{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,13]],"date-time":"2026-03-13T14:30:19Z","timestamp":1773412219202,"version":"3.50.1"},"publisher-location":"Cham","reference-count":22,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783319125671","type":"print"},{"value":"9783319125688","type":"electronic"}],"license":[{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-662-44952-3_22","type":"book-chapter","created":{"date-parts":[[2014,10,9]],"date-time":"2014-10-09T16:38:21Z","timestamp":1412872701000},"page":"327-335","source":"Crossref","is-referenced-by-count":1,"title":["Educating the Next Generation of Cyberforensic Professionals"],"prefix":"10.1007","author":[{"given":"Mark","family":"Pollitt","sequence":"first","affiliation":[]},{"given":"Philip","family":"Craiger","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"22_CR1","unstructured":"AccessData, AccessData, Lindon, Utah (\n                    \n                      www.accessdata.com\n                    \n                    \n                  )."},{"key":"22_CR2","unstructured":"Advanced Cyberforensics Education Consortium, Advanced Cyberforensics Education (ACE), Daytona State College, Daytona, Florida (\n                    \n                      http:\/\/cyberace.org\n                    \n                    \n                  )."},{"key":"22_CR3","unstructured":"American Academy of Forensic Sciences, Digital and Multimedia Sciences, Colorado Springs, Colorado (\n                    \n                      http:\/\/aafs.org\/about\/sections\/digital-multimedia-sciences\n                    \n                    \n                  )."},{"key":"22_CR4","unstructured":"American Society of Crime Laboratory Directors\/Laboratory Accreditation Board, Accredited Laboratory Index, Garner, North Carolina (\n                    \n                      www.ascld-lab.org\/accredited-laboratory-index\n                    \n                    \n                  )."},{"key":"22_CR5","unstructured":"Defense Cyber Crime Center, CDFAE, Linthicum, Maryland (\n                    \n                      www.dc3.mil\/cyber-training\/cdfae\n                    \n                    \n                  )."},{"key":"22_CR6","unstructured":"Digital Forensics Certification Board, Digital Forensics Certification Board (DFCB) (\n                    \n                      http:\/\/dfcb.org\n                    \n                    \n                  )."},{"key":"22_CR7","unstructured":"European Network of Forensic Science Institutes, Structure, Warsaw, Poland (\n                    \n                      www.enfsi.eu\/about-enfsi\/structure\n                    \n                    \n                  )."},{"key":"22_CR8","unstructured":"Forensic Science Education Program Accreditation Commission, Forensic Science Education Program Accreditation Commission (FEPAC), Colorado Springs, Colorado (\n                    \n                      http:\/\/fepac-edu.org\n                    \n                    \n                  )."},{"key":"22_CR9","unstructured":"Guidance Software, Guidance Software, Pasadena, California (\n                    \n                      www.guidancesoftware.com\n                    \n                    \n                  )."},{"key":"22_CR10","volume-title":"Wired","author":"M. Honan","year":"2013","unstructured":"M. Honan, I. Glasshole: My year with Google Glass, Wired (\n                    \n                      www.wired.com\/2013\/12\/glasshole\n                    \n                    \n                  ), December 30, 2013."},{"key":"22_CR11","unstructured":"International Association of Computer Investigative Specialists, About IACIS, Leesburg, Virginia (\n                    \n                      www.iacis.com\/about\/overview\n                    \n                    \n                  )."},{"key":"22_CR12","unstructured":"International Information Systems Security Certification Consortium, (ISC)2, Clearwater, Florida (\n                    \n                      www.isc2.org\/\/default.aspx\n                    \n                    \n                  )"},{"key":"22_CR13","unstructured":"International Organization on Computer Evidence, Guidelines for Best Practice in the Forensic Examination of Digital Technology (\n                    \n                      www.ioce.org\/fileadmin\/user_upload\/2002\/ioce_bp_exam_digit_tech.html\n                    \n                    \n                  )."},{"key":"22_CR14","unstructured":"International Society of Forensic Computer Examiners, International Society of Forensic Computer Examiners (ISFCE), Brentwood, Tennessee (\n                    \n                      www.isfce.com\/index.html\n                    \n                    \n                  )."},{"key":"22_CR15","doi-asserted-by":"publisher","DOI":"10.7208\/chicago\/9780226458106.001.0001","volume-title":"The Structure of Scientific Revolutions","author":"T. Kuhn","year":"1996","unstructured":"T. Kuhn, The Structure of Scientific Revolutions, University of Chicago Press, Chicago, Illinois, 1996."},{"key":"22_CR16","unstructured":"J. Markoff, Google cars drive themselves, in traffic, New York Times, October 9, 2010."},{"key":"22_CR17","unstructured":"National Institute of Standards and Technology, National Initiative for Cybersecurity Education (NICE), Gaithersburg, Maryland (\n                    \n                      http:\/\/csrc.nist.gov\/nice\n                    \n                    \n                  )."},{"key":"22_CR18","unstructured":"Pew Research Internet Project, Mobile Technology Fact Sheet, Pew Research Center, Washington, DC (\n                    \n                      www.pewinternet.org\/fact-sheets\/mobile-technology-fact-sheet\n                    \n                    \n                  ), 2014."},{"key":"22_CR19","series-title":"IFIP Advances in Information and Communication Technology","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/978-3-642-15506-2_1","volume-title":"Advances in Digital Forensics VI","author":"M. Pollitt","year":"2010","unstructured":"M. Pollitt, A history of digital forensics, in Advances in Digital Forensics VI, K. Chow and S. Shenoi (Eds.), Springer, Heidelberg, Germany, pp. 3\u201315, 2010."},{"key":"22_CR20","unstructured":"Scientific Working Group on Digital Evidence, Scientific Working Group on Digital Evidence (\n                    \n                      www.swgde.org\n                    \n                    \n                  )."},{"key":"22_CR21","unstructured":"E. Tittel, Best computer forensics certifications for 2014, Tom\u2019s IT Pro (\n                    \n                      www.tomsitpro.com\/articles\/computer-forensics-certifications,2-650.html\n                    \n                    \n                  ), November 15, 2013."},{"key":"22_CR22","unstructured":"West Virginia University Forensic Science Initiative, Technical Working Group for Education and Training in Digital Forensics, Morgantown, West Virginia (\n                    \n                      www.ncjrs.gov\/pdffiles1\/nij\/grants\/219380.pdf\n                    \n                    \n                  ), 2007."}],"container-title":["Lecture Notes in Computer Science","Progress in Pattern Recognition, Image Analysis, Computer Vision, and Applications"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-662-44952-3_22","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,28]],"date-time":"2019-05-28T03:00:50Z","timestamp":1559012450000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-662-44952-3_22"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783319125671","9783319125688"],"references-count":22,"URL":"https:\/\/doi.org\/10.1007\/978-3-662-44952-3_22","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2014]]}}}