{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T18:09:23Z","timestamp":1775066963561,"version":"3.50.1"},"reference-count":20,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2025,7,4]],"date-time":"2025-07-04T00:00:00Z","timestamp":1751587200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,7,4]],"date-time":"2025-07-04T00:00:00Z","timestamp":1751587200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Int. J. Inf. Secur."],"published-print":{"date-parts":[[2025,8]]},"DOI":"10.1007\/s10207-025-01079-z","type":"journal-article","created":{"date-parts":[[2025,7,4]],"date-time":"2025-07-04T00:44:18Z","timestamp":1751589858000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Preparing IoT-enabled organisations for digital forensics: model for readiness and resilience"],"prefix":"10.1007","volume":"24","author":[{"given":"Oyeyemi","family":"Kuku","sequence":"first","affiliation":[]},{"given":"Alexandros","family":"Chrysikos","sequence":"additional","affiliation":[]},{"given":"Shahram","family":"Salekzamankhani","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,7,4]]},"reference":[{"issue":"1","key":"1079_CR1","doi-asserted-by":"publisher","first-page":"111","DOI":"10.1186\/s40537-019-0268-2","volume":"6","author":"S Kumar","year":"2019","unstructured":"Kumar, S., Tiwari, P., Zymbler, M.: Internet of things is a revolutionary approach for future technology enhancement: a review. J. Big Data 6(1), 111 (2019). https:\/\/doi.org\/10.1186\/s40537-019-0268-2","journal-title":"J. Big Data"},{"issue":"3","key":"1079_CR2","doi-asserted-by":"publisher","first-page":"3","DOI":"10.51594\/csitrj.v5i3.929","volume":"5","author":"OT Modupe","year":"2024","unstructured":"Modupe, O.T., et al.: Reviewing the transformational impact of edge computing on real-time data processing and analytics. Comput. Sci. IT Res. J. 5(3), 3 (2024). https:\/\/doi.org\/10.51594\/csitrj.v5i3.929","journal-title":"Comput. Sci. IT Res. J."},{"issue":"10","key":"1079_CR3","doi-asserted-by":"publisher","first-page":"10217","DOI":"10.1016\/j.jksuci.2022.10.018","volume":"34","author":"O Isaac Abiodun","year":"2022","unstructured":"Isaac Abiodun, O., Alawida, M., Esther Omolara, A., Alabdulatif, A.: Data provenance for cloud forensic investigations, security, challenges, solutions and future perspectives: a survey. J. King Saud Univ .- Comput. Inf. Sci. 34(10), 10217\u201310245 (2022). https:\/\/doi.org\/10.1016\/j.jksuci.2022.10.018","journal-title":"J. King Saud Univ .- Comput. Inf. Sci."},{"issue":"12","key":"1079_CR4","doi-asserted-by":"publisher","first-page":"12","DOI":"10.3390\/app10124102","volume":"10","author":"L Tawalbeh","year":"2020","unstructured":"Tawalbeh, L., Muheidat, F., Tawalbeh, M., Quwaider, M.: IoT privacy and security: challenges and solutions. Appl. Sci. 10(12), 12 (2020). https:\/\/doi.org\/10.3390\/app10124102","journal-title":"Appl. Sci."},{"issue":"2","key":"1079_CR5","doi-asserted-by":"publisher","first-page":"1191","DOI":"10.1109\/COMST.2019.2962586","volume":"22","author":"M Stoyanova","year":"2020","unstructured":"Stoyanova, M., Nikoloudakis, Y., Panagiotakis, S., Pallis, E., Markakis, E.K.: A survey on the internet of things (iot) forensics: challenges, approaches, and open issues. IEEE Commun. Surv. Tutor. 22(2), 1191\u20131221 (2020). https:\/\/doi.org\/10.1109\/COMST.2019.2962586","journal-title":"IEEE Commun. Surv. Tutor."},{"issue":"3","key":"1079_CR6","doi-asserted-by":"publisher","first-page":"240","DOI":"10.1108\/DTS-08-2023-0061","volume":"3","author":"EJ Omol","year":"2023","unstructured":"Omol, E.J.: Organizational digital transformation: from evolution to future trends. Digit. Transform. Soc. 3(3), 240\u2013256 (2023). https:\/\/doi.org\/10.1108\/DTS-08-2023-0061","journal-title":"Digit. Transform. Soc."},{"key":"1079_CR7","doi-asserted-by":"publisher","first-page":"163","DOI":"10.1016\/j.procs.2020.03.194","volume":"167","author":"GS Pandi","year":"2020","unstructured":"Pandi, G.S., Shah, S., Wandra, K.H.: Exploration of vulnerabilities, threats and forensic issues and its impact on the distributed environment of cloud and its mitigation. Procedia Comput. Sci. 167, 163\u2013173 (2020). https:\/\/doi.org\/10.1016\/j.procs.2020.03.194","journal-title":"Procedia Comput. Sci."},{"key":"1079_CR8","doi-asserted-by":"publisher","first-page":"122877","DOI":"10.1016\/j.jclepro.2020.122877","volume":"274","author":"S Ni\u017eeti\u0107","year":"2020","unstructured":"Ni\u017eeti\u0107, S., \u0160oli\u0107, P., L\u00f3pez-de-Ipi\u00f1a Gonz\u00e1lez-de-Artaza, D., Patrono, L.: Internet of things (IoT): opportunities, issues and challenges towards a smart and sustainable future. J. Clean. Prod. 274, 122877 (2020). https:\/\/doi.org\/10.1016\/j.jclepro.2020.122877","journal-title":"J. Clean. Prod."},{"issue":"5","key":"1079_CR9","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3635030","volume":"56","author":"VR Kebande","year":"2024","unstructured":"Kebande, V.R., Awad, A.I.: Industrial internet of things ecosystems security and digital forensics: achievements, open challenges, and future directions. ACM Comput. Surv.Comput. Surv. 56(5), 1\u201337 (2024). https:\/\/doi.org\/10.1145\/3635030","journal-title":"ACM Comput. Surv.Comput. Surv."},{"key":"1079_CR10","doi-asserted-by":"publisher","first-page":"19469","DOI":"10.1109\/ACCESS.2022.3151403","volume":"10","author":"A Singh","year":"2022","unstructured":"Singh, A., Ikuesan, R.A., Venter, H.: Secure storage model for digital forensic readiness. IEEE Access 10, 19469\u201319480 (2022). https:\/\/doi.org\/10.1109\/ACCESS.2022.3151403","journal-title":"IEEE Access"},{"key":"1079_CR11","unstructured":"Sharma, P.: Enhancing cyber resilience: development, challenges, and strategic insights in cyber security report websites using artificial intelligence, Harrisbg. Univ. Diss. Theses, (2024). [Online]. Available: https:\/\/digitalcommons.harrisburgu.edu\/dandt\/1"},{"key":"1079_CR12","unstructured":"Avila, D.R.G., Miller, J.F., Iyengar, S.S.: Current challenges in iot security and forensics: strategies for a secure connected future, 2024, Accessed: Nov. 28, (2024). [Online]. Available: https:\/\/www.intechopen.com\/online-first\/1207070"},{"issue":"2","key":"1079_CR13","doi-asserted-by":"publisher","first-page":"2","DOI":"10.3390\/computers9020044","volume":"9","author":"MA Obaidat","year":"2020","unstructured":"Obaidat, M.A., Obeidat, S., Holst, J., Al Hayajneh, A., Brown, J.: A Comprehensive and systematic survey on the internet of things: security and privacy challenges, security frameworks, enabling technologies, threats, vulnerabilities and countermeasures. Computers 9(2), 2 (2020). https:\/\/doi.org\/10.3390\/computers9020044","journal-title":"Computers"},{"issue":"16","key":"1079_CR14","doi-asserted-by":"publisher","first-page":"16","DOI":"10.3390\/s24165210","volume":"24","author":"AA Ahmed","year":"2024","unstructured":"Ahmed, A.A., Farhan, K., Jabbar, W.A., Al-Othmani, A., Abdulrahman, A.G.: IoT forensics: current perspectives and future directions. Sensors 24(16), 16 (2024). https:\/\/doi.org\/10.3390\/s24165210","journal-title":"Sensors"},{"issue":"2","key":"1079_CR15","doi-asserted-by":"publisher","first-page":"37","DOI":"10.4018\/IJOCI.2020040103","volume":"10","author":"R Montasari","year":"2020","unstructured":"Montasari, R., Hill, R., Parkinson, S., Peltola, P., Hosseinian-Far, A., Daneshkhah, A.: Digital forensics: challenges and opportunities for future studies. Int. J. Organ. Collect. Intell. 10(2), 37\u201353 (2020). https:\/\/doi.org\/10.4018\/IJOCI.2020040103","journal-title":"Int. J. Organ. Collect. Intell."},{"issue":"2","key":"1079_CR16","doi-asserted-by":"publisher","first-page":"730","DOI":"10.3390\/app12020730","volume":"12","author":"FI Fagbola","year":"2022","unstructured":"Fagbola, F.I., Venter, H.S.: Smart digital forensic readiness model for shadow IoT devices. Appl. Sci. 12(2), 730 (2022)","journal-title":"Appl. Sci."},{"issue":"1","key":"1079_CR17","doi-asserted-by":"publisher","first-page":"121","DOI":"10.37934\/araset.50.1.121135","volume":"50","author":"R Rizal","year":"2025","unstructured":"Rizal, R., Selamat, S.R., Mas\u2019ud, M.Z., Widiyasono, N.: Enhanced readiness forensic framework for the complexity of internet of things (IoT) investigation based on artificial intelligence. J. Adv. Res. Appl. Sci. Eng. Technol. 50(1), 121\u2013135 (2025)","journal-title":"J. Adv. Res. Appl. Sci. Eng. Technol."},{"issue":"5","key":"1079_CR18","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3635030","volume":"56","author":"VR Kebande","year":"2024","unstructured":"Kebande, V.R., Awad, A.I.: Industrial internet of things ecosystems security and digital forensics: achievements, open challenges, and future directions. ACM Comput. Surv.Comput. Surv. 56(5), 1\u201337 (2024)","journal-title":"ACM Comput. Surv.Comput. Surv."},{"key":"1079_CR19","unstructured":"Lutta, P.: An internet of things forensics framework validated by machine learning, PhD Thesis, Staffordshire University (2024)"},{"key":"1079_CR20","unstructured":"Rani, D., Gill, N.S.: Examining digital forensics models and exploring for design of digital forensic framework for iot enabled smart environment (2020)"}],"container-title":["International Journal of Information Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-025-01079-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10207-025-01079-z\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-025-01079-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,5]],"date-time":"2025-09-05T11:32:55Z","timestamp":1757071975000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10207-025-01079-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,7,4]]},"references-count":20,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2025,8]]}},"alternative-id":["1079"],"URL":"https:\/\/doi.org\/10.1007\/s10207-025-01079-z","relation":{},"ISSN":["1615-5262","1615-5270"],"issn-type":[{"value":"1615-5262","type":"print"},{"value":"1615-5270","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,7,4]]},"assertion":[{"value":"2 June 2025","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"4 July 2025","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}],"article-number":"170"}}