{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T05:40:44Z","timestamp":1730266844202,"version":"3.28.0"},"reference-count":14,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011,5]]},"DOI":"10.1109\/imf.2011.19","type":"proceedings-article","created":{"date-parts":[[2011,6,29]],"date-time":"2011-06-29T11:23:16Z","timestamp":1309346596000},"page":"81-91","source":"Crossref","is-referenced-by-count":24,"title":["Usability of Forensics Tools: A User Study"],"prefix":"10.1109","author":[{"given":"Hanan","family":"Hibshi","sequence":"first","affiliation":[]},{"given":"Timothy","family":"Vidas","sequence":"additional","affiliation":[]},{"given":"Lorrie","family":"Cranor","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"doi-asserted-by":"publisher","key":"ref10","DOI":"10.1016\/j.diin.2010.05.009"},{"key":"ref11","article-title":"A Framework for Automated Digital Forensic Reporting","author":"farrell","year":"2009","journal-title":"M S thesis Naval Postgraduate School"},{"doi-asserted-by":"publisher","key":"ref12","DOI":"10.1109\/HICSS.2007.301"},{"key":"ref13","article-title":"Open source digital forensics tools: The legal argument","author":"carrier","year":"2002","journal-title":"stake Research Report"},{"doi-asserted-by":"publisher","key":"ref14","DOI":"10.1016\/j.diin.2007.06.005"},{"year":"2005","author":"cranor","journal-title":"Security and Usability Designing Secure Systems that People Can Use","key":"ref4"},{"year":"0","journal-title":"Usability Net","article-title":"Usability Net: International standards for HCI and usability","key":"ref3"},{"doi-asserted-by":"publisher","key":"ref6","DOI":"10.1145\/1047344.1047403"},{"year":"2005","author":"carrier","journal-title":"File System Forensic Analysis","key":"ref5"},{"key":"ref8","first-page":"1","article-title":"An examination of digital forensic models","volume":"1","author":"reith","year":"2002","journal-title":"International Journal of Digital Evidence"},{"doi-asserted-by":"publisher","key":"ref7","DOI":"10.1109\/MSECP.2003.1219052"},{"year":"2004","journal-title":"Court Case No 11-02-00074- CR 127 SW 3d 309 Texas Appeals Court","article-title":"Williford vs. State of Texas","key":"ref2"},{"year":"2008","author":"crenshaw","journal-title":"The Myth of Multitasking How “Doing It All” Gets Nothing Done","key":"ref1"},{"year":"0","journal-title":"Software Guidance","article-title":"Encase examination of ntfs","key":"ref9"}],"event":{"name":"2011 6th International Conference on IT Security Incident Management and IT Forensics (IMF 2011)","start":{"date-parts":[[2011,5,10]]},"location":"Stuttgart, Germany","end":{"date-parts":[[2011,5,12]]}},"container-title":["2011 Sixth International Conference on IT Security Incident Management and IT Forensics"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5931035\/5931097\/05931114.pdf?arnumber=5931114","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,21]],"date-time":"2017-03-21T02:58:05Z","timestamp":1490065085000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5931114\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,5]]},"references-count":14,"URL":"https:\/\/doi.org\/10.1109\/imf.2011.19","relation":{},"subject":[],"published":{"date-parts":[[2011,5]]}}}