{"id":"https://openalex.org/W2968402000","doi":"https://doi.org/10.1186/s13677-019-0133-z","title":"Experts reviews of a cloud forensic readiness framework for organizations","display_name":"Experts reviews of a cloud forensic readiness framework for organizations","publication_year":2019,"publication_date":"2019-08-14","ids":{"openalex":"https://openalex.org/W2968402000","doi":"https://doi.org/10.1186/s13677-019-0133-z","mag":"2968402000"},"language":"en","primary_location":{"id":"doi:10.1186/s13677-019-0133-z","is_oa":true,"landing_page_url":"https://doi.org/10.1186/s13677-019-0133-z","pdf_url":"https://journalofcloudcomputing.springeropen.com/counter/pdf/10.1186/s13677-019-0133-z","source":{"id":"https://openalex.org/S2486819371","display_name":"Journal of Cloud Computing Advances Systems and Applications","issn_l":"2192-113X","issn":["2192-113X"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Cloud Computing","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://journalofcloudcomputing.springeropen.com/counter/pdf/10.1186/s13677-019-0133-z","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5109429560","display_name":"Ahmed Alenezi","orcid":null},"institutions":[{"id":"https://openalex.org/I118590987","display_name":"Northern Border University","ror":"https://ror.org/03j9tzj20","country_code":"SA","type":"education","lineage":["https://openalex.org/I118590987"]},{"id":"https://openalex.org/I43439940","display_name":"University of Southampton","ror":"https://ror.org/01ryk1543","country_code":"GB","type":"education","lineage":["https://openalex.org/I43439940"]}],"countries":["GB","SA"],"is_corresponding":true,"raw_author_name":"Ahmed Alenezi","raw_affiliation_strings":["Faculty of Computing and Information Technology, Northern Border University, Rafha, Saudi Arabia","School of Electronics and Computer Science, University of Southampton, Southampton, UK"],"raw_orcid":"https://orcid.org/0000-0003-2782-3106","affiliations":[{"raw_affiliation_string":"Faculty of Computing and Information Technology, Northern Border University, Rafha, Saudi Arabia","institution_ids":["https://openalex.org/I118590987"]},{"raw_affiliation_string":"School of Electronics and Computer Science, University of Southampton, Southampton, UK","institution_ids":["https://openalex.org/I43439940"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5015475593","display_name":"Hany F. Atlam","orcid":"https://orcid.org/0000-0003-4142-6377"},"institutions":[{"id":"https://openalex.org/I43439940","display_name":"University of Southampton","ror":"https://ror.org/01ryk1543","country_code":"GB","type":"education","lineage":["https://openalex.org/I43439940"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Hany F. Atlam","raw_affiliation_strings":["School of Electronics and Computer Science, University of Southampton, Southampton, UK"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"School of Electronics and Computer Science, University of Southampton, Southampton, UK","institution_ids":["https://openalex.org/I43439940"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5073444134","display_name":"Gary Wills","orcid":"https://orcid.org/0000-0001-5771-4088"},"institutions":[{"id":"https://openalex.org/I43439940","display_name":"University of Southampton","ror":"https://ror.org/01ryk1543","country_code":"GB","type":"education","lineage":["https://openalex.org/I43439940"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Gary B. Wills","raw_affiliation_strings":["School of Electronics and Computer Science, University of Southampton, Southampton, UK"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"School of Electronics and Computer Science, University of Southampton, Southampton, UK","institution_ids":["https://openalex.org/I43439940"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5109429560"],"corresponding_institution_ids":["https://openalex.org/I118590987","https://openalex.org/I43439940"],"apc_list":{"value":990,"currency":"GBP","value_usd":1214},"apc_paid":{"value":990,"currency":"GBP","value_usd":1214},"fwci":7.0471,"has_fulltext":true,"cited_by_count":39,"citation_normalized_percentile":{"value":0.97047595,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":94,"max":99},"biblio":{"volume":"8","issue":"1","first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12034","display_name":"Digital and Cyber Forensics","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12034","display_name":"Digital and Cyber Forensics","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9991000294685364,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.9918000102043152,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.917435348033905},{"id":"https://openalex.org/keywords/cybercrime","display_name":"Cybercrime","score":0.7992463707923889},{"id":"https://openalex.org/keywords/digital-forensics","display_name":"Digital forensics","score":0.7949790358543396},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.5725318789482117},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5402073860168457},{"id":"https://openalex.org/keywords/service","display_name":"Service (business)","score":0.5058443546295166},{"id":"https://openalex.org/keywords/data-science","display_name":"Data science","score":0.47752490639686584},{"id":"https://openalex.org/keywords/knowledge-management","display_name":"Knowledge management","score":0.3837692141532898},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.30317527055740356},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.20584926009178162},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.12251713871955872},{"id":"https://openalex.org/keywords/marketing","display_name":"Marketing","score":0.10540434718132019}],"concepts":[{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.917435348033905},{"id":"https://openalex.org/C2779390178","wikidata":"https://www.wikidata.org/wiki/Q29137","display_name":"Cybercrime","level":3,"score":0.7992463707923889},{"id":"https://openalex.org/C84418412","wikidata":"https://www.wikidata.org/wiki/Q3246940","display_name":"Digital forensics","level":2,"score":0.7949790358543396},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5725318789482117},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5402073860168457},{"id":"https://openalex.org/C2780378061","wikidata":"https://www.wikidata.org/wiki/Q25351891","display_name":"Service (business)","level":2,"score":0.5058443546295166},{"id":"https://openalex.org/C2522767166","wikidata":"https://www.wikidata.org/wiki/Q2374463","display_name":"Data science","level":1,"score":0.47752490639686584},{"id":"https://openalex.org/C56739046","wikidata":"https://www.wikidata.org/wiki/Q192060","display_name":"Knowledge management","level":1,"score":0.3837692141532898},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.30317527055740356},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.20584926009178162},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.12251713871955872},{"id":"https://openalex.org/C162853370","wikidata":"https://www.wikidata.org/wiki/Q39809","display_name":"Marketing","level":1,"score":0.10540434718132019},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0}],"mesh":[],"locations_count":4,"locations":[{"id":"doi:10.1186/s13677-019-0133-z","is_oa":true,"landing_page_url":"https://doi.org/10.1186/s13677-019-0133-z","pdf_url":"https://journalofcloudcomputing.springeropen.com/counter/pdf/10.1186/s13677-019-0133-z","source":{"id":"https://openalex.org/S2486819371","display_name":"Journal of Cloud Computing Advances Systems and Applications","issn_l":"2192-113X","issn":["2192-113X"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Cloud Computing","raw_type":"journal-article"},{"id":"pmh:oai:eprints.soton.ac.uk:433471","is_oa":false,"landing_page_url":null,"pdf_url":null,"source":{"id":"https://openalex.org/S4306401019","display_name":"ePrints Soton (University of Southampton)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I43439940","host_organization_name":"University of Southampton","host_organization_lineage":["https://openalex.org/I43439940"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"acceptedVersion","is_accepted":true,"is_published":false,"raw_source_name":"","raw_type":"Article"},{"id":"pmh:oai:derby.openrepository.com:10545/624924","is_oa":false,"landing_page_url":"http://hdl.handle.net/10545/624924","pdf_url":null,"source":{"id":"https://openalex.org/S4306402138","display_name":"University of Derby Online Research Archive. (University of Derby)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I22128151","host_organization_name":"University of Derby","host_organization_lineage":["https://openalex.org/I22128151"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Journal of Cloud Computing","raw_type":"Article"},{"id":"pmh:oai:doaj.org/article:86058d189b574afa95eb8caffb1956a8","is_oa":true,"landing_page_url":"https://doaj.org/article/86058d189b574afa95eb8caffb1956a8","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by-sa","license_id":"https://openalex.org/licenses/cc-by-sa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Journal of Cloud Computing: Advances, Systems and Applications, Vol 8, Iss 1, Pp 1-14 (2019)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1186/s13677-019-0133-z","is_oa":true,"landing_page_url":"https://doi.org/10.1186/s13677-019-0133-z","pdf_url":"https://journalofcloudcomputing.springeropen.com/counter/pdf/10.1186/s13677-019-0133-z","source":{"id":"https://openalex.org/S2486819371","display_name":"Journal of Cloud Computing Advances Systems and Applications","issn_l":"2192-113X","issn":["2192-113X"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Cloud Computing","raw_type":"journal-article"},"sustainable_development_goals":[{"display_name":"Industry, innovation and infrastructure","id":"https://metadata.un.org/sdg/9","score":0.6700000166893005}],"awards":[],"funders":[{"id":"https://openalex.org/F4320318570","display_name":"Saudi Arabian Cultural Bureau","ror":null},{"id":"https://openalex.org/F4320324458","display_name":"Northern Borders University","ror":"https://ror.org/03j9tzj20"},{"id":"https://openalex.org/F4320328654","display_name":"Northern Border University","ror":null}],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W2968402000.pdf","grobid_xml":"https://content.openalex.org/works/W2968402000.grobid-xml"},"referenced_works_count":45,"referenced_works":["https://openalex.org/W126291697","https://openalex.org/W238030176","https://openalex.org/W352426156","https://openalex.org/W1229193984","https://openalex.org/W1480407456","https://openalex.org/W1547253197","https://openalex.org/W1557001362","https://openalex.org/W1586438432","https://openalex.org/W1612601206","https://openalex.org/W1678720259","https://openalex.org/W1714723801","https://openalex.org/W1914972138","https://openalex.org/W1977367431","https://openalex.org/W1979290264","https://openalex.org/W1987164007","https://openalex.org/W1992758609","https://openalex.org/W1993586921","https://openalex.org/W1996767106","https://openalex.org/W1997010178","https://openalex.org/W2000091716","https://openalex.org/W2001191963","https://openalex.org/W2003536302","https://openalex.org/W2015548170","https://openalex.org/W2023924513","https://openalex.org/W2025784223","https://openalex.org/W2031423416","https://openalex.org/W2047210738","https://openalex.org/W2054315779","https://openalex.org/W2056738644","https://openalex.org/W2067710398","https://openalex.org/W2082498084","https://openalex.org/W2114296561","https://openalex.org/W2129660502","https://openalex.org/W2133919537","https://openalex.org/W2146986300","https://openalex.org/W2289010250","https://openalex.org/W2319054850","https://openalex.org/W2573841943","https://openalex.org/W2624664036","https://openalex.org/W2628759714","https://openalex.org/W2726142957","https://openalex.org/W2799919344","https://openalex.org/W2883051977","https://openalex.org/W4205234248","https://openalex.org/W4234179784"],"related_works":["https://openalex.org/W2338899373","https://openalex.org/W4252285266","https://openalex.org/W199254545","https://openalex.org/W2476504758","https://openalex.org/W4248464163","https://openalex.org/W2997836625","https://openalex.org/W111175386","https://openalex.org/W2505820029","https://openalex.org/W4378234050","https://openalex.org/W4395456236"],"abstract_inverted_index":{"Cloud":[0],"computing":[1,46,85],"has":[2,26,47],"drastically":[3],"altered":[4],"the":[5,24,42,50,53,73,87,132,144,177,207,211,226,235,247,250,258,266,272,294,301],"ways":[6],"in":[7,41,96,117,174,187,225],"which":[8,204],"it":[9],"is":[10,93,152,168],"possible":[11],"to":[12,17,29,49,63,72,111,122,125,205,264],"deliver":[13],"information":[14],"technologies":[15],"(ITs)":[16],"consumers":[18,33],"as":[19,55,193],"a":[20,38,56,97,113,155,171,194,201,278,290],"service.":[21],"In":[22,70],"addition,":[23],"concept":[25],"given":[27],"rise":[28,62],"multiple":[30],"benefits":[31],"for":[32],"and":[34,67,86,120,149,180,228,244,257,262,297,299],"organizations.":[35,215],"However,":[36],"such":[37],"fast":[39],"surge":[40],"adoption":[43],"of":[44,52,76,129,134,140,146,157,214,234,293],"cloud":[45,54,84,118,158],"led":[48],"emergence":[51],"new":[57],"cybercrime":[58],"environment,":[59],"thus":[60],"giving":[61],"fresh":[64],"legal,":[65],"technical":[66],"organizational":[68,181],"challenges.":[69],"addition":[71],"vast":[74],"number":[75,156],"attacks":[77],"that":[78,89,151,183,189,209],"have":[79,103,161],"had":[80],"an":[81,135,191,231],"impact":[82],"on":[83,176],"fact":[88],"cloud-based":[90],"data":[91,127],"processing":[92],"carried":[94],"out":[95],"decentralized":[98],"manner,":[99],"many":[100],"other":[101],"concerns":[102,108],"been":[104],"noted.":[105],"Among":[106],"these":[107],"are":[109],"how":[110,121],"conduct":[112],"thorough":[114],"digital":[115],"investigation":[116],"environments":[119],"be":[123],"prepared":[124],"gather":[126],"ahead":[128],"time":[130,148],"before":[131],"occurrence":[133],"incident;":[136],"indeed,":[137],"this":[138,166],"kind":[139],"preparation":[141],"would":[142],"reduce":[143],"amount":[145],"money,":[147],"effort":[150],"expended.":[153],"As":[154],"forensics":[159],"challenges":[160],"not":[162],"received":[163],"enough":[164],"attention,":[165],"study":[167],"motivated":[169],"by":[170,220,229,282],"particular":[172],"gap":[173],"research":[175,273,295],"technical,":[178],"legal":[179],"factors":[182,208,240,251,259],"facilitate":[184,210],"forensic":[185,212],"readiness":[186,213],"organizations":[188],"utilize":[190],"Infrastructure":[192],"Service":[195],"(IaaS)":[196],"model.":[197],"This":[198,216],"paper":[199],"presents":[200],"framework":[202,217],"with":[203],"investigate":[206],"was":[218],"identified":[219],"critically":[221],"reviewing":[222],"previous":[223],"studies":[224],"literature":[227,279],"performing":[230],"in-depth":[232],"examination":[233],"relevant":[236],"industrial":[237],"standards.":[238],"The":[239],"were":[241,252,255,260],"comprehensively":[242],"studied":[243],"extracted":[245],"from":[246],"literature;":[248],"then,":[249],"analysed,":[253],"duplicates":[254],"removed,":[256],"categorized":[261],"synthesized":[263],"produce":[265],"framework.":[267],"To":[268],"obtain":[269],"reliable":[270],"results,":[271],"method":[274],"involved":[275],"two":[276],"steps:":[277],"review,":[280],"followed":[281],"expert":[283],"reviews.":[284],"These":[285],"techniques":[286],"help":[287],"us":[288],"paint":[289],"comprehensive":[291],"picture":[292],"topic":[296],"validate":[298],"confirm":[300],"results.":[302]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":6},{"year":2024,"cited_by_count":6},{"year":2023,"cited_by_count":6},{"year":2022,"cited_by_count":4},{"year":2021,"cited_by_count":8},{"year":2020,"cited_by_count":6},{"year":2019,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
