{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T05:32:26Z","timestamp":1740115946016,"version":"3.37.3"},"reference-count":42,"publisher":"IEEE","license":[{"start":{"date-parts":[[2024,12,10]],"date-time":"2024-12-10T00:00:00Z","timestamp":1733788800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,12,10]],"date-time":"2024-12-10T00:00:00Z","timestamp":1733788800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,12,10]]},"DOI":"10.1109\/acit62805.2024.10877028","type":"proceedings-article","created":{"date-parts":[[2025,2,17]],"date-time":"2025-02-17T18:27:16Z","timestamp":1739816836000},"page":"1-6","source":"Crossref","is-referenced-by-count":0,"title":["Digital Evidence and Forensic Tools in Cyber Law: A Comprehensive Analysis"],"prefix":"10.1109","author":[{"given":"Ala\u2019A Saeb","family":"Al-Sherideh","sequence":"first","affiliation":[{"name":"Zarqa University,Department of Cybersecurity,Zarqa,Jordan"}]},{"given":"Samah Suleiman","family":"Al-Zou\u2019Bi","sequence":"additional","affiliation":[{"name":"Zarqa University,Department of Cybersecurity,Zarqa,Jordan"}]},{"given":"Fuad","family":"Alshraiedeh","sequence":"additional","affiliation":[{"name":"Zarqa University,Department of Software Engineering,Zarqa,Jordan"}]},{"given":"Esraa Abu","family":"Elsoud","sequence":"additional","affiliation":[{"name":"Zarqa University,Department of Computer Science,Zarqa,Jordan"}]},{"given":"Suha","family":"Afaneh","sequence":"additional","affiliation":[{"name":"Zarqa University,Department of Cybersecurity,Zarqa,Jordan"}]},{"given":"Mohammad Rasmi","family":"Al-Mousa","sequence":"additional","affiliation":[{"name":"Zarqa University,Department of Cybersecurity,Zarqa,Jordan"}]},{"given":"Raed","family":"Alazaidah","sequence":"additional","affiliation":[{"name":"Zarqa University,Department of Data Science and AI,Zarqa,Jordan"}]},{"given":"Mohammed","family":"Khouj","sequence":"additional","affiliation":[{"name":"University of Business and Technology,Department of Electrical Engineering,Jeddah,Saudi Arabia,21432"}]},{"given":"Ghassan","family":"Samara","sequence":"additional","affiliation":[{"name":"Zarqa University,Department of Computer Science,Zarqa,Jordan"}]}],"member":"263","reference":[{"issue":"April 2021","key":"ref1","article-title":"Research paper on cyber security","author":"Sheth","year":"2021","journal-title":"Contemporary Research in India"},{"issue":"26","key":"ref2","first-page":"1","article-title":"Cybercrime regulation and nigerian youths increasing involvement in internet fraud: Attacking the roots rather than the symptoms","author":"Eboibi","year":"2023","journal-title":"J. Legal Ethical & Regul."},{"key":"ref3","first-page":"1","article-title":"Cyber crime: A review of the evidence, Summary of key findings and implications","volume":"75","author":"McGuire","year":"2013","journal-title":"Home Office Research report"},{"doi-asserted-by":"publisher","key":"ref4","DOI":"10.1080\/15614263.2015.1128163"},{"volume-title":"Cybercrime: The transformation of crime in the information age","year":"2024","author":"Wall","key":"ref5"},{"doi-asserted-by":"publisher","key":"ref6","DOI":"10.36941\/jesr-2021-0106"},{"doi-asserted-by":"publisher","key":"ref7","DOI":"10.24857\/rgsa.v18n4-028"},{"issue":"2","key":"ref8","first-page":"346","article-title":"Digital forensics: review of issues in scientific validation of digital evidence","volume":"14","author":"Arshad","year":"2018","journal-title":"Journal of Information Processing Systems"},{"doi-asserted-by":"publisher","key":"ref9","DOI":"10.1002\/wfs2.1337"},{"issue":"1","key":"ref10","first-page":"100","article-title":"Increasing Network Visibility Using Coded Repetition Beacon Piggybacking","volume":"13","author":"Samara","year":"2011","journal-title":"World Applied Sciences Journal"},{"volume-title":"Data breaches recorded in the united states by number of breaches and records exposed","key":"ref11"},{"year":"2019","author":"Savoska","journal-title":"Computer crime forms and mechanism for security and protection","key":"ref12"},{"doi-asserted-by":"publisher","key":"ref13","DOI":"10.4018\/978-1-5225-8304-2.ch001"},{"year":"2022","author":"Lutui","journal-title":"Critically examine the readiness of tonga\u2019s legislative framework for e-crimes","key":"ref14"},{"key":"ref15","first-page":"36","article-title":"Cyber crimes and cyber laws in india: an overview","author":"Kapila","year":"2020","journal-title":"Contemporary Issues and Challenges in the Society"},{"doi-asserted-by":"publisher","key":"ref16","DOI":"10.26650\/JPLC2023-1367714"},{"doi-asserted-by":"publisher","key":"ref17","DOI":"10.1177\/00111287221096374"},{"doi-asserted-by":"publisher","key":"ref18","DOI":"10.1109\/ACIT58888.2023.10453691"},{"doi-asserted-by":"publisher","key":"ref19","DOI":"10.5267\/j.ijdns.2023.8.015"},{"doi-asserted-by":"publisher","key":"ref20","DOI":"10.1080\/00131911.2022.2034749"},{"doi-asserted-by":"publisher","key":"ref21","DOI":"10.4018\/979-8-3693-0327-6.ch006"},{"doi-asserted-by":"publisher","key":"ref22","DOI":"10.1016\/j.eij.2020.12.005"},{"doi-asserted-by":"publisher","key":"ref23","DOI":"10.18576\/jsap\/130108"},{"doi-asserted-by":"publisher","key":"ref24","DOI":"10.3390\/s24072077"},{"doi-asserted-by":"publisher","key":"ref25","DOI":"10.1007\/978-981-13-6351-1_15"},{"doi-asserted-by":"publisher","key":"ref26","DOI":"10.21638\/spbu14.2023.105"},{"doi-asserted-by":"publisher","key":"ref27","DOI":"10.24857\/rgsa.v18n4-028"},{"doi-asserted-by":"publisher","key":"ref28","DOI":"10.55908\/sdgs.v11i10.1805"},{"doi-asserted-by":"publisher","key":"ref29","DOI":"10.1007\/978-3-031-36895-0_21"},{"issue":"3","key":"ref30","article-title":"Role and impact of digital forensics in cyber crime investigations","volume":"47","author":"Mugisha","year":"2019","journal-title":"International Journal of Cyber Criminology"},{"doi-asserted-by":"publisher","key":"ref31","DOI":"10.1109\/ACCESS.2023.3302771"},{"doi-asserted-by":"publisher","key":"ref32","DOI":"10.1007\/978-3-031-57242-5_8"},{"doi-asserted-by":"publisher","key":"ref33","DOI":"10.1093\/oso\/9780198806929.001.0001"},{"author":"Sharma","journal-title":"Digital evidence preservation: Challenges and solutions in the age of cybercrime","key":"ref34"},{"doi-asserted-by":"publisher","key":"ref35","DOI":"10.3390\/jcp1040029"},{"doi-asserted-by":"publisher","key":"ref36","DOI":"10.1109\/ACIT53391.2021.9677341"},{"doi-asserted-by":"publisher","key":"ref37","DOI":"10.1002\/9781394196470.ch3"},{"doi-asserted-by":"publisher","key":"ref38","DOI":"10.1149\/10701.19639ecst"},{"issue":"12","key":"ref39","article-title":"Data integrity concerns, requirements, and proofing in cloud computing","volume":"102","author":"Scientific","year":"2024","journal-title":"Journal of Theoretical and Applied Information Technology"},{"issue":"6","key":"ref40","first-page":"47","article-title":"Digital forensic: Challenges and solution in the protection of corporate crime","volume":"12","author":"CHOI","year":"2021","journal-title":"The Journal of Industrial Distribution & Business"},{"doi-asserted-by":"publisher","key":"ref41","DOI":"10.4324\/9780429343223"},{"doi-asserted-by":"publisher","key":"ref42","DOI":"10.1016\/j.techsoc.2020.101347"}],"event":{"name":"2024 25th International Arab Conference on Information Technology (ACIT)","start":{"date-parts":[[2024,12,10]]},"location":"Zarqa, Jordan","end":{"date-parts":[[2024,12,12]]}},"container-title":["2024 25th International Arab Conference on Information Technology (ACIT)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10876862\/10876868\/10877028.pdf?arnumber=10877028","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,20]],"date-time":"2025-02-20T19:58:18Z","timestamp":1740081498000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10877028\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,12,10]]},"references-count":42,"URL":"https:\/\/doi.org\/10.1109\/acit62805.2024.10877028","relation":{},"subject":[],"published":{"date-parts":[[2024,12,10]]}}}