<?xml version="1.0" encoding="ISO-8859-1"?><article xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance">
<front>
<journal-meta>
<journal-id>1870-0578</journal-id>
<journal-title><![CDATA[Mexican law review]]></journal-title>
<abbrev-journal-title><![CDATA[Mex. law rev]]></abbrev-journal-title>
<issn>1870-0578</issn>
<publisher>
<publisher-name><![CDATA[Universidad Nacional Autónoma de México, Instituto de Investigaciones Jurídicas]]></publisher-name>
</publisher>
</journal-meta>
<article-meta>
<article-id>S1870-05782024000100023</article-id>
<article-id pub-id-type="doi">10.22201/iij.24485306e.2024.2.18892</article-id>
<title-group>
<article-title xml:lang="en"><![CDATA[Cybercrime and the Law: Addressing the Challenges of Digital Forensics in Criminal Investigations]]></article-title>
</title-group>
<contrib-group>
<contrib contrib-type="author">
<name>
<surname><![CDATA[Allah Rakha]]></surname>
<given-names><![CDATA[Naeem]]></given-names>
</name>
<xref ref-type="aff" rid="Aff"/>
</contrib>
</contrib-group>
<aff id="Af1">
<institution><![CDATA[,Tashkent State University of Law Department of Cyber Law ]]></institution>
<addr-line><![CDATA[ ]]></addr-line>
<country>Uzbekistan</country>
</aff>
<pub-date pub-type="pub">
<day>00</day>
<month>06</month>
<year>2024</year>
</pub-date>
<pub-date pub-type="epub">
<day>00</day>
<month>06</month>
<year>2024</year>
</pub-date>
<volume>16</volume>
<numero>2</numero>
<fpage>23</fpage>
<lpage>54</lpage>
<copyright-statement/>
<copyright-year/>
<self-uri xlink:href="http://www.scielo.org.mx/scielo.php?script=sci_arttext&amp;pid=S1870-05782024000100023&amp;lng=en&amp;nrm=iso"></self-uri><self-uri xlink:href="http://www.scielo.org.mx/scielo.php?script=sci_abstract&amp;pid=S1870-05782024000100023&amp;lng=en&amp;nrm=iso"></self-uri><self-uri xlink:href="http://www.scielo.org.mx/scielo.php?script=sci_pdf&amp;pid=S1870-05782024000100023&amp;lng=en&amp;nrm=iso"></self-uri><abstract abstract-type="short" xml:lang="en"><p><![CDATA[Abstract A lack of standards and regulations for handling digital evidence is impeding its admissibility in court proceedings. This article addresses the challenges of digital forensics in criminal investigations due to the rise of cybercrime. The literature existing studies on digital forensics, legal frameworks, and cybercrime is reviewed in order to find possible solutions. The results demonstrate the importance of collaboration between the legal and technological sectors in developing standardized norms and processes for digital evidence collection and processing. The findings also highlight the importance of digital forensics in criminal investigations and the need for a robust legal framework to combat cybercrime effectively. This note emphasizes the vital significance of digital forensics in criminal investigations and the need to develop standardized rules and procedures for the management of digital evidence. The recommendations presented in this article may assist policymakers and law enforcement authorities in designing legal framework capable of effectively confronting cybercrime.]]></p></abstract>
<abstract abstract-type="short" xml:lang="es"><p><![CDATA[Resumen La falta de estándares y regulaciones para el manejo de evidencia digital está obstaculizando su admisión en los tribunales. Este artículo aborda los desafíos de la informática forense en las investigaciones criminales debido al aumento de la ciberdelincuencia. El estudio realizó una revisión de literatura de estudios existentes sobre informática forense, marcos legales y ciberdelincuencia para encontrar posibles alternativas. Los hallazgos demostraron la importancia de la colaboración entre los sectores legales y tecnológicos en el desarrollo de normas y procesos estándares para la recolección y procesamiento de evidencia digital. Las implicaciones resaltan la importancia de la informática forense en las investigaciones criminales y la necesidad de un marco legal sólido para abordar la ciberdelincuencia de manera efectiva. El documento subraya el vital significado de la informática forense en las investigaciones criminales y la necesidad de desarrollar reglas y procedimientos estándares para gestionar la evidencia digital. Estas recomendaciones pueden ser utilizadas por los legisladores y las autoridades policiales para establecer un marco legal efectivo.]]></p></abstract>
<kwd-group>
<kwd lng="en"><![CDATA[Cybercrime]]></kwd>
<kwd lng="en"><![CDATA[Digital Forensics]]></kwd>
<kwd lng="en"><![CDATA[Criminal Investigations]]></kwd>
<kwd lng="en"><![CDATA[Evidence Handling]]></kwd>
<kwd lng="en"><![CDATA[Legal Frameworks]]></kwd>
<kwd lng="en"><![CDATA[Standardization]]></kwd>
<kwd lng="es"><![CDATA[ciberdelincuencia]]></kwd>
<kwd lng="es"><![CDATA[informática forense]]></kwd>
<kwd lng="es"><![CDATA[investigaciones penales]]></kwd>
<kwd lng="es"><![CDATA[manejo de evidencia]]></kwd>
<kwd lng="es"><![CDATA[marco legal]]></kwd>
<kwd lng="es"><![CDATA[estandarización]]></kwd>
</kwd-group>
</article-meta>
</front><back>
<ref-list>
<ref id="B1">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Ahlberg]]></surname>
<given-names><![CDATA[P.]]></given-names>
</name>
<name>
<surname><![CDATA[Stedt]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Digital Evidence in Criminal Cases: An Overview of Challenges and Opportunities]]></article-title>
<source><![CDATA[Computer Law &amp; Security Review]]></source>
<year>2010</year>
</nlm-citation>
</ref>
<ref id="B2">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Alazab]]></surname>
<given-names><![CDATA[Mamoun]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[COVID-19 and Cybersecurity: A Systematic Literature Review]]></article-title>
<source><![CDATA[Journal of Information Privacy and Security]]></source>
<year>2021</year>
</nlm-citation>
</ref>
<ref id="B3">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Ali]]></surname>
<given-names><![CDATA[Mohamed]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[A Procedure For Tracing Chain of Custody in Digital Image Forensics: A Paradigm Based on Grey Hash and Blockchain]]></article-title>
<source><![CDATA[Symmetry]]></source>
<year>2022</year>
<volume>14</volume>
<numero>2</numero>
<issue>2</issue>
</nlm-citation>
</ref>
<ref id="B4">
<nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Alok]]></surname>
<given-names><![CDATA[Mishra]]></given-names>
</name>
<name>
<surname><![CDATA[Alzoubi]]></surname>
<given-names><![CDATA[Yehia Ibrahim]]></given-names>
</name>
<name>
<surname><![CDATA[Anwar]]></surname>
<given-names><![CDATA[Memoona Javeria]]></given-names>
</name>
<name>
<surname><![CDATA[Gill]]></surname>
<given-names><![CDATA[Asif Qumer]]></given-names>
</name>
</person-group>
<source><![CDATA[Attributes Impacting Cybersecurity Policy Development: An Evidence from Seven Nations, Computers &amp; Security]]></source>
<year>2022</year>
</nlm-citation>
</ref>
<ref id="B5">
<nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Andrews]]></surname>
<given-names><![CDATA[Courtney Hague]]></given-names>
</name>
<name>
<surname><![CDATA[Lew]]></surname>
<given-names><![CDATA[Darryl]]></given-names>
</name>
<name>
<surname><![CDATA[Picca]]></surname>
<given-names><![CDATA[Jean-Pierre]]></given-names>
</name>
<name>
<surname><![CDATA[Fain]]></surname>
<given-names><![CDATA[Marika]]></given-names>
</name>
</person-group>
<source><![CDATA[The Complementary Roles of the European Public Prosecutor&#8217;s Office and the European Anti-Fraud Office, White &amp; Case Insight]]></source>
<year>2022</year>
</nlm-citation>
</ref>
<ref id="B6">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Argyridou]]></surname>
<given-names><![CDATA[Elina]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Cyber Hygiene Methodology for Raising Cybersecurity and Data Privacy Awareness in Health Care Organizations: Concept Study]]></article-title>
<source><![CDATA[J Med Internet Res.]]></source>
<year>2023</year>
</nlm-citation>
</ref>
<ref id="B7">
<nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Bandyopadhyay]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Kshetri]]></surname>
<given-names><![CDATA[N.]]></given-names>
</name>
<name>
<surname><![CDATA[Voas]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
</person-group>
<source><![CDATA[Handbook Of Digital Forensic Investigations]]></source>
<year>2021</year>
</nlm-citation>
</ref>
<ref id="B8">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Barnum]]></surname>
<given-names><![CDATA[Daniel T.]]></given-names>
</name>
<name>
<surname><![CDATA[German]]></surname>
<given-names><![CDATA[Diana L.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Accessing and Analyzing Encrypted Digital Evidence Without the Encryption Key]]></article-title>
<source><![CDATA[Digital Investigation]]></source>
<year>2021</year>
<page-range>36-45</page-range></nlm-citation>
</ref>
<ref id="B9">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Beebe]]></surname>
<given-names><![CDATA[N. L.]]></given-names>
</name>
<name>
<surname><![CDATA[Clark]]></surname>
<given-names><![CDATA[T. R.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Evolving Digital Forensics: Challenges And Opportunities]]></article-title>
<source><![CDATA[J. Digital Forensics Secl.]]></source>
<year>2021</year>
<volume>31</volume>
</nlm-citation>
</ref>
<ref id="B10">
<nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Beek]]></surname>
<given-names><![CDATA[H.M.A. van]]></given-names>
</name>
<name>
<surname><![CDATA[Bos]]></surname>
<given-names><![CDATA[J. Van den]]></given-names>
</name>
<name>
<surname><![CDATA[Boztas]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Eijk]]></surname>
<given-names><![CDATA[E.J. van]]></given-names>
</name>
<name>
<surname><![CDATA[Schramp]]></surname>
<given-names><![CDATA[R.]]></given-names>
</name>
<name>
<surname><![CDATA[Ugen]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
</person-group>
<source><![CDATA[Digital Forensics as a Service: Stepping up the Game, Forensic Science International: Digital Investigation]]></source>
<year>2020</year>
<volume>35</volume>
</nlm-citation>
</ref>
<ref id="B11">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Bernal-Merino]]></surname>
<given-names><![CDATA[M.A.]]></given-names>
</name>
<name>
<surname><![CDATA[Valero-Torrijos]]></surname>
<given-names><![CDATA[M.A.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[International Cooperation in the Fight against Cybercrime: The Case of Mexico]]></article-title>
<source><![CDATA[Computer L. &amp; Security Rev.]]></source>
<year>2021</year>
</nlm-citation>
</ref>
<ref id="B12">
<nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Bossler]]></surname>
<given-names><![CDATA[Adam M.]]></given-names>
</name>
<name>
<surname><![CDATA[Burruss]]></surname>
<given-names><![CDATA[George W.]]></given-names>
</name>
</person-group>
<source><![CDATA[Cybercrime and Digital Forensics: An Introduction]]></source>
<year>2020</year>
<edition>2</edition>
</nlm-citation>
</ref>
<ref id="B13">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Blumberg]]></surname>
<given-names><![CDATA[Daniel M]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[New Directions in Police Academy Training: A Call to Action]]></article-title>
<source><![CDATA[Int J Environ Res Public Health]]></source>
<year>2019</year>
</nlm-citation>
</ref>
<ref id="B14">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Brenner]]></surname>
<given-names><![CDATA[S. W.]]></given-names>
</name>
<name>
<surname><![CDATA[Schwerha]]></surname>
<given-names><![CDATA[J. J.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Cybercrime and jurisdiction: A Global Problem Requires a Global Solution]]></article-title>
<source><![CDATA[Berkeley Journal of International Law]]></source>
<year>2018</year>
<volume>36</volume>
<page-range>228-83</page-range></nlm-citation>
</ref>
<ref id="B15">
<nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Casey]]></surname>
<given-names><![CDATA[Eoghan]]></given-names>
</name>
</person-group>
<source><![CDATA[Digital Evidence and Computer Crime: Forensic Science, Computers, and the Internet]]></source>
<year>2021</year>
<edition>4</edition>
</nlm-citation>
</ref>
<ref id="B16">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Casey]]></surname>
<given-names><![CDATA[Eoghan]]></given-names>
</name>
</person-group>
<source><![CDATA[Digital Evidence in Criminal Law]]></source>
<year>2021</year>
<publisher-name><![CDATA[Oxford University Press]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B17">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Castañeda]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Carvajal]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Sánchez]]></surname>
<given-names><![CDATA[I.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[A Comparative Analysis of the EU General Data Protection Regulation and the Mexican Federal Law for the Protection of Personal Data Held by Private Parties]]></article-title>
<source><![CDATA[J. Info. Privacy &amp; Security]]></source>
<year>2021</year>
</nlm-citation>
</ref>
<ref id="B18">
<nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Creswell]]></surname>
<given-names><![CDATA[John W]]></given-names>
</name>
</person-group>
<source><![CDATA[Research Design: Qualitative, Quantitative and Mixed Methods Approaches]]></source>
<year>2014</year>
<edition>4</edition>
</nlm-citation>
</ref>
<ref id="B19">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Coo]]></surname>
<given-names><![CDATA[Anthony]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Overwhelming Amount of Data Generated by Modern Devices and Platforms]]></article-title>
<source><![CDATA[Journal of Digital Forensics, Security and Law]]></source>
<year>2022</year>
</nlm-citation>
</ref>
<ref id="B20">
<nlm-citation citation-type="journal">
<collab>Corbin &amp; Strauss</collab>
<article-title xml:lang=""><![CDATA[Grounded Theory Research: Procedures, Canons, and Evaluative Criteria]]></article-title>
<source><![CDATA[Qual Sociol]]></source>
<year>2019</year>
<page-range>3-21</page-range></nlm-citation>
</ref>
<ref id="B21">
<nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Daniel]]></surname>
<given-names><![CDATA[Larry E.]]></given-names>
</name>
<name>
<surname><![CDATA[Daniel]]></surname>
<given-names><![CDATA[Lars E.]]></given-names>
</name>
</person-group>
<source><![CDATA[Digital Forensics for Legal Professionals: Understanding Digital Evidence From The Warrant To The Courtroom]]></source>
<year>2012</year>
</nlm-citation>
</ref>
<ref id="B22">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[D&#305;az-Perez]]></surname>
<given-names><![CDATA[Lelia Cristina]]></given-names>
</name>
<name>
<surname><![CDATA[Quintanar-Resendiz]]></surname>
<given-names><![CDATA[Ana Laura]]></given-names>
</name>
<name>
<surname><![CDATA[Vazquez-Alvarez]]></surname>
<given-names><![CDATA[Graciela]]></given-names>
</name>
<name>
<surname><![CDATA[Vazquez-Medina]]></surname>
<given-names><![CDATA[Ruben]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[A review of Cross-Border Cooperation Regulation for Digital Forensics in LATAM From the Soft Systems Methodology]]></article-title>
<source><![CDATA[Digital Forensic]]></source>
<year>2022</year>
</nlm-citation>
</ref>
<ref id="B23">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Dunn]]></surname>
<given-names><![CDATA[Kathleen]]></given-names>
</name>
<name>
<surname><![CDATA[Zukowski]]></surname>
<given-names><![CDATA[Leah]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[The Dark Web and Digital Forensics: Challenges and Solutions]]></article-title>
<source><![CDATA[Journal Of Digital Forensics, Security And Law]]></source>
<year>2021</year>
<volume>16</volume>
<page-range>15-28</page-range></nlm-citation>
</ref>
<ref id="B24">
<nlm-citation citation-type="book">
<collab>European Union Agency for Law Enforcement Cooperation</collab>
<source><![CDATA[Internet Organized Crime Threat Assessment (IOCTA) 2020]]></source>
<year>2020</year>
<publisher-name><![CDATA[Publications Office of the European Union]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B25">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Fakiha]]></surname>
<given-names><![CDATA[Bandr]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Digital Forensics: Crimes and Challenges in Online Social Networks Forensics]]></article-title>
<source><![CDATA[Journal of the Arab American University]]></source>
<year>2020</year>
</nlm-citation>
</ref>
<ref id="B26">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Friedman]]></surname>
<given-names><![CDATA[Batya]]></given-names>
</name>
<name>
<surname><![CDATA[Karnik]]></surname>
<given-names><![CDATA[Amrita]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Balancing Privacy Rights and Investigative Needs in the Digital Age]]></article-title>
<source><![CDATA[Journal of National Security Law and Policy]]></source>
<year>2021</year>
<volume>13</volume>
<page-range>69-96</page-range></nlm-citation>
</ref>
<ref id="B27">
<nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Frunza]]></surname>
<given-names><![CDATA[Marius-Christian]]></given-names>
</name>
</person-group>
<source><![CDATA[Introduction to the Theories and Varieties of Modern Crime in Financial Markets]]></source>
<year>2016</year>
<page-range>207-20</page-range></nlm-citation>
</ref>
<ref id="B28">
<nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Gillespie]]></surname>
<given-names><![CDATA[Alisdair]]></given-names>
</name>
<name>
<surname><![CDATA[Mason]]></surname>
<given-names><![CDATA[Simon]]></given-names>
</name>
</person-group>
<source><![CDATA[Legal Challenges in Digital Forensics. Digital Investigation]]></source>
<year>2019</year>
<volume>29</volume>
<page-range>81-8</page-range></nlm-citation>
</ref>
<ref id="B29">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Goodison]]></surname>
<given-names><![CDATA[Sean E]]></given-names>
</name>
</person-group>
<source><![CDATA[Digital Evidence and the U.S. Criminal Justice System Identifying Technology and Other Needs to More Effectively Acquire and Utilize Digital Evidence]]></source>
<year>2015</year>
<publisher-name><![CDATA[RAND]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B30">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Gonzales]]></surname>
<given-names><![CDATA[Alberto R]]></given-names>
</name>
</person-group>
<source><![CDATA[Digital Evidence in the Courtroom: A Guide for Law Enforcement and Prosecutors]]></source>
<year>2007</year>
<publisher-name><![CDATA[U.S. Department of Justice Office of Justice Programs National Institute of Justice]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B31">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Goswami]]></surname>
<given-names><![CDATA[Anushka]]></given-names>
</name>
<name>
<surname><![CDATA[Thakur]]></surname>
<given-names><![CDATA[Lokesh Kumar]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Challenges of Extracting and Analyzing Digital Evidence from Different Devices and Platforms]]></article-title>
<source><![CDATA[International Journal of Cyber Criminology]]></source>
<year>2021</year>
<volume>15</volume>
</nlm-citation>
</ref>
<ref id="B32">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Goodall]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
<name>
<surname><![CDATA[Cate]]></surname>
<given-names><![CDATA[F. T.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Balancing Privacy, Security, and Civil Liberties in Digital Investigations]]></article-title>
<source><![CDATA[J.l. &amp; Cyber Warfare]]></source>
<year>2022</year>
</nlm-citation>
</ref>
<ref id="B33">
<nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Gupta]]></surname>
<given-names><![CDATA[Sanjay]]></given-names>
</name>
</person-group>
<source><![CDATA[Cybercrime: A Comprehensive Introduction]]></source>
<year>2021</year>
</nlm-citation>
</ref>
<ref id="B34">
<nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Hayes]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
<name>
<surname><![CDATA[Shenoi]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Impact of Cybercrime on Digital Forensics: Threats, Challenges, and Future Directions]]></article-title>
<source><![CDATA[Handbook of Digital Forensics and Investigation]]></source>
<year>2010</year>
</nlm-citation>
</ref>
<ref id="B35">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Hernández-Pérez]]></surname>
<given-names><![CDATA[T.]]></given-names>
</name>
<name>
<surname><![CDATA[Cervantes]]></surname>
<given-names><![CDATA[O.]]></given-names>
</name>
<name>
<surname><![CDATA[Rodríguez-Cruz]]></surname>
<given-names><![CDATA[M. E.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[A Comparative Analysis of GDPR and FLPPD: An Approach to the Impact on the Right to Privacy]]></article-title>
<source><![CDATA[Computer l. &amp; Security Rev.]]></source>
<year>2021</year>
</nlm-citation>
</ref>
<ref id="B36">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Hernández-Sánchez]]></surname>
<given-names><![CDATA[J.A.]]></given-names>
</name>
<name>
<surname><![CDATA[Ramírez-De-La-Cruz]]></surname>
<given-names><![CDATA[G.]]></given-names>
</name>
<name>
<surname><![CDATA[Rodríguez-Aguilar]]></surname>
<given-names><![CDATA[R.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Digital Forensics and the Law: A Comparative Analysis of Mexico and the European Union]]></article-title>
<person-group person-group-type="editor">
<name>
<surname><![CDATA[Hernández-Sánchez]]></surname>
<given-names><![CDATA[J.A.]]></given-names>
</name>
<name>
<surname><![CDATA[Ramírez-de-la-Cruz]]></surname>
<given-names><![CDATA[G.]]></given-names>
</name>
</person-group>
<source><![CDATA[Cybersecurity and Digital Forensics: Concepts, Methodologies, Tools, and Applications]]></source>
<year>2021</year>
<publisher-name><![CDATA[IGI Global]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B37">
<nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Holt]]></surname>
<given-names><![CDATA[Thomas J.]]></given-names>
</name>
<name>
<surname><![CDATA[Bossler]]></surname>
<given-names><![CDATA[Adam M.]]></given-names>
</name>
</person-group>
<source><![CDATA[Cybercrime and Digital Criminology: An Introduction]]></source>
<year>2021</year>
</nlm-citation>
</ref>
<ref id="B38">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Holt]]></surname>
<given-names><![CDATA[Thomas J.]]></given-names>
</name>
<name>
<surname><![CDATA[Holt]]></surname>
<given-names><![CDATA[Timothy B.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Examining the Social Organization and Structure of Digital Offending in Hacking Groups]]></article-title>
<source><![CDATA[Deviant Behavior]]></source>
<year>2013</year>
<volume>34</volume>
<numero>1</numero>
<issue>1</issue>
</nlm-citation>
</ref>
<ref id="B39">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Holt]]></surname>
<given-names><![CDATA[Thomas J.]]></given-names>
</name>
<name>
<surname><![CDATA[Holt]]></surname>
<given-names><![CDATA[Lauren E.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[The Increasing Use of Encryption and Other Security Measures to Protect Digital Data]]></article-title>
<source><![CDATA[Journal of Digital Forensics, Security And Law]]></source>
<year>2021</year>
<volume>16</volume>
<page-range>23-44</page-range></nlm-citation>
</ref>
<ref id="B40">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Horton]]></surname>
<given-names><![CDATA[Thomas J.]]></given-names>
</name>
<name>
<surname><![CDATA[Kim-Kwang]]></surname>
</name>
<name>
<surname><![CDATA[Choo]]></surname>
<given-names><![CDATA[Raymond]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Encryption and Digital Forensics: Challenges and Impacts on Investigations]]></article-title>
<source><![CDATA[Journal of Digital Forensics, Security and Law]]></source>
<year>2020</year>
<volume>15</volume>
<page-range>25-40</page-range></nlm-citation>
</ref>
<ref id="B41">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Hubley]]></surname>
<given-names><![CDATA[Hillary]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Bad Speech, Good Evidence: Content Moderation in the Context of Open-Source Investigations]]></article-title>
<source><![CDATA[International Criminal Law Review]]></source>
<year>2022</year>
<page-range>989-1015</page-range></nlm-citation>
</ref>
<ref id="B42">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Humphries]]></surname>
<given-names><![CDATA[J. T.]]></given-names>
</name>
<name>
<surname><![CDATA[Mcmahon]]></surname>
<given-names><![CDATA[C. A.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Digital Evidence Collection and Preservation: A Review of Best Practices]]></article-title>
<source><![CDATA[Journal of Forensic Sciences]]></source>
<year>2022</year>
<volume>67</volume>
<page-range>38-48</page-range></nlm-citation>
</ref>
<ref id="B43">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Humphries]]></surname>
<given-names><![CDATA[Georgina]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Law Enforcement Educational Challenges for Mobile Forensics]]></article-title>
<source><![CDATA[Forensic Sci. Int&#8217;l: Digital Investigation]]></source>
<year>2021</year>
</nlm-citation>
</ref>
<ref id="B44">
<nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Jones]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Smith]]></surname>
<given-names><![CDATA[B.]]></given-names>
</name>
</person-group>
<source><![CDATA[A Guide for Law Enforcement and Prosecutors]]></source>
<year>2020</year>
</nlm-citation>
</ref>
<ref id="B45">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Kamal]]></surname>
<given-names><![CDATA[Ahmed]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[A Survey of Challenges Facing Digital Forensics Experts and Legal Systems in Keeping Up with the Latest Developments]]></article-title>
<source><![CDATA[International Journal of Digital Crime and Forensics]]></source>
<year>2020</year>
<volume>12</volume>
<numero>2</numero>
<issue>2</issue>
</nlm-citation>
</ref>
<ref id="B46">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Kang]]></surname>
<given-names><![CDATA[Min-Seok]]></given-names>
</name>
<name>
<surname><![CDATA[Park]]></surname>
<given-names><![CDATA[Jong-Hyouk]]></given-names>
</name>
<name>
<surname><![CDATA[Lee]]></surname>
<given-names><![CDATA[Sang-Ho]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Long Delays in Digital Evidence Analysis and Its Impact on Investigations]]></article-title>
<source><![CDATA[Journal of Digital Forensics, Security and Law]]></source>
<year>2021</year>
<volume>16</volume>
<page-range>45-56</page-range></nlm-citation>
</ref>
<ref id="B47">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Kerr]]></surname>
<given-names><![CDATA[Orin S.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[The Rules of Evidence in the Digital Age]]></article-title>
<source><![CDATA[Harvard Law Review]]></source>
<year>2021</year>
<volume>135</volume>
<page-range>1652-71</page-range></nlm-citation>
</ref>
<ref id="B48">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Kerr]]></surname>
<given-names><![CDATA[Orin S.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[The Curious History of Fourth Amendment Searches]]></article-title>
<source><![CDATA[Texas Law Review]]></source>
<year>2020</year>
<volume>98</volume>
</nlm-citation>
</ref>
<ref id="B49">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Koops]]></surname>
<given-names><![CDATA[Bert-Jaap]]></given-names>
</name>
<name>
<surname><![CDATA[Leenes]]></surname>
<given-names><![CDATA[Ronald]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Privacy, Data Protection, and Cybersecurity in Europe]]></article-title>
<source><![CDATA[Computer Law &amp; Security Review]]></source>
<year>2017</year>
<volume>33</volume>
<page-range>163-75</page-range></nlm-citation>
</ref>
<ref id="B50">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Keith Munoz]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
<name>
<surname><![CDATA[Sanders]]></surname>
<given-names><![CDATA[Robert H.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Digital Forensics: The Challenges of Operating in a Digital Landscape]]></article-title>
<source><![CDATA[Digital Evidence and Electronic Signature Law Review]]></source>
<year>2022</year>
</nlm-citation>
</ref>
<ref id="B51">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Kim]]></surname>
<given-names><![CDATA[Minsoo]]></given-names>
</name>
<name>
<surname><![CDATA[Lee]]></surname>
<given-names><![CDATA[Jae-Gil]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Development Of A Digital Forensic Investigation Process Model For Cybercrime: Focusing On Digital Evidence Collection And Preservation]]></article-title>
<source><![CDATA[Sustainability]]></source>
<year>2021</year>
<volume>13</volume>
<numero>15</numero>
<issue>15</issue>
</nlm-citation>
</ref>
<ref id="B52">
<nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Kirmani]]></surname>
<given-names><![CDATA[Mariya Shafat]]></given-names>
</name>
<name>
<surname><![CDATA[Banday]]></surname>
<given-names><![CDATA[Mohammad Tariq]]></given-names>
</name>
</person-group>
<source><![CDATA[Digital Forensics in the Context of the Internet of Things]]></source>
<year>2019</year>
<page-range>1-25</page-range></nlm-citation>
</ref>
<ref id="B53">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Kounelis]]></surname>
<given-names><![CDATA[Ilias]]></given-names>
</name>
<name>
<surname><![CDATA[Evangelatos]]></surname>
<given-names><![CDATA[Orestis]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Digital Forensic Investigation Process: Challenges and Solutions]]></article-title>
<source><![CDATA[International Journal of Advanced Computer Science and Applications]]></source>
<year>2022</year>
<volume>13</volume>
<page-range>74-9</page-range></nlm-citation>
</ref>
<ref id="B54">
<nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Kshetri]]></surname>
<given-names><![CDATA[Nir]]></given-names>
</name>
</person-group>
<source><![CDATA[Cybercrime and Cyber-Security: A Holistic Approach to Cybercrime Investigation and Prevention]]></source>
<year>2022</year>
<volume>58</volume>
</nlm-citation>
</ref>
<ref id="B55">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Lallie]]></surname>
<given-names><![CDATA[Harjinder S]]></given-names>
</name>
<name>
<surname><![CDATA[Pimlott]]></surname>
<given-names><![CDATA[Lee]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Applying the ACPO Principles in Public Cloud Forensic Investigations]]></article-title>
<source><![CDATA[Journal of Digital Forensics, Security and Law]]></source>
<year>2012</year>
<page-range>71-86</page-range></nlm-citation>
</ref>
<ref id="B56">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Lee]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Cybercrime and digital evidence: Challenges for the Legal Framework]]></article-title>
<source><![CDATA[Computer Law &amp; Security Review]]></source>
<year>2022</year>
<volume>42</volume>
</nlm-citation>
</ref>
<ref id="B57">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Lee]]></surname>
<given-names><![CDATA[Hyunho]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Cloud Forensics: Emerging Challenges and Opportunities]]></article-title>
<source><![CDATA[Journal of Digital Forensics, Security and Law]]></source>
<year>2021</year>
<volume>16</volume>
<page-range>65-78</page-range></nlm-citation>
</ref>
<ref id="B58">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Leswing]]></surname>
<given-names><![CDATA[Kif]]></given-names>
</name>
</person-group>
<source><![CDATA[Former Apple Engineer Accused of Stealing Automotive Trade Secrets Pleads Guilty]]></source>
<year>2022</year>
<publisher-name><![CDATA[CNBC]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B59">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Lillis]]></surname>
<given-names><![CDATA[David]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Current Challenges and F Ent Challenges and Future Resear E Research Areas for Digital Eas for Digital Forensic Investigation]]></article-title>
<source><![CDATA[Annual ADFSL Conference on Digital Forensics, Security and Law]]></source>
<year>2016</year>
<page-range>9-20</page-range></nlm-citation>
</ref>
<ref id="B60">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Lone]]></surname>
<given-names><![CDATA[Auqib Hamid]]></given-names>
</name>
<name>
<surname><![CDATA[Naaz Mir]]></surname>
<given-names><![CDATA[Roohie]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Forensic-Chain: Blockchain Based Digital Forensics Chain of Custody With PoC in Hyperledger Composer]]></article-title>
<source><![CDATA[Digital Investigation]]></source>
<year>2019</year>
<page-range>44-55</page-range></nlm-citation>
</ref>
<ref id="B61">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Mishra]]></surname>
<given-names><![CDATA[Alok]]></given-names>
</name>
<name>
<surname><![CDATA[Alzoubi]]></surname>
<given-names><![CDATA[Yehia Ibrahim]]></given-names>
</name>
<name>
<surname><![CDATA[Anwar]]></surname>
<given-names><![CDATA[Memoona Javeria]]></given-names>
</name>
<name>
<surname><![CDATA[Gill]]></surname>
<given-names><![CDATA[Asif Qumer]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Attributes Impacting Cybersecurity Policy Development: An Evidence from Seven Nations]]></article-title>
<source><![CDATA[Computers &amp; Security]]></source>
<year>2022</year>
</nlm-citation>
</ref>
<ref id="B62">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Miller]]></surname>
<given-names><![CDATA[Christa M]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[A Survey of Prosecutors and Investigators Using Digital Evidence: A Starting Point]]></article-title>
<source><![CDATA[Forensic Sci Int Synerg]]></source>
<year>2023</year>
</nlm-citation>
</ref>
<ref id="B63">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Ming]]></surname>
<given-names><![CDATA[Susan]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[The Council of Europe&#8217;s Convention on Cybercrime: a Comprehensive Legal Framework for Addressing Cybercrime and Digital Evidence in Criminal Investigations]]></article-title>
<source><![CDATA[Journal of Internet Law]]></source>
<year>2021</year>
<volume>24</volume>
<page-range>1-8</page-range></nlm-citation>
</ref>
<ref id="B64">
<nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Morrison]]></surname>
<given-names><![CDATA[Andrew]]></given-names>
</name>
<name>
<surname><![CDATA[Ellsberg]]></surname>
<given-names><![CDATA[Mary]]></given-names>
</name>
<name>
<surname><![CDATA[Bott]]></surname>
<given-names><![CDATA[Sarah]]></given-names>
</name>
</person-group>
<source><![CDATA[Addressing Gender-Based Violence in the Latin American and Caribbean Region: A Critical Review of Interventions]]></source>
<year>2004</year>
</nlm-citation>
</ref>
<ref id="B65">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Mohammed]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Palacios]]></surname>
<given-names><![CDATA[R.]]></given-names>
</name>
<name>
<surname><![CDATA[Ramírez-De-La-Cruz]]></surname>
<given-names><![CDATA[G.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Cross-Border Digital Forensics: Challenges and Opportunities for Law Enforcement Cooperation Between Mexico and The European Union]]></article-title>
<person-group person-group-type="editor">
<name>
<surname><![CDATA[Hernández-Sánchez]]></surname>
<given-names><![CDATA[J.A.]]></given-names>
</name>
<name>
<surname><![CDATA[Ramírez-de-la-Cruz]]></surname>
<given-names><![CDATA[G.]]></given-names>
</name>
</person-group>
<source><![CDATA[Cybersecurity and Digital Forensics: Concepts, Methodologies, Tools, and Applications]]></source>
<year>2021</year>
<publisher-name><![CDATA[IGI Global]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B66">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Munoz]]></surname>
<given-names><![CDATA[Claudia]]></given-names>
</name>
<name>
<surname><![CDATA[Sanders]]></surname>
<given-names><![CDATA[Michael]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[The Role of Digital Forensics in Modern Criminal Investigations, Particularly Those Involving Cybercrime]]></article-title>
<source><![CDATA[Journal of Cyber-Security]]></source>
<year>2022</year>
<volume>7</volume>
<page-range>1-18</page-range></nlm-citation>
</ref>
<ref id="B67">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Novak]]></surname>
<given-names><![CDATA[Martin]]></given-names>
</name>
</person-group>
<source><![CDATA[Improving the Collection of Digital Evidence]]></source>
<year>2021</year>
<publisher-name><![CDATA[NIJ National Institute of Justice]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B68">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Nwokedi]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
<name>
<surname><![CDATA[Kessler]]></surname>
<given-names><![CDATA[G. C.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Digital Forensics: A Critical Shortage of Qualified Examiners]]></article-title>
<source><![CDATA[J. Forensic Sci]]></source>
<year>2022</year>
<volume>266</volume>
</nlm-citation>
</ref>
<ref id="B69">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Palmiotto]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Unsworth]]></surname>
<given-names><![CDATA[C.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Digital Evidence Collection and Use: An Overview of Best Practices, Policies and Procedures]]></article-title>
<source><![CDATA[FBI Law Enforcement Bulletin]]></source>
<year>2021</year>
<volume>90</volume>
<page-range>2-9</page-range></nlm-citation>
</ref>
<ref id="B70">
<nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Pardo]]></surname>
<given-names><![CDATA[P.]]></given-names>
</name>
<name>
<surname><![CDATA[Kierkegaard]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
</person-group>
<source><![CDATA[Cybercrime laws in Mexico and the European Union. Computer Law &amp; Security Review]]></source>
<year>2022</year>
<volume>41</volume>
</nlm-citation>
</ref>
<ref id="B71">
<nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Painter]]></surname>
<given-names><![CDATA[Joseph Daniel]]></given-names>
</name>
</person-group>
<source><![CDATA[A Computer Forensic Response to Hard Drive Encryption]]></source>
<year>2008</year>
</nlm-citation>
</ref>
<ref id="B72">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Poulin]]></surname>
<given-names><![CDATA[Yanick]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Machine Learning for Digital Forensics: An Exploratory Study]]></article-title>
<source><![CDATA[Journal of Digital Forensics, Security and Law]]></source>
<year>2019</year>
<volume>14</volume>
<page-range>7-20</page-range></nlm-citation>
</ref>
<ref id="B73">
<nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Pollitt]]></surname>
<given-names><![CDATA[David]]></given-names>
</name>
</person-group>
<source><![CDATA[Cybercrime and Digital Evidence: Materials and Cases]]></source>
<year>2022</year>
<edition>2</edition>
</nlm-citation>
</ref>
<ref id="B74">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Pulijala]]></surname>
<given-names><![CDATA[Yashaswi]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Internet of Things Forensics: A Comprehensive Survey]]></article-title>
<source><![CDATA[Journal of Network and Computer Applications]]></source>
<year>2021</year>
<volume>18</volume>
</nlm-citation>
</ref>
<ref id="B75">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Quick]]></surname>
<given-names><![CDATA[Darren]]></given-names>
</name>
<name>
<surname><![CDATA[Choo]]></surname>
<given-names><![CDATA[Kim-Kwang Raymond]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Data Reduction and Data Mining Framework for Digital Forensic Evidence: Storage, Intelligence, Review and Archive]]></article-title>
<source><![CDATA[Trends &amp; Issues in Crime and Criminal Justice]]></source>
<year>2014</year>
<page-range>3-9</page-range></nlm-citation>
</ref>
<ref id="B76">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Quick]]></surname>
<given-names><![CDATA[Reena]]></given-names>
</name>
<name>
<surname><![CDATA[Choo]]></surname>
<given-names><![CDATA[Kim-Kwang Raymond]]></given-names>
</name>
</person-group>
<source><![CDATA[Cybercrime: The Investigation, Prosecution and Defense of a Computer-Related Crime]]></source>
<year>2020</year>
<publisher-name><![CDATA[Routledge]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B77">
<nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Quick]]></surname>
<given-names><![CDATA[R.]]></given-names>
</name>
<name>
<surname><![CDATA[Choo]]></surname>
<given-names><![CDATA[K.-K. R.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Digital Forensic Evidence: Challenges and Emerging Issues]]></article-title>
<source><![CDATA[Handbook of Digital Forensics and Investigation]]></source>
<year>2021</year>
<page-range>13-29</page-range></nlm-citation>
</ref>
<ref id="B78">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Raymond Choo]]></surname>
<given-names><![CDATA[Kim-Kwang]]></given-names>
</name>
<name>
<surname><![CDATA[Smith]]></surname>
<given-names><![CDATA[Robyn]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Understanding the Risk of Cybercrime: Lessons from a Study of Victimisation and Loss]]></article-title>
<source><![CDATA[Australian &amp; New Zealand Journal of Criminology]]></source>
<year>2019</year>
<volume>22</volume>
<numero>3</numero>
<issue>3</issue>
</nlm-citation>
</ref>
<ref id="B79">
<nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Ramírez-De-La-Cruz]]></surname>
<given-names><![CDATA[G.]]></given-names>
</name>
<name>
<surname><![CDATA[Rodríguez-Aguilar]]></surname>
<given-names><![CDATA[R.]]></given-names>
</name>
<name>
<surname><![CDATA[Palacios]]></surname>
<given-names><![CDATA[R.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Strengthening Cybersecurity And Data Protection In Mexico: Recent Advances And Remaining Challenges]]></article-title>
<person-group person-group-type="editor">
<name>
<surname><![CDATA[Gutwirth]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Leenes]]></surname>
<given-names><![CDATA[R.]]></given-names>
</name>
<name>
<surname><![CDATA[Hert]]></surname>
<given-names><![CDATA[P. De]]></given-names>
</name>
</person-group>
<source><![CDATA[Data Protection and Privacy: The Age of Intelligent Machines]]></source>
<year>2021</year>
</nlm-citation>
</ref>
<ref id="B80">
<nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Rahayu]]></surname>
<given-names><![CDATA[T. C.]]></given-names>
</name>
<name>
<surname><![CDATA[Mawengkang]]></surname>
<given-names><![CDATA[H.]]></given-names>
</name>
<name>
<surname><![CDATA[Sulistyono]]></surname>
<given-names><![CDATA[A. D.]]></given-names>
</name>
</person-group>
<source><![CDATA[Standardization of digital forensics practices and procedures: A Literature Review, International Seminar on Intelligent Technology and its Applications]]></source>
<year>2021</year>
<page-range>125-30</page-range></nlm-citation>
</ref>
<ref id="B81">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Rivera]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Jurisdiction in Cybercrime Cases: A Comparative Analysis Between the European Union And Mexico]]></article-title>
<source><![CDATA[Digital Evidence and Electronic Signature Law Review]]></source>
<year>2021</year>
<volume>18</volume>
<page-range>1-10</page-range></nlm-citation>
</ref>
<ref id="B82">
<nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Reith]]></surname>
<given-names><![CDATA[Matthias]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Digital Forensics: The Need For Standardization]]></article-title>
<person-group person-group-type="editor">
<name>
<surname><![CDATA[Baxter]]></surname>
<given-names><![CDATA[Bruce J. C.]]></given-names>
</name>
<name>
<surname><![CDATA[Stigall]]></surname>
<given-names><![CDATA[Elisabeth R.]]></given-names>
</name>
</person-group>
<source><![CDATA[Cybercrime and the Darknet]]></source>
<year>2022</year>
<page-range>169-82</page-range></nlm-citation>
</ref>
<ref id="B83">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Rosenbach]]></surname>
<given-names><![CDATA[Eric]]></given-names>
</name>
<name>
<surname><![CDATA[Sulmeyer]]></surname>
<given-names><![CDATA[Michael]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[The Balance Between Privacy Rights and Investigative Needs in the Context of Encryption]]></article-title>
<source><![CDATA[Harvard National Security Journal]]></source>
<year>2022</year>
<volume>13</volume>
<page-range>1-22</page-range></nlm-citation>
</ref>
<ref id="B84">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Brayne]]></surname>
<given-names><![CDATA[Sarah]]></given-names>
</name>
<name>
<surname><![CDATA[Martin]]></surname>
<given-names><![CDATA[Kneale]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Policing Cybercrime: A Collaborative Approach]]></article-title>
<source><![CDATA[Handbook of Cybercrime]]></source>
<year>2021</year>
<page-range>99-117</page-range><publisher-name><![CDATA[Mathieu Deflem, Wiley-Blackwell]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B85">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Sahito]]></surname>
<given-names><![CDATA[Naeem]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Cybercrime: Types, Trends, Challenges and Impact on Society]]></article-title>
<source><![CDATA[International Journal of Cyber Criminology]]></source>
<year>2018</year>
<volume>12</volume>
<numero>1</numero>
<issue>1</issue>
</nlm-citation>
</ref>
<ref id="B86">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Sahito]]></surname>
<given-names><![CDATA[Farhan Ahmed]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Challenges and Future Directions of Digital Forensic Investigation]]></article-title>
<source><![CDATA[IEEE access]]></source>
<year>2022</year>
<volume>10</volume>
<page-range>12568-87</page-range></nlm-citation>
</ref>
<ref id="B87">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Sallmen]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Kukka]]></surname>
<given-names><![CDATA[H.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Preserving Digital Evidence: Specialized Tools And Techniques]]></article-title>
<source><![CDATA[J. Digital Forensics Secl.]]></source>
<year>2021</year>
<volume>83</volume>
</nlm-citation>
</ref>
<ref id="B88">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Sandoval-Almazan]]></surname>
<given-names><![CDATA[R.]]></given-names>
</name>
<name>
<surname><![CDATA[Gil-Garcia]]></surname>
<given-names><![CDATA[J. R.]]></given-names>
</name>
<name>
<surname><![CDATA[Luna-Reyes]]></surname>
<given-names><![CDATA[L. F.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Cybersecurity Regulations in Mexico: A Comparative Analysis with the European Union]]></article-title>
<source><![CDATA[Proceedings of the 22nd Annual International Conference on Digital Government Research]]></source>
<year>2021</year>
<page-range>1-10</page-range><publisher-name><![CDATA[ACM]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B89">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Sanchez]]></surname>
<given-names><![CDATA[J. A.]]></given-names>
</name>
<name>
<surname><![CDATA[Marti]]></surname>
<given-names><![CDATA[L.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Comparative Analysis of Cybercrime Units In Mexico and The European Union]]></article-title>
<person-group person-group-type="editor">
<name>
<surname><![CDATA[Hernández-Sánchez]]></surname>
<given-names><![CDATA[J.A.]]></given-names>
</name>
<name>
<surname><![CDATA[Ramírez-de-la-Cruz]]></surname>
<given-names><![CDATA[G.]]></given-names>
</name>
</person-group>
<source><![CDATA[Cybersecurity and Digital Forensics: Concepts, Methodologies, Tools, and Applications]]></source>
<year>2021</year>
<publisher-name><![CDATA[IGI Global]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B90">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Sangpetch]]></surname>
<given-names><![CDATA[Anchalee]]></given-names>
</name>
<name>
<surname><![CDATA[Chomsiri]]></surname>
<given-names><![CDATA[Thawatchai]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[The Challenges of Admissibility of Digital Evidence in Court]]></article-title>
<source><![CDATA[International Journal of Cyber Criminology]]></source>
<year>2021</year>
<volume>15</volume>
<page-range>67-85</page-range></nlm-citation>
</ref>
<ref id="B91">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Singh]]></surname>
<given-names><![CDATA[Samayveer]]></given-names>
</name>
<name>
<surname><![CDATA[Jung]]></surname>
<given-names><![CDATA[Ki-Hyun]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Special Issue on Emerging Technologies for Information Hiding and Forensics in Multimedia Systems]]></article-title>
<source><![CDATA[Multimedia Tools and Applications]]></source>
<year>2022</year>
</nlm-citation>
</ref>
<ref id="B92">
<nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Stephen]]></surname>
<given-names><![CDATA[Mason]]></given-names>
</name>
<name>
<surname><![CDATA[Seng]]></surname>
<given-names><![CDATA[Daniel]]></given-names>
</name>
</person-group>
<source><![CDATA[Electronic Evidence]]></source>
<year>2017</year>
<edition>4</edition>
</nlm-citation>
</ref>
<ref id="B93">
<nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Smith]]></surname>
<given-names><![CDATA[B.]]></given-names>
</name>
<name>
<surname><![CDATA[Jones]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
</person-group>
<source><![CDATA[Best Practices for Digital Forensics]]></source>
<year>2018</year>
</nlm-citation>
</ref>
<ref id="B94">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Sremack]]></surname>
<given-names><![CDATA[Joseph C]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[The Gap Between Theory and Practice in Digital Forensics]]></article-title>
<source><![CDATA[Conference on Digital Forensics, Security and Law]]></source>
<year>2007</year>
<page-range>85-94</page-range></nlm-citation>
</ref>
<ref id="B95">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Stoykova]]></surname>
<given-names><![CDATA[Radina]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Digital Evidence: Unaddressed Threats to Fairness and the Presumption of Innocence]]></article-title>
<source><![CDATA[Computer Law &amp; Security Review]]></source>
<year>2021</year>
</nlm-citation>
</ref>
<ref id="B96">
<nlm-citation citation-type="book">
<collab>The NATO Stratcom Centre of Excellence</collab>
<source><![CDATA[Analysis of Russia&#8217;s Information Campaign Against Ukraine Examining Non-Military Aspects of the Crisis in Ukraine From a Strategic Communications Perspectives]]></source>
<year>2014</year>
<publisher-name><![CDATA[Stratcom]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B97">
<nlm-citation citation-type="book">
<collab>United Nations Office on Drugs and Crime</collab>
<source><![CDATA[The Challenge of Cybercrime: Strategies for Enhancing the Global Response]]></source>
<year>2020</year>
<publisher-name><![CDATA[United Nations]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B98">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Vahid]]></surname>
<given-names><![CDATA[Alireza]]></given-names>
</name>
<name>
<surname><![CDATA[Dehghantanha]]></surname>
<given-names><![CDATA[Ali]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[The Challenges and Gaps in Digital Forensics and Legal Frameworks for Handling Digital Evidence]]></article-title>
<source><![CDATA[Journal of Forensic Sciences and Criminal Investigation]]></source>
<year>2022</year>
<volume>1</volume>
<page-range>1-10</page-range></nlm-citation>
</ref>
<ref id="B99">
<nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Vidas]]></surname>
<given-names><![CDATA[Timothy]]></given-names>
</name>
</person-group>
<source><![CDATA[Challenges in Mobile Device Forensics. National institute of standards and technology (NIST) special publication]]></source>
<year>2019</year>
</nlm-citation>
</ref>
<ref id="B100">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Vishwanath]]></surname>
<given-names><![CDATA[Aparna]]></given-names>
</name>
<name>
<surname><![CDATA[Vishwanath]]></surname>
<given-names><![CDATA[Varun]]></given-names>
</name>
<name>
<surname><![CDATA[Cao]]></surname>
<given-names><![CDATA[Jian]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Digital Forensics in Crypto-currency Investigations: Challenges and Opportunities]]></article-title>
<source><![CDATA[Digital Investigation]]></source>
<year>2021</year>
<volume>38</volume>
</nlm-citation>
</ref>
<ref id="B101">
<nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Wall]]></surname>
<given-names><![CDATA[William E.]]></given-names>
</name>
</person-group>
<source><![CDATA[Cybercrime: The Investigation, Prosecution and Defense of a Computer-Related Crime]]></source>
<year>2021</year>
<volume>45</volume>
<edition>2</edition>
</nlm-citation>
</ref>
<ref id="B102">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Wang]]></surname>
<given-names><![CDATA[Ke]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Analyzing the Adoption Challenges of the Internet of Things (IOT) and Artificial Intelligence (AI) for Smart Cities in China]]></article-title>
<source><![CDATA[Sustainability]]></source>
<year>2021</year>
</nlm-citation>
</ref>
<ref id="B103">
<nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Watkins]]></surname>
<given-names><![CDATA[D]]></given-names>
</name>
<name>
<surname><![CDATA[Burton]]></surname>
<given-names><![CDATA[M]]></given-names>
</name>
</person-group>
<source><![CDATA[Research Methods in Law]]></source>
<year>2013</year>
</nlm-citation>
</ref>
<ref id="B104">
<nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Wolfe]]></surname>
<given-names><![CDATA[Caryn R.]]></given-names>
</name>
<name>
<surname><![CDATA[Lynch]]></surname>
<given-names><![CDATA[Kenneth J.]]></given-names>
</name>
<name>
<surname><![CDATA[Conklin]]></surname>
<given-names><![CDATA[William A.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Cybercrime And Digital Evidence: Addressing The Challenges Of Investigating And Prosecuting Cybercrime]]></article-title>
<person-group person-group-type="editor">
<name>
<surname><![CDATA[Kanade]]></surname>
<given-names><![CDATA[Pradeep]]></given-names>
</name>
<name>
<surname><![CDATA[Chaki]]></surname>
<given-names><![CDATA[Raghvendra Kumar]]></given-names>
</name>
<name>
<surname><![CDATA[Nag]]></surname>
<given-names><![CDATA[Ajith Abraham]]></given-names>
</name>
</person-group>
<source><![CDATA[Handbook of Research on Cyber Forensics and Information Security]]></source>
<year>2022</year>
<page-range>1-16</page-range></nlm-citation>
</ref>
<ref id="B105">
<nlm-citation citation-type="">
<collab>World Economic Forum</collab>
<source><![CDATA[Building Block-Chains for a Better Planet: How Technology Can Help Tackle Environmental Challenges]]></source>
<year>2019</year>
</nlm-citation>
</ref>
<ref id="B106">
<nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Zafar Yaqub]]></surname>
<given-names><![CDATA[Muhammad]]></given-names>
</name>
<name>
<surname><![CDATA[Alsabban]]></surname>
<given-names><![CDATA[Abdullah]]></given-names>
</name>
</person-group>
<source><![CDATA[Industry-4.0-Enabled Digital Transformation: Prospects, Instruments, Challenges, and Implications for Business Strategies. Sustainability]]></source>
<year>2023</year>
</nlm-citation>
</ref>
<ref id="B107">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Zheng]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Yang]]></surname>
<given-names><![CDATA[C.]]></given-names>
</name>
<name>
<surname><![CDATA[Hu]]></surname>
<given-names><![CDATA[C.]]></given-names>
</name>
<name>
<surname><![CDATA[Liu]]></surname>
<given-names><![CDATA[X.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Legal Framework and Practice for Digital Evidence in China]]></article-title>
<source><![CDATA[Digital Evidence and Electronic Signature Law Review]]></source>
<year>2021</year>
<volume>18</volume>
<page-range>1-10</page-range></nlm-citation>
</ref>
</ref-list>
</back>
</article>
