{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,29]],"date-time":"2025-08-29T10:12:13Z","timestamp":1756462333561,"version":"3.37.3"},"reference-count":21,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"6","license":[{"start":{"date-parts":[[2021,6,1]],"date-time":"2021-06-01T00:00:00Z","timestamp":1622505600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2021,6,1]],"date-time":"2021-06-01T00:00:00Z","timestamp":1622505600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,6,1]],"date-time":"2021-06-01T00:00:00Z","timestamp":1622505600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Computer"],"published-print":{"date-parts":[[2021,6]]},"DOI":"10.1109\/mc.2020.3038630","type":"journal-article","created":{"date-parts":[[2021,6,8]],"date-time":"2021-06-08T11:09:20Z","timestamp":1623150560000},"page":"14-23","source":"Crossref","is-referenced-by-count":10,"title":["Defending IEEE Software Standards in Federal Criminal Court"],"prefix":"10.1109","volume":"54","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-2952-1016","authenticated-orcid":false,"given":"Marc","family":"Canellas","sequence":"first","affiliation":[{"name":"Law, New York University, New York, New York 10012-1126 United States"}]}],"member":"263","reference":[{"journal-title":"People v Thompson 2019 WL 4678813","year":"2019","key":"ref10"},{"journal-title":"Position statement Artificial intelligence Accelerating inclusive innovation by building trust","year":"2020","key":"ref11"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1111\/1556-4029.13687"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/MC.1999.796142"},{"journal-title":"General principles of software validation Final guidance for industry and FDA staff &#x201D; Center for Devices and Radiological Health and Center for Biologics Evaluation and Research of the Food and Drug Administration","year":"2002","key":"ref14"},{"journal-title":"Verification validation reviews and audits for digital computer software used in safety systems of nuclear power plants office of nuclear regulatory research","year":"2013","key":"ref15"},{"journal-title":"Developing standards","year":"0","key":"ref16"},{"journal-title":"Laws cases and regulations in the essential guide to standards","year":"2013","author":"updegrove","key":"ref17"},{"journal-title":"Summary of miscodes","year":"0","key":"ref18"},{"journal-title":"Bylaws of the Scientific Working Group on DNA Analysis Methods (SWGDAM)","year":"0","key":"ref19"},{"journal-title":"United States v Tucker 2020 WL 93951","year":"2020","key":"ref4"},{"journal-title":"Strengthening Forensic Science in the United States A Path Forward","year":"2009","key":"ref3"},{"journal-title":"International Standard - Software and Systems Engineering&#x2013;Software Testing","year":"2019","key":"ref6"},{"journal-title":"IEEE Standard for System Software and Hardware Verification and Validation","year":"2017","key":"ref5"},{"journal-title":"United States v Lewis 442 F Supp 3d 1122","year":"2020","key":"ref8"},{"journal-title":"United States v Gissantaner 417 F Supp 3d 857","year":"2019","key":"ref7"},{"journal-title":"Inside the Cell The Dark Side of Forensic DNA","year":"2015","author":"murphy","key":"ref2"},{"journal-title":"Traces of crime How New York&#x2019;s DNA techniques became tainted","year":"2017","author":"kirchner","key":"ref1"},{"key":"ref9","article-title":"Opening the black box: Defendants&#x2019; rights to confront forensic software","volume":"5","author":"lacambra","year":"2018","journal-title":"The champion"},{"journal-title":"The Human Use of Human Beings Cybernetics and Society","year":"1950","author":"weiner","key":"ref20"},{"journal-title":"United States v Gissantaner 990 F 3d 457","year":"2021","key":"ref21"}],"container-title":["Computer"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/2\/9447326\/09447421.pdf?arnumber=9447421","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,10]],"date-time":"2022-05-10T14:48:26Z","timestamp":1652194106000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9447421\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,6]]},"references-count":21,"journal-issue":{"issue":"6"},"URL":"https:\/\/doi.org\/10.1109\/mc.2020.3038630","relation":{},"ISSN":["0018-9162","1558-0814"],"issn-type":[{"type":"print","value":"0018-9162"},{"type":"electronic","value":"1558-0814"}],"subject":[],"published":{"date-parts":[[2021,6]]}}}