{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,4,1]],"date-time":"2022-04-01T05:03:19Z","timestamp":1648789399522},"reference-count":10,"publisher":"Springer Science and Business Media LLC","issue":"8","license":[{"start":{"date-parts":[[2012,7,12]],"date-time":"2012-07-12T00:00:00Z","timestamp":1342051200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Datenschutz Datensich"],"published-print":{"date-parts":[[2012,8]]},"DOI":"10.1007\/s11623-012-0187-2","type":"journal-article","created":{"date-parts":[[2012,9,26]],"date-time":"2012-09-26T05:03:33Z","timestamp":1348635813000},"page":"597-602","source":"Crossref","is-referenced-by-count":0,"title":["Kriterien f\u00fcr die Priorisierung bei der Sicherung und Analyse digitaler Spuren"],"prefix":"10.1007","volume":"36","author":[{"given":"Matthias","family":"B\u00e4cker","sequence":"first","affiliation":[]},{"given":"Andreas","family":"Dewald","sequence":"additional","affiliation":[]},{"given":"Felix C.","family":"Freiling","sequence":"additional","affiliation":[]},{"given":"Sven","family":"Schmitt","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2012,7,12]]},"reference":[{"key":"187_CR1","unstructured":"B\u00e4cker, Matthias: Kriminalpr\u00e4ventives Strafrecht und polizeiliche Kriminalpr\u00e4vention. In: Baumeister, Peter; Roth, Wolfgang; Ruthig, Josef (Hrsg.): Staat, Verwaltung und Rechtsschutz. Festschrift f\u00fcr Wolf-R\u00fcdiger Schenke zum 70. Geburtstag, 2011, S. 331\u2013354."},{"issue":"2","key":"187_CR2","doi-asserted-by":"publisher","first-page":"80","DOI":"10.1007\/s11623-010-0040-4","volume":"34","author":"Matthias B\u00e4cker","year":"2010","unstructured":"B\u00e4cker, Matthias; Freiling, Felix C.; Schmitt, Sven: Selektion vor der Sicherung \u2014 Methoden zur effizienten forensischen Sicherung von digitalen Speichermedien. In: Datenschutz und Datensicherheit \u2014 DuD 34 (2010), Nr. 2, S. 80\u201385.","journal-title":"Datenschutz und Datensicherheit - DuD"},{"key":"187_CR3","unstructured":"Carrier, Brian: File System Forensic Analysis. Addison-Wesley, 2005."},{"key":"187_CR4","unstructured":"Casey, Eoghan: Digital Evidence and Computer Crime: Forensic Science, Computers, and the Internet. 2. Auflage. Academic Press, 2004."},{"key":"187_CR5","unstructured":"Dewald, Andreas; Freiling, Felix: Forensische Informatik. 1. Auflage. Books on Demand, 2011."},{"key":"187_CR6","volume-title":"Selective Imaging \u2014 Creating Efficient Forensic Images by Selecting Content First","author":"J. St\u00fcttgen","year":"2011","unstructured":"St\u00fcttgen, Johannes: Selective Imaging \u2014 Creating Efficient Forensic Images by Selecting Content First. Diplomarbeit, Universit\u00e4t Mannheim, 2011."},{"key":"187_CR7","doi-asserted-by":"publisher","DOI":"10.3790\/978-3-428-51488-5","volume-title":"Die rechtliche Bew\u00e4ltigung von Erscheinungsformen organisierter Kriminalit\u00e4t","author":"J. Kinzig","year":"2004","unstructured":"Kinzig, J\u00f6rg: Die rechtliche Bew\u00e4ltigung von Erscheinungsformen organisierter Kriminalit\u00e4t. Duncker & Humbolt, Berlin, 2004."},{"key":"187_CR8","doi-asserted-by":"crossref","unstructured":"Pollitt, Mark: An Ad Hoc Review of Digital Forensic Models. In: Huang, Ming-Yuh; Fincke, Deborah A. (Hrsg.): Second International Workshop on Systematic Approaches to Digital Forensic Engineering (SADFE 2007), IEEE Computer Society, 2007.","DOI":"10.1109\/SADFE.2007.3"},{"key":"187_CR9","doi-asserted-by":"publisher","first-page":"59","DOI":"10.1016\/j.diin.2006.06.003","volume":"3","author":"P. Turner","year":"2006","unstructured":"Turner, P.: Selective and intelligent imaging using digital evidence bags. In: digital investigation 3 (2006), S. 59\u201364.","journal-title":"digital investigation"},{"key":"187_CR10","doi-asserted-by":"publisher","first-page":"243","DOI":"10.1007\/978-3-540-89862-7_21","volume-title":"Information Systems Security","author":"Craig Wright","year":"2008","unstructured":"Wright, Craig; Kleiman, Dave; Sundhar R.S., Shyaam: Overwriting Hard Drive Data: The Great Wiping Controversy. In: Sekar, R.; Pujari, Arun (Hrsg.): Information Systems Security. Springer Berlin\/Heidelberg, 2008, S. 243\u2013257."}],"container-title":["Datenschutz und Datensicherheit - DuD"],"original-title":[],"language":"de","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11623-012-0187-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11623-012-0187-2\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11623-012-0187-2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11623-012-0187-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,1]],"date-time":"2019-06-01T18:22:32Z","timestamp":1559413352000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11623-012-0187-2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,7,12]]},"references-count":10,"journal-issue":{"issue":"8","published-print":{"date-parts":[[2012,8]]}},"alternative-id":["187"],"URL":"https:\/\/doi.org\/10.1007\/s11623-012-0187-2","relation":{},"ISSN":["1614-0702","1862-2607"],"issn-type":[{"value":"1614-0702","type":"print"},{"value":"1862-2607","type":"electronic"}],"subject":[],"published":{"date-parts":[[2012,7,12]]}}}