{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T05:46:28Z","timestamp":1742967988939,"version":"3.40.3"},"publisher-location":"Dordrecht","reference-count":33,"publisher":"Springer Netherlands","isbn-type":[{"type":"print","value":"9789048136612"},{"type":"electronic","value":"9789048136629"}],"license":[{"start":{"date-parts":[[2009,12,12]],"date-time":"2009-12-12T00:00:00Z","timestamp":1260576000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2009,12,12]],"date-time":"2009-12-12T00:00:00Z","timestamp":1260576000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-90-481-3662-9_5","type":"book-chapter","created":{"date-parts":[[2010,1,30]],"date-time":"2010-01-30T11:23:45Z","timestamp":1264850625000},"page":"29-33","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["Preventing the \u201cWorst Case Scenario:\u201d Combating the Lost Laptop Epidemic with RFID Technology"],"prefix":"10.1007","author":[{"given":"David C.","family":"Wyld","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2009,12,12]]},"reference":[{"key":"5_CR1","unstructured":"B. Wilson, \u201cTSA pilot would offer ads at airport security checkpoints,\u201d Aviation Week, January 4, 2007. Retrieved July 6, 2008, from http:\/\/www.aviationweek.com\/aw\/generic\/story_channel.jsp?channel=comm&id=news\/ADS01047.xml."},{"key":"5_CR2","unstructured":"The Ponemon Institute, White Paper - Airport insecurity: The case of lost laptops, June 30, 2008. Retrieved July 2, 2008, from http:\/\/www.dell.com\/downloads\/global\/services\/dell_lost_laptop_study.pdf."},{"key":"5_CR3","unstructured":"P. Seitz, \u201cNew Dell services help users hunt down missing laptops,\u201d Investors Business Daily, June 30, 2008. Retrieved July 4, 2008, from http:\/\/investors.com\/editorial\/IBDArticles.asp?artsec=17&issue=20080630."},{"key":"5_CR4","unstructured":"T. Wilson, \u201cLaptop losses total 12,000 per week at US airports: Nearly 70% are never recovered, many go unreported,\u201d Dark Reading, July 2, 2008. Retrieved July 13, 2008, from http:\/\/www.darkreading.com\/document.asp?doc_id=158099&f_src=drdaily."},{"key":"5_CR5","unstructured":"D. Hughes, \u201c12,000 laptops lost weekly at U.S. airports,\u201d Aviation Week, July 3, 2008. Retrieved July 10, 2008, from http:\/\/www.aviationnow.com\/aw\/generic\/story_channel.jsp?channel=comm&id=news\/LAP07038.xml&headline=12,000%20Laptops%20Lost%20Weekly%20At%20U.S.%20Airports."},{"key":"5_CR6","unstructured":"T. Frank, \u201cTSA takes steps toward speedier laptop X-rays,\u201d USA Today, July 6, 2008. Retrieved September 13, 2008, from http:\/\/www.usatoday.com\/travel\/flights\/2008-07-06-laptops_N.htm."},{"key":"5_CR7","unstructured":"Identity Theft Daily Staff, \u201cCosts attributable to laptop theft are projected to exceed $1 billion,\u201d Identity Theft Daily, July 16, 2008. Retrieved AUgust 20, 2008, from http:\/\/www.identitytheftdaily.com\/index.php\/20080714370\/Latest\/Costs-Attributable-to-Laptop-Theft-Are-Projected-to-Exceed-$1-Billion.html."},{"key":"5_CR8","unstructured":"J. Ryder, \u201cLaptop security, part one: Preventing laptop theft,\u201d Security Focus, July 30, 2001. Retrieved May 28, 2008, from http:\/\/www.securityfocus.com\/infocus\/1186."},{"key":"5_CR9","unstructured":"A. Sacco, \u201cLax laptop security can be dangerous \u2026 and expensive,\u201d Network World, November 12, 2007. Retrieved June 11, 2008, from http:\/\/www.networkworld.com\/news\/2007\/111207-lax-laptop-security-can-be.html."},{"key":"5_CR10","volume-title":"Networks and netwars: The future of terror, crime, and militancy","author":"J. Arquilla","year":"2001","unstructured":"J. Arquilla, Networks and netwars: The future of terror, crime, and militancy. Santa Monica, CA: RAND Corporation, 2001."},{"key":"5_CR11","unstructured":"A. Griebenow, White Paper: RFID as mandatory protection for laptops, March 2008. Retrieved September 22, 2008, from http:\/\/www.mediarecovery.com\/library\/AxcessLaptopWhitePaper.pdf."},{"key":"5_CR12","unstructured":"A. Sacco, \u201cStudy: Average value of business info on travelers\u2019 laptops equals $525\u00a0K - The average value of personal information on travelers\u2019 laptop computers is $330,000, according to iBahn,\u201d Network World, October 17, 2007. Retrieved August 14, 2008, from http:\/\/www.cio.com\/article\/147000\/Study_Average_Value_of_Business_Info_on_Travelers_Laptops_Equals_K."},{"key":"5_CR13","unstructured":"McAfee and Datamonitor, White Paper - Datagate: The Next Inevitable Corporate Disaster?, April 2007. Retrieved October 2, 2008, from http:\/\/www.mcafee.com\/us\/local_content\/misc\/dlp_datagate_research.pdf."},{"key":"5_CR14","unstructured":"The Ponemon Institute, 2007 Annual Study: Cost of a data breach. Retrieved July 28, 2008, from http:\/\/www.ponemon.org\/press\/PR_Ponemon_2007-COB_071126_F.pdf."},{"key":"5_CR15","unstructured":"G. Gruman, \u201cHow to lock up laptop security,\u201d CIO Magazine, October 22, 2007. Retrieved June 27, 2008, from http:\/\/www.cio.com\/article\/147900\/How_to_Lock_Up_Laptop_Security\/1."},{"key":"5_CR16","unstructured":"M.O. Foley, \u201cNew technologies to thwart laptop theft.\u201d Inc., August 2007. Retrieved September 22, 2008, from http:\/\/technology.inc.com\/hardware\/articles\/200708\/theft.html."},{"key":"5_CR17","unstructured":"R.K. Raghavan, \u201cProtect your laptop,\u201d The Hindu Business Line, June 18, 2007. Retrieved August 14, 2008, from http:\/\/www.thehindubusinessline.com\/ew\/2007\/06\/18\/stories\/2007061850010200.htm."},{"key":"5_CR18","unstructured":"G. Gruman, \u201cABC: An introduction to mobile security,\u201d CIO Magazine, March 8, 2007. Retrieved June 27, 2008, from http:\/\/www.cio.com\/article\/40360\/ABC_An_Introduction_to_Mobile_Security_\/1."},{"key":"5_CR19","unstructured":"A. Foster, \u201cIncrease in stolen laptops endangers data security,\u201d The Chronicle of Higher Education. Retrieved July 25, 2008, from http:\/\/chronicle.com\/free\/v54\/i43\/43a00103.htm."},{"key":"5_CR20","unstructured":"Anonymous, \u201cDallas-based AXCESS\u2019 RFID technology used by U.S.government to stop laptop theft,\u201d Pegasus News, April 17, 2007. Retrieved September 29, 2008, from http:\/\/www.pegasusnews.com\/news\/2007\/apr\/17\/dallas-based-axcess-rfid-technology-used-us-govern\/."},{"key":"5_CR21","unstructured":"C. Swedberg, \u201cArmy National Guard tracks assets: A PICS RFID system enables U.S. Army National Guard divisions to locate laptop computers and other electronics as they are moved in and out of their Washington, D.C., headquarters,\u201d RFID Journal, March 3, 2008. Retrieved July 22, 2008, from http:\/\/www.rfidjournal.com\/article\/articleview\/3951\/1\/1\/."},{"key":"5_CR22","unstructured":"B. Violino, \u201cEating your own dog food: Cognizant Uses RFID to Track Laptops - The global technology solutions company is currently deploying an asset-tracking system throughout its development facilities worldwide,\u201d RFID Journal, January 21, 2008. Retrieved August 22, 2008, from http:\/\/www.rfidjournal.com\/article\/articleview\/3857\/."},{"key":"5_CR23","unstructured":"AssetPulse, Inc., Fact Sheet: AssetGather for laptop tracking - RFID- based solution for tracking laptops and IT assets, July 2008. Retrieved September 8, 2008, from http:\/\/www.assetpulse.com\/solutions\/AssetGatherForLaptopTracking.pdf."},{"key":"5_CR24","unstructured":"Anonymous, \u201cOrizin Technologies launches active RFID system for laptop tracking,\u201d Newswire Today, September 3, 2007. Retrieved July 19, 2008, from http:\/\/www.newswiretoday.com\/news\/23006\/."},{"key":"5_CR25","unstructured":"Virtuity, Ltd., Fact Sheet: What is BackStopp?, February 2008, Retrieved May 27, 2008, from http:\/\/www.backstopp.com\/what_is_backstopp.aspx."},{"key":"5_CR26","unstructured":"G. Dixon, \u201cSelf-destruct laptops foil thieves: Wi-Fi and RFID system destroys sensitive data,\u201d Vnunet.com, February 19, 2008. Retrieved July 17, 2008, from http:\/\/www.vnunet.com\/vnunet\/news\/2209973\/laptops-set-self-destruct."},{"key":"5_CR27","unstructured":"J.E. Dunn, \u201cLaptop wipes own hard drive to beat thieves: A new laptop protection system can automatically wipe hard disk data on machines taken from authorized locations,\u201d PC World, February 19, 2008. Retrieved July 17, 2008, from http:\/\/www.pcworld.com\/printable\/article\/id,142631\/printable.html."},{"key":"5_CR28","unstructured":"D. Goodin, \u201cMind the gap: Data for 800,000 job applicants stolen. The Register, September 28, 2007. Retrieved July 28, 2008, from http:\/\/www.theregister.co.uk\/2007\/09\/28\/gap_data_breach\/."},{"key":"5_CR29","unstructured":"U.S. House of Representatives, Committee on Government Reform, Staff Report: Agency data breaches since January 1, 2003, October 13, 2006. Retrieved September 19, 2006, from http:\/\/oversight.house.gov\/documents\/20061013145352-82231.pdf."},{"key":"5_CR30","unstructured":"Y. Ting and J. Tsai, \u201cWorldwide notebook shipments grow 33% on year in 2007, says IDC,\u201d DigiTimes, January 31, 2008. Retrieved June 29, 2008, from http:\/\/www.digitimes.com\/NewsShow\/MailHome.asp?datePublish=2008\/1\/31&pages=PD&seq=209."},{"key":"5_CR31","doi-asserted-by":"crossref","unstructured":"D.C. Wyld, M.A. Jones, and J.W. Totten, \u201cWhere is my suitcase?: RFID and airline customer service,\u201d Marketing Intelligence & Planning, vol. 23, no. 4, pp. 382-394.","DOI":"10.1108\/02634500510603483"},{"key":"5_CR32","unstructured":"B. Bacheldor, \u201cMedical distributor puts RFID tags on equipment,\u201d RFID Journal, July 25, 2006. Retrieved September 20, 2008, from http:\/\/www.rfidjournal.com\/article\/articleview\/2513\/1\/1\/."},{"key":"5_CR33","unstructured":"D.C. Wyld, \u201cSports 2.0: A look at the future of sports in the context of RFID\u2019s \u2018weird new media revolution,\u2019\u201d The Sport Journal, October 2006. Retrieved October 26, 2006, from http:\/\/www.thesportjournal.org\/article\/sports-20-look-future-sports-context-rfid-s-weird-new-media-revolution."}],"container-title":["Novel Algorithms and Techniques in Telecommunications and Networking"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-90-481-3662-9_5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,8,5]],"date-time":"2024-08-05T17:41:15Z","timestamp":1722879675000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-90-481-3662-9_5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,12,12]]},"ISBN":["9789048136612","9789048136629"],"references-count":33,"URL":"https:\/\/doi.org\/10.1007\/978-90-481-3662-9_5","relation":{},"subject":[],"published":{"date-parts":[[2009,12,12]]},"assertion":[{"value":"12 December 2009","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}