{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:38:48Z","timestamp":1750307928833,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":29,"publisher":"ACM","license":[{"start":{"date-parts":[[2006,9,22]],"date-time":"2006-09-22T00:00:00Z","timestamp":1158883200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2006,9,22]]},"DOI":"10.1145\/1231047.1231085","type":"proceedings-article","created":{"date-parts":[[2007,4,5]],"date-time":"2007-04-05T19:41:00Z","timestamp":1175802060000},"page":"168-174","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":3,"title":["Criminal computer forensics management"],"prefix":"10.1145","author":[{"given":"Ray","family":"Yeager","sequence":"first","affiliation":[{"name":"Kennesaw State University, Marietta, GA"}]}],"member":"320","published-online":{"date-parts":[[2006,9,22]]},"reference":[{"volume-title":"MA: Artech House","year":"2004","author":"Caloyannides Michael A","key":"e_1_3_2_1_1_1"},{"unstructured":"Cybertrust. Forensic Data Handling White Paper 2005 Retrieved from the World Wide Web on 07\/06\/06: URL http:\/\/www.cybertrust.com\/media\/white_papers\/cybertrust_wp_forensic.pdf.  Cybertrust. Forensic Data Handling White Paper 2005 Retrieved from the World Wide Web on 07\/06\/06: URL http:\/\/www.cybertrust.com\/media\/white_papers\/cybertrust_wp_forensic.pdf.","key":"e_1_3_2_1_2_1"},{"unstructured":"Kessler Gary C. Schirling Michael. Cracking the Books Cracking the Case: A Review of Computer Forensics Texts. Information Security Magazine {serial online} 2002. Retrieved from the World Wide Web on 07\/07\/06: URL http:\/\/infosecuritymag.techtarget.com\/2002\/apr\/crackingbooks.shtml.  Kessler Gary C. Schirling Michael. Cracking the Books Cracking the Case: A Review of Computer Forensics Texts. Information Security Magazine {serial online} 2002. Retrieved from the World Wide Web on 07\/07\/06: URL http:\/\/infosecuritymag.techtarget.com\/2002\/apr\/crackingbooks.shtml.","key":"e_1_3_2_1_3_1"},{"doi-asserted-by":"crossref","unstructured":"Kuchta Kelly J. Computer Forensics Today. Information Systems Security {serial online} 9(1):29 2000. Available from: Computer Source Ipswich MA. Accessed July 4 2006.  Kuchta Kelly J. Computer Forensics Today. Information Systems Security {serial online} 9(1):29 2000. Available from: Computer Source Ipswich MA. Accessed July 4 2006.","key":"e_1_3_2_1_4_1","DOI":"10.1201\/1086\/43308.9.1.20000304\/31345.6"},{"volume-title":"FL: Auerbach Publications","year":"2002","author":"Marcella Albert J","key":"e_1_3_2_1_5_1"},{"volume-title":"MA: Thompson Course Technology","year":"2004","author":"Nelson Bill","key":"e_1_3_2_1_6_1"},{"unstructured":"Scientific Working Group on Digital Evidence (SWGDE) of the National Center for Forensic Science (NCFS). Digital Evidence: Standards and Principles. Forensic Science Communications 2(2) 2000. Retrieved from the World Wide Web on 07\/07\/06: URL http:\/\/www.fbi.gov\/hq\/lab\/fsc\/backissu\/april2000\/swgde.htm.  Scientific Working Group on Digital Evidence (SWGDE) of the National Center for Forensic Science (NCFS). Digital Evidence: Standards and Principles. Forensic Science Communications 2(2) 2000. Retrieved from the World Wide Web on 07\/07\/06: URL http:\/\/www.fbi.gov\/hq\/lab\/fsc\/backissu\/april2000\/swgde.htm.","key":"e_1_3_2_1_7_1"},{"unstructured":"Scientific Working Group on Digital Evidence (SWGDE) of the National Center for Forensic Science (NCFS). Best Practices for Computer Forensics V2 2006a. Retrieved from the World Wide Web on 07\/07\/06: URL http:\/\/ncfs.org\/swgde\/documents\/swgde2006\/Best_Practices_for_Computer_Forensics%20V2.0.pdf  Scientific Working Group on Digital Evidence (SWGDE) of the National Center for Forensic Science (NCFS). Best Practices for Computer Forensics V2 2006a. Retrieved from the World Wide Web on 07\/07\/06: URL http:\/\/ncfs.org\/swgde\/documents\/swgde2006\/Best_Practices_for_Computer_Forensics%20V2.0.pdf","key":"e_1_3_2_1_8_1"},{"unstructured":"Scientific Working Groups on Digital Evidence (SWGDE) of the National Center for Forensic Science (NCFS). Recommended Guidelines for Developing a Quality Management System 2006b. Retrieved from the World Wide Web on 07\/07\/06: URL http:\/\/ncfs.org\/swgde\/documents\/swgde2006\/SWGDE%20Recommended%20Guidelines%20for%20Developing%20a%20Quality%20Management  Scientific Working Groups on Digital Evidence (SWGDE) of the National Center for Forensic Science (NCFS). Recommended Guidelines for Developing a Quality Management System 2006b. Retrieved from the World Wide Web on 07\/07\/06: URL http:\/\/ncfs.org\/swgde\/documents\/swgde2006\/SWGDE%20Recommended%20Guidelines%20for%20Developing%20a%20Quality%20Management","key":"e_1_3_2_1_9_1"},{"unstructured":"Scientific Working Groups on Digital Evidence (SWGDE) of the National Center for Forensic Science (NCFS). Data Archiving 2006c. Retrieved from the World Wide Web on 07\/07\/06: URL http:\/\/ncfs.org\/swgde\/documents\/swgde2006\/Data%20Archiving.pdf.  Scientific Working Groups on Digital Evidence (SWGDE) of the National Center for Forensic Science (NCFS). Data Archiving 2006c. Retrieved from the World Wide Web on 07\/07\/06: URL http:\/\/ncfs.org\/swgde\/documents\/swgde2006\/Data%20Archiving.pdf.","key":"e_1_3_2_1_10_1"},{"unstructured":"Scientific Working Groups on Digital Evidence (SWGDE) of the National Center for Forensic Science (NCFS). Data Integrity Within Computer Forensics 2006d. Retrieved from the World Wide Web on 07\/07\/06: URL http:\/\/ncfs.org\/swgde\/documents\/swgde2006\/Data%20Integrity.pdf.  Scientific Working Groups on Digital Evidence (SWGDE) of the National Center for Forensic Science (NCFS). Data Integrity Within Computer Forensics 2006d. Retrieved from the World Wide Web on 07\/07\/06: URL http:\/\/ncfs.org\/swgde\/documents\/swgde2006\/Data%20Integrity.pdf.","key":"e_1_3_2_1_11_1"},{"unstructured":"Scientific Working Groups on Digital Evidence (SWGDE) of the National Center for Forensic Science (NCFS). Digital Evidence Findings 2006e. Retrieved from the World Wide Web on 07\/07\/06: URL http:\/\/ncfs.org\/swgde\/documents\/swgde2006\/Digital%20Evidence%20Findings.pdf.  Scientific Working Groups on Digital Evidence (SWGDE) of the National Center for Forensic Science (NCFS). Digital Evidence Findings 2006e. Retrieved from the World Wide Web on 07\/07\/06: URL http:\/\/ncfs.org\/swgde\/documents\/swgde2006\/Digital%20Evidence%20Findings.pdf.","key":"e_1_3_2_1_12_1"},{"unstructured":"Scientific Working Groups on Digital Evidence and Imaging Technology (SWGDE\/SWGIT) of the National Center for Forensic Science (NCFS). Recommended Guidelines for Developing Standard Operating Procedures 2004a. Retrieved from the World Wide Web on 07\/07\/06: URL http:\/\/ncfs.org\/swgde\/documents\/swgde2006\/SWGDE%20-%20SWGIT%20Recommended%20Guidelines%20for%20Developing%20Standard%20Operating%20Procedures.pdf  Scientific Working Groups on Digital Evidence and Imaging Technology (SWGDE\/SWGIT) of the National Center for Forensic Science (NCFS). Recommended Guidelines for Developing Standard Operating Procedures 2004a. Retrieved from the World Wide Web on 07\/07\/06: URL http:\/\/ncfs.org\/swgde\/documents\/swgde2006\/SWGDE%20-%20SWGIT%20Recommended%20Guidelines%20for%20Developing%20Standard%20Operating%20Procedures.pdf","key":"e_1_3_2_1_13_1"},{"unstructured":"Scientific Working Groups on Digital Evidence and Imaging Technology (SWGDE\/SWGIT) of the National Center for Forensic Science (NCFS). Guidelines &amp; Recommendations for Training in Digital &amp; Multimedia Evidence 2004b. Retrieved from the World Wide Web on 07\/07\/06: URL http:\/\/ncfs.org\/swgde\/documents\/swgde2006\/SWGDE-SWGIT%20Guidelines%20and%20Recommendations%20for%20Training%20in%20Digital%20and%20Multimedia%20Evidence.pdf.  Scientific Working Groups on Digital Evidence and Imaging Technology (SWGDE\/SWGIT) of the National Center for Forensic Science (NCFS). Guidelines &amp; Recommendations for Training in Digital &amp; Multimedia Evidence 2004b. Retrieved from the World Wide Web on 07\/07\/06: URL http:\/\/ncfs.org\/swgde\/documents\/swgde2006\/SWGDE-SWGIT%20Guidelines%20and%20Recommendations%20for%20Training%20in%20Digital%20and%20Multimedia%20Evidence.pdf.","key":"e_1_3_2_1_14_1"},{"unstructured":"Scientific Working Groups on Digital Evidence and Imaging Technology (SWGDE\/SWGIT) of the National Center for Forensic Science (NCFS). Proficiency Test Program Guidelines 2004c. Retrieved from the World Wide Web on 07\/07\/06: URL http:\/\/ncfs.org\/swgde\/documents\/swgde2006\/SWGDE_SWGIT%20Proficiency%20Test%20Document%20V1.2.pdf.  Scientific Working Groups on Digital Evidence and Imaging Technology (SWGDE\/SWGIT) of the National Center for Forensic Science (NCFS). Proficiency Test Program Guidelines 2004c. Retrieved from the World Wide Web on 07\/07\/06: URL http:\/\/ncfs.org\/swgde\/documents\/swgde2006\/SWGDE_SWGIT%20Proficiency%20Test%20Document%20V1.2.pdf.","key":"e_1_3_2_1_15_1"},{"unstructured":"United States Department of Commerce Computer Security Resource Center (CSRC) National Institute of Standards and Technology (NIST). SP 800-61 Computer Security Incident Handling Guide 2004. Retrieved from the World Wide Web on 07\/07\/06: URL http:\/\/csrc.nist.gov\/publications\/nistpubs\/800-61\/sp800-61.pdf.  United States Department of Commerce Computer Security Resource Center (CSRC) National Institute of Standards and Technology (NIST). SP 800-61 Computer Security Incident Handling Guide 2004. Retrieved from the World Wide Web on 07\/07\/06: URL http:\/\/csrc.nist.gov\/publications\/nistpubs\/800-61\/sp800-61.pdf.","key":"e_1_3_2_1_16_1"},{"unstructured":"United States Department of Justice (USDOJ) Computer Crime and Intellectual Property Section (CCIPS). Searching and Seizing Computers and Obtaining Electronic Evidence in Criminal Investigations 2002. Retrieved from the World Wide Web on 07\/06\/06: URL http:\/\/www.cybercrime.gov\/s&smanual2002.htm.  United States Department of Justice (USDOJ) Computer Crime and Intellectual Property Section (CCIPS). Searching and Seizing Computers and Obtaining Electronic Evidence in Criminal Investigations 2002. Retrieved from the World Wide Web on 07\/06\/06: URL http:\/\/www.cybercrime.gov\/s&smanual2002.htm.","key":"e_1_3_2_1_17_1"},{"unstructured":"United States Secret Service. Best Practices for Seizing Electronic Evidence 2006. Retrieved from the World Wide Web on 07\/05\/06: URL http:\/\/www.secretservice.gov\/electronic_evidence.shtml.  United States Secret Service. Best Practices for Seizing Electronic Evidence 2006. Retrieved from the World Wide Web on 07\/05\/06: URL http:\/\/www.secretservice.gov\/electronic_evidence.shtml.","key":"e_1_3_2_1_18_1"},{"volume-title":"MA: Charles River Media","year":"2002","author":"Vacca John R","key":"e_1_3_2_1_19_1"},{"doi-asserted-by":"crossref","unstructured":"Welch T. Computer Crime Investigation and Computer Forensics. Information Systems Security {serial online} 6(2):56 1997. Available from: Computer Source Ipswich MA. Accessed July 4 2006.  Welch T. Computer Crime Investigation and Computer Forensics. Information Systems Security {serial online} 6(2):56 1997. Available from: Computer Source Ipswich MA. Accessed July 4 2006.","key":"e_1_3_2_1_20_1","DOI":"10.1080\/10658989709342536"},{"volume-title":"MA: Thompson Course Technology","year":"2004","author":"Whitman Michael E","key":"e_1_3_2_1_21_1"},{"unstructured":"Wright Timothy E. An Introduction to the Field Guide for Investigating Part 1 2000a. Retrieved from the World Wide Web on 07\/05\/06: URL http:\/\/www.securityfocus.com\/print\/infocus\/1244  Wright Timothy E. An Introduction to the Field Guide for Investigating Part 1 2000a. Retrieved from the World Wide Web on 07\/05\/06: URL http:\/\/www.securityfocus.com\/print\/infocus\/1244","key":"e_1_3_2_1_22_1"},{"unstructured":"Wright Timothy E. The Field Guide for Investigating Computer Crime: Overview of a Methodology for the Application of Computer Forensics Part 2 2000b. Retrieved from the World Wide Web on 07\/05\/06: URL http:\/\/www.securityfocus.com\/print\/infocus\/1245  Wright Timothy E. The Field Guide for Investigating Computer Crime: Overview of a Methodology for the Application of Computer Forensics Part 2 2000b. Retrieved from the World Wide Web on 07\/05\/06: URL http:\/\/www.securityfocus.com\/print\/infocus\/1245","key":"e_1_3_2_1_23_1"},{"unstructured":"Wright Timothy E. The Field Guide for Investigating Computer Crime: Search &amp; Seizure Basics Part 3 2000c. Retrieved from the World Wide Web on 07\/05\/06: URL http:\/\/www.securityfocus.com\/print\/infocus\/1246  Wright Timothy E. The Field Guide for Investigating Computer Crime: Search &amp; Seizure Basics Part 3 2000c. Retrieved from the World Wide Web on 07\/05\/06: URL http:\/\/www.securityfocus.com\/print\/infocus\/1246","key":"e_1_3_2_1_24_1"},{"unstructured":"Wright Timothy E. The Field Guide for Investigating Computer Crime: Search &amp; Seizure Planning Part 4 2000d. Retrieved from the World Wide Web on 07\/05\/06: URL http:\/\/www.securityfocus.com\/print\/infocus\/1247  Wright Timothy E. The Field Guide for Investigating Computer Crime: Search &amp; Seizure Planning Part 4 2000d. Retrieved from the World Wide Web on 07\/05\/06: URL http:\/\/www.securityfocus.com\/print\/infocus\/1247","key":"e_1_3_2_1_25_1"},{"unstructured":"Wright Timothy E. The Field Guide for Investigating Computer Crime: Search &amp; Seizure Approach Documentation and Location Part 5 2000e. Retrieved from the World Wide Web on 07\/10\/06: URL http:\/\/www.securityfocus.com\/print\/infocus\/1248  Wright Timothy E. The Field Guide for Investigating Computer Crime: Search &amp; Seizure Approach Documentation and Location Part 5 2000e. Retrieved from the World Wide Web on 07\/10\/06: URL http:\/\/www.securityfocus.com\/print\/infocus\/1248","key":"e_1_3_2_1_26_1"},{"unstructured":"Wright Timothy E. The Field Guide for Investigating Computer Crime: Search &amp; Seizure Evidence Retrieval &amp; Processing Part 6 2001a. Retrieved from the World Wide Web on 07\/10\/06: URL http:\/\/www.securityfocus.com\/print\/infocus\/1249  Wright Timothy E. The Field Guide for Investigating Computer Crime: Search &amp; Seizure Evidence Retrieval &amp; Processing Part 6 2001a. Retrieved from the World Wide Web on 07\/10\/06: URL http:\/\/www.securityfocus.com\/print\/infocus\/1249","key":"e_1_3_2_1_27_1"},{"unstructured":"Wright Timothy E. The Field Guide for Investigating Computer Crime: Information Discovery - Basics and Planning Part 7 2001b. Retrieved from the World Wide Web on 07\/10\/06: URL http:\/\/www.securityfocus.com\/print\/infocus\/1250  Wright Timothy E. The Field Guide for Investigating Computer Crime: Information Discovery - Basics and Planning Part 7 2001b. Retrieved from the World Wide Web on 07\/10\/06: URL http:\/\/www.securityfocus.com\/print\/infocus\/1250","key":"e_1_3_2_1_28_1"},{"unstructured":"Wright Timothy E. The Field Guide for Investigating Computer Crime: Information Discovery - Searching &amp; Processing Part 8 2001c. Retrieved from the World Wide Web on 07\/10\/06: URL http:\/\/www.securityfocus.com\/print\/infocus\/1251  Wright Timothy E. The Field Guide for Investigating Computer Crime: Information Discovery - Searching &amp; Processing Part 8 2001c. Retrieved from the World Wide Web on 07\/10\/06: URL http:\/\/www.securityfocus.com\/print\/infocus\/1251","key":"e_1_3_2_1_29_1"}],"event":{"acronym":"InfoSecCD06","name":"InfoSecCD06: 2006 Information Security Curriculum Development Conference","location":"Kennesaw Georgia"},"container-title":["Proceedings of the 3rd annual conference on Information security curriculum development"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1231047.1231085","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1231047.1231085","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T14:51:53Z","timestamp":1750258313000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1231047.1231085"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006,9,22]]},"references-count":29,"alternative-id":["10.1145\/1231047.1231085","10.1145\/1231047"],"URL":"https:\/\/doi.org\/10.1145\/1231047.1231085","relation":{},"subject":[],"published":{"date-parts":[[2006,9,22]]},"assertion":[{"value":"2006-09-22","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}