{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T20:06:45Z","timestamp":1729627605987,"version":"3.28.0"},"reference-count":31,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020,9,28]]},"DOI":"10.23919\/mipro48935.2020.9245157","type":"proceedings-article","created":{"date-parts":[[2020,11,6]],"date-time":"2020-11-06T21:51:34Z","timestamp":1604699494000},"page":"1764-1770","source":"Crossref","is-referenced-by-count":1,"title":["Digital forensics appliance in corporate ecosystem considering limitations in the EU legal framework"],"prefix":"10.23919","author":[{"given":"Vinko","family":"Rajic","sequence":"first","affiliation":[]},{"given":"Melita","family":"Milenkovic","sequence":"additional","affiliation":[]},{"given":"Goran","family":"Vojkovic","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"volume":"136","journal-title":"Regulation (EC) No 1073\/1999 of the European Parliament and of the Council of 25 May 1999 concerning investigations conducted by the European Anti-Fraud Office (OLAF) Official Journal L","year":"1999","key":"ref31"},{"journal-title":"Regulation (EU) 2018\/1725 of the European Parliament and of the Council of 23 October 2018 on the protection of natural persons with regard to the processing of personal data by the Union institutions bodies offices and agencies and on the free movement of such data and repealing Regulation (EC) No 45\/2001 and Decision No 1247\/2002\/EC (Text with EEA relevance ) Official Journal of the European Union L 295\/39","year":"0","key":"ref30"},{"key":"ref10","article-title":"Authorized course lectures: Forensic analysis of information and communication system, University of Zagreb, Faculty of Transport and Traffic Sciences, Department of Information and Communitcation Traffic","author":"perakovi?","year":"2019","journal-title":"Basic of digital evidence"},{"journal-title":"Overview of Digital forensics Cybersecurity Nexus ISACA","year":"2015","key":"ref11"},{"journal-title":"Handbook of Digital Forensics and Investigation","year":"2010","author":"casey","key":"ref12"},{"key":"ref13","article-title":"Authorized course lectures: Forensic analysis of information and communication system, University of Zagreb, Faculty of Transport and Traffic Sciences, Department of Information and Communitcation Traffic","author":"perakovi?","year":"2019","journal-title":"Forensic analysis methodologies for information communitaction system"},{"journal-title":"Guide to Integrating Forensic Techniques into Incident Response Recommendations of the National Institute of Standards and Technology Special Publication 800-86 Gaithersburg National Institute of Standards and Technology","year":"2006","author":"kent","key":"ref14"},{"key":"ref15","article-title":"Authorized course lectures: Security and protection of the information and communication system, University of Zagreb, Faculty of Transport and Traffic Sciences, Department of Information and Communitcation Traffic","author":"perakovi?","year":"2017","journal-title":"Information security terminology"},{"key":"ref16","first-page":"301","article-title":"Criminal-law Protection of Computer Systems, Programs and Data","volume":"3","author":"kokot","year":"2014","journal-title":"(in Croatian) Zagreb Law Review e-Journal of Postgraduate Studies of Faculy of Law University of Zagreb Faculty of Law of the University in Zagreb"},{"journal-title":"Croatian academic and research network Security policy (in Croatian) CCERT-PUBDOC-2009-05-265","year":"2020","key":"ref17"},{"key":"ref18","article-title":"The Enterprise Information Security Policy as a Strategic Business Policy within the Corporate Strategic Plan","author":"corpuz","year":"2011","journal-title":"Information Security Institute Queensland University of Technology Brisbane Queensland\/4000"},{"key":"ref19","first-page":"105","article-title":"Importance of organizational information security in port community systems","author":"aksantijevi?","year":"0","journal-title":"MIPRO 2009 32nd International Convention on information and communication tecnology electronic and microelectronics Proceeding Opatija"},{"journal-title":"Proposal for a Regulation of the European Parliament and of the Council Concerning the Respect for Private Life and the Protection of Personal Data in Electronic Communications and Repealing Directive 2002\/58\/EC (Regulation on Privacy and Electronic Communications)","year":"2017","key":"ref28"},{"journal-title":"Criminalistics Forensic Science Crime And Terrorism","year":"0","author":"girard","key":"ref4"},{"journal-title":"Study of proposal for an ePrivacy Regulation","year":"2020","key":"ref27"},{"journal-title":"National Institute od Justice Forensic Sciences","year":"2020","key":"ref3"},{"key":"ref6","doi-asserted-by":"crossref","DOI":"10.1201\/b14883","author":"mirakovits","year":"2010","journal-title":"Forensic science the basics"},{"journal-title":"OLAF &#x2013; European Anti-fraud Office Digital Forensics Operation Leaflet","year":"2020","key":"ref29"},{"key":"ref5","article-title":"Admissibility of evidence, judicial review of the actions of the European Public Prosecutor&#x2019;s Office and the protection of fundamental rights","author":"durdevic","year":"2020","journal-title":"Head of the Department of Criminal Procedural Law University of Zagreb"},{"journal-title":"The Evolution of Digital Forensics Civilizing the Cyber Frontier","year":"2009","author":"chartes","key":"ref8"},{"key":"ref7","first-page":"3","author":"pollit","year":"2010","journal-title":"A History of Digital Forensics 6th IFIP WG 11 9 International Conference on Digital Forensics (DF)"},{"journal-title":"An Introduction to Forensic Science","year":"1997","author":"eckert","key":"ref2"},{"journal-title":"Interpol Global guidelines for digital forensics laboratories","year":"2019","key":"ref9"},{"journal-title":"Forensic Science","year":"2008","author":"embar-seddon","key":"ref1"},{"journal-title":"European Union Agency for Cibersecurity","year":"2020","key":"ref20"},{"journal-title":"Three Business Use Cases for Digital Forensic","year":"2020","author":"walden","key":"ref22"},{"journal-title":"Five Basic Mistakes of Security Policy","year":"2020","author":"chuvakin","key":"ref21"},{"journal-title":"The Data Recovery Expert Vs The Computer Forensics Specialist","year":"2020","author":"lohberg","key":"ref24"},{"journal-title":"Nigeria Conducting Internal investigations In Organisation","year":"2020","author":"adu","key":"ref23"},{"journal-title":"Directive 2002\/58\/EC of the European Parliament and of the Council of 12 July 2002 concerning the processing of personal data and the protection of privacy in the electronic communications sector (Directive on privacy and electronic communications) Official Journal L 201","year":"2002","key":"ref26"},{"journal-title":"Damage Control in Crisis Management","year":"2020","key":"ref25"}],"event":{"name":"2020 43rd International Convention on Information, Communication and Electronic Technology (MIPRO)","start":{"date-parts":[[2020,9,28]]},"location":"Opatija, Croatia","end":{"date-parts":[[2020,10,2]]}},"container-title":["2020 43rd International Convention on Information, Communication and Electronic Technology (MIPRO)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9245088\/9245075\/09245157.pdf?arnumber=9245157","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,13]],"date-time":"2021-04-13T03:09:31Z","timestamp":1618283371000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9245157\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,9,28]]},"references-count":31,"URL":"https:\/\/doi.org\/10.23919\/mipro48935.2020.9245157","relation":{},"subject":[],"published":{"date-parts":[[2020,9,28]]}}}