{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,24]],"date-time":"2026-01-24T00:32:12Z","timestamp":1769214732458,"version":"3.49.0"},"publisher-location":"Berlin, Heidelberg","reference-count":31,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783642231407","type":"print"},{"value":"9783642231414","type":"electronic"}],"license":[{"start":{"date-parts":[[2011,1,1]],"date-time":"2011-01-01T00:00:00Z","timestamp":1293840000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011]]},"DOI":"10.1007\/978-3-642-23141-4_9","type":"book-chapter","created":{"date-parts":[[2011,8,17]],"date-time":"2011-08-17T12:36:48Z","timestamp":1313584608000},"page":"87-100","source":"Crossref","is-referenced-by-count":33,"title":["The Proactive and Reactive Digital Forensics Investigation Process: A Systematic Literature Review"],"prefix":"10.1007","author":[{"given":"Soltan","family":"Alharbi","sequence":"first","affiliation":[]},{"given":"Jens","family":"Weber-Jahnke","sequence":"additional","affiliation":[]},{"given":"Issa","family":"Traore","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"9_CR1","doi-asserted-by":"crossref","unstructured":"Grobler, C.P., Louwrens, C.P., von Solms, S.H.: A Multi-component View of Digital Forensics. In: ARES 2010 International Conference on Availability, Reliability, and Security, pp. 647\u2013652 (2010)","DOI":"10.1109\/ARES.2010.61"},{"key":"9_CR2","unstructured":"Garfinkel, S.: Anti-forensics: Techniques, detection and countermeasures. In: 2nd International Conference on i-Warfare and Security, p. 77 (2007)"},{"key":"9_CR3","doi-asserted-by":"publisher","first-page":"64","DOI":"10.1016\/j.diin.2010.05.009","volume":"7","author":"S.L. Garfinkel","year":"2010","unstructured":"Garfinkel, S.L.: Digital forensics research: The next 10 years. Digital Investigation\u00a07, S64\u2013S73 (2010)","journal-title":"Digital Investigation"},{"key":"9_CR4","doi-asserted-by":"publisher","first-page":"37","DOI":"10.1080\/15567280600626411","volume":"1","author":"A. Orebaugh","year":"2006","unstructured":"Orebaugh, A.: Proactive forensics. Journal of Digital Forensic Practice\u00a01, 37 (2006)","journal-title":"Journal of Digital Forensic Practice"},{"key":"9_CR5","doi-asserted-by":"publisher","first-page":"571","DOI":"10.1016\/j.jss.2006.07.009","volume":"80","author":"P. Brereton","year":"2007","unstructured":"Brereton, P., Kitchenham, B.A., Budgen, D., Turner, M., Khalil, M.: Lessons from applying the systematic literature review process within the software engineering domain. Journal of Systems and Software\u00a080, 571\u2013583 (2007)","journal-title":"Journal of Systems and Software"},{"key":"9_CR6","first-page":"1","volume":"2","author":"R. Rowlingson","year":"2004","unstructured":"Rowlingson, R.: A ten step process for forensic readiness. International Journal of Digital Evidence\u00a02, 1\u201328 (2004)","journal-title":"International Journal of Digital Evidence"},{"key":"9_CR7","unstructured":"Palmer, G.: A road map for digital forensics research-report from the first Digital Forensics Research Workshop (DFRWS), Utica, New York (2001)"},{"key":"9_CR8","first-page":"1","volume":"1","author":"R. Mark","year":"2002","unstructured":"Mark, R., Clint, C., Gregg, G.: An Examination of Digital Forensic Models. International Journal of Digital Evidence\u00a01, 1\u201312 (2002)","journal-title":"International Journal of Digital Evidence"},{"key":"9_CR9","unstructured":"Carrier, B., Spafford, E.: An event-based digital forensic investigation framework. In: Proceeding of the 4th Digital Forensic Research Workshop, pp. 11\u201313 (2004)"},{"key":"9_CR10","first-page":"790","volume":"5","author":"V. Baryamureeba","year":"2006","unstructured":"Baryamureeba, V., Tushabe, F.: The Enhanced Digital Investigation Process Model. Asian Journal of Information Technology\u00a05, 790\u2013794 (2006)","journal-title":"Asian Journal of Information Technology"},{"key":"9_CR11","unstructured":"Kohn, M., Eloff, J., Olivier, M.: Framework for a digital forensic investigation. In: Proceedings of Information Security South Africa (ISSA) 2006 from Insight to Foresight Conference (2006)"},{"key":"9_CR12","doi-asserted-by":"publisher","first-page":"42","DOI":"10.1016\/S1363-4127(03)00206-1","volume":"8","author":"P. Stephenson","year":"2003","unstructured":"Stephenson, P.: A comprehensive approach to digital incident investigation. Information Security Technical Report\u00a08, 42\u201354 (2003)","journal-title":"Information Security Technical Report"},{"key":"9_CR13","doi-asserted-by":"crossref","unstructured":"Stephenson, P.: Completing the Post Mortem Investigation. Computer Fraud & Security, 17\u201320 (2003)","DOI":"10.1016\/S1361-3723(03)10010-3"},{"key":"9_CR14","doi-asserted-by":"publisher","first-page":"75","DOI":"10.1016\/S0065-2458(03)60003-3","volume":"60","author":"W. Harrison","year":"2004","unstructured":"Harrison, W.: The digital detective: An introduction to digital forensics. Advances in Computers\u00a060, 75\u2013119 (2004)","journal-title":"Advances in Computers"},{"key":"9_CR15","doi-asserted-by":"publisher","first-page":"147","DOI":"10.1016\/j.diin.2005.04.002","volume":"2","author":"N.L. Beebe","year":"2005","unstructured":"Beebe, N.L., Clark, J.G.: A hierarchical, objectives-based framework for the digital investigations process. Digital Investigation\u00a02, 147\u2013167 (2005)","journal-title":"Digital Investigation"},{"key":"9_CR16","doi-asserted-by":"publisher","first-page":"29","DOI":"10.1016\/j.diin.2006.06.004","volume":"3","author":"R.S.C. Ieong","year":"2006","unstructured":"Ieong, R.S.C.: FORZA - Digital forensics investigation framework that incorporate legal issues. Digital Investigation\u00a03, 29\u201336 (2006)","journal-title":"Digital Investigation"},{"key":"9_CR17","doi-asserted-by":"crossref","unstructured":"Khatir, M., Hejazi, S.M., Sneiders, E.: Two-Dimensional Evidence Reliability Amplification Process Model for Digital Forensics. In: Third International Annual Workshop on Digital Forensics and Incident Analysis, WDFIA 2008, pp. 21\u201329 (2008)","DOI":"10.1109\/WDFIA.2008.11"},{"key":"9_CR18","doi-asserted-by":"crossref","unstructured":"Pollitt, M.M.: An Ad Hoc Review of Digital Forensic Models. In: Second International Workshop on Systematic Approaches to Digital Forensic Engineering, SADFE 2007, pp. 43\u201354 (2007)","DOI":"10.1109\/SADFE.2007.3"},{"key":"9_CR19","doi-asserted-by":"crossref","unstructured":"Yong-Dal, S.: New Digital Forensics Investigation Procedure Model. In: Fourth International Conference on Networked Computing and Advanced Information Management, NCM 2008, pp. 528\u2013531 (2008)","DOI":"10.1109\/NCM.2008.116"},{"key":"9_CR20","doi-asserted-by":"publisher","first-page":"277","DOI":"10.1007\/978-3-642-04155-6_21","volume-title":"Advances in Digital Forensics V","author":"D. Billard","year":"2009","unstructured":"Billard, D.: An Extended Model for E-Discovery Operations. In: Peterson, G., Shenoi, S. (eds.) Advances in Digital Forensics V, vol.\u00a0306, pp. 277\u2013287. Springer, Boston (2009)"},{"key":"9_CR21","doi-asserted-by":"publisher","first-page":"291","DOI":"10.1007\/978-3-642-04155-6_22","volume-title":"Advances in Digital Forensics V","author":"A. Tanner","year":"2009","unstructured":"Tanner, A., Dampier, D.: Concept Mapping for Digital Forensic Investigations. In: Peterson, G., Shenoi, S. (eds.) Advances in Digital Forensics V, vol.\u00a0306, pp. 291\u2013300. Springer, Boston (2009)"},{"key":"9_CR22","doi-asserted-by":"publisher","first-page":"184","DOI":"10.1007\/978-3-642-01112-2_19","volume-title":"Information Systems: Modeling, Development, and Integration","author":"C. Ruan","year":"2009","unstructured":"Ruan, C., Huebner, E.: Formalizing Computer Forensics Process with UML. In: Yang, J., Ginige, A., Mayr, H.C., Kutsche, R.-D. (eds.) Information Systems: Modeling, Development, and Integration, vol.\u00a020, pp. 184\u2013189. Springer, Heidelberg (2009)"},{"key":"9_CR23","doi-asserted-by":"publisher","first-page":"37","DOI":"10.1007\/978-3-642-04155-6_3","volume-title":"Advances in Digital Forensics V","author":"J. Slay","year":"2009","unstructured":"Slay, J., Lin, Y.-C., Turnbull, B., Beckett, J., Lin, P.: Towards a Formalization of Digital Forensics. In: Peterson, G., Shenoi, S. (eds.) Advances in Digital Forensics V, pp. 37\u201347. Springer, Boston (2009)"},{"key":"9_CR24","first-page":"343","volume-title":"Ethical and Social Issues in the Information Age","author":"J. Kizza","year":"2007","unstructured":"Kizza, J.: Computer Crime Investigations-Computer Forensics. In: Ethical and Social Issues in the Information Age, pp. 343\u2013358. Springer, London (2007)"},{"key":"9_CR25","first-page":"163","volume":"8","author":"S. Selamat","year":"2008","unstructured":"Selamat, S., Yusof, R., Sahib, S.: Mapping process of digital forensic investigation framework. IJCSNS\u00a08, 163 (2008)","journal-title":"IJCSNS"},{"key":"9_CR26","first-page":"38","volume":"9","author":"S. Perumal","year":"2009","unstructured":"Perumal, S.: Digital forensic model based on Malaysian investigation process. IJCSNS\u00a09, 38 (2009)","journal-title":"IJCSNS"},{"key":"9_CR27","first-page":"1","volume":"2","author":"B. Carrier","year":"2003","unstructured":"Carrier, B., Spafford, E.: Getting physical with the digital investigation process. International Journal of Digital Evidence\u00a02, 1\u201320 (2003)","journal-title":"International Journal of Digital Evidence"},{"key":"9_CR28","first-page":"1","volume":"3","author":"S. Ciardhu\u2219in","year":"2004","unstructured":"Ciardhu\u2219in, S.: An extended model of cybercrime investigations. International Journal of Digital Evidence\u00a03, 1\u201322 (2004)","journal-title":"International Journal of Digital Evidence"},{"key":"9_CR29","first-page":"27","volume":"1","author":"M. Rogers","year":"2006","unstructured":"Rogers, M., Goldman, J., Mislan, R., Wedge, T., Debrota, S.: Computer forensics field triage process model. Journal of Digital Forensics, Security and Law\u00a01, 27\u201340 (2006)","journal-title":"Journal of Digital Forensics, Security and Law"},{"key":"9_CR30","unstructured":"Freiling, F., Schwittay, B.: A common process model for incident response and computer forensics. In: 3rd International Conference on IT-Incident Management and IT- Forensic (2007)"},{"key":"9_CR31","doi-asserted-by":"crossref","unstructured":"Kent, K., Chevalier, S., Grance, T., Dang, H.: \"Guide to Integrating Forensic Techniques into Incident Response. NIST Special Publication 800-86 (2006)","DOI":"10.6028\/NIST.SP.800-86"}],"container-title":["Communications in Computer and Information Science","Information Security and Assurance"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-23141-4_9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,8]],"date-time":"2025-03-08T21:26:24Z","timestamp":1741469184000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-23141-4_9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011]]},"ISBN":["9783642231407","9783642231414"],"references-count":31,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-23141-4_9","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"value":"1865-0929","type":"print"},{"value":"1865-0937","type":"electronic"}],"subject":[],"published":{"date-parts":[[2011]]}}}