{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,28]],"date-time":"2026-02-28T04:52:35Z","timestamp":1772254355230,"version":"3.50.1"},"reference-count":49,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2019,8,14]],"date-time":"2019-08-14T00:00:00Z","timestamp":1565740800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2019,8,14]],"date-time":"2019-08-14T00:00:00Z","timestamp":1565740800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"funder":[{"DOI":"10.13039\/501100014786","name":"Northern Border University","doi-asserted-by":"crossref","id":[{"id":"10.13039\/501100014786","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Cloud Comp"],"published-print":{"date-parts":[[2019,12]]},"DOI":"10.1186\/s13677-019-0133-z","type":"journal-article","created":{"date-parts":[[2019,8,14]],"date-time":"2019-08-14T12:03:39Z","timestamp":1565784219000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":33,"title":["Experts reviews of a cloud forensic readiness framework for organizations"],"prefix":"10.1186","volume":"8","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-2782-3106","authenticated-orcid":false,"given":"Ahmed","family":"Alenezi","sequence":"first","affiliation":[]},{"given":"Hany F.","family":"Atlam","sequence":"additional","affiliation":[]},{"given":"Gary B.","family":"Wills","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,8,14]]},"reference":[{"key":"133_CR1","doi-asserted-by":"publisher","unstructured":"Ruan K, Carthy J, Kechadi T, Crosbie M (2011) Cloud forensics. An Overview IFIP Conference on Digital Forensics:35\u201346. \n                    https:\/\/doi.org\/10.1007\/978-3-642-24212-03","DOI":"10.1007\/978-3-642-24212-03"},{"key":"133_CR2","doi-asserted-by":"publisher","first-page":"599","DOI":"10.1016\/j.future.2008.12.001","volume":"25","author":"R Buyya","year":"2009","unstructured":"Buyya R, Yeo CS, Venugopal S et al (2009) Cloud computing and emerging IT platforms: vision, hype, and reality for delivering computing as the 5th utility. Futur Gener Comput Syst 25:599\u2013616. \n                    https:\/\/doi.org\/10.1016\/j.future.2008.12.001","journal-title":"Futur Gener Comput Syst"},{"key":"133_CR3","doi-asserted-by":"publisher","first-page":"50","DOI":"10.1145\/1721654.1721672","volume":"53","author":"M Armbrust","year":"2010","unstructured":"Armbrust M, Stoica I, Zaharia M et al (2010) A view of cloud computing. Commun ACM 53:50. \n                    https:\/\/doi.org\/10.1145\/1721654.1721672","journal-title":"Commun ACM"},{"key":"133_CR4","unstructured":"Marco L De, Kechadi M-T, Ferrucci F (2013) Cloud Forensic Readiness: Foundations. International Conference on Digital Forensics and Cyber Crime 237\u2013244"},{"key":"133_CR5","unstructured":"Market Research Media. In: Market research media. 2016. \n                    http:\/\/www.marketresearchmedia.com\/?p=839\n                    \n                  . Accessed 16 July 2017."},{"key":"133_CR6","doi-asserted-by":"publisher","unstructured":"Sang T (2013) A log-based approach to make digital forensics easier on cloud computing. Proceedings of the 2013 3rd international conference on intelligent system design and engineering applications, ISDEA 2013 91\u201394. \n                    https:\/\/doi.org\/10.1109\/ISDEA.2012.29","DOI":"10.1109\/ISDEA.2012.29"},{"key":"133_CR7","unstructured":"NIST (2014) NIST Cloud Computing Forensic Science Challenges"},{"key":"133_CR8","doi-asserted-by":"crossref","unstructured":"Kent K, Chevalier S, Grance T, Dang H (2006) Guide to integrating forensic techniques into incident response. NIST Special Publication","DOI":"10.6028\/NIST.SP.800-86"},{"issue":"1","key":"133_CR9","doi-asserted-by":"publisher","first-page":"101","DOI":"10.1111\/j.1365-2656.2005.01025.x","volume":"75","author":"DAVID A. MILLER","year":"2006","unstructured":"Palmer G (2001) A road map for digital forensic research. First digital forensic research workshop 1\u201342. \n                    https:\/\/doi.org\/10.1111\/j.1365-2656.2005.01025.x","journal-title":"Journal of Animal Ecology"},{"key":"133_CR10","doi-asserted-by":"publisher","first-page":"91","DOI":"10.1007\/s40012-012-0008-7","volume":"1","author":"S Raghavan","year":"2013","unstructured":"Raghavan S (2013) Digital forensic research: current state of the art. CSI Transactions on ICT 1:91\u2013114. \n                    https:\/\/doi.org\/10.1007\/s40012-012-0008-7","journal-title":"CSI Transactions on ICT"},{"key":"133_CR11","unstructured":"Hewling M (2013) Digital forensics: an integrated approach for the Investigation of Cyber\/Computer Related Crimes"},{"key":"133_CR12","unstructured":"Yung Chou (2010) Cloud Computing for IT Pros (2\/6): What Is Cloud. \n                    https:\/\/blogs.technet.microsoft.com\/yungchou\/2010\/12\/17\/cloud-computing-for-it-pros-26-what-is-cloud\/\n                    \n                  . Accessed 19 Mar 2019"},{"key":"133_CR13","first-page":"17","volume":"26","author":"S Zawoad","year":"2013","unstructured":"Zawoad S, Hasan R (2013) Digital forensics in the cloud. The Journal of Defense Software Engineering (Cross Talk) 26:17\u201320","journal-title":"The Journal of Defense Software Engineering (Cross Talk)"},{"key":"133_CR14","first-page":"181","volume-title":"International conference on e-democracy","author":"G Pangalos","year":"2010","unstructured":"Pangalos G, Katos V (2010) Information assurance and forensic readiness. In: International conference on e-democracy. Springer, Berlin Heidelberg, pp 181\u2013188"},{"key":"133_CR15","doi-asserted-by":"crossref","unstructured":"Alenezi A, Hussein RK, Walters RJ, Wills GB (2017) A framework for cloud forensic readiness in organizations. In: 2017 5th IEEE International Conference on Mobile Cloud Computing, Services, and Engineering (MobileCloud) pp 199\u2013204","DOI":"10.1109\/MobileCloud.2017.12"},{"key":"133_CR16","doi-asserted-by":"publisher","unstructured":"Grobler CP, Louwrens CP, Von Solms SH (2010) A framework to guide the implementation of proactive digital forensics in organizations. Availability, reliability, and security, 2010 ARES \u201810 international conference 677\u2013682. \n                    https:\/\/doi.org\/10.1109\/ARES.2010.62","DOI":"10.1109\/ARES.2010.62"},{"key":"133_CR17","doi-asserted-by":"publisher","first-page":"59","DOI":"10.1007\/978-3-642-23141-4","volume":"5","author":"S Alharbi","year":"2011","unstructured":"Alharbi S, Weber-Jahnke J, Traore I (2011) The proactive and reactive digital forensics investigation process: a systematic literature review. International Journal of Security and Its Applications 5:59\u201372. \n                    https:\/\/doi.org\/10.1007\/978-3-642-23141-4","journal-title":"International Journal of Security and Its Applications"},{"key":"133_CR18","doi-asserted-by":"publisher","first-page":"97","DOI":"10.1108\/17506200710779521","volume":"54","author":"M Elyas","year":"2014","unstructured":"Elyas M, Maynard SB, Ahmad A, Lonie A (2014) Towards a systematic framework for digital forensic readiness. J Comput Inf Syst 54:97\u2013105. \n                    https:\/\/doi.org\/10.1108\/17506200710779521","journal-title":"J Comput Inf Syst"},{"key":"133_CR19","doi-asserted-by":"publisher","first-page":"70","DOI":"10.1016\/j.cose.2015.04.003","volume":"52","author":"M Elyas","year":"2015","unstructured":"Elyas M, Ahmad A, Maynard SB, Lonie A (2015) Digital forensic readiness: expert perspectives on a theoretical framework. Computers and Security 52:70\u201389. \n                    https:\/\/doi.org\/10.1016\/j.cose.2015.04.003","journal-title":"Computers and Security"},{"key":"133_CR20","doi-asserted-by":"crossref","unstructured":"Valjarevic A, Venter H (2013) Implementation guidelines for a harmonised digital forensic investigation readiness process model. 2013 Information Security for South Africa 1\u20139.","DOI":"10.1109\/ISSA.2013.6641041"},{"key":"133_CR21","doi-asserted-by":"crossref","unstructured":"Moussa AN, Ithnin NB, Miaikil OA. (2014) Conceptual forensic readiness framework for infrastructure as a service consumers. In: Systems, Process and Control (ICSPC), 2014 IEEE Conference pp 162\u2013167.","DOI":"10.1109\/SPC.2014.7086250"},{"key":"133_CR22","first-page":"150","volume-title":"International conference on trust and privacy in digital business","author":"S Simou","year":"2018","unstructured":"Simou S, Troumpis I, Kalloniatis C et al (2018) A decision-making approach for improving organizations\u2019 cloud forensic readiness. In: International conference on trust and privacy in digital business, pp 150\u2013164"},{"key":"133_CR23","first-page":"1","volume":"4","author":"S Park","year":"2018","unstructured":"Park S, Kim Y, Park G et al (2018) Research on digital forensic readiness Design in a Cloud Computing-Based Smart Work Environment. Sustainability 4:1\u201324","journal-title":"Sustainability"},{"key":"133_CR24","doi-asserted-by":"crossref","unstructured":"Sibiya G, Fogwill T, Venter HS, Ngobeni S (2013) Digital forensic readiness in a cloud environment. AFRICON, IEEE:1\u20135","DOI":"10.1109\/AFRCON.2013.6757831"},{"key":"133_CR25","unstructured":"Makutsoane MP, Leonard A (2014) A conceptual framework to determine the digital forensic readiness of a cloud service provider. In: Proceedings of PICMET \u201814 conference. Portland International Center for Management of Engineering and Technology; Infrastructure and Service Integration, pp 3313\u20133321"},{"key":"133_CR26","unstructured":"Kebande VR, Venter HS (2014) A cloud forensic readiness model using a botnet as a service. The international conference on digital security and forensics (DigitalSec2014) 23\u201332"},{"key":"133_CR27","unstructured":"Kebande VR, Venter HS (2016) Requirements for achieving digital forensic readiness in the cloud environment using an NMB solution. 11th International Conference on Cyber Warfare and Security ICCWS"},{"key":"133_CR28","doi-asserted-by":"publisher","first-page":"552","DOI":"10.1080\/00450618.2016.1267797","volume":"50","author":"VR Kebande","year":"2017","unstructured":"Kebande VR, Venter HS (2017) Novel digital forensic readiness technique in the cloud environment. Australian Journal of Forensic Sciences 50:552\u2013591. \n                    https:\/\/doi.org\/10.1080\/00450618.2016.1267797","journal-title":"Australian Journal of Forensic Sciences"},{"key":"133_CR29","doi-asserted-by":"publisher","first-page":"50","DOI":"10.1109\/MCC.2016.5","volume":"3","author":"NH Ab Rahman","year":"2016","unstructured":"Ab Rahman NH, Glisson WB, Yang Y, Choo K-KR (2016) Forensic-by-design framework for cyber-physical cloud systems. IEEE Cloud Computing 3:50\u201359","journal-title":"IEEE Cloud Computing"},{"key":"133_CR30","doi-asserted-by":"publisher","first-page":"S90","DOI":"10.1016\/j.diin.2012.05.001","volume":"9","author":"J Dykstra","year":"2012","unstructured":"Dykstra J, Sherman AT (2012) Acquiring forensic evidence from infrastructure-as-a-service cloud computing: exploring and evaluating tools, trust, and techniques. Digit Investig 9:S90\u2013S98","journal-title":"Digit Investig"},{"key":"133_CR31","doi-asserted-by":"crossref","unstructured":"Trenwith PM, Venter HS (2013) Digital forensic readiness in the cloud. 2013 Information Security for South Africa IEEE.","DOI":"10.1109\/ISSA.2013.6641055"},{"key":"133_CR32","doi-asserted-by":"crossref","unstructured":"Zawoad S, Dutta AK, Hasan R (2013) SecLaaS: secure logging-as-a-service for cloud forensics. In: the 8th ACM SIGSAC symposium on Information, computer and communications security. pp 219\u2013230.","DOI":"10.1145\/2484313.2484342"},{"key":"133_CR33","volume-title":"Research design: Qualitative, quantitative, And mixed methods approaches","author":"C J w","year":"2009","unstructured":"J w C (2009) Research design: Qualitative, quantitative, And mixed methods approaches"},{"key":"133_CR34","volume-title":"Designing and conducting mixed methods research","author":"JW Creswell","year":"2007","unstructured":"Creswell JW, Clark VLP (2007) Designing and conducting mixed methods research"},{"key":"133_CR35","doi-asserted-by":"publisher","DOI":"10.4135\/9781412986328","volume-title":"The survey handbook","author":"A Fink","year":"2003","unstructured":"Fink A (2003) The survey handbook"},{"key":"133_CR36","volume-title":"The qualitative report","author":"J Aronson","year":"1995","unstructured":"Aronson J (1995) A pragmatic view of thematic analysis. In: The qualitative report"},{"key":"133_CR37","doi-asserted-by":"crossref","unstructured":"Braun V, Clarke V (2006) Using thematic analysis in psychology. Qualitative research in psychology.","DOI":"10.1191\/1478088706qp063oa"},{"key":"133_CR38","unstructured":"Sekaran U (2000) Research methods for business. John Wiley & Sons, Inc"},{"key":"133_CR39","unstructured":"Hancock B, Ockleford E, Windridge K (1998) An introduction to qualitative research."},{"key":"133_CR40","doi-asserted-by":"crossref","unstructured":"Banerjee A, Chitnis U, Jadhav S (2009) Hypothesis testing, type I and type II errors. Industrial psychiatry.","DOI":"10.4103\/0972-6748.62274"},{"key":"133_CR41","doi-asserted-by":"crossref","unstructured":"Grant J, Davis L (1997) Selection and use of content experts for instrument development. Research in nursing & health.","DOI":"10.1002\/(SICI)1098-240X(199706)20:3<269::AID-NUR9>3.0.CO;2-G"},{"key":"133_CR42","doi-asserted-by":"publisher","first-page":"59","DOI":"10.1177\/1525822X05279903","volume":"18","author":"G Guest","year":"2006","unstructured":"Guest G, Bunce A, Johnson L (2006) How many interviews are enough ? An experiment with data saturation and variability. Family Health International 18:59\u201382. \n                    https:\/\/doi.org\/10.1177\/1525822X05279903","journal-title":"Family Health International"},{"key":"133_CR43","doi-asserted-by":"crossref","unstructured":"Zargari S, Benford D (2012) Cloud forensics: concepts, issues, and challenges. Third International Conference on Emerging Intelligent Data and Web Technologies:236\u2013243","DOI":"10.1109\/EIDWT.2012.44"},{"key":"133_CR44","doi-asserted-by":"publisher","first-page":"14","DOI":"10.1109\/MCC.2017.39","volume":"4","author":"KR Choo","year":"2017","unstructured":"Choo KR, Antonio S, Choo R (2017) Evidence and forensics in the cloud: challenges and future research directions. IEEE Cloud Computing 4:14\u201319","journal-title":"IEEE Cloud Computing"},{"key":"133_CR45","doi-asserted-by":"publisher","first-page":"38","DOI":"10.1016\/j.diin.2015.03.002","volume":"13","author":"Ameer Pichan","year":"2015","unstructured":"Pichan A, Lazarescu M, Soh ST (2015) Cloud forensics: technical challenges, solutions and comparative analysis. Digit Investig:38\u201357. \n                    https:\/\/doi.org\/10.1016\/j.diin.2015.03.002","journal-title":"Digital Investigation"},{"key":"133_CR46","unstructured":"ACPO (2012) ACPO Good practice Guide for Digital Evidence."},{"key":"133_CR47","unstructured":"CSA (2013) Mapping the forensic standard ISO \/ IEC 27037 to cloud computing. Cloud Security Alliance:1\u201331"},{"key":"133_CR48","unstructured":"Liveri D, Skouloudi C (2016) Exploring Cloud Incidents. The European Network and Information Security Agency (ENISA) 1\u201314."},{"key":"133_CR49","volume-title":"Information technology \u2014 security techniques \u2014 incident investigation principles and processes","author":"ISO\/IEC-27043","year":"2015","unstructured":"ISO\/IEC-27043 (2015) Information technology \u2014 security techniques \u2014 incident investigation principles and processes."}],"container-title":["Journal of Cloud Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1186\/s13677-019-0133-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1186\/s13677-019-0133-z\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1186\/s13677-019-0133-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,8,12]],"date-time":"2020-08-12T23:07:01Z","timestamp":1597273621000},"score":1,"resource":{"primary":{"URL":"https:\/\/journalofcloudcomputing.springeropen.com\/articles\/10.1186\/s13677-019-0133-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,8,14]]},"references-count":49,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2019,12]]}},"alternative-id":["133"],"URL":"https:\/\/doi.org\/10.1186\/s13677-019-0133-z","relation":{},"ISSN":["2192-113X"],"issn-type":[{"value":"2192-113X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,8,14]]},"assertion":[{"value":"24 October 2018","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"27 June 2019","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"14 August 2019","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"The authors declare that they have no competing interests.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"11"}}