{"id":"https://openalex.org/W2124675676","doi":"https://doi.org/10.1109/issa.2015.7335052","title":"Evaluation and analysis of a software prototype for guidance and implementation of a standardized digital forensic investigation process","display_name":"Evaluation and analysis of a software prototype for guidance and implementation of a standardized digital forensic investigation process","publication_year":2015,"publication_date":"2015-08-01","ids":{"openalex":"https://openalex.org/W2124675676","doi":"https://doi.org/10.1109/issa.2015.7335052","mag":"2124675676"},"language":"en","primary_location":{"id":"doi:10.1109/issa.2015.7335052","is_oa":false,"landing_page_url":"https://doi.org/10.1109/issa.2015.7335052","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2015 Information Security for South Africa (ISSA)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5082653976","display_name":"Melissa Ingels","orcid":null},"institutions":[{"id":"https://openalex.org/I69552723","display_name":"University of Pretoria","ror":"https://ror.org/00g0p6g84","country_code":"ZA","type":"education","lineage":["https://openalex.org/I69552723"]}],"countries":["ZA"],"is_corresponding":true,"raw_author_name":"Melissa Ingels","raw_affiliation_strings":["Department of Computer Science, University of Pretoria, Pretoria, South Africa","Department of Computer Science, University of Pretoria, South-Africa"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, University of Pretoria, Pretoria, South Africa","institution_ids":["https://openalex.org/I69552723"]},{"raw_affiliation_string":"Department of Computer Science, University of Pretoria, South-Africa","institution_ids":["https://openalex.org/I69552723"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5063733669","display_name":"Aleksandar Valjarevi\u0107","orcid":"https://orcid.org/0000-0003-2997-2164"},"institutions":[{"id":"https://openalex.org/I69552723","display_name":"University of Pretoria","ror":"https://ror.org/00g0p6g84","country_code":"ZA","type":"education","lineage":["https://openalex.org/I69552723"]}],"countries":["ZA"],"is_corresponding":false,"raw_author_name":"Aleksandar Valjarevic","raw_affiliation_strings":["University of Pretoria, Pretoria, ZA","Department of Computer Science, University of Pretoria, South-Africa"],"affiliations":[{"raw_affiliation_string":"University of Pretoria, Pretoria, ZA","institution_ids":["https://openalex.org/I69552723"]},{"raw_affiliation_string":"Department of Computer Science, University of Pretoria, South-Africa","institution_ids":["https://openalex.org/I69552723"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5037461417","display_name":"Hein S. Venter","orcid":"https://orcid.org/0000-0002-3607-8630"},"institutions":[{"id":"https://openalex.org/I69552723","display_name":"University of Pretoria","ror":"https://ror.org/00g0p6g84","country_code":"ZA","type":"education","lineage":["https://openalex.org/I69552723"]}],"countries":["ZA"],"is_corresponding":false,"raw_author_name":"Hein S. Venter","raw_affiliation_strings":["Department of Computer Science, University of Pretoria, Pretoria, South Africa","Department of Computer Science, University of Pretoria, South-Africa"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, University of Pretoria, Pretoria, South Africa","institution_ids":["https://openalex.org/I69552723"]},{"raw_affiliation_string":"Department of Computer Science, University of Pretoria, South-Africa","institution_ids":["https://openalex.org/I69552723"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5082653976"],"corresponding_institution_ids":["https://openalex.org/I69552723"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.10016045,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":"3","issue":null,"first_page":"1","last_page":"8"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12034","display_name":"Digital and Cyber Forensics","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12034","display_name":"Digital and Cyber Forensics","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9771000146865845,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T13192","display_name":"Forensic Fingerprint Detection Methods","score":0.9315999746322632,"subfield":{"id":"https://openalex.org/subfields/3311","display_name":"Safety Research"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/usability","display_name":"Usability","score":0.8357172608375549},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7270176410675049},{"id":"https://openalex.org/keywords/process","display_name":"Process (computing)","score":0.6393818855285645},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.5565610527992249},{"id":"https://openalex.org/keywords/software-engineering","display_name":"Software engineering","score":0.5170936584472656},{"id":"https://openalex.org/keywords/digital-forensics","display_name":"Digital forensics","score":0.482713907957077},{"id":"https://openalex.org/keywords/acceptance-testing","display_name":"Acceptance testing","score":0.4352148175239563},{"id":"https://openalex.org/keywords/usability-inspection","display_name":"Usability inspection","score":0.4320414066314697},{"id":"https://openalex.org/keywords/quality","display_name":"Quality (philosophy)","score":0.412864625453949},{"id":"https://openalex.org/keywords/human\u2013computer-interaction","display_name":"Human\u2013computer interaction","score":0.2615496814250946},{"id":"https://openalex.org/keywords/heuristic-evaluation","display_name":"Heuristic evaluation","score":0.20319628715515137},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.1168900728225708},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.08524823188781738}],"concepts":[{"id":"https://openalex.org/C170130773","wikidata":"https://www.wikidata.org/wiki/Q216378","display_name":"Usability","level":2,"score":0.8357172608375549},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7270176410675049},{"id":"https://openalex.org/C98045186","wikidata":"https://www.wikidata.org/wiki/Q205663","display_name":"Process (computing)","level":2,"score":0.6393818855285645},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.5565610527992249},{"id":"https://openalex.org/C115903868","wikidata":"https://www.wikidata.org/wiki/Q80993","display_name":"Software engineering","level":1,"score":0.5170936584472656},{"id":"https://openalex.org/C84418412","wikidata":"https://www.wikidata.org/wiki/Q3246940","display_name":"Digital forensics","level":2,"score":0.482713907957077},{"id":"https://openalex.org/C131377759","wikidata":"https://www.wikidata.org/wiki/Q322514","display_name":"Acceptance testing","level":2,"score":0.4352148175239563},{"id":"https://openalex.org/C23456302","wikidata":"https://www.wikidata.org/wiki/Q7901668","display_name":"Usability inspection","level":4,"score":0.4320414066314697},{"id":"https://openalex.org/C2779530757","wikidata":"https://www.wikidata.org/wiki/Q1207505","display_name":"Quality (philosophy)","level":2,"score":0.412864625453949},{"id":"https://openalex.org/C107457646","wikidata":"https://www.wikidata.org/wiki/Q207434","display_name":"Human\u2013computer interaction","level":1,"score":0.2615496814250946},{"id":"https://openalex.org/C3255780","wikidata":"https://www.wikidata.org/wiki/Q1616517","display_name":"Heuristic evaluation","level":3,"score":0.20319628715515137},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.1168900728225708},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.08524823188781738},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C111472728","wikidata":"https://www.wikidata.org/wiki/Q9471","display_name":"Epistemology","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/issa.2015.7335052","is_oa":false,"landing_page_url":"https://doi.org/10.1109/issa.2015.7335052","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2015 Information Security for South Africa (ISSA)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[{"id":"https://openalex.org/F4320306098","display_name":"U.S. Department of Justice","ror":"https://ror.org/02916qm60"},{"id":"https://openalex.org/F4320320671","display_name":"National Research Foundation","ror":"https://ror.org/05s0g1g46"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":15,"referenced_works":["https://openalex.org/W24678375","https://openalex.org/W59255397","https://openalex.org/W82821577","https://openalex.org/W159069299","https://openalex.org/W625206410","https://openalex.org/W985774724","https://openalex.org/W1509810813","https://openalex.org/W2016384539","https://openalex.org/W2060217293","https://openalex.org/W2120457539","https://openalex.org/W2136135923","https://openalex.org/W2156849122","https://openalex.org/W2966572960","https://openalex.org/W6601015418","https://openalex.org/W6630663579"],"related_works":["https://openalex.org/W65754041","https://openalex.org/W3206214086","https://openalex.org/W3210710594","https://openalex.org/W4244725308","https://openalex.org/W2550923876","https://openalex.org/W2485414097","https://openalex.org/W2057326359","https://openalex.org/W2077503414","https://openalex.org/W2369811593","https://openalex.org/W1988497134"],"abstract_inverted_index":{"Performing":[0],"a":[1,6,47,54,82,133,140,238,252,268,271],"digital":[2,26,48,170],"forensic":[3,27,49],"investigation":[4,28,125,151],"requires":[5],"standardized":[7,55,188],"and":[8,69,106,147,152,160,209,259,306,314,319],"formalized":[9],"process":[10,189],"to":[11,18,51,94,115,176,184,205,281,312],"be":[12,102,173,182],"followed.":[13,191],"The":[14,57,75,90,111,136,158,224,234,261,289],"authors":[15,68],"have":[16,303],"contributed":[17],"the":[19,67,79,124,128,177,187,198,207,210,213,219,222,227,246,276,279,284,293],"creation":[20],"of":[21,59,81,108,119,130,132,138,149,155,169,197,212,221,226,230,255,264,270,297,317],"an":[22,61,97,150,195],"international":[23],"standard":[24],"on":[25],"process,":[29],"namely":[30],"ISO/IEC":[31],"27043:2015,":[32],"which":[33,85,242],"was":[34,190,201,237,243,266],"published":[35],"in":[36,71,78,145,203,267,325],"2015.":[37],"However,":[38],"currently,":[39],"there":[40],"exists":[41],"no":[42],"application":[43,62,84],"that":[44,100,166,179,186,292,300,307],"would":[45],"guide":[46],"investigator":[50],"implement":[52],"such":[53,60,139],"process.":[56,135],"prototype":[58,76,141,214,228,285,294],"has":[63,86],"been":[64],"developed":[65],"by":[66,275],"presented":[70],"their":[72],"previous":[73],"work.":[74,327],"is":[77,93,114,309],"form":[80,269],"software":[83,239,257],"two":[87,231],"main":[88,232],"functionalities.":[89],"first":[91,235],"functionality":[92,113],"act":[95],"as":[96,216,218],"expert":[98],"system":[99],"can":[101],"used":[103],"for":[104],"guidance":[105],"training":[107,154],"novice":[109,156],"investigators.":[110,157],"second":[112,262],"enable":[116],"reliable":[117,253],"logging":[118],"all":[120],"actions":[121],"taken":[122],"within":[123],"processes,":[126],"enabling":[127],"validation":[129],"use":[131],"correct":[134],"benefits":[137],"include":[142],"possible":[143,174],"improvement":[144,318],"efficiency":[146],"effectiveness":[148,220],"easier":[153,183],"last,":[159],"possibly":[161],"most":[162,296],"important":[163],"benefit,":[164],"includes":[165],"higher":[167],"admissibility":[168],"evidence":[171],"will":[172,181],"due":[175],"fact":[178],"it":[180,301,308],"show":[185],"This":[192],"paper":[193],"presents":[194],"evaluation":[196,225,265],"prototype.":[199,223],"Evaluation":[200],"performed":[202,244],"order":[204],"measure":[206],"usability":[208,240,258],"quality":[211],"software,":[215],"well":[217],"consisted":[229],"parts.":[233],"part":[236,263],"evaluation,":[241],"using":[245],"Software":[247],"Usability":[248],"Measurement":[249],"Inventory":[250],"(SUMI),":[251],"method":[254],"measuring":[256],"quality.":[260],"questionnaire":[272],"set":[273],"up":[274],"authors,":[277],"with":[278],"aim":[280],"evaluate":[282],"whether":[283],"meets":[286],"its":[287,298],"goals.":[288],"results":[290],"indicated":[291],"reaches":[295],"goals,":[299],"does":[302],"intended":[304],"functionalities":[305],"realatively":[310],"easy":[311],"learn":[313],"use.":[315],"Areas":[316],"future":[320],"work":[321],"were":[322],"also":[323],"identified":[324],"this":[326]},"counts_by_year":[{"year":2020,"cited_by_count":1},{"year":2019,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
