{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,29]],"date-time":"2025-09-29T07:47:14Z","timestamp":1759132034377},"publisher-location":"Berlin, Heidelberg","reference-count":24,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642398902"},{"type":"electronic","value":"9783642398919"}],"license":[{"start":{"date-parts":[[2013,1,1]],"date-time":"2013-01-01T00:00:00Z","timestamp":1356998400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-642-39891-9_20","type":"book-chapter","created":{"date-parts":[[2013,10,1]],"date-time":"2013-10-01T01:28:17Z","timestamp":1380590897000},"page":"314-327","source":"Crossref","is-referenced-by-count":15,"title":["A Review and Comparative Study of Digital Forensic Investigation Models"],"prefix":"10.1007","author":[{"given":"Kwaku","family":"Kyei","sequence":"first","affiliation":[]},{"given":"Pavol","family":"Zavarsky","sequence":"additional","affiliation":[]},{"given":"Dale","family":"Lindskog","sequence":"additional","affiliation":[]},{"given":"Ron","family":"Ruhl","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"20_CR1","unstructured":"Boateng, R., et al.: Cyber Crime and Criminality in Ghana: Its Forms and Implications. In: Proceedings of the 16th Americas Conference on Information Systems (2010)"},{"key":"20_CR2","doi-asserted-by":"crossref","unstructured":"Smith, R.G., Grabosky, P.N., Urbas, G.: Cybercriminals on trial. Cambridge University Press (2004) ISBN: 9780521840477","DOI":"10.1017\/CBO9780511481604"},{"key":"20_CR3","doi-asserted-by":"crossref","unstructured":"Kent, K., Chevalier, S., Grance, T., Dang, H.: NIST SP 800-86 Guide to Integrating Forensic Techniques into Incident Response (2006)","DOI":"10.6028\/NIST.SP.800-86"},{"key":"20_CR4","unstructured":"Agarwal, A., et al.: Systematic Digital Forensic Investigation Model (2011), \n                    \n                      http:\/\/www.cscjournals.org\/csc\/manuscript\/journals\/IJCSS\/Volume5\/Issue1\/IJCSS-438.pdf"},{"key":"20_CR5","unstructured":"Kruse, W.J., Heiser, G.: Computer Forensics: Incident Response Essentials. Addison-Wesley (2002) ISBN 0-201-70719-5"},{"key":"20_CR6","unstructured":"Palmer, G.: A Road Map for Digital Forensic Research. Technical Report DTR-T001-01, DFRW, Report From the First Digital Forensic Research Workshop, Utica, NY (2001)"},{"key":"20_CR7","unstructured":"Reith, M., Carr, C., Gunsch, G.: An Examination of Digital Forensic Models. International Journal of Digital Evidence\u00a01(3) (2002)"},{"key":"20_CR8","unstructured":"Carrier, B., Spafford, E.H.: Getting Physical with the Investigative Process. International Journal of Digital Evidence\u00a02(2) (Fall 2003)"},{"key":"20_CR9","unstructured":"Lee, H., Palmbach, T., Miller, M.: Henry Lee\u2019s Crime Scene Handbook, Academic Press (2001) ISBN-13: 978-0124408302"},{"key":"20_CR10","unstructured":"Baryamureeba, V., Tushabe, F.: Enhanced Digital Investigation Process Model, Digital Forensic Research Workshop, Baltimore, MD, USA (2004)"},{"key":"20_CR11","unstructured":"Ciardhu\u00e1in, S.O.: An Extended Model of Cybercrime Investigations. In:International Journal of Digital Evidence\u00a03(1) (Summer 2004)"},{"key":"20_CR12","unstructured":"Perumal, S.: Digital Forensic Model Based on Malaysian Investigation Process. IJCSNS International Journal of Computer Science and Network Security\u00a09(8) (August 2009)"},{"key":"20_CR13","doi-asserted-by":"crossref","unstructured":"Ademu, I.O., Imafidon, C.O., Preston, D.S.: A New Approach of Digital Forensic Model for Digital Forensic Investigation. (IJACSA) International Journal of Advanced Computer Science and Applications\u00a02(12) (2011)","DOI":"10.14569\/IJACSA.2011.021226"},{"key":"20_CR14","unstructured":"Aghatise, E.J.: Computer Crime Research Center Cybercrime Definition (2006)"},{"key":"20_CR15","unstructured":"Carrier, B.: File System Forensic Analysis, Addison-Wesley (2005) ISBN 0-321-26817-2"},{"key":"20_CR16","unstructured":"Bunting, S.: Mastering Windows Network Forensic and Investigation, 1st edn. Sybex (2007) ISBN-13: 978-0470097625"},{"key":"20_CR17","unstructured":"Cressey, D.R.: Other People\u2019s Money: Study in the Social Psychology of Embezzlement. Wadsworth Publishing Company (1972) ISBN-13: 978-0534001421"},{"key":"20_CR18","unstructured":"Cosic, J., Baca, M.: A Framework to (Im)Prove \u201cChain of Custody\u201d in Digital Investigation Process. In: Proceedings of the CECIIS, Varazdin, Croatia (2010)"},{"key":"20_CR19","volume-title":"A social learning theory and moral disengagement analysis of criminal computer behavior: An exploratory study","author":"M.K. Roger","year":"2001","unstructured":"Roger, M.K.: A social learning theory and moral disengagement analysis of criminal computer behavior: An exploratory study. University of Manitoba, Winnipeg (2001)"},{"key":"20_CR20","unstructured":"Biros, D.P., et al.: Information Sharing: Hackers vs. law enforcement. In: Proceedings of the 9th Australian Information Warfare and Security Conference, Perth, Australia (2008)"},{"key":"20_CR21","unstructured":"Stephenson, P.: Modeling of Post-Incident Root Cause Analysis. International Journal of Digital Evidence\u00a02(2) (Fall 2003)"},{"key":"20_CR22","unstructured":"Turvey, B.: Criminal Profiling: An Introduction to behavioral evidence analysis, 4th edn. Elsevier (2012) ISBN 978-0-12-385243-4"},{"key":"20_CR23","unstructured":"ACFE Fraud Examiners Manual, Canadian Edition (2012)"},{"key":"20_CR24","unstructured":"Association of Chief Police Officers (ACPO): Good Practice Guide for Computer based Electronic Evidence (2006)"}],"container-title":["Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","Digital Forensics and Cyber Crime"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-39891-9_20","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,17]],"date-time":"2019-05-17T13:02:18Z","timestamp":1558098138000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-39891-9_20"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783642398902","9783642398919"],"references-count":24,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-39891-9_20","relation":{},"ISSN":["1867-8211","1867-822X"],"issn-type":[{"type":"print","value":"1867-8211"},{"type":"electronic","value":"1867-822X"}],"subject":[],"published":{"date-parts":[[2013]]}}}