{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,6,7]],"date-time":"2024-06-07T14:44:42Z","timestamp":1717771482880},"reference-count":42,"publisher":"Elsevier BV","issue":"5","license":[{"start":{"date-parts":[[2012,10,1]],"date-time":"2012-10-01T00:00:00Z","timestamp":1349049600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Computer Law & Security Review"],"published-print":{"date-parts":[[2012,10]]},"DOI":"10.1016\/j.clsr.2012.07.009","type":"journal-article","created":{"date-parts":[[2012,9,28]],"date-time":"2012-09-28T00:26:45Z","timestamp":1348792005000},"page":"522-531","source":"Crossref","is-referenced-by-count":28,"title":["Trust in digital records: An increasingly cloudy legal area"],"prefix":"10.1016","volume":"28","author":[{"given":"Luciana","family":"Duranti","sequence":"first","affiliation":[]},{"given":"Corinne","family":"Rogers","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/j.clsr.2012.07.009_bib1","series-title":"Electronic discovery and evidence","author":"Arkfeld","year":"2006"},{"key":"10.1016\/j.clsr.2012.07.009_bib2","series-title":"Lying: moral choice in public and private life","author":"Bok","year":"1999"},{"issue":"1","key":"10.1016\/j.clsr.2012.07.009_bib3","first-page":"94","article-title":"Trusting archivists","volume":"XIX","author":"Borland","year":"2009","journal-title":"Archivi and Computer"},{"key":"10.1016\/j.clsr.2012.07.009_bib4","series-title":"CYB3RCRIM3: expert testimony, hearsay and the electronic monitoring device","author":"Brenner","year":"2011"},{"key":"10.1016\/j.clsr.2012.07.009_bib5","series-title":"The law of evidence in Canada, Markham, Ont.","author":"Bryant","year":"2009"},{"key":"10.1016\/j.clsr.2012.07.009_bib6","doi-asserted-by":"crossref","first-page":"19","DOI":"10.1080\/15567280500541421","article-title":"Digital evidence: challenging the presumption of reliability","volume":"1","author":"Buskirk","year":"2006","journal-title":"Journal of Digital Forensic Practice"},{"issue":"4","key":"10.1016\/j.clsr.2012.07.009_bib7","first-page":"1","article-title":"Defining digital forensic examination and analysis tools using abstraction layers","volume":"1","author":"Carrier","year":"2003","journal-title":"International Journal of Digital Evidence"},{"key":"10.1016\/j.clsr.2012.07.009_bib8","series-title":"Open source digital forensics tools: the legal argument","author":"Carrier","year":"2003"},{"key":"10.1016\/j.clsr.2012.07.009_bib9","series-title":"Electronic evidence","author":"Chasse","year":"2010"},{"key":"10.1016\/j.clsr.2012.07.009_bib10","first-page":"141","article-title":"Electronic records as documentary evidence","author":"Chasse","year":"2007","journal-title":"Canadian Journal of Law and Technology"},{"key":"10.1016\/j.clsr.2012.07.009_bib11","article-title":"The inadequacy of analysis of electronic records management for evidence and discovery","author":"Chasse","year":"2011","journal-title":"Asia Law Info"},{"key":"10.1016\/j.clsr.2012.07.009_bib12","article-title":"\u201cSkype of cloud storage\u201d symform nets $11M in funding","author":"Darrow","year":"2012","journal-title":"GigaOM"},{"key":"10.1016\/j.clsr.2012.07.009_bib13","series-title":"Finding our way through the clouds","author":"Denham","year":"2011"},{"issue":"Fall","key":"10.1016\/j.clsr.2012.07.009_bib14","first-page":"39","article-title":"From digital diplomatics to digital records forensics","volume":"68","author":"Duranti","year":"2009","journal-title":"Archivaria"},{"key":"10.1016\/j.clsr.2012.07.009_bib15","series-title":"The long-term preservation of authentic electronic records: findings of the InterPARES project","author":"Duranti","year":"2005"},{"issue":"2","key":"10.1016\/j.clsr.2012.07.009_bib16","first-page":"1","article-title":"Digital records forensics: a new science and academic program for forensic readiness","volume":"5","author":"Duranti","year":"2010","journal-title":"Journal of Digital Forensics, Security and Law"},{"key":"10.1016\/j.clsr.2012.07.009_bib17","series-title":"Research on permanent authentic records in electronic systems (InterPARES) 2: experiential. Interactive and dynamic records","author":"Duranti","year":"2008"},{"issue":"3\u20134","key":"10.1016\/j.clsr.2012.07.009_bib18","doi-asserted-by":"crossref","first-page":"373","DOI":"10.1007\/s10502-011-9152-3","article-title":"Educating for trust","volume":"11","author":"Duranti","year":"2011","journal-title":"Archival Science"},{"issue":"Fall","key":"10.1016\/j.clsr.2012.07.009_bib19","first-page":"95","article-title":"Electronic records and the law of evidence in Canada: the uniform electronic evidence act twelve years later","volume":"70","author":"Duranti","year":"2010","journal-title":"Archivaria"},{"issue":"1","key":"10.1016\/j.clsr.2012.07.009_bib20","doi-asserted-by":"crossref","first-page":"13","DOI":"10.1007\/s10502-006-9021-7","article-title":"The concept of record in interactive, experiential and dynamic environments: the view of InterPARES","volume":"6","author":"Duranti","year":"2006","journal-title":"Archival Science"},{"key":"10.1016\/j.clsr.2012.07.009_bib21","series-title":"Refining the standard: authenticating computer-based evidence","author":"Fosmire","year":"2006"},{"key":"10.1016\/j.clsr.2012.07.009_bib22","series-title":"Electronic evidence","author":"Gahtan","year":"1999"},{"key":"10.1016\/j.clsr.2012.07.009_bib23","series-title":"Privacy policy. Google|policies & principles","author":"Google","year":"2012"},{"key":"10.1016\/j.clsr.2012.07.009_bib24","series-title":"Consolidated federal laws of Canada, Canada evidence act","author":"Government of Canada, L.S.B.","year":"2008"},{"key":"10.1016\/j.clsr.2012.07.009_bib25","series-title":"InterPARES 3 project: glossary","author":"InterPARES","year":"2011"},{"key":"10.1016\/j.clsr.2012.07.009_bib26","series-title":"Guidelines on security and privacy in public cloud computing","author":"Jansen","year":"2011"},{"key":"10.1016\/j.clsr.2012.07.009_bib27","article-title":"From records to data: it\u2019s not just about collections any more","author":"Johnston","year":"2011","journal-title":"The Signal: Digital Preservation"},{"issue":"Fall","key":"10.1016\/j.clsr.2012.07.009_bib28","article-title":"Gatekeeping out of the box: open source software as a mechanism to assess reliability for digital evidence","volume":"13","author":"Kenneally","year":"2001","journal-title":"Virginia Journal of Law and Technology"},{"key":"10.1016\/j.clsr.2012.07.009_bib29","first-page":"52","article-title":"Providing grounds for trust: developing conceptual requirements for the long-term preservation of authentic electronic records","volume":"50","author":"MacNeil","year":"2000","journal-title":"Archivaria"},{"key":"10.1016\/j.clsr.2012.07.009_bib30","article-title":"SOPA, PIPA, Megaupload.com, and the United States government","author":"Maes","year":"2012","journal-title":"The Washington Times"},{"issue":"1","key":"10.1016\/j.clsr.2012.07.009_bib31","doi-asserted-by":"crossref","first-page":"61","DOI":"10.1016\/j.diin.2003.12.004","article-title":"Building theoretical underpinnings for digital forensics research","volume":"1","author":"Mocas","year":"2004","journal-title":"Digital Investigation"},{"issue":"5","key":"10.1016\/j.clsr.2012.07.009_bib32","article-title":"The internet, cloud computing, and the charter right to privacy: the effect of terms of service agreements on reasonable expectations of privacy in criminal cases","volume":"12","author":"Nied","year":"2011","journal-title":"Internet and E-Commerce Law in Canada"},{"key":"10.1016\/j.clsr.2012.07.009_bib33","series-title":"A dire diagnosis for access to information in Canada","author":"Office of the Information Commissioner of Canada","year":"2009"},{"issue":"3","key":"10.1016\/j.clsr.2012.07.009_bib34","first-page":"307","article-title":"Understanding the accusatorial system","volume":"14","author":"Paciocco","year":"2010","journal-title":"Canadian Criminal Law Review"},{"issue":"1","key":"10.1016\/j.clsr.2012.07.009_bib35","first-page":"175","article-title":"Digital manipulation and photographic evidence: defrauding the courts one thousand words at a time","author":"Parry","year":"2009","journal-title":"Journal of Law, Technology & Policy"},{"key":"10.1016\/j.clsr.2012.07.009_bib36","series-title":"Foundations of digital evidence","author":"Paul","year":"2008"},{"issue":"6","key":"10.1016\/j.clsr.2012.07.009_bib37","first-page":"45","article-title":"The \u201cauthenticity crisis\u201d in real evidence","volume":"15","author":"Paul","year":"2004","journal-title":"The Practical Litigator"},{"key":"10.1016\/j.clsr.2012.07.009_bib38","first-page":"956","article-title":"Computer data and reliability: a call for authentication of business records under the federal rules of evidence","volume":"80","author":"Peritz","year":"1986","journal-title":"Northwestern University Law Review"},{"key":"10.1016\/j.clsr.2012.07.009_bib39","series-title":"The Canadian legal framework for evidence and the digital economy: a disjunction?","author":"Sheppard","year":"2010"},{"key":"10.1016\/j.clsr.2012.07.009_bib40","series-title":"Trust a sociological theory","author":"Sztompka","year":"1999"},{"key":"10.1016\/j.clsr.2012.07.009_bib41","series-title":"Tweets still must flow","author":"Twitter Blog","year":"2012"},{"issue":"2","key":"10.1016\/j.clsr.2012.07.009_bib42","doi-asserted-by":"crossref","first-page":"576","DOI":"10.17723\/aarc.74.2.e088666710692t3k","article-title":"Building foundations for digital records forensics: a comparative study of the concept of reproduction in digital records management and digital forensics","volume":"74","author":"Xie","year":"2011","journal-title":"American Archivist"}],"container-title":["Computer Law & Security Review"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0267364912001458?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0267364912001458?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2018,11,20]],"date-time":"2018-11-20T13:20:51Z","timestamp":1542720051000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0267364912001458"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,10]]},"references-count":42,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2012,10]]}},"alternative-id":["S0267364912001458"],"URL":"https:\/\/doi.org\/10.1016\/j.clsr.2012.07.009","relation":{},"ISSN":["0267-3649"],"issn-type":[{"value":"0267-3649","type":"print"}],"subject":[],"published":{"date-parts":[[2012,10]]}}}