{"id":"https://openalex.org/W6906656380","doi":"https://doi.org/10.18420/inf2022_05","title":"Ontology in the Digital Forensics Domain: A Scoping Review","display_name":"Ontology in the Digital Forensics Domain: A Scoping Review","publication_year":2022,"publication_date":"2022-01-01","ids":{"openalex":"https://openalex.org/W6906656380","doi":"https://doi.org/10.18420/inf2022_05"},"language":"en","primary_location":{"id":"doi:10.18420/inf2022_05","is_oa":true,"landing_page_url":"https://doi.org/10.18420/inf2022_05","pdf_url":null,"source":{"id":"https://openalex.org/S7407052918","display_name":"Gesellschaft f\u00fcr Informatik (GI)","issn_l":null,"issn":[],"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"article-journal"},"type":"article","indexed_in":["datacite"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://doi.org/10.18420/inf2022_05","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":null,"display_name":"Morgenstern, Martin","orcid":null},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Morgenstern, Martin","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":null,"display_name":"F\u00e4hndrich, Johannes","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"F\u00e4hndrich, Johannes","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"last","author":{"id":null,"display_name":"Honekamp, Wilfried","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Honekamp, Wilfried","raw_affiliation_strings":[],"affiliations":[]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":3,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.42202131,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":true,"primary_topic":{"id":"https://openalex.org/T12034","display_name":"Digital and Cyber Forensics","score":0.9081000089645386,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12034","display_name":"Digital and Cyber Forensics","score":0.9081000089645386,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11986","display_name":"Scientific Computing and Data Management","score":0.015599999576807022,"subfield":{"id":"https://openalex.org/subfields/1802","display_name":"Information Systems and Management"},"field":{"id":"https://openalex.org/fields/18","display_name":"Decision Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T10751","display_name":"Forensic and Genetic Research","score":0.0034000000450760126,"subfield":{"id":"https://openalex.org/subfields/1311","display_name":"Genetics"},"field":{"id":"https://openalex.org/fields/13","display_name":"Biochemistry, Genetics and Molecular Biology"},"domain":{"id":"https://openalex.org/domains/1","display_name":"Life Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/digital-forensics","display_name":"Digital forensics","score":0.7218999862670898},{"id":"https://openalex.org/keywords/ontology","display_name":"Ontology","score":0.694599986076355},{"id":"https://openalex.org/keywords/domain","display_name":"Domain (mathematical analysis)","score":0.661300003528595},{"id":"https://openalex.org/keywords/automation","display_name":"Automation","score":0.5482000112533569},{"id":"https://openalex.org/keywords/digital-evidence","display_name":"Digital evidence","score":0.5299000144004822},{"id":"https://openalex.org/keywords/computer-forensics","display_name":"Computer forensics","score":0.4977000057697296},{"id":"https://openalex.org/keywords/quality","display_name":"Quality (philosophy)","score":0.4438999891281128}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7669000029563904},{"id":"https://openalex.org/C84418412","wikidata":"https://www.wikidata.org/wiki/Q3246940","display_name":"Digital forensics","level":2,"score":0.7218999862670898},{"id":"https://openalex.org/C25810664","wikidata":"https://www.wikidata.org/wiki/Q44325","display_name":"Ontology","level":2,"score":0.694599986076355},{"id":"https://openalex.org/C36503486","wikidata":"https://www.wikidata.org/wiki/Q11235244","display_name":"Domain (mathematical analysis)","level":2,"score":0.661300003528595},{"id":"https://openalex.org/C115901376","wikidata":"https://www.wikidata.org/wiki/Q184199","display_name":"Automation","level":2,"score":0.5482000112533569},{"id":"https://openalex.org/C2781357168","wikidata":"https://www.wikidata.org/wiki/Q5276084","display_name":"Digital evidence","level":3,"score":0.5299000144004822},{"id":"https://openalex.org/C2522767166","wikidata":"https://www.wikidata.org/wiki/Q2374463","display_name":"Data science","level":1,"score":0.5187000036239624},{"id":"https://openalex.org/C556601545","wikidata":"https://www.wikidata.org/wiki/Q878553","display_name":"Computer forensics","level":3,"score":0.4977000057697296},{"id":"https://openalex.org/C2779530757","wikidata":"https://www.wikidata.org/wiki/Q1207505","display_name":"Quality (philosophy)","level":2,"score":0.4438999891281128},{"id":"https://openalex.org/C2778476105","wikidata":"https://www.wikidata.org/wiki/Q628539","display_name":"Workload","level":2,"score":0.4336000084877014},{"id":"https://openalex.org/C18762648","wikidata":"https://www.wikidata.org/wiki/Q42213","display_name":"Work (physics)","level":2,"score":0.41110000014305115},{"id":"https://openalex.org/C2780428219","wikidata":"https://www.wikidata.org/wiki/Q16952335","display_name":"Cover (algebra)","level":2,"score":0.4072999954223633},{"id":"https://openalex.org/C2775945657","wikidata":"https://www.wikidata.org/wiki/Q381442","display_name":"Structuring","level":2,"score":0.40560001134872437},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.39489999413490295},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.39430001378059387},{"id":"https://openalex.org/C115903868","wikidata":"https://www.wikidata.org/wiki/Q80993","display_name":"Software engineering","level":1,"score":0.36039999127388},{"id":"https://openalex.org/C48103436","wikidata":"https://www.wikidata.org/wiki/Q599031","display_name":"State (computer science)","level":2,"score":0.3547999858856201},{"id":"https://openalex.org/C2779777834","wikidata":"https://www.wikidata.org/wiki/Q4202277","display_name":"Enforcement","level":2,"score":0.3294999897480011},{"id":"https://openalex.org/C2780262971","wikidata":"https://www.wikidata.org/wiki/Q44554","display_name":"Law enforcement","level":2,"score":0.3276999890804291},{"id":"https://openalex.org/C207685749","wikidata":"https://www.wikidata.org/wiki/Q2088941","display_name":"Domain knowledge","level":2,"score":0.25459998846054077}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.18420/inf2022_05","is_oa":true,"landing_page_url":"https://doi.org/10.18420/inf2022_05","pdf_url":null,"source":{"id":"https://openalex.org/S7407052918","display_name":"Gesellschaft f\u00fcr Informatik (GI)","issn_l":null,"issn":[],"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":null,"raw_source_name":null,"raw_type":"article-journal"}],"best_oa_location":{"id":"doi:10.18420/inf2022_05","is_oa":true,"landing_page_url":"https://doi.org/10.18420/inf2022_05","pdf_url":null,"source":{"id":"https://openalex.org/S7407052918","display_name":"Gesellschaft f\u00fcr Informatik (GI)","issn_l":null,"issn":[],"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"article-journal"},"sustainable_development_goals":[{"score":0.8173483610153198,"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":[],"abstract_inverted_index":{"A":[0],"need":[1],"for":[2,16],"the":[3,13,28,68,78,81,87,102,129],"use":[4,128],"of":[5,57,70,80,83,89,105],"automation":[6,34],"in":[7,67,86,108],"digital":[8,19,71,90,106],"forensics":[9,91,107],"is":[10],"imminent.":[11],"With":[12],"overwhelming":[14],"workload":[15],"analysing":[17],"collected":[18],"evidence,":[20],"law":[21],"enforcement":[22],"agencies":[23],"are":[24,97],"no":[25],"longer":[26],"meeting":[27],"quality":[29],"investigations":[30],"we":[31,76],"expect.":[32],"For":[33],"to":[35,64,100,127,139],"work":[36,124],"(e.":[37],"g.,":[38],"integrating":[39],"heterogeneous":[40],"data":[41],"sources,":[42],"structuring":[43],"unstructured":[44],"data,":[45],"or":[46,120],"drawing":[47],"conclusions":[48],"from":[49],"structured":[50],"data),":[51],"formalisation":[52,58,85],"must":[53],"be":[54,126],"specified.":[55],"Specification":[56],"includes":[59],"as":[60],"a":[61,93],"first":[62],"step":[63],"describe":[65],"concepts":[66],"domain":[69,88,104],"forensics.":[72],"In":[73],"this":[74],"contribution,":[75],"analyse":[77],"state":[79],"art":[82],"ontological":[84],"via":[92],"scoping":[94],"review.":[95],"There":[96],"some":[98],"attempts":[99],"formalise":[101],"technical":[103,118],"ontologies,":[109],"but":[110],"they":[111],"do":[112],"not":[113],"cover":[114],"essential":[115],"context,":[116],"like":[117],"annotations":[119],"acquisition":[121],"modelling.":[122],"Future":[123],"will":[125],"existing":[130],"foundations":[131],"and":[132,137],"extend":[133],"them":[134],"with":[135],"facts":[136],"rules":[138],"enable":[140],"reasoning.":[141]},"counts_by_year":[],"updated_date":"2025-11-06T06:51:31.235846","created_date":"2025-10-10T00:00:00"}
