{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T14:22:41Z","timestamp":1742912561879,"version":"3.40.3"},"publisher-location":"Cham","reference-count":13,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031620829"},{"type":"electronic","value":"9783031620836"}],"license":[{"start":{"date-parts":[[2024,9,30]],"date-time":"2024-09-30T00:00:00Z","timestamp":1727654400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2024,9,30]],"date-time":"2024-09-30T00:00:00Z","timestamp":1727654400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"abstract":"<jats:title>Abstract<\/jats:title><jats:p>The management of a digital chain of custody (dCoC) for collected samples in chemical, biological, radiological, nuclear and explosive (CBRNE) incidents lacks standardisation, leading to inconsistent practices among stakeholders within and across EU member states. This highlights the need for a digitalised approach to the chain of custody process, currently applied with paper-based forms, through a system that ensures the traceability and security of CBRNE evidence items throughout the process, including collection, transportation, analysis, storage and disposal. Establishing a standardised dCoC process across EU member states is crucial to provide evidence consistency and admissibility in court.<\/jats:p><jats:p>The paper analyses a proposal submitted to the CEN\/TC 391 for Technical Specifications related to a data governance workflow to preserve metadata consistency in a digital chain of custody (dCoC). Maintaining data integrity is essential to the consistency and admissibility of evidence in court. The dCoC data governance workflow provides information about digital evidence items and their metadata, such as custody ownership, transfer between stakeholders and the transfer\u2019s purpose. Adherence to a consistent process is required to ensure the integrity of digital custody metadata (DCM), which drives stakeholders taking custodianship at each Custody Transfer Point (CTP). The proposal includes an acknowledgement process enabling stakeholders to report various levels of data inconsistency concerning the metadata recorded in the DCM.<\/jats:p>","DOI":"10.1007\/978-3-031-62083-6_1","type":"book-chapter","created":{"date-parts":[[2024,9,29]],"date-time":"2024-09-29T12:01:24Z","timestamp":1727611284000},"page":"3-14","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["The Data Governance Process Within the Digital Chain of Custody"],"prefix":"10.1007","author":[{"given":"Gabriel","family":"Pestana","sequence":"first","affiliation":[]},{"given":"Lu\u00eds M.","family":"Carvalho","sequence":"additional","affiliation":[]},{"given":"Sebastian","family":"Chmel","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,9,30]]},"reference":[{"key":"1_CR1","first-page":"126","volume":"3","author":"J Cosic","year":"2012","unstructured":"Cosic, J., & Cosic, Z. (2012). Chain of custody and life cycle of digital evidence. Computer Technology and Application, 3, 126\u2013129. Accessed: May 13, 2021. [Online]. Available: https:\/\/www.researchgate.net\/publication\/279175015_Chain_of_custody_and_life_cycle_of_digital_evidence","journal-title":"Computer Technology and Application"},{"issue":"5","key":"1_CR2","doi-asserted-by":"publisher","first-page":"1","DOI":"10.5120\/19971-1856","volume":"114","author":"Y Prayudi","year":"2015","unstructured":"Prayudi, Y., & Azhari, S. N. (2015). Digital chain of custody: State of the art. International Journal of Computers and Applications, 114(5), 1\u20139. https:\/\/doi.org\/10.5120\/19971-1856","journal-title":"International Journal of Computers and Applications"},{"key":"1_CR3","volume-title":"Nato handbook for sampling and identification of biological, chemical and radiological agents","author":"AEP-66","year":"2015","unstructured":"AEP-66. (2015). Nato handbook for sampling and identification of biological, chemical and radiological agents. Nato Standardization Agency (NSA)."},{"key":"1_CR4","unstructured":"CEN. (2020). BS EN 17173:2020 European CBRNE glossary, Brussels."},{"key":"1_CR5","first-page":"1","volume-title":"EN ISO\/IEC 27042 Information technology \u2013 Security techniques \u2013 Guidelines for the analysis and interpretation of digital evidence","author":"EN ISO\/IEC","year":"2016","unstructured":"EN ISO\/IEC. (2016). EN ISO\/IEC 27042 Information technology \u2013 Security techniques \u2013 Guidelines for the analysis and interpretation of digital evidence (pp. 1\u201314). International Organization for Standardization. [Online]. Available: www.iso.org"},{"key":"1_CR6","first-page":"1","volume-title":"ISO\/FDIS 22095: 2020 (E) Chain of custody\u2014General terminology and models","author":"ISO","year":"2020","unstructured":"ISO. (2020). ISO\/FDIS 22095: 2020 (E) Chain of custody\u2014General terminology and models (pp. 1\u201334). International Organization for Standardization. [Online]. Available: https:\/\/www.iso.org\/"},{"key":"1_CR7","first-page":"1","volume-title":"ISO\/IEC 27050-1 Information technology\u2014Electronic discovery\u2014Part 1: Overview and concepts","author":"ISO\/IEC","year":"2019","unstructured":"ISO\/IEC. (2019). ISO\/IEC 27050-1 Information technology\u2014Electronic discovery\u2014Part 1: Overview and concepts (pp. 1\u201320). International Organization for Standardization. [Online]. Available: www.iso.org"},{"key":"1_CR8","first-page":"1","volume-title":"ISO\/IEC 27050-2 Information technology\u2014Electronic discovery\u2014Part 2: Guidance for governance and management of electronic discovery","author":"ISO\/IEC","year":"2018","unstructured":"ISO\/IEC. (2018). ISO\/IEC 27050-2 Information technology\u2014Electronic discovery\u2014Part 2: Guidance for governance and management of electronic discovery (pp. 1\u20139). International Organization for Standardization. [Online]. Available: www.iso.org"},{"key":"1_CR9","doi-asserted-by":"publisher","first-page":"304","DOI":"10.1007\/978-3-031-04819-7_30","volume-title":"Information systems and technologies","author":"GF Pestana","year":"2022","unstructured":"Pestana, G. F., Carvalho, L. M., Gouveia-Carvalho, J., & Antunes, W. (2022). Digital chain of custody for CBRNE events: Custody transfer governance. In A. Rocha, H. Adeli, G. Dzemyda, & F. Moreira (Eds.), Information systems and technologies (pp. 304\u2013314). Springer International Publishing."},{"key":"1_CR10","doi-asserted-by":"publisher","unstructured":"Bonomi, S., M. Engineering, Ruberti, A., Casini, M., & Ciccotelli, C. (2019). B-CoC: A blockchain-based chain of custody for evidences management in digital forensics. In International conference on blockchain economics, security and protocols (Vol. 12, pp. 12:1\u201312:15). https:\/\/doi.org\/10.4230\/OASIcs.Tokenomics.2019.12","DOI":"10.4230\/OASIcs.Tokenomics.2019.12"},{"key":"1_CR11","volume-title":"Digital forensic evidence towards common European standards in antifraud administrative and criminal investigations \u2013 OLAF, European Anti-Fraud Office","author":"M Caianiello","year":"2021","unstructured":"Caianiello, M., & Camon, A. (2021). Digital forensic evidence towards common European standards in antifraud administrative and criminal investigations \u2013 OLAF, European Anti-Fraud Office. Wolters Kluwer."},{"issue":"2","key":"1_CR12","doi-asserted-by":"publisher","first-page":"85","DOI":"10.5958\/j.2277-7946.3.2.008","volume":"3","author":"J-L Ermine","year":"2013","unstructured":"Ermine, J.-L. (2013). A knowledge value chain for knowledge management. Journal of Knowledge & Communication Management, 3(2), 85. https:\/\/doi.org\/10.5958\/j.2277-7946.3.2.008","journal-title":"Journal of Knowledge & Communication Management"},{"key":"1_CR13","unstructured":"Koleoso, R. A. (2018, July). A digital forensics investigation model with digital chain of custody for confidentiality, integrity and authenticity, Conimsconference.Com.Ng"}],"container-title":["Security Informatics and Law Enforcement","Paradigms on Technology Development for Security Practitioners"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-62083-6_1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,9,29]],"date-time":"2024-09-29T12:02:18Z","timestamp":1727611338000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-62083-6_1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,9,30]]},"ISBN":["9783031620829","9783031620836"],"references-count":13,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-62083-6_1","relation":{},"ISSN":["2523-8507","2523-8515"],"issn-type":[{"type":"print","value":"2523-8507"},{"type":"electronic","value":"2523-8515"}],"subject":[],"published":{"date-parts":[[2024,9,30]]},"assertion":[{"value":"30 September 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}