{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,6]],"date-time":"2024-09-06T03:34:40Z","timestamp":1725593680536},"publisher-location":"Berlin, Heidelberg","reference-count":13,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642223648"},{"type":"electronic","value":"9783642223655"}],"license":[{"start":{"date-parts":[[2011,1,1]],"date-time":"2011-01-01T00:00:00Z","timestamp":1293840000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011]]},"DOI":"10.1007\/978-3-642-22365-5_6","type":"book-chapter","created":{"date-parts":[[2011,6,27]],"date-time":"2011-06-27T22:07:06Z","timestamp":1309212426000},"page":"41-49","source":"Crossref","is-referenced-by-count":3,"title":["Digital Trails Discovering of a GPS Embedded Smart Phone - Take Nokia N78 Running Symbian S60 Ver 3.2 for Example"],"prefix":"10.1007","author":[{"given":"Hai-Cheng","family":"Chu","sequence":"first","affiliation":[]},{"given":"Li-Wei","family":"Wu","sequence":"additional","affiliation":[]},{"given":"Hsiang-Ming","family":"Yu","sequence":"additional","affiliation":[]},{"given":"Jong Hyuk","family":"Park","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"6_CR1","doi-asserted-by":"publisher","first-page":"10","DOI":"10.1016\/j.diin.2008.06.003","volume":"5","author":"B. Nutter","year":"2008","unstructured":"Nutter, B.: Pinpointing TomTom location records: A forensic analysis. Digital Investigation\u00a05, 10\u201318 (2008)","journal-title":"Digital Investigation"},{"issue":"1","key":"6_CR2","first-page":"1","volume":"3","author":"C. Strawn","year":"2009","unstructured":"Strawn, C.: Expanding The Potential for GPS Evidence Acquisition. Small Scale Digital Device Forensics Journal\u00a03(1), 1\u201312 (2009)","journal-title":"Small Scale Digital Device Forensics Journal"},{"key":"6_CR3","doi-asserted-by":"publisher","first-page":"97","DOI":"10.1109\/MC.2008.61","volume":"41","author":"A.C. Weaver","year":"2008","unstructured":"Weaver, A.C., Morrison, B.B.: Social Networking. Computer\u00a041, 97\u2013100 (2008)","journal-title":"Computer"},{"issue":"3","key":"6_CR4","first-page":"17","volume":"3","author":"M.U. Iqbal","year":"2008","unstructured":"Iqbal, M.U., Samsung, L.: Legal and ethical implications of GPS vulnerabilities. Journal of International Commercial Law and Technology\u00a03(3), 17\u2013187 (2008)","journal-title":"Journal of International Commercial Law and Technology"},{"issue":"1","key":"6_CR5","first-page":"1","volume":"3","author":"S. Danker","year":"2009","unstructured":"Danker, S., Ayers, R., Mislan, R.P.: Hashing Techniques for Mobile Device Forensics. Small Scale Digital Device Forensics Journal\u00a03(1), 1\u20136 (2009)","journal-title":"Small Scale Digital Device Forensics Journal"},{"key":"6_CR6","doi-asserted-by":"crossref","unstructured":"Fusco, S.J., Michael, K., Michael, M.G.: Using a social informatics framework to study the effects of location-based social networking on relationships between people: A review of literature. In: 2010 IEEE International Symposium on Technology and Society, ISTAS, pp. 157\u2013171, 7\u20139 (2010)","DOI":"10.1109\/ISTAS.2010.5514641"},{"key":"6_CR7","doi-asserted-by":"crossref","unstructured":"Counts, S., Fisher, K.E.: Mobile Social Networking: An Information Grounds Perspective. In: Hawaii International Conference on System Sciences, HICSS (2008)","DOI":"10.1109\/HICSS.2008.320"},{"key":"6_CR8","unstructured":"\u0106osi\u0107, J., Ba\u010da, M.: A Framework to (Im)Prove Chain of Custody in Digital Investigation Process. In: Proceedings of the 21st Central European Conference on Information and Intelligent Systems (CECIIS ), pp. 43\u2013438 (2010)"},{"key":"6_CR9","unstructured":"LeMere, B., Sayers, A.: TomTom gps device forensics, http:\/\/www.forensicfocus.com\/tomtom-gps-device-forensics (retrieved November 21, 2010)"},{"key":"6_CR10","unstructured":"http:\/\/www.mactiontech.com\/"},{"key":"6_CR11","unstructured":"http:\/\/www.finaldata.com\/"},{"key":"6_CR12","unstructured":"http:\/\/www.r-studio.com\/"},{"key":"6_CR13","unstructured":"http:\/\/www.hexworkshop.com\/"}],"container-title":["Communications in Computer and Information Science","Secure and Trust Computing, Data Management, and Applications"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-22365-5_6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,12]],"date-time":"2019-06-12T08:24:58Z","timestamp":1560327898000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-22365-5_6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011]]},"ISBN":["9783642223648","9783642223655"],"references-count":13,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-22365-5_6","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2011]]}}}