{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,24]],"date-time":"2025-03-24T07:24:46Z","timestamp":1742801086187},"reference-count":21,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2013,5,25]],"date-time":"2013-05-25T00:00:00Z","timestamp":1369440000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Electron Commer Res"],"published-print":{"date-parts":[[2013,9]]},"DOI":"10.1007\/s10660-013-9116-1","type":"journal-article","created":{"date-parts":[[2013,5,24]],"date-time":"2013-05-24T14:28:07Z","timestamp":1369405687000},"page":"399-410","source":"Crossref","is-referenced-by-count":9,"title":["The disclosure of an Android smartphone\u2019s digital footprint respecting the Instant Messaging utilizing Skype and MSN"],"prefix":"10.1007","volume":"13","author":[{"given":"Hai-Cheng","family":"Chu","sequence":"first","affiliation":[]},{"given":"Chi-Hsiang","family":"Lo","sequence":"additional","affiliation":[]},{"given":"Han-Chieh","family":"Chao","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2013,5,25]]},"reference":[{"key":"9116_CR1","doi-asserted-by":"crossref","first-page":"347","DOI":"10.1145\/1920261.1920313","volume-title":"Proceedings of the 26th annual computer security applications conference (ACSAC\u201910)","author":"G. Portokalidis","year":"2010","unstructured":"Portokalidis, G., Homburg, P., Anagnostakis, K., & Bos, H. (2010). Paranoid android: versatile protection for smartphones. In Proceedings of the 26th annual computer security applications conference (ACSAC\u201910), New York (pp. 347\u2013356)."},{"key":"9116_CR2","doi-asserted-by":"crossref","first-page":"35","DOI":"10.1109\/MSP.2010.2","volume":"8","author":"A. Shabtai","year":"2010","unstructured":"Shabtai, A., Fledel, Y., Kanonov, U., Elovici, Y., Dolev, S., & Glezer, C. (2010). Google android: a\u00a0comprehensive security assessment. IEEE Security & Privacy, 8, 35\u201344.","journal-title":"IEEE Security & Privacy"},{"key":"9116_CR3","first-page":"1","volume-title":"Proceedings of the 4th USENIX conference on offensive technologies (WOOT\u201910)","author":"A. J. Aviv","year":"2010","unstructured":"Aviv, A. J., Gibson, K., Mossop, E., Blaze, M., & Smith, J. M. (2010). Smudge attacks on smartphone touch screens. In Proceedings of the 4th USENIX conference on offensive technologies (WOOT\u201910), Berkeley, CA, USA (pp. 1\u20137)."},{"key":"9116_CR4","doi-asserted-by":"crossref","first-page":"465","DOI":"10.1145\/2037373.2037442","volume-title":"Proceedings of the 13th international conference on human computer interaction with mobile devices and services (Mobile HCI \u201911)","author":"N. Ben-Asher","year":"2011","unstructured":"Ben-Asher, N., Kirschnick, N., Sieger, H., Meyer, J., Ben-Oved, A., & Moller, S. (2011). On the need for deferent security methods on mobile phones. In Proceedings of the 13th international conference on human computer interaction with mobile devices and services (Mobile HCI \u201911), New York (pp. 465\u2013473)."},{"key":"9116_CR5","doi-asserted-by":"crossref","first-page":"249","DOI":"10.1145\/1966913.1966945","volume-title":"Proceedings of the 6th ACM symposium on information, computer and communications security (ASIACCS \u201911)","author":"M. Conti","year":"2011","unstructured":"Conti, M., Zachia-Zlatea, I., & Crispo, B. (2011). Mind how you answer me! Transparently authenticating the user of a smartphone when answering or placing a call. In Proceedings of the 6th ACM symposium on information, computer and communications security (ASIACCS \u201911), New York (pp. 249\u2013259)."},{"key":"9116_CR6","doi-asserted-by":"crossref","first-page":"987","DOI":"10.1145\/2207676.2208544","volume-title":"Proceedings of the 2012 ACM annual conference on human factors in computing systems (CHI \u201912)","author":"A. Luca De","year":"2012","unstructured":"De Luca, A., Hang, A., Brudy, F., Lindner, C., & Hussmann, H. (2012). Touch me once and I know it\u2019s you! Implicit authentication based on touch screen patterns. In Proceedings of the 2012 ACM annual conference on human factors in computing systems (CHI \u201912), New York (pp. 987\u2013996)."},{"key":"9116_CR7","doi-asserted-by":"crossref","first-page":"306","DOI":"10.1109\/IIHMSP.2010.83","volume-title":"Proceedings of the 2010 sixth international conference on intelligent information hiding and multimedia signal processing (IIH-MSP \u201910)","author":"M. O. Derawi","year":"2010","unstructured":"Derawi, M. O., Nickel, C., Bours, P., & Busch, C. (2010). Unobtrusive user-authentication on mobile phones using biometric gait recognition. In Proceedings of the 2010 sixth international conference on intelligent information hiding and multimedia signal processing (IIH-MSP \u201910), USA (pp. 306\u2013311)."},{"key":"9116_CR8","series-title":"Lecture notes in computer science","doi-asserted-by":"crossref","first-page":"224","DOI":"10.1007\/978-3-642-04342-0_12","volume-title":"Recent advances in intrusion detection","author":"S. Zahid","year":"2009","unstructured":"Zahid, S., Shahzad, M., Khayam, S., & Farooq, M. (2009). Keystroke-based user identification on smartphones. In E. Kirda, S. Jha, & D. Balzarotti (Eds.), Lecture notes in computer science: Vol.\u00a05758. Recent advances in intrusion detection (pp. 224\u2013243). Berlin: Springer."},{"key":"9116_CR9","first-page":"347","volume-title":"Annual computer security applications conference (ACSAC \u201910)","author":"G. Portokalidis","year":"2010","unstructured":"Portokalidis, G., Homburg, P., Anagnostakis, K., & Bos, H. (2010). Paranoid android: zero-day protection for smartphones using the cloud. In Annual computer security applications conference (ACSAC \u201910), Austin (pp. 347\u2013356)."},{"key":"9116_CR10","doi-asserted-by":"crossref","first-page":"24","DOI":"10.1016\/j.cageo.2012.02.027","volume":"44","author":"Y. H. Weng","year":"2012","unstructured":"Weng, Y. H., Sun, F. S., & Grigsby, J. D. (2012). Geo tools: an android phone application in geology. Computers & Geosciences, 44, 24\u201330.","journal-title":"Computers & Geosciences"},{"key":"9116_CR11","doi-asserted-by":"crossref","first-page":"74","DOI":"10.1016\/j.diin.2010.05.010","volume":"7","author":"V. Thing","year":"2010","unstructured":"Thing, V., Ng, K., & Chang, E. (2010). Live memory forensics of mobile phones. Digital Investigation, 7, 74\u201382.","journal-title":"Digital Investigation"},{"key":"9116_CR12","doi-asserted-by":"crossref","first-page":"15","DOI":"10.1145\/2046614.2046619","volume-title":"Proceedings of the ACM workshop on security and privacy in mobile devices (SPSM)","author":"I. Burguera","year":"2011","unstructured":"Burguera, I., Zurutuza, U., & Nadjm-Tehrani, S. (2011). Crowdroid: behavior-based malware detection system for android. In Proceedings of the ACM workshop on security and privacy in mobile devices (SPSM) (pp. 15\u201326)."},{"key":"9116_CR13","doi-asserted-by":"crossref","first-page":"83","DOI":"10.1016\/j.diin.2010.05.011","volume":"7","author":"A. Distefano","year":"2010","unstructured":"Distefano, A., Me, G., & Pace, F. (2010). Android anti-forensics through a local paradigm. Digital Investigation, 7, 83\u201394.","journal-title":"Digital Investigation"},{"key":"9116_CR14","doi-asserted-by":"crossref","first-page":"74","DOI":"10.1016\/j.diin.2010.05.010","volume":"7","author":"V. L. L. Thing","year":"2010","unstructured":"Thing, V. L. L., Ng, K. Y., & Chang, E. C. (2010). Live memory forensics of mobile phones. Digital Investigation, 7, 74\u201382.","journal-title":"Digital Investigation"},{"issue":"1","key":"9116_CR15","first-page":"1","volume":"4","author":"J. Lessard","year":"2010","unstructured":"Lessard, J., & Kessler, G. C. (2010). Android forensics: simplifying cell phone examinations. Small Scale Digital Device Forensics Journal, 4(1), 1\u201312.","journal-title":"Small Scale Digital Device Forensics Journal"},{"key":"9116_CR16","first-page":"312","volume-title":"6th international conference on e-governance (ICEG), emerging technologies in e-government, m-government","author":"R. Ahmed","year":"2008","unstructured":"Ahmed, R., & Dharaskar, R. V. (2008). Mobile forensics: an overview, tools, future trends and challenges from law enforcement perspective. In 6th international conference on e-governance (ICEG), emerging technologies in e-government, m-government (pp. 312\u2013323)."},{"key":"9116_CR17","volume-title":"Android forensics investigation, analysis and mobile security for Google android","author":"A. Hoog","year":"2011","unstructured":"Hoog, A. (2011). Android forensics investigation, analysis and mobile security for Google android. Amsterdam: Elsevier."},{"key":"9116_CR18","doi-asserted-by":"crossref","first-page":"103","DOI":"10.1007\/s10660-010-9067-8","volume":"11","author":"Y. Ren","year":"2011","unstructured":"Ren, Y., Cheng, F., Peng, Z., Huang, X., & Song, W. (2011). A privacy policy conflict detection method for multi-owner privacy data protection. Electronic Commerce Research, 11, 103\u2013121.","journal-title":"Electronic Commerce Research"},{"key":"9116_CR19","doi-asserted-by":"crossref","first-page":"41","DOI":"10.1007\/s10660-013-9105-4","volume":"13","author":"N. Kshetri","year":"2013","unstructured":"Kshetri, N. (2013). Cybercrime and cyber-security issues associated with China: some economic and institutional considerations. Electronic Commerce Research, 13, 41\u201369.","journal-title":"Electronic Commerce Research"},{"key":"9116_CR20","doi-asserted-by":"crossref","first-page":"173","DOI":"10.1007\/s10660-009-9034-4","volume":"9","author":"J. M. Nurmilaakso","year":"2009","unstructured":"Nurmilaakso, J. M. (2009). ICT solutions and labor productivity: evidence from firm-level data. Electronic Commerce Research, 9, 173\u2013181.","journal-title":"Electronic Commerce Research"},{"key":"9116_CR21","doi-asserted-by":"crossref","first-page":"225","DOI":"10.1007\/s10660-012-9092-x","volume":"12","author":"T. Zarmpou","year":"2012","unstructured":"Zarmpou, T., Saprikis, V., Markos, A., & Vlachopoulou, M. (2012). Modeling users\u2019 acceptance of mobile services. Electronic Commerce Research, 12, 225\u2013248.","journal-title":"Electronic Commerce Research"}],"container-title":["Electronic Commerce Research"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10660-013-9116-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10660-013-9116-1\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10660-013-9116-1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,2,22]],"date-time":"2022-02-22T21:20:23Z","timestamp":1645564823000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10660-013-9116-1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,5,25]]},"references-count":21,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2013,9]]}},"alternative-id":["9116"],"URL":"https:\/\/doi.org\/10.1007\/s10660-013-9116-1","relation":{},"ISSN":["1389-5753","1572-9362"],"issn-type":[{"value":"1389-5753","type":"print"},{"value":"1572-9362","type":"electronic"}],"subject":[],"published":{"date-parts":[[2013,5,25]]}}}