{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T11:29:26Z","timestamp":1740137366392,"version":"3.37.3"},"reference-count":31,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2024,12,13]],"date-time":"2024-12-13T00:00:00Z","timestamp":1734048000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2024,12,13]],"date-time":"2024-12-13T00:00:00Z","timestamp":1734048000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"funder":[{"DOI":"10.13039\/501100014791","name":"University of Sk\u00f6vde","doi-asserted-by":"crossref","id":[{"id":"10.13039\/501100014791","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Int. J. Inf. Secur."],"published-print":{"date-parts":[[2025,2]]},"abstract":"<jats:title>Abstract<\/jats:title>\n          <jats:p>The willingness of victims to report crimes is declining, which leads to an increase in the dark figure of crime and undermines effective crime control. One possible reason is that victims are reluctant to report crimes if they are required to submit their digital devices for forensic examination. Today, a mobile phone holds vast amounts of information that may be valuable for police forensics experts, showing that victims\u2019 phones could be critical in crime investigations. This interview study has investigated the factors that influence Swedish citizens\u2019 willingness to report crimes when reporting involves surrendering their own mobile phones for forensic analysis. The study also uncovered factors that increase their willingness to report crimes under the same circumstances. The gathered data was subjected to a qualitative analysis with thematic coding, resulting in four distinct themes with 12 categories distributed among them. The analysis reveals that the primary factors affecting Swedish citizens\u2019 willingness to report crimes are privacy concerns, with participants feeling uneasy about others accessing their private data, and anxiety over being separated from their mobile phones. Furthermore, the study yields that the most significant factors for increasing the willingness to report crimes are enhanced information and transparency from the police. Participants suggested that better understanding of the process, and increased openness would increase their willingness to report.<\/jats:p>","DOI":"10.1007\/s10207-024-00955-4","type":"journal-article","created":{"date-parts":[[2024,12,13]],"date-time":"2024-12-13T13:38:32Z","timestamp":1734097112000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Factors influencing Swedish citizens\u2019 willingness to provide their mobile phones to forensic examination"],"prefix":"10.1007","volume":"24","author":[{"ORCID":"https:\/\/orcid.org\/0009-0004-0326-2548","authenticated-orcid":false,"given":"Jonas","family":"Ingemarsson","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5692-4008","authenticated-orcid":false,"given":"Marcus","family":"Birath","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2084-9119","authenticated-orcid":false,"given":"Joakim","family":"K\u00e4vrestad","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,12,13]]},"reference":[{"issue":"6","key":"955_CR1","doi-asserted-by":"publisher","first-page":"1665","DOI":"10.1016\/j.chb.2016.02.089","volume":"30","author":"N Akdemir","year":"2020","unstructured":"Akdemir, N., Lawless, C.J.: 2020 Exploring the human factor in cyber-enabled and cyber-dependent crime victimisation: a lifestyle routine activities approach. Internet Res. 30(6), 1665\u201387 (2020). https:\/\/doi.org\/10.1016\/j.chb.2016.02.089","journal-title":"Internet Res."},{"key":"955_CR2","doi-asserted-by":"publisher","first-page":"435","DOI":"10.1016\/j.chb.2016.02.089","volume":"60","author":"M Ak\u00e7ay\u0131r","year":"2016","unstructured":"Ak\u00e7ay\u0131r, M., D\u00fcndar, H., Ak\u00e7ay\u0131r, G.: What makes you a digital native? Is it enough to be born after 1980? Comput. Hum. Behav. 60, 435\u2013440 (2016). https:\/\/doi.org\/10.1016\/j.chb.2016.02.089","journal-title":"Comput. Hum. Behav."},{"key":"955_CR3","unstructured":"Andersson, F., Nelander\u00a0Hedqvist, K., Ring, J., Skarp, A.: It-inslag i brottsligheten och r\u00e4ttsv\u00e4sendets f\u00f6rm\u00e5ga att hantera dem. Brottsf\u00f6rebyggande r\u00e5de, Box 1386, 111 93 Stockholm, (2016)"},{"issue":"2","key":"955_CR4","doi-asserted-by":"publisher","first-page":"328","DOI":"10.1111\/j.1365-2648.1994.tb01088.x","volume":"19","author":"K Louise Barriball","year":"1994","unstructured":"Louise Barriball, K., While, A.: Collecting data using a semi-structured interview: a discussion paper. J. Adv. Nurs. Inst. Subscr. 19(2), 328\u2013335 (1994)","journal-title":"J. Adv. Nurs. Inst. Subscr."},{"key":"955_CR5","doi-asserted-by":"publisher","unstructured":"Berndtsson, M., Hansson, J., Olsson, B., Lundell, B.: Thesis projects. Springer, London (2008) 9781848000094. https:\/\/doi.org\/10.1007\/978-1-84800-009-4","DOI":"10.1007\/978-1-84800-009-4"},{"key":"955_CR6","unstructured":"Birath, M.: How evidence seizure times affect swedish citizens\u2019 willingness to report crimes, https:\/\/urn.kb.se\/resolve?urn=urn%3Anbn%3Ase%3Ahis%3Adiva-22877. Master\u2019s thesis, University of Sk\u00f6vde (2023)"},{"key":"955_CR7","unstructured":"Br\u00e5: Anm\u00e4lda brott 2022 Slutlig statistik. Brottsf\u00f6rebyggande r\u00e5det, Box 1386, 111 93 Stockholm, Available online: https:\/\/www.bra.se\/publikationer, Accessed: 18 Jan 2024"},{"key":"955_CR8","first-page":"1","volume":"3","author":"E Casey","year":"2011","unstructured":"Casey, E., Turnbull, Benjamin: Digital evidence on mobile devices. Digit. Evid. Comput. Crime 3, 1\u201344 (2011)","journal-title":"Digit. Evid. Comput. Crime"},{"key":"955_CR9","unstructured":"Chohen, D., Crabtree, B.: Qualitative research guidelines project, July 2006. http:\/\/www.qualres.org\/HomeSemi-3629.html"},{"issue":"4","key":"955_CR10","doi-asserted-by":"publisher","first-page":"3","DOI":"10.2298\/tem1404003f","volume":"17","author":"S Fohring","year":"2014","unstructured":"Fohring, S.: Putting a face on the dark figure: describing victims who don\u2019t report crime. Temida 17(4), 3\u201318 (2014). https:\/\/doi.org\/10.2298\/tem1404003f. (ISSN 2406-0941)","journal-title":"Temida"},{"issue":"1","key":"955_CR11","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1108\/PIJPSM-07-2019-0115","volume":"43","author":"A Graham","year":"2019","unstructured":"Graham, A., Kulig Teresa, C., Cullen Francis, T.: Willingness to report crime to the police: traditional crime cybercrime and procedural justice. Polic. Int. J. 43(1), 1\u201316 (2019). https:\/\/doi.org\/10.1108\/PIJPSM-07-2019-0115","journal-title":"Polic. Int. J."},{"issue":"2","key":"955_CR12","doi-asserted-by":"publisher","first-page":"105","DOI":"10.1016\/j.nedt.2003.10.001","volume":"24","author":"UH Graneheim","year":"2004","unstructured":"Graneheim, U.H., Lundman, B.: Qualitative content analysis in nursing research: concepts, procedures and measures to achieve trustworthiness. Nurs. Educ. Today 24(2), 105\u201312 (2004). https:\/\/doi.org\/10.1016\/j.nedt.2003.10.001","journal-title":"Nurs. Educ. Today"},{"issue":"3","key":"955_CR13","first-page":"36","volume":"28","author":"T Griffee Dale","year":"2005","unstructured":"Griffee Dale, T.: Research tips: interview data collection. J. Dev. Educ. 28(3), 36\u201337 (2005)","journal-title":"J. Dev. Educ."},{"issue":"6","key":"955_CR14","doi-asserted-by":"publisher","first-page":"761","DOI":"10.1016\/j.scijus.2021.10.003","volume":"61","author":"G Horsman","year":"2021","unstructured":"Horsman, G.: Digital evidence and the crime scene. Sci. Justice 61(6), 761\u2013770 (2021). https:\/\/doi.org\/10.1016\/j.scijus.2021.10.003","journal-title":"Sci. Justice"},{"key":"955_CR15","doi-asserted-by":"publisher","DOI":"10.1016\/j.fsidi.2021.301129","volume":"38","author":"G Humphries","year":"2021","unstructured":"Humphries, G., Nordvik, R., Manifavas, H., Cobley, P., Sorell, M.: Law enforcement educational challenges for mobile forensics. Forensic Sci. Int. Digital Investig. 38, 301129 (2021). https:\/\/doi.org\/10.1016\/j.fsidi.2021.301129","journal-title":"Forensic Sci. Int. Digital Investig."},{"key":"955_CR16","unstructured":"Internetstiftelsen. Allm\u00e4nt om internetutvecklingen: Egen utrustning, 2016. https:\/\/svenskarnaochinternet.se\/rapporter\/svenskarna-och-internet-2016\/allmant-om-internetutvecklingen\/egen-utrustning\/. Accessed: 21 Jan 2024"},{"key":"955_CR17","unstructured":"Internetstiftelsen. Svenskarna och internet 2023. Internetstiftelsen, 2023. https:\/\/svenskarnaochinternet.se\/app\/uploads\/2023\/10\/internetstiftelsen-svenskarna-och-internet-2023.pdf. Accessed: 19 Jan 2024"},{"key":"955_CR18","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-53649-6","author":"J K\u00e4vrestad","year":"2024","unstructured":"K\u00e4vrestad, J., Birath, M., Clarke, N.: Fundamentals of digital forensics: a guide to theory. Springer Int. Publ. (2024). https:\/\/doi.org\/10.1007\/978-3-031-53649-6","journal-title":"Springer Int. Publ."},{"issue":"3","key":"955_CR19","doi-asserted-by":"publisher","first-page":"293","DOI":"10.1007\/s10610-020-09439-2","volume":"26","author":"S Kemp","year":"2020","unstructured":"Kemp, S., Mir\u00f3-Llinares, F., Moneva, A.: The dark figure and the cyber fraud rise in Europe: evidence from Spain. Eur. J. Crim. Policy Res. 26(3), 293\u2013312 (2020). https:\/\/doi.org\/10.1007\/s10610-020-09439-2. (ISSN 1572-9869)","journal-title":"Eur. J. Crim. Policy Res."},{"issue":"1","key":"955_CR20","doi-asserted-by":"publisher","first-page":"64","DOI":"10.1504\/IJESDF.2021.111725","volume":"13","author":"Manish Kumar","year":"2021","unstructured":"Kumar, Manish: Mobile phone forensics - a systematic approach, tools, techniques and challenges. Int. J. Electron. Secur. Digit. Forensics 13(1), 64\u201387 (2021). https:\/\/doi.org\/10.1504\/IJESDF.2021.111725","journal-title":"Int. J. Electron. Secur. Digit. Forensics"},{"issue":"3","key":"955_CR21","doi-asserted-by":"publisher","first-page":"304","DOI":"10.1108\/ics-10-2022-0167","volume":"31","author":"G Lindqvist","year":"2023","unstructured":"Lindqvist, G., K\u00e4vrestad, Joakim: How privacy concerns impact Swedish citizens\u2019 willingness to report crimes: a quantitative mobile phone survey. Inf. Comput. Security 31(3), 304\u2013315 (2023). https:\/\/doi.org\/10.1108\/ics-10-2022-0167. (ISSN 2056-4961)","journal-title":"Inf. Comput. Security"},{"key":"955_CR22","doi-asserted-by":"publisher","unstructured":"Murphy, Kristina, Barkworth, J.: Victim willingness to report crime to police: does procedural justice or outcome matter most? Victims Offenders 9(2), 178\u2013204 (2014). https:\/\/doi.org\/10.1080\/15564886.2013.872744","DOI":"10.1080\/15564886.2013.872744"},{"issue":"2","key":"955_CR23","doi-asserted-by":"publisher","first-page":"135","DOI":"10.1016\/j.diin.2011.03.002","volume":"8","author":"P Owen","year":"2011","unstructured":"Owen, P., Thomas, P.: An analysis of digital forensic examinations: mobile devices versus hard disk drives utilising acpo & nist guidelines. Digital Investig. 8(2), 135\u2013140 (2011). https:\/\/doi.org\/10.1016\/j.diin.2011.03.002","journal-title":"Digital Investig."},{"key":"955_CR24","volume-title":"Qualitative research & evaluation methods: integrating theory and practice","author":"P Michael Quinn","year":"2014","unstructured":"Michael Quinn, P.: Qualitative research & evaluation methods: integrating theory and practice. Sage publications, Thousand Oaks (2014)"},{"issue":"6","key":"955_CR25","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1108\/10748120110424843","volume":"9","author":"M Prensky","year":"2001","unstructured":"Prensky, M.: Digital natives, digital immigrants part 2: Do they really think differently? On Horiz. 9(6), 1\u20136 (2001)","journal-title":"On Horiz."},{"key":"955_CR26","unstructured":"PTS. Svensk telekommarknad 2022: PTS-ER-2023:15. Post- och telestyrelsen, Box 6101, 102 32 Stockholm, 2023. https:\/\/statistik.pts.se\/media\/2pqpssnr\/rapport-stm-2022_dnr23-190_t.pdf. Accessed 27 Jan 2024"},{"key":"955_CR27","doi-asserted-by":"publisher","unstructured":"Rasnayaka, S., Sim, T.: Your tattletale gait privacy invasiveness of imu gait data. In 2020 IEEE International Joint Conference on Biometrics (IJCB), p 1\u201310, (2020). https:\/\/doi.org\/10.1109\/IJCB48548.2020.9304922","DOI":"10.1109\/IJCB48548.2020.9304922"},{"issue":"3","key":"955_CR28","doi-asserted-by":"publisher","first-page":"412","DOI":"10.1177\/0022427818817338","volume":"56","author":"AF Rengifo","year":"2019","unstructured":"Rengifo, A.F., Slocum, L.A., Chillar, Vijay: From impressions to intentions: direct and indirect effects of police contact on willingness to report crimes to law enforcement. J. Res. Crime Delinq. 56(3), 412\u2013450 (2019). https:\/\/doi.org\/10.1177\/0022427818817338","journal-title":"J. Res. Crime Delinq."},{"issue":"3","key":"955_CR29","doi-asserted-by":"publisher","first-page":"477","DOI":"10.2307\/40041279","volume":"154","author":"Daniel J Solove","year":"2006","unstructured":"Solove, Daniel J.: A taxonomy of privacy. Univ. Pa. Law Rev. 154(3), 477\u2013564 (2006)","journal-title":"Univ. Pa. Law Rev."},{"issue":"1","key":"955_CR30","doi-asserted-by":"publisher","first-page":"17","DOI":"10.1108\/pijpsm-07-2019-0122","volume":"43","author":"S van de Weijer","year":"2020","unstructured":"van de Weijer, S., Leukfeldt, R., Van der Zee, S.: Reporting cybercrime victimization: determinants motives and previous experiences. Polic. Int. J. 43(1), 17\u201334 (2020). https:\/\/doi.org\/10.1108\/pijpsm-07-2019-0122","journal-title":"Polic. Int. J."},{"key":"955_CR31","unstructured":"Vetenskapsr\u00e5det. Good research practice. Swedish research council, Vetenskapsr\u00e5det, Box 1035, 101 38 Stockholm, Sweden, 2017. https:\/\/www.vr.se\/download\/18.5639980c162791bbfe697882\/1555334908942\/Good-Research-Practice_VR_2017.pdf. Accessed 24 May 2024"}],"container-title":["International Journal of Information Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-024-00955-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10207-024-00955-4\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-024-00955-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,12]],"date-time":"2025-02-12T05:16:14Z","timestamp":1739337374000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10207-024-00955-4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,12,13]]},"references-count":31,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2025,2]]}},"alternative-id":["955"],"URL":"https:\/\/doi.org\/10.1007\/s10207-024-00955-4","relation":{},"ISSN":["1615-5262","1615-5270"],"issn-type":[{"type":"print","value":"1615-5262"},{"type":"electronic","value":"1615-5270"}],"subject":[],"published":{"date-parts":[[2024,12,13]]},"assertion":[{"value":"13 December 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors have no Conflict of interest to declare that are relevant to the content of this article.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}],"article-number":"42"}}