{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,13]],"date-time":"2026-02-13T04:17:28Z","timestamp":1770956248056,"version":"3.50.1"},"reference-count":32,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2022,11,2]],"date-time":"2022-11-02T00:00:00Z","timestamp":1667347200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2022,11,2]],"date-time":"2022-11-02T00:00:00Z","timestamp":1667347200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Mobile Netw Appl"],"published-print":{"date-parts":[[2023,8]]},"DOI":"10.1007\/s11036-022-02048-9","type":"journal-article","created":{"date-parts":[[2022,11,2]],"date-time":"2022-11-02T08:03:03Z","timestamp":1667376183000},"page":"1272-1281","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["Badoo Android and iOS Dating Application Analysis"],"prefix":"10.1007","volume":"28","author":[{"given":"Jack","family":"Long","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3728-6711","authenticated-orcid":false,"given":"Ivan","family":"Cviti\u0107","sequence":"additional","affiliation":[]},{"given":"Xiaolu","family":"Zhang","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0476-9373","authenticated-orcid":false,"given":"Dragan","family":"Perakovi\u0107","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9208-5336","authenticated-orcid":false,"given":"Kim-Kwang Raymond","family":"Choo","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,11,2]]},"reference":[{"key":"2048_CR1","unstructured":"Statista (2019) Most popular online dating apps in the United States as of September 2019. https:\/\/www.statista.com\/statistics\/826778\/most-popular-dating-apps-by-audience-size-usa\/. Accessed 18 May\u00a02021"},{"key":"2048_CR2","unstructured":"Awford (2017) Tinder stalker stabbed date 11 times, then doused her in gasoline. http:\/\/nypost.com\/2017\/02\/16\/tinder-stalker-stabbed-date-11-times-then-doused-her-in-gasoline\/. Accessed 23 Aug\u00a02021"},{"key":"2048_CR3","doi-asserted-by":"crossref","unstructured":"van Zandwijk JP, Boztas A (2019) The iPhone Health App from a forensic perspective: can steps and distances registered during walking and running be used as digital evidence? Digit Investig 28:S126\u2013S133","DOI":"10.1016\/j.diin.2019.01.021"},{"key":"2048_CR4","doi-asserted-by":"crossref","unstructured":"Hassenfeldt C, Baig S, Baggili I, Zhang X (2019) Map my murder: A digital forensic study of mobile health and fitness applications. In Proceedings of the 14th International Conference on Availability, Reliability and Security, pp 1\u201312","DOI":"10.1145\/3339252.3340515"},{"key":"2048_CR5","doi-asserted-by":"crossref","unstructured":"Zhang X, Baggili I, Breitinger F (2017) Breaking into the vault: Privacy, security and forensic analysis of Android vault applications. Comput Secur 70:516\u2013531","DOI":"10.1016\/j.cose.2017.07.011"},{"issue":"11","key":"2048_CR6","doi-asserted-by":"publisher","first-page":"708","DOI":"10.12720\/jcm.8.11.708-715","volume":"8","author":"N Al Barghouthy","year":"2013","unstructured":"Al Barghouthy N, Said H (2013) Social networks IM forensics: encryption analysis. J Commun 8(11):708\u2013715","journal-title":"J Commun"},{"issue":"4","key":"2048_CR7","doi-asserted-by":"publisher","first-page":"6487","DOI":"10.1109\/JIOT.2019.2906946","volume":"6","author":"S Li","year":"2019","unstructured":"Li S, Choo KKR, Sun Q, Buchanan WJ, Cao J (2019) IoT forensics: Amazon echo as a use case. IEEE Internet Things J 6(4):6487\u20136497","journal-title":"IEEE Internet Things J"},{"key":"2048_CR8","doi-asserted-by":"crossref","unstructured":"Meffert C, Clark D, Baggili I, Breitinger F (2017) Forensic State Acquisition from Internet of Things (FSAIoT) A general framework and practical approach for IoT forensics through IoT device state acquisition. In: Proceedings of the 12th International Conference on Availability, Reliability and Security, pp 1\u201311","DOI":"10.1145\/3098954.3104053"},{"key":"2048_CR9","doi-asserted-by":"crossref","unstructured":"Bhatt AJ, Gupta C, Mittal S (2018) Network forensics analysis of iOS social networking and messaging Apps. In:\u00a02018 Eleventh International Conference on Contemporary Computing (IC3). IEEE,\u00a0pp 1\u20136","DOI":"10.1109\/IC3.2018.8530576"},{"issue":"4","key":"2048_CR10","doi-asserted-by":"publisher","first-page":"469","DOI":"10.1080\/00450618.2015.1066854","volume":"48","author":"F Norouzizadeh Dezfouli","year":"2016","unstructured":"Norouzizadeh Dezfouli F, Dehghantanha A, Eterovic-Soric B, Choo KKR (2016) Investigating Social Networking applications on smartphones detecting Facebook, Twitter, LinkedIn and Google + artefacts on Android and iOS platforms. Aust J Forensic Sci 48(4):469\u2013488","journal-title":"Aust J Forensic Sci"},{"key":"2048_CR11","doi-asserted-by":"crossref","unstructured":"Zhang X, Liu CZ, Choo KKR, Alvarado JA (2021) A design science approach to developing an integrated mobile app forensic framework. Comput Secur 105:102226","DOI":"10.1016\/j.cose.2021.102226"},{"key":"2048_CR12","doi-asserted-by":"publisher","unstructured":"Pooley K, Boxall H (2020) Mobile dating applications and sexual and violent offending. Trends and issues in crime and criminal justice 612.\u00a0https:\/\/doi.org\/10.52922\/ti04862","DOI":"10.52922\/ti04862"},{"issue":"10","key":"2048_CR13","first-page":"133","volume":"1","author":"I Cviti\u0107","year":"2018","unstructured":"Cviti\u0107 I, Perakovi\u0107 D, Peri\u0161a M, Husnjak S (2018) Application possibilities of digital forensics procedures in vehicle telematics systems. Zesz Nauk Wy\u017cszej Szk Tech w Katowicach 1(10):133\u2013144","journal-title":"Zesz Nauk Wy\u017cszej Szk Tech w Katowicach"},{"key":"2048_CR14","doi-asserted-by":"publisher","unstructured":"Shetty R, Grispos G, Choo K-KR (2017) Are you dating danger? An interdisciplinary approach to evaluating the (In) security of android dating apps. IEEE Trans Sustain Comput 6(2):197\u2013207.\u00a0https:\/\/doi.org\/10.1109\/tsusc.2017.2783858","DOI":"10.1109\/tsusc.2017.2783858"},{"key":"2048_CR15","doi-asserted-by":"publisher","unstructured":"Knox S, Moghadam S, Patrick K, Phan A, Choo KKR (2020) What\u2019s really \u2018Happning\u2019? A forensic analysis of Android and iOS Happn dating apps. Comput Secur 94. https:\/\/doi.org\/10.1016\/j.cose.2020.101833","DOI":"10.1016\/j.cose.2020.101833"},{"key":"2048_CR16","doi-asserted-by":"publisher","unstructured":"Stoicescu MV, Matei S, Rughinis R (2019) Sharing and privacy in dating apps. In: Proceedings \u2013 2019 22nd International Conference on Control Systems and Computer Science, CSCS 2019, pp 432\u2013437. https:\/\/doi.org\/10.1109\/CSCS.2019.00079","DOI":"10.1109\/CSCS.2019.00079"},{"key":"2048_CR17","doi-asserted-by":"publisher","first-page":"156","DOI":"10.1016\/j.cose.2018.12.002","volume":"81","author":"Q Do","year":"2019","unstructured":"Do Q, Martini B, Choo KKR (2019) The role of the adversary model in applied security research. Comput Secur 81:156\u2013181. doi: https:\/\/doi.org\/10.1016\/j.cose.2018.12.002","journal-title":"Comput Secur"},{"key":"2048_CR18","doi-asserted-by":"publisher","unstructured":"Ma X, Sun E, Naaman M (2017) What happens in happn: The warranting powers of location history in online dating. Proc. ACM Conf. Comput Support Coop Work. CSCW, pp 41\u201350.\u00a0https:\/\/doi.org\/10.1145\/2998181.2998241","DOI":"10.1145\/2998181.2998241"},{"key":"2048_CR19","doi-asserted-by":"publisher","first-page":"100055","DOI":"10.1016\/j.chbr.2021.100055","volume":"3","author":"A Phan","year":"2021","unstructured":"Phan A, Seigfried-Spellar K, Choo K-KR (2021) Threaten me softly: A review of potential dating app risks. Comput Hum Behav Rep 3:100055. https:\/\/doi.org\/10.1016\/j.chbr.2021.100055","journal-title":"Comput Hum Behav Rep"},{"key":"2048_CR20","unstructured":"Farnden J, Martini B, Choo KKR. Privacy risks in mobile dating apps. May 2015, [Online]. Available: http:\/\/arxiv.org\/abs\/1505.02906"},{"issue":"1","key":"2048_CR21","doi-asserted-by":"publisher","first-page":"1920","DOI":"10.1109\/COMST.2021.3086296","volume":"23","author":"E Rodr\u00edguez","year":"2021","unstructured":"Rodr\u00edguez E, Otero B, Guti\u00e9rrez N, Canal R (2021) A survey of deep learning techniques for cybersecurity in mobile networks. IEEE Commun Surv Tutor 23(1):1920\u20131955","journal-title":"IEEE Commun Surv Tutor"},{"key":"2048_CR22","doi-asserted-by":"crossref","unstructured":"Sequeiros JB, Chimuco FT, Samaila MG, Freire MM, In\u00e1cio PR (2020) Attack and system modeling applied to IoT, cloud, and mobile ecosystems: embedding security by design. ACM Comput Surv 53(2), article no. 25","DOI":"10.1145\/3376123"},{"key":"2048_CR23","unstructured":"Wireshark. WPA PSK (Raw Key) Generator"},{"key":"2048_CR24","unstructured":"Spy Traffic From Smartphone with Wireshark (2019). https:\/\/null-byte.wonderhowto.com\/how-to\/spy-traffic-from-smartphone-with-wireshark-0198549\/. Accessed 21 Mar\u00a02021"},{"key":"2048_CR25","unstructured":"Velikov K (2019) How To: Capture iOS Traffic with Fiddler. https:\/\/www.telerik.com\/blogs\/how-to-capture-ios-traffic-with-fiddler. Accessed 18 Jan\u00a02020"},{"key":"2048_CR26","unstructured":"Green E (2020) Why root Android phones? The pros and cons explained. https:\/\/nordvpn.com\/blog\/why-you-shouldn\u2019t-root-android\/. Accessed 26 Nov\u00a02020"},{"key":"2048_CR27","unstructured":"DC3 advanced (2021) https:\/\/techlinkcenter.org\/technologies\/dc3-advanced-carver-suite-for-digital-forensics-content-recovery\/92b523e1-6859-4f17-92b0-961f825500a8.\u00a0Accessed 8 Nov\u00a02021"},{"issue":"4","key":"2048_CR28","doi-asserted-by":"publisher","first-page":"6850","DOI":"10.1109\/JIOT.2019.2912118","volume":"6","author":"X Zhang","year":"2019","unstructured":"Zhang X, Choo KKR, Beebe NL (2019) How do I share my IoT forensic experience with the broader community? An automated knowledge sharing IoT forensic platform. IEEE Internet Things J 6(4):6850\u20136861","journal-title":"IEEE Internet Things J"},{"key":"2048_CR29","unstructured":"Anderson M, Vogels E, Turnet E (2020) The vitures and downsides of online dating. https:\/\/www.pewresearch.org\/internet\/2020\/02\/06\/the-virtues-and-downsides-of-online-dating\/. Accessed 25 Mar\u00a02021"},{"key":"2048_CR30","unstructured":"Wu Y (2021) Tinder, bumble and hinge show surge in Americans looking for love Online. https:\/\/www.wsj.com\/articles\/tinder-bumble-and-hinge-show-surge-in-americans-looking-for-love-online-11613246400. Accessed 26 Oct\u00a02021"},{"key":"2048_CR31","doi-asserted-by":"crossref","unstructured":"Garga S, Thomas M, Bhatia A, Sullivan A, John-Leader F, Pit S (2021) Geosocial networking dating app usage and risky sexual behavior in young adults attending a music festival: cross-sectional questionnaire study. J Med Internet Res 23(4), article no.: e21082","DOI":"10.2196\/21082"},{"key":"2048_CR32","doi-asserted-by":"crossref","unstructured":"Cohen LE, Felson M (1979) Social change and crime rate trends: A routine activity approach. Am Sociol Rev 44(4):588\u2013608","DOI":"10.2307\/2094589"}],"container-title":["Mobile Networks and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11036-022-02048-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11036-022-02048-9\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11036-022-02048-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,4,9]],"date-time":"2025-04-09T03:58:50Z","timestamp":1744171130000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11036-022-02048-9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,11,2]]},"references-count":32,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2023,8]]}},"alternative-id":["2048"],"URL":"https:\/\/doi.org\/10.1007\/s11036-022-02048-9","relation":{},"ISSN":["1383-469X","1572-8153"],"issn-type":[{"value":"1383-469X","type":"print"},{"value":"1572-8153","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,11,2]]},"assertion":[{"value":"13 December 2021","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"2 November 2022","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"Not applicable.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflicts of interest\/competing interests"}}]}}