{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T18:51:41Z","timestamp":1725562301625},"publisher-location":"Berlin, Heidelberg","reference-count":16,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642116292"},{"type":"electronic","value":"9783642116315"}],"license":[{"start":{"date-parts":[[2010,1,1]],"date-time":"2010-01-01T00:00:00Z","timestamp":1262304000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-11631-5_17","type":"book-chapter","created":{"date-parts":[[2010,1,30]],"date-time":"2010-01-30T03:44:11Z","timestamp":1264823051000},"page":"181-188","source":"Crossref","is-referenced-by-count":13,"title":["Information Assurance and Forensic Readiness"],"prefix":"10.1007","author":[{"given":"Georgios","family":"Pangalos","sequence":"first","affiliation":[]},{"given":"Vasilios","family":"Katos","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"17_CR1","unstructured":"Antiphishing Working Group. Phishing Activity Trends Report Q2, 2008 (2008), \n \n http:\/\/www.antiphishing.org\/reports\/apwg_report_Q2_2008.pdf"},{"key":"17_CR2","unstructured":"Parliamentary Office of Science and Technology. Computer Crime. POSTNOTE, 271 (2006)"},{"key":"17_CR3","unstructured":"Harris, S.: To Catch A Thief: Bringing Forensics In-House And The Necessary Tools To Succeed. Amazines (2008)"},{"key":"17_CR4","series-title":"IFIP","doi-asserted-by":"publisher","first-page":"13","DOI":"10.1007\/978-0-387-72367-9_2","volume-title":"New Approaches for Security, Privacy and Trust in Complex Environments","author":"T. Grobler","year":"2007","unstructured":"Grobler, T., Louwrens, B.: Digital Forensic Readiness as a Component of Information Security Best Practice. In: Venter, H., Eloff, M., Labuschanc, L., Eloff, J., von Solms, R. (eds.) New Approaches for Security, Privacy and Trust in Complex Environments. IFIP, vol.\u00a0232, pp. 13\u201324. Springer, Boston (2007)"},{"key":"17_CR5","unstructured":"Information Systems Audit and Control Association: CISA Review Manual 2008 (2007)"},{"key":"17_CR6","volume-title":"Computer Forensics: Incident Response Essentials","author":"W. Kruse II","year":"2004","unstructured":"Kruse II, W., Heiser, J.: Computer Forensics: Incident Response Essentials. Addison Wesley, Reading (2004)"},{"key":"17_CR7","unstructured":"Rowlingson, R.: A Ten Step Process for Forensic Readiness. Int. Journal of Digital Evidence\u00a02(3) (2004)"},{"key":"17_CR8","doi-asserted-by":"publisher","first-page":"11","DOI":"10.1016\/S1361-3723(02)00610-3","volume":"8","author":"D. Sinangin","year":"2002","unstructured":"Sinangin, D.: Computer Forensics Investigations in a Corporate Environment. Computer Fraud & Security\u00a08, 11\u201314 (2002)","journal-title":"Computer Fraud & Security"},{"key":"17_CR9","unstructured":"EDRM, The E-Discovery Reference Model, \n \n http:\/\/edrm.net"},{"key":"17_CR10","doi-asserted-by":"crossref","unstructured":"Chen, L., Wang, G.: An Efficient Piecewise Hashing Method for Computer Forensics. In: 2008 Workshop on Knowledge Discovery and Data Mining, pp. 635\u2013638 (2008)","DOI":"10.1109\/WKDD.2008.80"},{"key":"17_CR11","doi-asserted-by":"crossref","unstructured":"Kotze, D., Olivier, M.: Patlet for Digital Forensics First Responders. In: 18th International Workshop on Database and Expert Systems Applications, pp. 770\u2013774 (2007)","DOI":"10.1109\/DEXA.2007.30"},{"key":"17_CR12","unstructured":"US Court, Amendments to the Federal Rules of Civil Procedure (2006), \n \n http:\/\/www.uscourts.gov\/rules\/EDiscovery_w_Notes.pdf"},{"key":"17_CR13","first-page":"44","volume":"5","author":"A. Marcella","year":"2008","unstructured":"Marcella, A.: Electronically Stored Information and Cyberforensics. Information Systems Control Journal\u00a05, 44\u201348 (2008)","journal-title":"Information Systems Control Journal"},{"key":"17_CR14","unstructured":"Information Systems Audit and Control Association, Guidline G28: Computer Forensics (2000)"},{"key":"17_CR15","unstructured":"Endicott-Popovsky, B., Frinke, D.: Adding the 4th R: A Systems Approach to Solving the Hackers Arms Race. In: Proc. of the 2006 Symposium 39th Hawaii International Conference on System Sciences (2006)"},{"key":"17_CR16","unstructured":"Computer Security Institute CSI Survey 2007 (2007), \n \n http:\/\/i.cmpnet.com\/v2.gocsi.com\/pdf\/CSISurvey2007.pdf"}],"container-title":["Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","Next Generation Society. Technological and Legal Issues"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-11631-5_17","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,3,12]],"date-time":"2019-03-12T01:08:28Z","timestamp":1552352908000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-11631-5_17"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642116292","9783642116315"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-11631-5_17","relation":{},"ISSN":["1867-8211","1867-822X"],"issn-type":[{"type":"print","value":"1867-8211"},{"type":"electronic","value":"1867-822X"}],"subject":[],"published":{"date-parts":[[2010]]}}}