{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T00:00:18Z","timestamp":1725494418471},"publisher-location":"Boston, MA","reference-count":11,"publisher":"Springer US","isbn-type":[{"type":"print","value":"9780387723662"},{"type":"electronic","value":"9780387723679"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2007]]},"DOI":"10.1007\/978-0-387-72367-9_41","type":"book-chapter","created":{"date-parts":[[2007,11,9]],"date-time":"2007-11-09T18:12:08Z","timestamp":1194631928000},"page":"461-466","source":"Crossref","is-referenced-by-count":0,"title":["Hard-drive Disposal and Identity Fraud"],"prefix":"10.1007","author":[{"given":"Paula","family":"Thomas","sequence":"first","affiliation":[]},{"given":"Theodore","family":"Tryfonas","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"41_CR1","unstructured":"Tryfonas T., Thomas P., Owen P. (2006), \u201cID Theft: Fraudsters\u2019 techniques for Personal Data Collection, the Related digital Evidence and Investigation Issues\u201d, Information Systems Control Journal, (JOnline) Vol. 1."},{"key":"41_CR2","unstructured":"Federal Trade Commission (2003), Fair and Accurate Credit Transactions Act of 2003 Revision, http:\/\/www.ftc.gov\/os\/2004\/10\/041029idtheftdefsfrsm.pdf"},{"key":"41_CR3","unstructured":"Leyden, J., \u201cOops! Firm accidentally eBays customer database\u201d, The Register, 7 June 2004."},{"key":"41_CR4","doi-asserted-by":"crossref","unstructured":"Jones A., Mee V., Meyler C, Gooch J., \u201cAnalysis of Data Recovered from Computer Disks released for Resale by Organisations\u201d, Journal of Information Warfare, 2005.","DOI":"10.1016\/S1361-3723(05)70273-6"},{"key":"41_CR5","doi-asserted-by":"crossref","unstructured":"Jones A., Valli C, Sutherland I., Thomas P. (2006), \u201cAn Analysis of Information Remaining on Disks offered for sale on the second hand market\u201c, Journal of Digital Security, Forensics & Law, Vol. 1 No 3.","DOI":"10.15394\/jdfsl.2006.1008"},{"key":"41_CR6","unstructured":"Windows Forensic Toolchest, freeware tool available for download at http:\/\/www.foolmoon.net\/security\/wft (last accessed January 2007)."},{"key":"41_CR7","doi-asserted-by":"crossref","unstructured":"Fragkos, G., et al. (2006), \u201cAn empirical methodology derived from the analysis of information remaining on second hand hard disks\u201d, in Blyth, A., Sutherland, I., WDFIA 2006, Proceedings of the First Workshop in Digital Forensics and Incident Analysis.","DOI":"10.1007\/978-1-84628-750-3_10"},{"issue":"2","key":"41_CR8","doi-asserted-by":"crossref","first-page":"128","DOI":"10.1016\/j.clsr.2005.02.004","volume":"2005","author":"A.M. Marshall","year":"2005","unstructured":"Marshall, A.M. and Tompsett, B.C. (2005), \u201cIdentity theft in an online world\u201d, Computer Law & Security Report, Vol. 2005, Issue 2, Page 128\u2013137.","journal-title":"Computer Law & Security Report"},{"key":"41_CR9","doi-asserted-by":"crossref","unstructured":"Garfinkel, S.L., Shelat A., \u201cRemembrance of Data Passed: A Study of Disk Sanitization Practices\u201d, IEEE Security & Privacy, Vol. 1, No 1, 2003.","DOI":"10.1109\/MSECP.2003.1176992"},{"key":"41_CR10","volume-title":"Proceedings of 2nd Australian Computer, Information and Network Forensics Conference","author":"C. Valli","year":"2004","unstructured":"Valli, C. (2004), \u201cThrowing out the Enterprise with the Hard Disk\u201d, In Proceedings of 2nd Australian Computer, Information and Network Forensics Conference, We-BCentre.COM, Fremantle Western Australia."},{"key":"41_CR11","unstructured":"Department for Trade and Industry, on-line (latest accessed 20-01-2007) http:\/\/www.dti.gov.uk\/innovation\/sustainability\/weee\/page30269.html ."}],"container-title":["IFIP International Federation for Information Processing","New Approaches for Security, Privacy and Trust in Complex Environments"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-0-387-72367-9_41","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,4]],"date-time":"2019-05-04T04:58:18Z","timestamp":1556945898000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-0-387-72367-9_41"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2007]]},"ISBN":["9780387723662","9780387723679"],"references-count":11,"URL":"https:\/\/doi.org\/10.1007\/978-0-387-72367-9_41","relation":{},"ISSN":["1571-5736"],"issn-type":[{"type":"print","value":"1571-5736"}],"subject":[],"published":{"date-parts":[[2007]]}}}