{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T09:54:35Z","timestamp":1725530075369},"reference-count":28,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,8]]},"DOI":"10.1109\/issa.2015.7335068","type":"proceedings-article","created":{"date-parts":[[2015,11,23]],"date-time":"2015-11-23T17:50:11Z","timestamp":1448301011000},"page":"1-9","source":"Crossref","is-referenced-by-count":2,"title":["The current state of digital forensic practitioners in South Africa"],"prefix":"10.1109","author":[{"given":"Jason","family":"Jordaan","sequence":"first","affiliation":[]},{"given":"Karen","family":"Bradshaw","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"year":"2007","key":"ref10","article-title":"Association of Chief Police Officers, Good Practice Guide for Computer-Based Electronic Evidence"},{"key":"ref11","doi-asserted-by":"crossref","DOI":"10.1007\/978-0-387-84927-0_1","article-title":"When is Digital Evidence Forensically Sound?","author":"mckemmish","year":"2008"},{"article-title":"Hacking Exposed: Computer Forensics","year":"2010","author":"philipp","key":"ref12"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ISSA.2012.6320431"},{"year":"2014","key":"ref14","article-title":"Standard Guide for Education and Training in Computer Forensics"},{"year":"2010","key":"ref15","article-title":"Scientific Working Group on Digital Evidence"},{"year":"2009","key":"ref16","article-title":"European Network of Forensic Science Institutes"},{"year":"2011","key":"ref17","article-title":"United Nations Office on Drugs and Crime"},{"article-title":"Research Methods for Business Students","year":"2009","author":"saunders","key":"ref18"},{"key":"ref19","article-title":"Establishing a Vendor Neutral Skills Based Framework for Digital Forensics Curriculum Development and Competence Assessment","author":"valli","year":"2006","journal-title":"Proceedings of the 4th Australian Digital Forensics Conference"},{"journal-title":"Global Information Assurance Certification Paper","article-title":"Certification Maintenance Guidelines & Requirements","year":"2014","key":"ref28"},{"article-title":"Computer Forensics Principles and Practices","year":"2007","author":"volonino","key":"ref4"},{"journal-title":"Syntricate","article-title":"Computer Forensics - Certification","year":"2015","key":"ref27"},{"key":"ref3","article-title":"Electronic Evidence","author":"meintjes-van der walt","year":"2012","journal-title":"Cyberlaw SA III"},{"year":"2005","key":"ref6","article-title":"House of Commons Science and Technology Committee"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1016\/S1355-0306(03)71750-X"},{"journal-title":"Criminal Investigation","year":"2006","author":"swanson","key":"ref8"},{"year":"2009","key":"ref7","article-title":"National Research Council, Strengthening Forensic Science in the United States: A Path Forward"},{"year":"2008","author":"van","key":"ref2"},{"year":"2009","author":"jones","key":"ref9"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2012.399"},{"journal-title":"University of Pretoria","article-title":"Computer Science Honours Degree","year":"2013","key":"ref20"},{"journal-title":"University of Cape Town","article-title":"Postgraduate Diploma in Management in Information Systems (CG022). INF4016W: Computer Forensics (Curriculum)","year":"2013","key":"ref22"},{"journal-title":"Johannes Kepler University","article-title":"Faculty of Science Postgraduate Courses","year":"2013","key":"ref21"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/SSIRI.2009.42"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1016\/j.diin.2009.05.002"},{"journal-title":"Software Guidance","article-title":"EnCase Certified Examiner (EnCE) Program Renewal Requirements","year":"2014","key":"ref26"},{"journal-title":"Software Guidance","article-title":"EnCE Certification Program","year":"2014","key":"ref25"}],"event":{"name":"2015 Information Security for South Africa (ISSA)","start":{"date-parts":[[2015,8,12]]},"location":"Johannesburg, South Africa","end":{"date-parts":[[2015,8,13]]}},"container-title":["2015 Information Security for South Africa (ISSA)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7328027\/7335039\/07335068.pdf?arnumber=7335068","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,23]],"date-time":"2017-06-23T20:14:44Z","timestamp":1498248884000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7335068\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,8]]},"references-count":28,"URL":"https:\/\/doi.org\/10.1109\/issa.2015.7335068","relation":{},"subject":[],"published":{"date-parts":[[2015,8]]}}}