{"id":"https://openalex.org/W1965414993","doi":"https://doi.org/10.4018/jdcf.2013040101","title":"A Framework for Digital Forensics and Investigations","display_name":"A Framework for Digital Forensics and Investigations","publication_year":2013,"publication_date":"2013-04-01","ids":{"openalex":"https://openalex.org/W1965414993","doi":"https://doi.org/10.4018/jdcf.2013040101","mag":"1965414993"},"language":"en","primary_location":{"id":"doi:10.4018/jdcf.2013040101","is_oa":false,"landing_page_url":"https://doi.org/10.4018/jdcf.2013040101","pdf_url":null,"source":{"id":"https://openalex.org/S8943243","display_name":"International Journal of Digital Crime and Forensics","issn_l":"1941-6210","issn":["1941-6210","1941-6229"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320424","host_organization_name":"IGI Global","host_organization_lineage":["https://openalex.org/P4310320424"],"host_organization_lineage_names":["IGI Global"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Digital Crime and Forensics","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5063706430","display_name":"Benjamin Aziz","orcid":"https://orcid.org/0000-0001-5089-2025"},"institutions":[{"id":"https://openalex.org/I63072094","display_name":"University of Portsmouth","ror":"https://ror.org/03ykbk197","country_code":"GB","type":"education","lineage":["https://openalex.org/I63072094"]}],"countries":["GB"],"is_corresponding":true,"raw_author_name":"Benjamin Aziz","raw_affiliation_strings":["School of Computing, University of Portsmouth, Portsmouth, UK"],"affiliations":[{"raw_affiliation_string":"School of Computing, University of Portsmouth, Portsmouth, UK","institution_ids":["https://openalex.org/I63072094"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5007134269","display_name":"Clive Blackwell","orcid":null},"institutions":[{"id":"https://openalex.org/I124261462","display_name":"Oxford Brookes University","ror":"https://ror.org/04v2twj65","country_code":"GB","type":"education","lineage":["https://openalex.org/I124261462"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Clive Blackwell","raw_affiliation_strings":["Department of Computing and Communication Technologies, Oxford Brookes University, Oxford, UK","[Department of Computing and Communication Technologies, Oxford Brookes University, Oxford, UK]"],"affiliations":[{"raw_affiliation_string":"Department of Computing and Communication Technologies, Oxford Brookes University, Oxford, UK","institution_ids":["https://openalex.org/I124261462"]},{"raw_affiliation_string":"[Department of Computing and Communication Technologies, Oxford Brookes University, Oxford, UK]","institution_ids":["https://openalex.org/I124261462"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5058734055","display_name":"Shareeful Islam","orcid":"https://orcid.org/0000-0003-0885-1881"},"institutions":[{"id":"https://openalex.org/I157227730","display_name":"University of East London","ror":"https://ror.org/057jrqr44","country_code":"GB","type":"education","lineage":["https://openalex.org/I157227730"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Shareeful Islam","raw_affiliation_strings":["School of Architecture, Computing and Engineering, University of East London, London, UK"],"affiliations":[{"raw_affiliation_string":"School of Architecture, Computing and Engineering, University of East London, London, UK","institution_ids":["https://openalex.org/I157227730"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5063706430"],"corresponding_institution_ids":["https://openalex.org/I63072094"],"apc_list":null,"apc_paid":null,"fwci":1.6179,"has_fulltext":false,"cited_by_count":8,"citation_normalized_percentile":{"value":0.87363025,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":96},"biblio":{"volume":"5","issue":"2","first_page":"1","last_page":"22"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12034","display_name":"Digital and Cyber Forensics","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12034","display_name":"Digital and Cyber Forensics","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9961000084877014,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9912999868392944,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/digital-forensics","display_name":"Digital forensics","score":0.8264561891555786},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8239203691482544},{"id":"https://openalex.org/keywords/digital-evidence","display_name":"Digital evidence","score":0.7950359582901001},{"id":"https://openalex.org/keywords/computer-forensics","display_name":"Computer forensics","score":0.7754561901092529},{"id":"https://openalex.org/keywords/operationalization","display_name":"Operationalization","score":0.7081723213195801},{"id":"https://openalex.org/keywords/process","display_name":"Process (computing)","score":0.5937852263450623},{"id":"https://openalex.org/keywords/cyberspace","display_name":"Cyberspace","score":0.5349147915840149},{"id":"https://openalex.org/keywords/task","display_name":"Task (project management)","score":0.5099104642868042},{"id":"https://openalex.org/keywords/data-science","display_name":"Data science","score":0.3944613039493561},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3194407820701599},{"id":"https://openalex.org/keywords/systems-engineering","display_name":"Systems engineering","score":0.17151552438735962},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.1599692702293396},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.14129656553268433}],"concepts":[{"id":"https://openalex.org/C84418412","wikidata":"https://www.wikidata.org/wiki/Q3246940","display_name":"Digital forensics","level":2,"score":0.8264561891555786},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8239203691482544},{"id":"https://openalex.org/C2781357168","wikidata":"https://www.wikidata.org/wiki/Q5276084","display_name":"Digital evidence","level":3,"score":0.7950359582901001},{"id":"https://openalex.org/C556601545","wikidata":"https://www.wikidata.org/wiki/Q878553","display_name":"Computer forensics","level":3,"score":0.7754561901092529},{"id":"https://openalex.org/C9354725","wikidata":"https://www.wikidata.org/wiki/Q286017","display_name":"Operationalization","level":2,"score":0.7081723213195801},{"id":"https://openalex.org/C98045186","wikidata":"https://www.wikidata.org/wiki/Q205663","display_name":"Process (computing)","level":2,"score":0.5937852263450623},{"id":"https://openalex.org/C2781241145","wikidata":"https://www.wikidata.org/wiki/Q204606","display_name":"Cyberspace","level":3,"score":0.5349147915840149},{"id":"https://openalex.org/C2780451532","wikidata":"https://www.wikidata.org/wiki/Q759676","display_name":"Task (project management)","level":2,"score":0.5099104642868042},{"id":"https://openalex.org/C2522767166","wikidata":"https://www.wikidata.org/wiki/Q2374463","display_name":"Data science","level":1,"score":0.3944613039493561},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3194407820701599},{"id":"https://openalex.org/C201995342","wikidata":"https://www.wikidata.org/wiki/Q682496","display_name":"Systems engineering","level":1,"score":0.17151552438735962},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.1599692702293396},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.14129656553268433},{"id":"https://openalex.org/C111472728","wikidata":"https://www.wikidata.org/wiki/Q9471","display_name":"Epistemology","level":1,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.4018/jdcf.2013040101","is_oa":false,"landing_page_url":"https://doi.org/10.4018/jdcf.2013040101","pdf_url":null,"source":{"id":"https://openalex.org/S8943243","display_name":"International Journal of Digital Crime and Forensics","issn_l":"1941-6210","issn":["1941-6210","1941-6229"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320424","host_organization_name":"IGI Global","host_organization_lineage":["https://openalex.org/P4310320424"],"host_organization_lineage_names":["IGI Global"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Digital Crime and Forensics","raw_type":"journal-article"},{"id":"pmh:oai:RePEc:igg:jdcf00:v:5:y:2013:i:2:p:1-22","is_oa":false,"landing_page_url":"http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/jdcf.2013040101","pdf_url":null,"source":{"id":"https://openalex.org/S4306401271","display_name":"RePEc: Research Papers in Economics","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I77793887","host_organization_name":"Federal Reserve Bank of St. Louis","host_organization_lineage":["https://openalex.org/I77793887"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16","score":0.7900000214576721}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":31,"referenced_works":["https://openalex.org/W24678375","https://openalex.org/W157169276","https://openalex.org/W159069299","https://openalex.org/W310602596","https://openalex.org/W1489227129","https://openalex.org/W1494679152","https://openalex.org/W1534992827","https://openalex.org/W1551602616","https://openalex.org/W1570969260","https://openalex.org/W1648198059","https://openalex.org/W1965414993","https://openalex.org/W2001436649","https://openalex.org/W2019360156","https://openalex.org/W2021337424","https://openalex.org/W2030485707","https://openalex.org/W2060155568","https://openalex.org/W2096127821","https://openalex.org/W2097154968","https://openalex.org/W2129010475","https://openalex.org/W2129289644","https://openalex.org/W2130906372","https://openalex.org/W2136135923","https://openalex.org/W2170673199","https://openalex.org/W2462042108","https://openalex.org/W3118517595","https://openalex.org/W4229680087","https://openalex.org/W4285719527","https://openalex.org/W6634329698","https://openalex.org/W6941642702","https://openalex.org/W7034243346","https://openalex.org/W7047661385"],"related_works":["https://openalex.org/W2598491911","https://openalex.org/W2181728705","https://openalex.org/W4247205791","https://openalex.org/W4242633011","https://openalex.org/W2489557937","https://openalex.org/W4238452393","https://openalex.org/W2536999591","https://openalex.org/W93745046","https://openalex.org/W4244711387","https://openalex.org/W4283205458"],"abstract_inverted_index":{"Digital":[0],"forensics":[1,113,169],"investigations":[2,26,91,114,170],"are":[3,27],"an":[4],"important":[5],"task":[6],"for":[7,18,53,110,180],"collecting":[8],"evidence":[9],"based":[10,118],"on":[11,119],"the":[12,35,58,68,78,86,94,99,104,116,157,165],"artifacts":[13],"left":[14],"in":[15,32,124,156,171],"computer":[16,19],"systems":[17],"related":[20],"crimes.":[21],"The":[22,147],"requirements":[23,59,121,136],"of":[24,34,38,60,77,164,168],"such":[25],"often":[28],"a":[29,42,51,107],"neglected":[30],"aspect":[31],"most":[33],"existing":[36],"models":[37],"digital":[39,61,112],"investigations.":[40,62],"Therefore,":[41,88],"formal":[43],"and":[44,55,132,137,144,162],"systematic":[45],"approach":[46],"is":[47],"needed":[48],"to":[49,159],"provide":[50,176],"framework":[52],"modeling":[54,131],"reasoning":[56,133,181],"about":[57,134,182],"In":[63,101],"addition,":[64],"anti-forensics":[65,117],"situations":[66],"make":[67],"forensic":[69,90,183],"investigation":[70,79],"process":[71],"challenging":[72],"by":[73,84],"contaminating":[74],"any":[75],"stage":[76],"process,":[80],"its":[81],"requirements,":[82],"or":[83],"destroying":[85],"evidence.":[87,184],"successful":[89],"require":[92],"understanding":[93],"possible":[95],"anti-forensic":[96],"issues":[97],"during":[98],"investigation.":[100],"this":[102,151],"paper,":[103],"authors":[105,148],"present":[106],"new":[108,152],"method":[109,153],"guiding":[111],"considering":[115],"goal-driven":[120],"engineering":[122],"methodologies,":[123],"particular":[125],"KAOS.":[126],"Methodologies":[127],"like":[128],"KAOS":[129],"facilitate":[130],"goals,":[135],"obstacles,":[138],"as":[139,141,173,175],"well":[140,174],"their":[142],"operationalization":[143],"responsibility":[145],"assignments.":[146],"believe":[149],"that":[150],"will":[154],"lead":[155],"future":[158],"better":[160],"management":[161],"organization":[163],"various":[166],"steps":[167],"cyberspace":[172],"more":[177],"robust":[178],"grounds":[179]},"counts_by_year":[{"year":2025,"cited_by_count":2},{"year":2024,"cited_by_count":1},{"year":2021,"cited_by_count":2},{"year":2017,"cited_by_count":1},{"year":2014,"cited_by_count":1},{"year":2013,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2016-06-24T00:00:00"}
