{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T12:10:30Z","timestamp":1725538230243},"publisher-location":"Berlin, Heidelberg","reference-count":25,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642041549"},{"type":"electronic","value":"9783642041556"}],"license":[{"start":{"date-parts":[[2009,1,1]],"date-time":"2009-01-01T00:00:00Z","timestamp":1230768000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009]]},"DOI":"10.1007\/978-3-642-04155-6_19","type":"book-chapter","created":{"date-parts":[[2009,9,29]],"date-time":"2009-09-29T12:04:42Z","timestamp":1254225882000},"page":"255-266","source":"Crossref","is-referenced-by-count":1,"title":["Assessing the Legal Risks in Network Forensic Probing"],"prefix":"10.1007","author":[{"given":"Michael","family":"Losavio","sequence":"first","affiliation":[]},{"given":"Olfa","family":"Nasraoui","sequence":"additional","affiliation":[]},{"given":"Vincent","family":"Thacker","sequence":"additional","affiliation":[]},{"given":"Jeff","family":"Marean","sequence":"additional","affiliation":[]},{"given":"Nick","family":"Miles","sequence":"additional","affiliation":[]},{"given":"Roman","family":"Yampolskiy","sequence":"additional","affiliation":[]},{"given":"Ibrahim","family":"Imam","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"19_CR1","unstructured":"Associated Press, Singapore teen faces 3 years\u2019 jail for tapping into another\u2019s wireless Internet, International Herald Tribune, November 10, 2006."},{"issue":"5","key":"19_CR2","first-page":"1123","volume":"67","author":"M. Bierlein","year":"2006","unstructured":"M. Bierlein, Policing the wireless world: Access liability in the open Wi-Fi era, Ohio State Law Journal, vol. 67(5), pp. 1123\u20131186, 2006.","journal-title":"Ohio State Law Journal"},{"key":"19_CR3","volume-title":"Privacy Protection and Computer Forensics","author":"M. Caloyannides","year":"2004","unstructured":"M. Caloyannides, Privacy Protection and Computer Forensics, Artech House, Norwood, Massachusetts, 2004."},{"key":"19_CR4","unstructured":"Clip2 Distributed Search Services, The Gnutella Protocol Specification v0.4 (Document Revision 1.2) (www9.limewire.com\/developer \/gnutella_protocol_0.4.pdf), 2001."},{"key":"19_CR5","unstructured":"Council of Europe, Convention on Cybercrime, Strasbourg, France (conventions.coe.int\/Treaty\/en\/Treaties\/Html\/185.htm), 2001."},{"key":"19_CR6","unstructured":"M. Godwin, Some \u201cproperty\u201d problems in a computer crime prosecution, Electronic Frontier Foundation, San Francisco, California (www.textfiles.com\/law\/cardozo.txt), 1992."},{"key":"19_CR7","first-page":"543","volume":"21","author":"R. Hale","year":"2005","unstructured":"R. Hale, Wi-Fi liability: Potential legal risks in accessing and operating wireless Internet, Santa Clara Computer and High Technology Law Journal, vol. 21, pp. 543\u2013559, 2005.","journal-title":"Santa Clara Computer and High Technology Law Journal"},{"issue":"5","key":"19_CR8","first-page":"1596","volume":"78","author":"O. Kerr","year":"2003","unstructured":"O. Kerr, Cybercrime\u2019s scope: Interpreting \u201caccess\u201d and \u201cauthorization\u201d in computer misuse statutes, NYU Law Review, vol. 78(5), pp. 1596\u20131668, 2003.","journal-title":"NYU Law Review"},{"issue":"1","key":"19_CR9","doi-asserted-by":"publisher","first-page":"237","DOI":"10.1016\/j.ipm.2004.08.011","volume":"42","author":"S. Kwok","year":"2006","unstructured":"S. Kwok, P2P searching trends: 2002-2004, Information Processing and Management, vol. 42(1), pp. 237\u2013247, 2006.","journal-title":"Information Processing and Management"},{"key":"19_CR10","unstructured":"A. Leary, Wi-Fi cloaks a new breed of intruder, St. Petersburg Times, July 4, 2005."},{"key":"19_CR11","doi-asserted-by":"crossref","unstructured":"M. Losavio, The law of possession of digital objects: Dominion and control issues for digital forensic investigations and prosecutions, Proceedings of the First International Workshop on Systematic Approaches to Digital Forensic Engineering, pp. 177\u2013183, 2005.","DOI":"10.1109\/SADFE.2005.25"},{"key":"19_CR12","unstructured":"M. Madison, Rights of access and the shape of the Internet, Boston College Law Review, pp. 433\u2013507, 2003."},{"key":"19_CR13","doi-asserted-by":"crossref","unstructured":"O. Nasraoui, D. Keeling, A. Elmaghraby, G. Higgins and M. Losavio, Node-based probing and monitoring to investigate the use of peer-to-peer technologies for the distribution of contraband material, Proceedings of the Third International Workshop on Systematic Approaches to Digital Forensic Engineering, pp. 135\u2013140, 2008.","DOI":"10.1109\/SADFE.2008.16"},{"issue":"1","key":"19_CR14","doi-asserted-by":"publisher","first-page":"50","DOI":"10.1109\/4236.978369","volume":"6","author":"M. Ripeanu","year":"2002","unstructured":"M. Ripeanu, A. Iamnitchi and I. Foster, Mapping the Gnutella network, IEEE Internet Computing, vol. 6(1), pp. 50\u201357, 2002.","journal-title":"IEEE Internet Computing"},{"key":"19_CR15","unstructured":"S. Schjolberg, The legal framework \u2013 Unauthorized access to computer systems, Penal legislation in 44 countries, Moss District Court, Moss, Norway (www.mosstingrett.no\/info\/legal.html), 2003."},{"key":"19_CR16","unstructured":"S. Sharma, L. Nguyen and D. Jia, IR-Wire: A research tool for P2P information retrieval, Proceedings of the Second Workshop on Open Source Information Retrieval, pp. 33\u201338, 2006."},{"key":"19_CR17","doi-asserted-by":"crossref","unstructured":"R. Shim, Wi-Fi arrest highlights security dangers, ZDNet News, November 28, 2003.","DOI":"10.1093\/combul\/45.6.28"},{"key":"19_CR18","first-page":"941","volume":"21","author":"B. Simon","year":"1997","unstructured":"B. Simon, Note: The tangled web we weave \u2013 The Internet and standing under the Fourth Amendment, Nova Law Review, vol. 21, pp. 941\u2013959, 1997.","journal-title":"Nova Law Review"},{"key":"19_CR19","unstructured":"J. Stanley, Whose hands are \u201cunclean?\u201d \u2013 SCO, IBM\u2019s \u201cagents\u201d and the CFAA, Groklaw (www.groklaw.net\/articlebasic.php?story =20041217091956894), December 17, 2004."},{"key":"19_CR20","unstructured":"Supreme Court of Kansas, State of Kansas v. Allen, Pacific Reporter (Second Series), vol. 917, pp. 848\u2013854, 1996."},{"key":"19_CR21","unstructured":"U.S. Court of Appeals (First Circuit), EF Cultural Travel BV v. Zefer Corp., Federal Reporter (Third Series), vol. 318, pp. 58\u201364, 2003."},{"key":"19_CR22","unstructured":"U.S. Court of Appeals (Second Circuit), United States v. Morris, Federal Reporter (Second Series), vol. 928, pp. 504\u2013512, 1991."},{"key":"19_CR23","unstructured":"U.S. Court of Appeals (Tenth Circuit), United States v. Simpson, Federal Reporter (Third Series), vol. 94, pp. 1373\u20131382, 1996."},{"key":"19_CR24","unstructured":"U.S. District Court (Northern District of Iowa, Western Division), America Online, Inc. v. National Health Care Discount, Inc., Federal Supplementer (Second Series), vol. 121, pp. 1255\u20131280, 2001."},{"key":"19_CR25","unstructured":"U.S. Government, Title 18, Crimes and Criminal Procedure, United States Code Annotated, Washington, DC, pp. 445\u2013453, 2000."}],"container-title":["IFIP Advances in Information and Communication Technology","Advances in Digital Forensics V"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-04155-6_19","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,22]],"date-time":"2019-05-22T22:38:22Z","timestamp":1558564702000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-04155-6_19"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009]]},"ISBN":["9783642041549","9783642041556"],"references-count":25,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-04155-6_19","relation":{},"ISSN":["1868-4238","1868-422X"],"issn-type":[{"type":"print","value":"1868-4238"},{"type":"electronic","value":"1868-422X"}],"subject":[],"published":{"date-parts":[[2009]]}}}