{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,7]],"date-time":"2026-05-07T11:04:23Z","timestamp":1778151863906,"version":"3.51.4"},"reference-count":40,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100006378","name":"Universitas Indonesia through Hibah Publikasi Terindeks Internasional (PUTI) Kolaborasi Internasional (Q2) Scheme","doi-asserted-by":"publisher","award":["NKB-1339\/UN2.RST\/HKP.05.00\/2022"],"award-info":[{"award-number":["NKB-1339\/UN2.RST\/HKP.05.00\/2022"]}],"id":[{"id":"10.13039\/501100006378","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100006378","name":"Indonesia Cyber Awareness and Resilience Center, Universitas Indonesia (IdCARE-UI), through the IT Forensics Enablement Workshop by the Japan International Cooperation Agency","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100006378","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100014538","name":"Lembaga Pengelola Dana Pendidikan (LPDP), Ministry of Finance of the Republic of Indonesia","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100014538","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2023]]},"DOI":"10.1109\/access.2023.3270619","type":"journal-article","created":{"date-parts":[[2023,4,26]],"date-time":"2023-04-26T18:48:36Z","timestamp":1682534916000},"page":"42644-42659","source":"Crossref","is-referenced-by-count":13,"title":["A Novel Digital Forensic Framework for Data Breach Investigation"],"prefix":"10.1109","volume":"11","author":[{"ORCID":"https:\/\/orcid.org\/0009-0000-7621-0301","authenticated-orcid":false,"given":"Arif Rahman","family":"Hakim","sequence":"first","affiliation":[{"name":"Department of Electrical Engineering, Faculty of Engineering, Universitas Indonesia, Depok, Indonesia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0374-4465","authenticated-orcid":false,"given":"Kalamullah","family":"Ramli","sequence":"additional","affiliation":[{"name":"Department of Electrical Engineering, Faculty of Engineering, Universitas Indonesia, Depok, Indonesia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3345-4669","authenticated-orcid":false,"given":"Teddy Surya","family":"Gunawan","sequence":"additional","affiliation":[{"name":"Department of Electrical and Computer Engineering, Kulliyyah of Engineering, International Islamic University Malaysia, Kuala Lumpur, Malaysia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1234-9870","authenticated-orcid":false,"given":"Susila","family":"Windarta","sequence":"additional","affiliation":[{"name":"Department of Electrical Engineering, Faculty of Engineering, Universitas Indonesia, Depok, Indonesia"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/s1361-3723(21)00061-0"},{"key":"ref2","volume-title":"The State of Data Breach Intelligence: 2022 Midyear Edition | Flashpoint","year":"2022"},{"key":"ref3","year":"2022","journal-title":"Elevating the Cybersecurity Discussion: Why CEOs Need to Get More Involved in Securing the Business"},{"issue":"4","key":"ref4","doi-asserted-by":"crossref","DOI":"10.1016\/j.im.2022.103638","article-title":"Antecedents and consequences of data breaches: A systematic review","volume":"59","author":"Schlackl","year":"2022","journal-title":"Inf. Manag."},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1093\/cybsec\/tyy006"},{"issue":"1","key":"ref6","first-page":"59","article-title":"Protecting a brand: Evaluating the cost of a security breach from a marketer\u2019s perspective","volume":"11","author":"Choong","year":"2017","journal-title":"Amer. J. Manag."},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.48009\/2_iis_2019_162-171"},{"issue":"3","key":"ref8","first-page":"309","article-title":"The impact of information security breach incidents on CIO turnover","volume":"33","author":"Banker","year":"2019","journal-title":"J. Inf. Syst."},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2021.102508"},{"key":"ref10","first-page":"4957","article-title":"Firm actions toward data breach incidents and firm equity value: An empirical study","volume-title":"Proc. 50th Hawaii Int. Conf. Syst. Sci.","author":"Song"},{"key":"ref11","first-page":"1","article-title":"Cloud data breach disclosures: The consumer and their personally identifiable information (PII)?","volume-title":"Proc. IEEE Conf. Norbert Wiener 21st Century (CW)","author":"Kolevski"},{"issue":"3","key":"ref12","first-page":"63","article-title":"Financial consequences of cyber attacks leading to data breaches in healthcare sector","volume-title":"Copernican J. Finance Accounting","volume":"6","author":"Meisner"},{"key":"ref13","first-page":"1","article-title":"Underlying and consequential costs of cyber security breaches: Changes in systematic risk","volume-title":"Proc. Workshop Econ. Inf. Secur.","author":"Malliouris"},{"key":"ref14","first-page":"1","article-title":"Consumer skepticism as it relates to E commerce data breaches and company efforts to enhance trust","volume-title":"Proc. MWAIS","author":"Muzatko"},{"key":"ref15","first-page":"71","article-title":"Causes and impacts of personal health information (PHI) breaches: A scoping review and thematic analysis","volume-title":"Proc. 23rd Pacific Asia Conf. Inf. Syst.","author":"Pool"},{"key":"ref16","first-page":"481","article-title":"The impact of data breach severity on post-breach online shopping intention","volume-title":"Proc. 39th Int. Conf. Inf. Syst.","author":"Aivazpour"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1509\/jm.15.0497"},{"issue":"2","key":"ref18","doi-asserted-by":"crossref","first-page":"208","DOI":"10.1007\/s11747-016-0486-5","article-title":"Birds of a feather: Intra-industry spillover of the target customer data breach and the shielding role of IT, marketing, and CSR","volume":"45","author":"Kashmiri","year":"2017","journal-title":"J. Acad. Marketing Sci."},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/TEM.2020.3008827"},{"key":"ref20","first-page":"1","article-title":"The economic cost of cybersecurity breaches: A broad-based analysis","volume-title":"Proc. Workshop Econ. Inf. Secur. (WEIS)","author":"Haislip"},{"key":"ref21","doi-asserted-by":"crossref","DOI":"10.2139\/ssrn.3544245","volume-title":"The impact of customer\u2019s reported cybersecurity breaches on key supplier\u2019s relationship-specific investments and relationship duration","author":"He","year":"2020"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3107426"},{"key":"ref23","volume-title":"Cost of a Data Breach Report 2021","year":"2021"},{"key":"ref24","volume-title":"IBM Security\u2019s Cost of a Data Breach Report 2022","year":"2022"},{"key":"ref25","author":"Morgan","year":"2020","journal-title":"Cybercrime to Cost the World"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1016\/s1361-3723(20)30127-5"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1287\/stsc.2020.0106"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.14569\/ijacsa.2019.0100880"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2021.102237"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1080\/20961790.2020.1837429"},{"issue":"2","key":"ref31","first-page":"1","article-title":"Computer forensics field triage process model","volume":"1","author":"Rogers","year":"2006","journal-title":"J. Digit. Forensics, Secur. Law"},{"issue":"1","key":"ref32","first-page":"118","article-title":"Systematic digital forensic investigation model","volume":"5","author":"Agarwal","year":"2011","journal-title":"Int. J. Comput. Sci. Secur. (IJCSS)"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2013.05.001"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1016\/j.array.2019.100015"},{"issue":"1","key":"ref35","first-page":"206","article-title":"Osint by crowdsourcing: A theoretical model for online child abuse investigations","volume":"12","author":"Acar","year":"2018","journal-title":"Int. J. Cyber Criminology"},{"issue":"1","key":"ref36","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1093\/cybsec\/tyac014","article-title":"SoK: Cross-border criminal investigations and digital evidence","volume":"8","author":"Casino","year":"2022","journal-title":"J. Cybersecurity"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1007\/s42521-021-00035-5"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.6028\/NIST.SP.800-86"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1016\/c2014-0-04209-8"},{"issue":"11","key":"ref40","first-page":"292","article-title":"Analysis of digital forensic investigation models","volume":"14","author":"Mir","year":"2016","journal-title":"Int. J. Comput. Sci. Inform. Secur."}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6287639\/10005208\/10108925.pdf?arnumber=10108925","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,1]],"date-time":"2024-03-01T03:39:21Z","timestamp":1709264361000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10108925\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023]]},"references-count":40,"URL":"https:\/\/doi.org\/10.1109\/access.2023.3270619","relation":{},"ISSN":["2169-3536"],"issn-type":[{"value":"2169-3536","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023]]}}}