{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:23:59Z","timestamp":1750307039953,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":25,"publisher":"ACM","license":[{"start":{"date-parts":[[2012,6,11]],"date-time":"2012-06-11T00:00:00Z","timestamp":1339372800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2012,6,11]]},"DOI":"10.1145\/2316936.2316943","type":"proceedings-article","created":{"date-parts":[[2012,7,3]],"date-time":"2012-07-03T11:53:15Z","timestamp":1341316395000},"page":"31-37","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["Using open source for forensic purposes"],"prefix":"10.1145","author":[{"given":"Manuel","family":"Delgado","sequence":"first","affiliation":[{"name":"ISCTE-IUL, Lisboa"}]},{"given":"Manuela","family":"Aparicio","sequence":"additional","affiliation":[{"name":"Adetti-IUL\/ISCTE-IUL, Lisboa"}]},{"given":"Carlos","family":"Costa","sequence":"additional","affiliation":[{"name":"Adetti-IUL\/ISCTE-IUL, Lisboa"}]}],"member":"320","published-online":{"date-parts":[[2012,6,11]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Gantz John e Reinsel David - The Digital Universe Decade -- Are You Ready? -- IDC -- IVIEW http:\/\/www.emc.com\/collateral\/demos\/microsites\/emc-digital-universe-2011\/index.htm  Gantz John e Reinsel David - The Digital Universe Decade -- Are You Ready? -- IDC -- IVIEW http:\/\/www.emc.com\/collateral\/demos\/microsites\/emc-digital-universe-2011\/index.htm"},{"key":"e_1_3_2_1_2_1","unstructured":"Vacca Jonh R(2005) -- Computer Forensics -- Computer Crime scene Investigation 2.a Edi\u00e7\u00e3o - Published by pela editora Charles River Media - ISBN: 1-58450-389-0   Vacca Jonh R(2005) -- Computer Forensics -- Computer Crime scene Investigation 2. a Edi\u00e7\u00e3o - Published by pela editora Charles River Media - ISBN: 1-58450-389-0"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1111\/1467-6419.00133"},{"key":"e_1_3_2_1_4_1","volume-title":"Economic and Financial Crimes: Challenges to Sustainable Development - http:\/\/www.unis.unvienna.org\/pdf\/05-82108_E_5_pr_SFS.pdf","author":"UNODC","year":"2005","unstructured":"UNODC ( 2005 ) Economic and Financial Crimes: Challenges to Sustainable Development - http:\/\/www.unis.unvienna.org\/pdf\/05-82108_E_5_pr_SFS.pdf UNODC (2005) Economic and Financial Crimes: Challenges to Sustainable Development - http:\/\/www.unis.unvienna.org\/pdf\/05-82108_E_5_pr_SFS.pdf"},{"key":"e_1_3_2_1_5_1","volume-title":"Esbo\u00e7o de Quantifica\u00e7\u00e3o da Fraude em Portugal\" Working Papers N\u00b0 3\/2009 OBEGEF -- Observat\u00f3rio de Economia e Gest\u00e3o de Fraude","author":"Pimenta C.","year":"2009","unstructured":"Pimenta , C. ( 2009 ) \" Esbo\u00e7o de Quantifica\u00e7\u00e3o da Fraude em Portugal\" Working Papers N\u00b0 3\/2009 OBEGEF -- Observat\u00f3rio de Economia e Gest\u00e3o de Fraude . Pimenta, C. (2009) \"Esbo\u00e7o de Quantifica\u00e7\u00e3o da Fraude em Portugal\" Working Papers N\u00b0 3\/2009 OBEGEF -- Observat\u00f3rio de Economia e Gest\u00e3o de Fraude."},{"key":"e_1_3_2_1_6_1","unstructured":"Pwc 2011 - Global economic crime survey 2011 http:\/\/www.pwc.com\/gx\/en\/economic-crime-survey\/download-economic-crime-people-culture-controls.jhtml  Pwc 2011 - Global economic crime survey 2011 http:\/\/www.pwc.com\/gx\/en\/economic-crime-survey\/download-economic-crime-people-culture-controls.jhtml"},{"key":"e_1_3_2_1_7_1","unstructured":"Branco M. 2010 \"Empresas Responsabilidade Social e Corrup\u00e7\u00e3o\" Working Papers N\u00b0 6\/2010 OBEGEF -- Observat\u00f3rio de Economia e Gest\u00e3o de Fraude  Branco M. 2010 \"Empresas Responsabilidade Social e Corrup\u00e7\u00e3o\" Working Papers N\u00b0 6\/2010 OBEGEF -- Observat\u00f3rio de Economia e Gest\u00e3o de Fraude"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1111\/1467-6419.00133"},{"key":"e_1_3_2_1_9_1","volume-title":"Wall Street's Economic Crimes Against Humanity - BusinessWeek -- VIEWPOINT -","author":"Zuboff S.","year":"2009","unstructured":"Zuboff , S. ( 2009 ) Wall Street's Economic Crimes Against Humanity - BusinessWeek -- VIEWPOINT - March 20, 2009 http:\/\/www.businessweek.com\/managing\/content\/mar2009\/ca20090319_591214.htm Zuboff, S. (2009) Wall Street's Economic Crimes Against Humanity - BusinessWeek -- VIEWPOINT - March 20, 2009 http:\/\/www.businessweek.com\/managing\/content\/mar2009\/ca20090319_591214.htm"},{"key":"e_1_3_2_1_10_1","unstructured":"Schneier B 2004 \"Secrets and Lies - Digital Security in a Networked World\" - Wiley Computer Publishing Inc.   Schneier B 2004 \"Secrets and Lies - Digital Security in a Networked World\" - Wiley Computer Publishing Inc."},{"key":"e_1_3_2_1_11_1","unstructured":"Kruse Warren G. Heiser Jay G. 2001. Computer forensics incident response essentials -- Published by Addison-Wesley Professional; 1 edition.  Kruse Warren G. Heiser Jay G. 2001. Computer forensics incident response essentials -- Published by Addison-Wesley Professional; 1 edition."},{"key":"e_1_3_2_1_12_1","volume-title":"Digital Forensic Research Workshop 2002","author":"Carrier B.","year":"2002","unstructured":"Carrier , B. 2002 \" Defining Digital Forensic Examination and Analysis Tools \". Digital Forensic Research Workshop 2002 , Syracuse - http:\/\/www.dfrws.org\/ 2002\/papers\/Papers\/Brian_carrier.pdf. Carrier, B. 2002 \"Defining Digital Forensic Examination and Analysis Tools\". Digital Forensic Research Workshop 2002, Syracuse - http:\/\/www.dfrws.org\/2002\/papers\/Papers\/Brian_carrier.pdf."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"crossref","unstructured":"Inmon Keith e Rudin Norah (2001) - Principles and Practice of Criminalistics - The Profession of Forensic Science  Inmon Keith e Rudin Norah (2001) - Principles and Practice of Criminalistics - The Profession of Forensic Science","DOI":"10.1201\/9781420036930"},{"key":"e_1_3_2_1_14_1","unstructured":"IOCE - International Organization on Computer Evidence -General Definitions relating to digital evidence -http:\/\/www.ioce.org\/core.php?ID=5.  IOCE - International Organization on Computer Evidence -General Definitions relating to digital evidence -http:\/\/www.ioce.org\/core.php?ID=5."},{"key":"e_1_3_2_1_15_1","unstructured":"SWGDE - Best Practices for Computer Forensics - http:\/\/www.swgde.org\/documents\/current-documents\/.  SWGDE - Best Practices for Computer Forensics - http:\/\/www.swgde.org\/documents\/current-documents\/."},{"key":"e_1_3_2_1_16_1","unstructured":"ACPO - Association of Chief Police Officers -- UK Good Practice Guide for Computer-Based Electronic Evidence http:\/\/www.7safe.com\/electronic_evidence\/ACPO_guidelines_computer_evidence.pdf  ACPO - Association of Chief Police Officers -- UK Good Practice Guide for Computer-Based Electronic Evidence http:\/\/www.7safe.com\/electronic_evidence\/ACPO_guidelines_computer_evidence.pdf"},{"key":"e_1_3_2_1_17_1","unstructured":"Carrey Eoghan 2009 - \"Handbook of Digital Forensics and Investigation\" Published by Elsevier Academic Press   Carrey Eoghan 2009 - \"Handbook of Digital Forensics and Investigation\" Published by Elsevier Academic Press"},{"key":"e_1_3_2_1_18_1","volume-title":"P.","author":"Brown L. T.","year":"2007","unstructured":"Brown , Christopher L. T. 2006 - Computer evidence: Collection & Preservation Thomson\/Delmar learning. published by: Charles River Media, inc.Tavel , P. 2007 . Modeling and Simulation Design. AK Peters Ltd ., Natick, MA. Brown, Christopher L. T. 2006 - Computer evidence: Collection & Preservation Thomson\/Delmar learning. published by: Charles River Media, inc.Tavel, P. 2007. Modeling and Simulation Design. AK Peters Ltd., Natick, MA."},{"key":"e_1_3_2_1_19_1","unstructured":"Boddington R. Hobbs V. and Mann G. - Validating digital evidence for legal argument - Murdoch University  Boddington R. Hobbs V. and Mann G. - Validating digital evidence for legal argument - Murdoch University"},{"key":"e_1_3_2_1_20_1","unstructured":"Farmer D. Venema W. 2005 -- \"Forensic Discovery\" Addison-Wesley Professional Computing Series   Farmer D. Venema W. 2005 -- \"Forensic Discovery\" Addison-Wesley Professional Computing Series"},{"key":"e_1_3_2_1_21_1","unstructured":"Carrier B. 2006 -- \"Digital Investigation and Digital Forensic Basics\" - Disponivel em: http:\/\/www.digital-evidence.org\/di_basics.html  Carrier B. 2006 -- \"Digital Investigation and Digital Forensic Basics\" - Disponivel em: http:\/\/www.digital-evidence.org\/di_basics.html"},{"key":"e_1_3_2_1_22_1","volume-title":"DFRWS","author":"Palmer L.","year":"2001","unstructured":"Palmer , Gary L. 2001 \" A Road Map for Digital Forensic Research\". Technical Report DTR-T001-01 , DFRWS , November 2001. Report From the First Digital Forensic Research Workshop (DFRWS). Palmer, Gary L. 2001 \"A Road Map for Digital Forensic Research\". Technical Report DTR-T001-01, DFRWS, November 2001. Report From the First Digital Forensic Research Workshop (DFRWS)."},{"key":"e_1_3_2_1_23_1","unstructured":"DFRWS TECHNICAL REPORT 2001 - A Road Map for Digital Forensic Research. -Report From the First Digital Forensic Research Workshop (DFRWS)  DFRWS TECHNICAL REPORT 2001 - A Road Map for Digital Forensic Research. -Report From the First Digital Forensic Research Workshop (DFRWS)"},{"key":"e_1_3_2_1_24_1","unstructured":"Kenneally Erin E. - Open Source Software As A Mechanism To Assess Reliability For Digital Evidence Published by Virginia Journal of Law and Technology Association - http:\/\/www.vjolt.net\/vol6\/issue3\/v6i3-a13-Kenneally.html#_edn3  Kenneally Erin E. - Open Source Software As A Mechanism To Assess Reliability For Digital Evidence Published by Virginia Journal of Law and Technology Association - http:\/\/www.vjolt.net\/vol6\/issue3\/v6i3-a13-Kenneally.html#_edn3"},{"key":"e_1_3_2_1_25_1","unstructured":"SWGDE - Best Practices for Computer Forensics - http:\/\/www.swgde.org\/documents\/current-documents\/  SWGDE - Best Practices for Computer Forensics - http:\/\/www.swgde.org\/documents\/current-documents\/"}],"event":{"name":"OSDOC 2012: OSDOC 2012 Workshop Open Source and Design of Communication","acronym":"OSDOC 2012","location":"Lisboa Portugal"},"container-title":["Proceedings of the Workshop on Open Source and Design of Communication"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2316936.2316943","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2316936.2316943","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T09:20:53Z","timestamp":1750238453000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2316936.2316943"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,6,11]]},"references-count":25,"alternative-id":["10.1145\/2316936.2316943","10.1145\/2316936"],"URL":"https:\/\/doi.org\/10.1145\/2316936.2316943","relation":{},"subject":[],"published":{"date-parts":[[2012,6,11]]},"assertion":[{"value":"2012-06-11","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}