{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T08:21:36Z","timestamp":1730276496245,"version":"3.28.0"},"reference-count":12,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,8]]},"DOI":"10.1109\/issa.2015.7335075","type":"proceedings-article","created":{"date-parts":[[2015,11,23]],"date-time":"2015-11-23T22:50:11Z","timestamp":1448319011000},"page":"1-9","source":"Crossref","is-referenced-by-count":2,"title":["A model for the design of next generation e-supply chain digital forensic readiness tools"],"prefix":"10.1109","author":[{"given":"D.J.E.","family":"Masvosvere","sequence":"first","affiliation":[]},{"given":"H.S.","family":"Venter","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/ISSA.2010.5588281"},{"key":"ref3","first-page":"808","article-title":"Next generation modeling III-agents: a multi-paradigm simulator for simulating complex adaptive supply chain networks","author":"pathak","year":"2003","journal-title":"Proceedings of the 35th conference on Winter simulation Driving innovation"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1080\/00207540601020544"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.4304\/jcp.2.3.1-11"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.5772\/37086"},{"key":"ref5","first-page":"1","article-title":"A ten step process for forensic readiness","volume":"2","author":"rowlingson","year":"2004","journal-title":"International Journal of Digital Evidence"},{"article-title":"A Conceptual Model for Digital Forensic Readiness in e-Supply Chains","year":"0","author":"masvosvere","key":"ref12"},{"key":"ref8","article-title":"Challenges in the capture and dissemination of measurements from high-speed networks","author":"clegg","year":"2013","journal-title":"arXiv preprint arXiv 1303 6908"},{"article-title":"Implementation of e-Supply Chain Management","year":"0","author":"pulevska-ivanovska","key":"ref7"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/j.diin.2009.06.013"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.4236\/jis.2013.42011"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/ICITA.2005.274"}],"event":{"name":"2015 Information Security for South Africa (ISSA)","start":{"date-parts":[[2015,8,12]]},"location":"Johannesburg, South Africa","end":{"date-parts":[[2015,8,13]]}},"container-title":["2015 Information Security for South Africa (ISSA)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7328027\/7335039\/07335075.pdf?arnumber=7335075","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,25]],"date-time":"2017-03-25T04:52:00Z","timestamp":1490417520000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7335075\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,8]]},"references-count":12,"URL":"https:\/\/doi.org\/10.1109\/issa.2015.7335075","relation":{},"subject":[],"published":{"date-parts":[[2015,8]]}}}