{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T12:10:30Z","timestamp":1725538230230},"publisher-location":"Berlin, Heidelberg","reference-count":14,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642041549"},{"type":"electronic","value":"9783642041556"}],"license":[{"start":{"date-parts":[[2009,1,1]],"date-time":"2009-01-01T00:00:00Z","timestamp":1230768000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009]]},"DOI":"10.1007\/978-3-642-04155-6_20","type":"book-chapter","created":{"date-parts":[[2009,9,29]],"date-time":"2009-09-29T12:04:42Z","timestamp":1254225882000},"page":"267-276","source":"Crossref","is-referenced-by-count":10,"title":["A Survey of the Legal Issues Facing Digital Forensic Experts"],"prefix":"10.1007","author":[{"given":"Sydney","family":"Liles","sequence":"first","affiliation":[]},{"given":"Marcus","family":"Rogers","sequence":"additional","affiliation":[]},{"given":"Marianne","family":"Hoebich","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"20_CR1","unstructured":"V. Baryamureeba and F. Tushabe, The enhanced digital investigation process model, Proceedings of the Fourth Digital Forensic Research Workshop, 2004."},{"issue":"3","key":"20_CR2","doi-asserted-by":"publisher","first-page":"408","DOI":"10.1108\/13639510610684674","volume":"29","author":"R. Broadhurst","year":"2006","unstructured":"R. Broadhurst, Developments in the global law enforcement of cyber-crime, Policing: International Journal of Police Strategies and Management, vol. 29(3), pp. 408\u2013433, 2006.","journal-title":"Policing: International Journal of Police Strategies and Management"},{"key":"20_CR3","unstructured":"V. Broucek and P. Turner, Bridging the divide: Rising awareness of forensic issues amongst systems administrators, presented at the Third International System Administration and Networking Conference, 2002."},{"issue":"2","key":"20_CR4","doi-asserted-by":"publisher","first-page":"57","DOI":"10.1201\/1078\/45099.22.2.20050301\/87278.7","volume":"22","author":"A. Brungs","year":"2005","unstructured":"A. Brungs and R. Jamieson, Identification of legal issues for computer forensics, Information Systems Management, vol. 22(2), pp. 57\u201366, 2005.","journal-title":"Information Systems Management"},{"key":"20_CR5","unstructured":"M. Carney and M. Rogers, The Trojan made me do it: A first step in statistical based computer forensics event reconstruction, International Journal of Digital Evidence, vol. 2(4), 2004."},{"issue":"1","key":"20_CR6","doi-asserted-by":"publisher","first-page":"35","DOI":"10.1080\/13600834.1999.9965797","volume":"8","author":"J. Conley","year":"1999","unstructured":"J. Conley and R. Bryan, A survey of computer crime legislation in the United States, Information and Communications Technology Law, vol. 8(1), pp. 35\u201358, 1999.","journal-title":"Information and Communications Technology Law"},{"issue":"3","key":"20_CR7","doi-asserted-by":"publisher","first-page":"127","DOI":"10.1023\/A:1024713424863","volume":"15","author":"N. King","year":"2003","unstructured":"N. King, Electronic monitoring to promote national security impacts workplace privacy, Employee Responsibilities and Rights Journal, vol. 15(3), pp. 127\u2013147, 2003.","journal-title":"Employee Responsibilities and Rights Journal"},{"key":"20_CR8","unstructured":"R. Laubscher, D. Rabe, M. Olivier, J. Eloff and H. Venter, Computer forensics for a computer-based assessment: The preparation phase, Proceedings of the Fifth Annual Information Security South Africa Conference, 2005."},{"key":"20_CR9","unstructured":"M. Meyers and M. Rogers, Computer forensics: The need for standardization and certification, International Journal of Digital Evidence, vol. 3(2), 2004."},{"issue":"1","key":"20_CR10","doi-asserted-by":"publisher","first-page":"27","DOI":"10.1023\/B:CRIM.0000037565.32355.10","volume":"10","author":"F. Pocar","year":"2004","unstructured":"F. Pocar, New challenges for international rules against cyber-crime, European Journal on Criminal Policy and Research, vol. 10(1), pp. 27\u201337, 2004.","journal-title":"European Journal on Criminal Policy and Research"},{"issue":"1","key":"20_CR11","doi-asserted-by":"publisher","first-page":"47","DOI":"10.1080\/15536548.2006.10855786","volume":"2","author":"L. Reid","year":"2006","unstructured":"L. Reid, Expert opinion: Interview with Amanda M. Hubbard, J.D., Fulbright Scholar, former trial attorney, Computer Crime and Intellectual Property Section, U.S. Department of Justice, Journal of Information Privacy and Security, vol. 2(1), pp. 47\u201356, 2006.","journal-title":"Journal of Information Privacy and Security"},{"key":"20_CR12","unstructured":"M. Reith, C. Carr and G. Gunsch, An examination of digital forensic models, International Journal of Digital Evidence, vol. 1(3), 2002."},{"key":"20_CR13","unstructured":"M. Saudi, An Overview of Disk Imaging Tools in Computer Forensics, InfoSec Reading Room, SANS Institute, Bethesda, Maryland, 2001."},{"key":"20_CR14","unstructured":"F. Witter, Legal Aspects of Collecting and Preserving Computer Forensic Evidence, InfoSec Reading Room, SANS Institute, Bethesda, Maryland, 2001."}],"container-title":["IFIP Advances in Information and Communication Technology","Advances in Digital Forensics V"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-04155-6_20","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,3,10]],"date-time":"2019-03-10T00:31:50Z","timestamp":1552177910000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-04155-6_20"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009]]},"ISBN":["9783642041549","9783642041556"],"references-count":14,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-04155-6_20","relation":{},"ISSN":["1868-4238","1868-422X"],"issn-type":[{"type":"print","value":"1868-4238"},{"type":"electronic","value":"1868-422X"}],"subject":[],"published":{"date-parts":[[2009]]}}}