{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,28]],"date-time":"2025-09-28T20:25:58Z","timestamp":1759091158177},"publisher-location":"Berlin, Heidelberg","reference-count":23,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642041549"},{"type":"electronic","value":"9783642041556"}],"license":[{"start":{"date-parts":[[2009,1,1]],"date-time":"2009-01-01T00:00:00Z","timestamp":1230768000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009]]},"DOI":"10.1007\/978-3-642-04155-6_11","type":"book-chapter","created":{"date-parts":[[2009,9,29]],"date-time":"2009-09-29T08:04:42Z","timestamp":1254211482000},"page":"143-155","source":"Crossref","is-referenced-by-count":12,"title":["A Forensic Framework for Handling Information Privacy Incidents"],"prefix":"10.1007","author":[{"given":"Kamil","family":"Reddy","sequence":"first","affiliation":[]},{"given":"Hein","family":"Venter","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"4","key":"11_CR1","doi-asserted-by":"publisher","first-page":"229","DOI":"10.1016\/j.csi.2007.10.008","volume":"30","author":"G. Antoniou","year":"2008","unstructured":"G. Antoniou, L. Sterling, S. Gritzalis and P. Udaya, Privacy and forensics investigation process: The ERPINA protocol, Computer Standards and Interfaces, vol. 30(4), pp. 229\u2013236, 2008.","journal-title":"Computer Standards and Interfaces"},{"issue":"6","key":"11_CR2","doi-asserted-by":"publisher","first-page":"15","DOI":"10.1145\/1349026.1349030","volume":"51","author":"H. Berghel","year":"2008","unstructured":"H. Berghel, BRAP forensics, Communications of the ACM, vol. 51(6), pp. 15\u201320, 2008.","journal-title":"Communications of the ACM"},{"key":"11_CR3","first-page":"125","volume-title":"Technology and Privacy: The New Landscape","author":"H. Burkert","year":"1997","unstructured":"H. Burkert, Privacy-enhancing technologies: Typology, critique, vision, in Technology and Privacy: The New Landscape, P. Agre and M. Rotenberg (Eds.), MIT Press, Cambridge, Massachusetts, pp. 125\u2013142, 1997."},{"key":"11_CR4","volume-title":"Privacy Protection and Computer Forensics","author":"M. Caloyannides","year":"2004","unstructured":"M. Caloyannides, Privacy Protection and Computer Forensics, Artech House, Norwood, Massachusetts, 2004."},{"key":"11_CR5","unstructured":"Canadian Institute of Chartered Accountants, Generally Accepted Privacy Principles, Toronto, Canada (www.cica.ca\/index.cfm\/ci_id \/258\/la_id\/1.htm)."},{"key":"11_CR6","unstructured":"B. Carrier and E. Spafford, An event-based digital forensic investigation framework, Proceedings of the Fourth Digital Forensic Research Workshop, 2004."},{"key":"11_CR7","volume-title":"Introduction to Dataveillance and Information Privacy and Definitions of Terms","author":"R. Clarke","year":"2006","unstructured":"R. Clarke, Introduction to Dataveillance and Information Privacy and Definitions of Terms, Xamax Consultancy, Chapman, Australia (www.rogerclarke.com\/DV\/Intro.html), 2006."},{"issue":"3","key":"11_CR8","doi-asserted-by":"publisher","first-page":"1","DOI":"10.4304\/jcp.2.3.1-11","volume":"2","author":"B. Endicott-Popovsky","year":"2007","unstructured":"B. Endicott-Popovsky, D. Frincke and C. Taylor, A theoretical framework for organizational network forensic readiness, Journal of Computers, vol. 2(3), pp. 1\u201311, 2007.","journal-title":"Journal of Computers"},{"key":"11_CR9","first-page":"193","volume-title":"Technology and Privacy: The New Landscape","author":"R. Gellman","year":"1997","unstructured":"R. Gellman, Does privacy law work? in Technology and Privacy: The New Landscape, P. Agre and M. Rotenberg (Eds.), MIT Press, Cambridge, Massachusetts, pp. 193\u2013218, 1997."},{"key":"11_CR10","unstructured":"International Association of Privacy Professionals, IAPP Privacy Certification, York, Maine (www.privacyassociation.org\/index.php? option=com_content&task=view&id=17&Itemid=80)."},{"key":"11_CR11","volume-title":"South African Consumers\u2019 Information Privacy Concerns: An Investigation in a Commercial Environment, Ph","author":"Y. Jordaan","year":"2003","unstructured":"Y. Jordaan, South African Consumers\u2019 Information Privacy Concerns: An Investigation in a Commercial Environment, Ph.D. Thesis, Department of Marketing and Communication Management, University of Pretoria, Pretoria, South Africa, 2003."},{"key":"11_CR12","unstructured":"S. Lau, Good privacy practices and good corporate governance \u2013 Hong Kong experience, Proceedings of the Twenty-Third International Conference of Data Protection Commissioners, 2001."},{"issue":"2","key":"11_CR13","doi-asserted-by":"publisher","first-page":"91","DOI":"10.1016\/j.cose.2006.01.002","volume":"25","author":"V. Luoma","year":"2006","unstructured":"V. Luoma, Computer forensics and electronic discovery: The new management challenge, Computers and Security, vol. 25(2), pp. 91\u201396, 2006.","journal-title":"Computers and Security"},{"key":"11_CR14","doi-asserted-by":"crossref","unstructured":"G. Mohay, Technical challenges and directions for digital forensics, Proceedings of the First International Workshop on Systematic Approaches to Digital Forensic Engineering, pp. 155\u2013161, 2005.","DOI":"10.1109\/SADFE.2005.24"},{"key":"11_CR15","unstructured":"M. Noblett, M. Pollitt and L. Presley, Recovering and examining computer forensic evidence, Forensic Science Communications, vol. 2(4), 2000."},{"key":"11_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"110","DOI":"10.1007\/978-3-540-30079-3_12","volume-title":"Trust and Privacy in Digital Business","author":"A.D. Oliver-Lalana","year":"2004","unstructured":"A. Oliver-Lalana, Consent as a threat: A critical approach to privacy negotiation in e-commerce practices, Proceedings of the First International Conference on Trust and Privacy in Digital Business, pp. 110\u2013119, 2004."},{"key":"11_CR17","unstructured":"Organization for Economic Cooperation and Development, OECD Guidelines on the Protection of Privacy and Transborder Flows of Personal Data, Paris, France (www.oecd.org\/document\/18\/0,3343, en_2649_34255_1815186_1_1_1_1,00.html)."},{"key":"11_CR18","unstructured":"K. Reddy and H. Venter, Privacy Capability Maturity Models within telecommunications organizations, Proceedings of the Southern African Telecommunication Networks and Applications Conference, 2007."},{"key":"11_CR19","unstructured":"R. Rowlingson, A ten step process for forensic readiness, International Journal of Digital Evidence, vol. 2(3), 2004."},{"key":"11_CR20","unstructured":"South African Law Reform Commission, Privacy and Data Protection, Discussion Paper 109, Project 124, Pretoria, South Africa (www.doj.gov.za\/salrc\/dpapers.htm), 2005."},{"issue":"S1","key":"11_CR21","doi-asserted-by":"publisher","first-page":"101","DOI":"10.1016\/j.diin.2007.06.006","volume":"4","author":"C. Taylor","year":"2007","unstructured":"C. Taylor, B. Endicott-Popovsky and D. Frincke, Specifying digital forensics: A forensics policy approach, Digital Investigation, vol. 4(S1), pp. 101\u2013104, 2007.","journal-title":"Digital Investigation"},{"issue":"6","key":"11_CR22","doi-asserted-by":"publisher","first-page":"13","DOI":"10.1016\/S1361-3723(04)00077-6","volume":"2004","author":"H. Wolf","year":"2004","unstructured":"H. Wolf, The question of organizational forensic policy, Computer Fraud and Security, vol. 2004(6), pp. 13\u201314, 2004.","journal-title":"Computer Fraud and Security"},{"key":"11_CR23","unstructured":"A. Yasinsac and Y. Manzano, Policies to enhance computer and network forensics, Proceedings of the Second IEEE Workshop on Information Assurance and Security, pp. 289\u2013295, 2001."}],"container-title":["IFIP Advances in Information and Communication Technology","Advances in Digital Forensics V"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-04155-6_11","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,3,9]],"date-time":"2019-03-09T20:05:09Z","timestamp":1552161909000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-04155-6_11"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009]]},"ISBN":["9783642041549","9783642041556"],"references-count":23,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-04155-6_11","relation":{},"ISSN":["1868-4238","1868-422X"],"issn-type":[{"type":"print","value":"1868-4238"},{"type":"electronic","value":"1868-422X"}],"subject":[],"published":{"date-parts":[[2009]]}}}