{"id":"https://openalex.org/W7087655934","doi":"https://doi.org/10.18420/inf2025_25","title":"Forensic readiness of small and medium-sized enterprises from a police perspective","display_name":"Forensic readiness of small and medium-sized enterprises from a police perspective","publication_year":2025,"publication_date":"2025-01-01","ids":{"openalex":"https://openalex.org/W7087655934","doi":"https://doi.org/10.18420/inf2025_25"},"language":"en","primary_location":{"id":"doi:10.18420/inf2025_25","is_oa":true,"landing_page_url":"https://doi.org/10.18420/inf2025_25","pdf_url":null,"source":{"id":"https://openalex.org/S7407052918","display_name":"Gesellschaft f\u00fcr Informatik (GI)","issn_l":null,"issn":[],"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"article-journal"},"type":"article","indexed_in":["datacite"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://doi.org/10.18420/inf2025_25","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":null,"display_name":"Jessing, Julia","orcid":null},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Jessing, Julia","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":null,"display_name":"Morgenstern, Martin","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Morgenstern, Martin","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"last","author":{"id":null,"display_name":"Honekamp, Wilfried","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Honekamp, Wilfried","raw_affiliation_strings":[],"affiliations":[]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":3,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.54001826,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":true,"primary_topic":{"id":"https://openalex.org/T11075","display_name":"Insect Resistance and Genetics","score":0.6829000115394592,"subfield":{"id":"https://openalex.org/subfields/1312","display_name":"Molecular Biology"},"field":{"id":"https://openalex.org/fields/13","display_name":"Biochemistry, Genetics and Molecular Biology"},"domain":{"id":"https://openalex.org/domains/1","display_name":"Life Sciences"}},"topics":[{"id":"https://openalex.org/T11075","display_name":"Insect Resistance and Genetics","score":0.6829000115394592,"subfield":{"id":"https://openalex.org/subfields/1312","display_name":"Molecular Biology"},"field":{"id":"https://openalex.org/fields/13","display_name":"Biochemistry, Genetics and Molecular Biology"},"domain":{"id":"https://openalex.org/domains/1","display_name":"Life Sciences"}},{"id":"https://openalex.org/T11515","display_name":"Bacillus and Francisella bacterial research","score":0.13420000672340393,"subfield":{"id":"https://openalex.org/subfields/1312","display_name":"Molecular Biology"},"field":{"id":"https://openalex.org/fields/13","display_name":"Biochemistry, Genetics and Molecular Biology"},"domain":{"id":"https://openalex.org/domains/1","display_name":"Life Sciences"}},{"id":"https://openalex.org/T12388","display_name":"Identification and Quantification in Food","score":0.016499999910593033,"subfield":{"id":"https://openalex.org/subfields/1312","display_name":"Molecular Biology"},"field":{"id":"https://openalex.org/fields/13","display_name":"Biochemistry, Genetics and Molecular Biology"},"domain":{"id":"https://openalex.org/domains/1","display_name":"Life Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/digital-forensics","display_name":"Digital forensics","score":0.7336999773979187},{"id":"https://openalex.org/keywords/perspective","display_name":"Perspective (graphical)","score":0.661899983882904},{"id":"https://openalex.org/keywords/law-enforcement","display_name":"Law enforcement","score":0.6492000222206116},{"id":"https://openalex.org/keywords/digital-evidence","display_name":"Digital evidence","score":0.4790000021457672},{"id":"https://openalex.org/keywords/computer-forensics","display_name":"Computer forensics","score":0.462799996137619},{"id":"https://openalex.org/keywords/forensic-science","display_name":"Forensic science","score":0.4172999858856201}],"concepts":[{"id":"https://openalex.org/C84418412","wikidata":"https://www.wikidata.org/wiki/Q3246940","display_name":"Digital forensics","level":2,"score":0.7336999773979187},{"id":"https://openalex.org/C12713177","wikidata":"https://www.wikidata.org/wiki/Q1900281","display_name":"Perspective (graphical)","level":2,"score":0.661899983882904},{"id":"https://openalex.org/C2780262971","wikidata":"https://www.wikidata.org/wiki/Q44554","display_name":"Law enforcement","level":2,"score":0.6492000222206116},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.5860999822616577},{"id":"https://openalex.org/C39549134","wikidata":"https://www.wikidata.org/wiki/Q133080","display_name":"Public relations","level":1,"score":0.5331000089645386},{"id":"https://openalex.org/C2781357168","wikidata":"https://www.wikidata.org/wiki/Q5276084","display_name":"Digital evidence","level":3,"score":0.4790000021457672},{"id":"https://openalex.org/C556601545","wikidata":"https://www.wikidata.org/wiki/Q878553","display_name":"Computer forensics","level":3,"score":0.462799996137619},{"id":"https://openalex.org/C56739046","wikidata":"https://www.wikidata.org/wiki/Q192060","display_name":"Knowledge management","level":1,"score":0.4449000060558319},{"id":"https://openalex.org/C55587333","wikidata":"https://www.wikidata.org/wiki/Q1133029","display_name":"Engineering ethics","level":1,"score":0.41830000281333923},{"id":"https://openalex.org/C140505726","wikidata":"https://www.wikidata.org/wiki/Q495304","display_name":"Forensic science","level":2,"score":0.4172999858856201},{"id":"https://openalex.org/C2779777834","wikidata":"https://www.wikidata.org/wiki/Q4202277","display_name":"Enforcement","level":2,"score":0.4147000014781952},{"id":"https://openalex.org/C184356942","wikidata":"https://www.wikidata.org/wiki/Q830382","display_name":"Best practice","level":2,"score":0.3840999901294708},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.3783999979496002},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3409000039100647},{"id":"https://openalex.org/C71745522","wikidata":"https://www.wikidata.org/wiki/Q2476929","display_name":"Confidentiality","level":2,"score":0.290800005197525},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.2685000002384186},{"id":"https://openalex.org/C27219730","wikidata":"https://www.wikidata.org/wiki/Q46952","display_name":"Organised crime","level":2,"score":0.2648000121116638},{"id":"https://openalex.org/C2779390178","wikidata":"https://www.wikidata.org/wiki/Q29137","display_name":"Cybercrime","level":3,"score":0.26440000534057617},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.2590000033378601},{"id":"https://openalex.org/C195094911","wikidata":"https://www.wikidata.org/wiki/Q14167904","display_name":"Process management","level":1,"score":0.2565999925136566}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.18420/inf2025_25","is_oa":true,"landing_page_url":"https://doi.org/10.18420/inf2025_25","pdf_url":null,"source":{"id":"https://openalex.org/S7407052918","display_name":"Gesellschaft f\u00fcr Informatik (GI)","issn_l":null,"issn":[],"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":null,"raw_source_name":null,"raw_type":"article-journal"}],"best_oa_location":{"id":"doi:10.18420/inf2025_25","is_oa":true,"landing_page_url":"https://doi.org/10.18420/inf2025_25","pdf_url":null,"source":{"id":"https://openalex.org/S7407052918","display_name":"Gesellschaft f\u00fcr Informatik (GI)","issn_l":null,"issn":[],"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"article-journal"},"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","score":0.7624500393867493,"id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":[],"abstract_inverted_index":{"The":[0,48,85],"capacity":[1],"to":[2,57,88,95],"investigate":[3],"cyberattacks":[4],"in":[5],"an":[6],"effective":[7],"manner":[8],"can":[9],"be":[10],"supported":[11],"by":[12],"forensic":[13,52],"readiness":[14],"through":[15],"the":[16,27,30,59,72,97],"systematic":[17],"recording":[18],"and":[19,36,39,67,77,82,105],"securing":[20],"of":[21,32,46,50,61,75,99],"digital":[22,73],"traces.":[23],"This":[24,63],"paper":[25,64],"examines":[26],"topic":[28],"from":[29],"perspectives":[31],"law":[33],"enforcement":[34],"authorities":[35],"selected":[37],"small":[38],"medium-sized":[40],"enterprises":[41,94],"that":[42,91],"have":[43],"been":[44,55],"victims":[45],"cyberattacks.":[47],"absence":[49],"comprehensive":[51],"structures":[53],"has":[54],"demonstrated":[56],"impede":[58],"efficacy":[60],"investigations.":[62],"identifies":[65],"challenges":[66],"best":[68],"practices":[69],"for":[70],"improving":[71],"preservation":[74],"evidence":[76],"optimising":[78],"cooperation":[79],"between":[80],"companies":[81],"investigating":[83],"authorities.":[84],"objective":[86],"is":[87],"formulate":[89],"recommendations":[90],"will":[92],"help":[93],"facilitate":[96],"investigation":[98],"cyber":[100],"incidents":[101],"with":[102],"greater":[103],"alacrity":[104],"efficacy.":[106]},"counts_by_year":[],"updated_date":"2025-11-06T06:51:31.235846","created_date":"2025-10-11T00:00:00"}
