{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,6,7]],"date-time":"2024-06-07T09:18:44Z","timestamp":1717751924443},"reference-count":21,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2013,6,16]],"date-time":"2013-06-16T00:00:00Z","timestamp":1371340800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Electron Commer Res"],"published-print":{"date-parts":[[2013,9]]},"DOI":"10.1007\/s10660-013-9119-y","type":"journal-article","created":{"date-parts":[[2013,6,15]],"date-time":"2013-06-15T11:26:46Z","timestamp":1371295606000},"page":"379-398","source":"Crossref","is-referenced-by-count":3,"title":["A framework for unified digital evidence management in security convergence"],"prefix":"10.1007","volume":"13","author":[{"given":"Kyung-Soo","family":"Lim","sequence":"first","affiliation":[]},{"given":"Changhoon","family":"Lee","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2013,6,16]]},"reference":[{"issue":"1","key":"9119_CR1","doi-asserted-by":"crossref","first-page":"41","DOI":"10.1007\/s10660-013-9105-4","volume":"13","author":"N. Kshetri","year":"2013","unstructured":"Kshetri, N. (2013). Cybercrime and cyber-security issues associated with China: some economic and institutional considerations. Electronic Commerce Research, 13(1), 41\u201369.","journal-title":"Electronic Commerce Research"},{"issue":"4","key":"9119_CR2","doi-asserted-by":"crossref","first-page":"383","DOI":"10.1007\/s10660-011-9081-5","volume":"11","author":"K. Narayanasamy","year":"2011","unstructured":"Narayanasamy, K., Rasiah, D., & Tan, T. M. (2011). The adoption and concerns of e-finance in Malaysia. Electronic Commerce Research, 11(4), 383\u2013400.","journal-title":"Electronic Commerce Research"},{"key":"9119_CR3","doi-asserted-by":"crossref","first-page":"421","DOI":"10.1007\/s10660-011-9083-3","volume":"11","author":"G. Antoniou","year":"2011","unstructured":"Antoniou, G., & Batten, L. (2011). E-commerce: protecting purchaser privacy to enforce trust. Electronic Commerce Research, 11, 421\u2013456.","journal-title":"Electronic Commerce Research"},{"issue":"3","key":"9119_CR4","doi-asserted-by":"crossref","first-page":"203","DOI":"10.1007\/s10660-009-9036-2","volume":"9","author":"D. G. Taylor","year":"2009","unstructured":"Taylor, D. G., Donna, F. D., & Jillapalli, R. (2009). Privacy concern and online personalization: the moderating effects of information control and compensation. Electronic Commerce Research, 9(3), 203\u2013223.","journal-title":"Electronic Commerce Research"},{"key":"9119_CR5","volume-title":"ICCSCE\u201911","author":"K.-S. Lim","year":"2011","unstructured":"Lim, K.-S., Park, J., Lee, C., & Lee, S. (2011). A new proposal for a digital evidence container for triage investigation. In ICCSCE\u201911."},{"key":"9119_CR6","volume-title":"Conference on digital forensics, security and law","author":"M. K. Rogers","year":"2006","unstructured":"Rogers, M. K., Goldman, J., Mislan, R., Wedge, T., & Debrot, S. (2006). Computer forensics field triage process model. In Conference on digital forensics, security and law."},{"key":"9119_CR7","doi-asserted-by":"crossref","first-page":"88","DOI":"10.1016\/j.diin.2007.04.002","volume":"4","author":"G. G. Richard III","year":"2007","unstructured":"Richard, G. G. III, Roussev, V., & Marziale, L. (2007). Forensic discovery auditing of digital evidence containers. Digital Investigation, 4, 88\u201397.","journal-title":"Digital Investigation"},{"key":"9119_CR8","volume-title":"2nd international conference on computer science and its application","author":"K.-s. Lim","year":"2009","unstructured":"Lim, K.-s., Lee, S., & Lee, S. (2009). Applying a stepwise forensic approach to incident response and computer usage analysis. In 2nd international conference on computer science and its application (CSA 2009)."},{"issue":"3","key":"9119_CR9","doi-asserted-by":"crossref","first-page":"223","DOI":"10.1016\/j.diin.2005.07.001","volume":"2","author":"P. Turner","year":"2005","unstructured":"Turner, P. (2005). Unification of digital evidence from disparate sources (digital evidence bags). Digital Investigation, 2(3), 223\u2013228.","journal-title":"Digital Investigation"},{"key":"9119_CR10","doi-asserted-by":"crossref","first-page":"59","DOI":"10.1016\/j.diin.2006.06.003","volume":"3\u00a0Supplement","author":"P. Turner","year":"2006","unstructured":"Turner, P. (2006). Selective and intelligent imaging using digital evidence bags. Digital Investigation, 3\u00a0Supplement, 59\u201364.","journal-title":"Digital Investigation"},{"issue":"1","key":"9119_CR11","doi-asserted-by":"crossref","first-page":"30","DOI":"10.1016\/j.diin.2007.01.002","volume":"4","author":"P. Turner","year":"2007","unstructured":"Turner, P. (2007). Applying a forensic approach to incident response, network investigation and system administration using digital evidence bags. Digital Investigation, 4(1), 30\u201335.","journal-title":"Digital Investigation"},{"key":"9119_CR12","unstructured":"Encase Portable kits. http:\/\/www.guidancesoftware.com\/encase-portable.htm ."},{"key":"9119_CR13","unstructured":"IP camera definition. http:\/\/en.wikipedia.org\/wiki\/IP_camera ."},{"issue":"2","key":"9119_CR14","doi-asserted-by":"crossref","first-page":"129","DOI":"10.3745\/JIPS.2010.6.2.129","volume":"6","author":"K. Chang","year":"2010","unstructured":"Chang, K., Chen, C., Chen, J., & Chao, H. (2010). Challenges to next generation services in IP multimedia subsystem. Journal of Information Processing Systems, 6(2), 129\u2013146.","journal-title":"Journal of Information Processing Systems"},{"key":"9119_CR15","unstructured":"CCTV definition. http:\/\/en.wikipedia.org\/wiki\/Closed_circuit_elevision ."},{"issue":"3","key":"9119_CR16","doi-asserted-by":"crossref","first-page":"483","DOI":"10.3745\/JIPS.2012.8.3.483","volume":"8","author":"M. Satone","year":"2012","unstructured":"Satone, M., & Kharate, D. G. (2012). Face Recognition based on PCA on wavelet subband of average-half-face. Journal of Information Processing Systems, 8(3), 483\u2013494.","journal-title":"Journal of Information Processing Systems"},{"issue":"1","key":"9119_CR17","doi-asserted-by":"crossref","first-page":"173","DOI":"10.3745\/JIPS.2013.9.1.173","volume":"9","author":"G. M. Nagi","year":"2013","unstructured":"Nagi, G. M., Rahmat, R., Khalid, F., & Taufik, M. (2013). Region-based facial expression recognition in still images. Journal of Information Processing Systems, 9(1), 173.","journal-title":"Journal of Information Processing Systems"},{"issue":"1","key":"9119_CR18","doi-asserted-by":"crossref","first-page":"141","DOI":"10.3745\/JIPS.2013.9.1.141","volume":"9","author":"D. Ghimire","year":"2013","unstructured":"Ghimire, D., & Lee, J. (2013). A robust face detection method based on skin color and edges. Journal of Information Processing Systems, 9(1), 141\u2013156.","journal-title":"Journal of Information Processing Systems"},{"key":"9119_CR19","unstructured":"Axis\u2019s video management sofware. http:\/\/www.axis.com\/products\/video\/about_networkvideo\/platforms.htm ."},{"key":"9119_CR20","unstructured":"PKZip file structure. http:\/\/www.absolutestronomy.com\/topics\/ZIP_(file_format) ."},{"key":"9119_CR21","volume-title":"Computer science and its applications","author":"K.-S. Lim","year":"2012","unstructured":"Lim, K.-S., & Lee, C. (2012). Applying forensic approach to live investigation using XeBag. In Computer science and its applications."}],"container-title":["Electronic Commerce Research"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10660-013-9119-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10660-013-9119-y\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10660-013-9119-y","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,30]],"date-time":"2019-05-30T20:52:53Z","timestamp":1559249573000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10660-013-9119-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,6,16]]},"references-count":21,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2013,9]]}},"alternative-id":["9119"],"URL":"https:\/\/doi.org\/10.1007\/s10660-013-9119-y","relation":{},"ISSN":["1389-5753","1572-9362"],"issn-type":[{"value":"1389-5753","type":"print"},{"value":"1572-9362","type":"electronic"}],"subject":[],"published":{"date-parts":[[2013,6,16]]}}}