{"id":"https://openalex.org/W7087383041","doi":"https://doi.org/10.18420/inf2025_27","title":"IT Forensic Challenges and Comparative Insights: A Comparative Analysis of the NIS-2 Framework (2022) with the BSI IT Forensic Guide (2011)","display_name":"IT Forensic Challenges and Comparative Insights: A Comparative Analysis of the NIS-2 Framework (2022) with the BSI IT Forensic Guide (2011)","publication_year":2025,"publication_date":"2025-01-01","ids":{"openalex":"https://openalex.org/W7087383041","doi":"https://doi.org/10.18420/inf2025_27"},"language":"en","primary_location":{"id":"doi:10.18420/inf2025_27","is_oa":true,"landing_page_url":"https://doi.org/10.18420/inf2025_27","pdf_url":null,"source":{"id":"https://openalex.org/S7407052918","display_name":"Gesellschaft f\u00fcr Informatik (GI)","issn_l":null,"issn":[],"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"article-journal"},"type":"article","indexed_in":["datacite"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://doi.org/10.18420/inf2025_27","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":null,"display_name":"Weijers, Florian","orcid":null},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Weijers, Florian","raw_affiliation_strings":[],"affiliations":[]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":1,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.5374154,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":true,"primary_topic":{"id":"https://openalex.org/T12688","display_name":"Microbial metabolism and enzyme function","score":0.2897000014781952,"subfield":{"id":"https://openalex.org/subfields/1312","display_name":"Molecular Biology"},"field":{"id":"https://openalex.org/fields/13","display_name":"Biochemistry, Genetics and Molecular Biology"},"domain":{"id":"https://openalex.org/domains/1","display_name":"Life Sciences"}},"topics":[{"id":"https://openalex.org/T12688","display_name":"Microbial metabolism and enzyme function","score":0.2897000014781952,"subfield":{"id":"https://openalex.org/subfields/1312","display_name":"Molecular Biology"},"field":{"id":"https://openalex.org/fields/13","display_name":"Biochemistry, Genetics and Molecular Biology"},"domain":{"id":"https://openalex.org/domains/1","display_name":"Life Sciences"}},{"id":"https://openalex.org/T10303","display_name":"Photosynthetic Processes and Mechanisms","score":0.10840000212192535,"subfield":{"id":"https://openalex.org/subfields/1312","display_name":"Molecular Biology"},"field":{"id":"https://openalex.org/fields/13","display_name":"Biochemistry, Genetics and Molecular Biology"},"domain":{"id":"https://openalex.org/domains/1","display_name":"Life Sciences"}},{"id":"https://openalex.org/T10932","display_name":"Microbial Metabolic Engineering and Bioproduction","score":0.04190000146627426,"subfield":{"id":"https://openalex.org/subfields/1312","display_name":"Molecular Biology"},"field":{"id":"https://openalex.org/fields/13","display_name":"Biochemistry, Genetics and Molecular Biology"},"domain":{"id":"https://openalex.org/domains/1","display_name":"Life Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/digital-forensics","display_name":"Digital forensics","score":0.7089999914169312},{"id":"https://openalex.org/keywords/traceability","display_name":"Traceability","score":0.6208000183105469},{"id":"https://openalex.org/keywords/directive","display_name":"Directive","score":0.5400000214576721},{"id":"https://openalex.org/keywords/obfuscation","display_name":"Obfuscation","score":0.4959000051021576},{"id":"https://openalex.org/keywords/forensic-science","display_name":"Forensic science","score":0.4471000134944916},{"id":"https://openalex.org/keywords/digital-evidence","display_name":"Digital evidence","score":0.4291999936103821},{"id":"https://openalex.org/keywords/data-protection-act-1998","display_name":"Data Protection Act 1998","score":0.4153999984264374},{"id":"https://openalex.org/keywords/computer-forensics","display_name":"Computer forensics","score":0.39469999074935913},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.3903000056743622}],"concepts":[{"id":"https://openalex.org/C84418412","wikidata":"https://www.wikidata.org/wiki/Q3246940","display_name":"Digital forensics","level":2,"score":0.7089999914169312},{"id":"https://openalex.org/C153876917","wikidata":"https://www.wikidata.org/wiki/Q899704","display_name":"Traceability","level":2,"score":0.6208000183105469},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6207000017166138},{"id":"https://openalex.org/C2779547435","wikidata":"https://www.wikidata.org/wiki/Q1121492","display_name":"Directive","level":2,"score":0.5400000214576721},{"id":"https://openalex.org/C40305131","wikidata":"https://www.wikidata.org/wiki/Q2616305","display_name":"Obfuscation","level":2,"score":0.4959000051021576},{"id":"https://openalex.org/C140505726","wikidata":"https://www.wikidata.org/wiki/Q495304","display_name":"Forensic science","level":2,"score":0.4471000134944916},{"id":"https://openalex.org/C2781357168","wikidata":"https://www.wikidata.org/wiki/Q5276084","display_name":"Digital evidence","level":3,"score":0.4291999936103821},{"id":"https://openalex.org/C69360830","wikidata":"https://www.wikidata.org/wiki/Q1172237","display_name":"Data Protection Act 1998","level":2,"score":0.4153999984264374},{"id":"https://openalex.org/C556601545","wikidata":"https://www.wikidata.org/wiki/Q878553","display_name":"Computer forensics","level":3,"score":0.39469999074935913},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.39320001006126404},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.3903000056743622},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.3749000132083893},{"id":"https://openalex.org/C2522767166","wikidata":"https://www.wikidata.org/wiki/Q2374463","display_name":"Data science","level":1,"score":0.3736000061035156},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.3596999943256378},{"id":"https://openalex.org/C43214815","wikidata":"https://www.wikidata.org/wiki/Q7310987","display_name":"Reliability (semiconductor)","level":3,"score":0.35929998755455017},{"id":"https://openalex.org/C112930515","wikidata":"https://www.wikidata.org/wiki/Q4389547","display_name":"Risk analysis (engineering)","level":1,"score":0.3589000105857849},{"id":"https://openalex.org/C165609540","wikidata":"https://www.wikidata.org/wiki/Q1172486","display_name":"Data breach","level":2,"score":0.35100001096725464},{"id":"https://openalex.org/C2780073145","wikidata":"https://www.wikidata.org/wiki/Q2663158","display_name":"Forensic accounting","level":3,"score":0.3411000072956085},{"id":"https://openalex.org/C2776876444","wikidata":"https://www.wikidata.org/wiki/Q2845200","display_name":"Crime analysis","level":2,"score":0.3077999949455261},{"id":"https://openalex.org/C32896092","wikidata":"https://www.wikidata.org/wiki/Q189447","display_name":"Risk management","level":2,"score":0.2994000017642975},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.2989000082015991},{"id":"https://openalex.org/C33762810","wikidata":"https://www.wikidata.org/wiki/Q461671","display_name":"Data integrity","level":2,"score":0.28929999470710754},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.2831000089645386},{"id":"https://openalex.org/C184356942","wikidata":"https://www.wikidata.org/wiki/Q830382","display_name":"Best practice","level":2,"score":0.2824000120162964},{"id":"https://openalex.org/C71745522","wikidata":"https://www.wikidata.org/wiki/Q2476929","display_name":"Confidentiality","level":2,"score":0.2745000123977661},{"id":"https://openalex.org/C2985105721","wikidata":"https://www.wikidata.org/wiki/Q13479512","display_name":"Incident response","level":2,"score":0.2743000090122223},{"id":"https://openalex.org/C117660856","wikidata":"https://www.wikidata.org/wiki/Q1964968","display_name":"Criminal investigation","level":2,"score":0.26570001244544983},{"id":"https://openalex.org/C2781460075","wikidata":"https://www.wikidata.org/wiki/Q1399332","display_name":"Compliance (psychology)","level":2,"score":0.2558000087738037},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.2533999979496002}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.18420/inf2025_27","is_oa":true,"landing_page_url":"https://doi.org/10.18420/inf2025_27","pdf_url":null,"source":{"id":"https://openalex.org/S7407052918","display_name":"Gesellschaft f\u00fcr Informatik (GI)","issn_l":null,"issn":[],"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":null,"raw_source_name":null,"raw_type":"article-journal"}],"best_oa_location":{"id":"doi:10.18420/inf2025_27","is_oa":true,"landing_page_url":"https://doi.org/10.18420/inf2025_27","pdf_url":null,"source":{"id":"https://openalex.org/S7407052918","display_name":"Gesellschaft f\u00fcr Informatik (GI)","issn_l":null,"issn":[],"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"article-journal"},"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","score":0.6636748909950256,"display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":[],"abstract_inverted_index":{"This":[0,86],"study":[1],"analytically":[2],"examines":[3,88],"the":[4,12,26,89,99,114],"BSI":[5,27],"Guide":[6,28],"for":[7,32,101],"IT":[8],"Forensics":[9],"(2011)":[10],"and":[11,16,22,42,54,60,83,94,97],"NIS-2":[13,35,71],"Directive":[14],"(2022)":[15],"their":[17],"influence":[18],"on":[19],"digital":[20],"forensics":[21],"anti-forensics":[23,74],"techniques.":[24],"While":[25],"provides":[29],"a":[30,102],"methodology":[31],"forensic":[33,58,77,92,110],"investigations,":[34],"sets":[36],"out":[37],"cybersecurity":[38,95],"risk":[39],"management":[40],"obligations":[41],"strict":[43],"incident":[44],"reporting":[45],"requirements.":[46],"Anti-forensic":[47],"methods":[48],"such":[49],"as":[50],"log":[51],"manipulation,":[52],"encryption,":[53],"data":[55,81],"obfuscation":[56],"hinder":[57],"traceability":[59],"conflict":[61],"with":[62,109],"NIS-2's":[63],"compliance-driven":[64],"mandates.":[65],"A":[66],"key":[67],"challenge":[68],"is":[69],"whether":[70],"inadvertently":[72],"facilitates":[73],"by":[75],"restricting":[76],"access":[78],"through":[79],"stricter":[80],"protection":[82],"encryption":[84],"policies.":[85],"paper":[87],"tensions":[90],"between":[91],"integrity":[93],"regulation":[96],"argues":[98],"need":[100],"harmonized":[103],"framework":[104],"that":[105],"balances":[106],"regulatory":[107],"compliance":[108],"feasibility":[111],"to":[112],"ensure":[113],"reliability":[115],"of":[116],"evidence":[117],"in":[118],"an":[119],"evolving":[120],"threat":[121],"landscape":[122]},"counts_by_year":[],"updated_date":"2025-11-06T06:51:31.235846","created_date":"2025-10-11T00:00:00"}
