{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2023,10,2]],"date-time":"2023-10-02T14:10:33Z","timestamp":1696255833417},"reference-count":31,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2013,3,13]],"date-time":"2013-03-13T00:00:00Z","timestamp":1363132800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2014,7]]},"DOI":"10.1007\/s11042-012-1349-9","type":"journal-article","created":{"date-parts":[[2013,3,12]],"date-time":"2013-03-12T08:46:14Z","timestamp":1363077974000},"page":"219-234","source":"Crossref","is-referenced-by-count":3,"title":["Digital evidence discovery of networked multimedia smart devices based on social networking activities"],"prefix":"10.1007","volume":"71","author":[{"given":"Hai-Cheng","family":"Chu","sequence":"first","affiliation":[]},{"given":"Szu-Wei","family":"Yang","sequence":"additional","affiliation":[]},{"given":"Ching-Hsien","family":"Hsu","sequence":"additional","affiliation":[]},{"given":"Jong Hyuk","family":"Park","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2013,3,13]]},"reference":[{"key":"1349_CR1","doi-asserted-by":"crossref","first-page":"36","DOI":"10.1007\/11957454_3","volume":"4258","author":"A Acquisti","year":"2006","unstructured":"Acquisti A, Gross R (2006) Imagined communities: awareness, information sharing and privacy on the facebook. Lect Notes Comput Sci 4258:36\u201358","journal-title":"Lect Notes Comput Sci"},{"key":"1349_CR2","unstructured":"Andrew MW (2007) Defining a process model for forensic analysis of digital evidence devices and storage media. In: Proceedings of the Second International Workshop on Systematic Approaches to Digital Forensic Engineering. IEEE, SADFE 2007"},{"key":"1349_CR3","first-page":"139","volume":"309","author":"C Asher","year":"2009","unstructured":"Asher C, Aumasson JP, Phan RC-W (2009) Security and privacy preservation in human-involved networks, iNetSec. IFIP AICT 309:139\u2013148","journal-title":"IFIP AICT"},{"key":"1349_CR4","doi-asserted-by":"crossref","first-page":"395","DOI":"10.1007\/11553939_57","volume":"3683","author":"R Brown","year":"2005","unstructured":"Brown R, Pham B, DeVel O (2005) Design of a digital forensics image mining system. KES 2005. Lect Notes Comput Sci 3683:395\u2013404","journal-title":"Lect Notes Comput Sci"},{"issue":"4","key":"1349_CR5","doi-asserted-by":"crossref","first-page":"50","DOI":"10.1109\/MC.2004.1297301","volume":"37","author":"H Chen","year":"2004","unstructured":"Chen H, Chung W, Xu J, Wang G, Qin Y, Chau M (2004) Crime data mining: a general framework and some examples. IEEE Comput 37(4):50\u201356","journal-title":"IEEE Comput"},{"key":"1349_CR6","doi-asserted-by":"crossref","unstructured":"Counts S, Fisher KE (2008) Mobile social networking: an information grounds perspective. Proceedings of the 41st Hawaii International Conference on System Sciences (HICSS). IEEE Publication, Waikoloa, Big Island, HI, pp 1\u201310","DOI":"10.1109\/HICSS.2008.320"},{"issue":"1","key":"1349_CR7","first-page":"53","volume":"2","author":"C Deng","year":"2011","unstructured":"Deng C, Lin Y, Ma L, Cao Y (2011) Towards a practical and scalable trusted software dissemination system. J Converg 2(1):53\u201360","journal-title":"J Converg"},{"issue":"1","key":"1349_CR8","first-page":"41","volume":"1","author":"D Dominguez-Sal","year":"2010","unstructured":"Dominguez-Sal D, Perez-Casany M, Larriba-Pey JL (2010) Cooperative cache analysis for distributed search engines. Int J Inf Technol Commun Converg 1(1):41\u201365","journal-title":"Int J Inf Technol Commun Converg"},{"key":"1349_CR9","unstructured":"Dwyer C, Hiltz S, Passerini K (2007) Trust and privacy concern within social networking sites: a comparison of Facebook and Myspace. In: Proceedings of the Thirteenth Americas Conference on Information Systems, AMCIS"},{"issue":"6","key":"1349_CR10","doi-asserted-by":"crossref","first-page":"595","DOI":"10.1002\/wcm.231","volume":"4","author":"K El-Khatib","year":"2004","unstructured":"El-Khatib K, Zhang ZE, Hadibi N, Bochmann GV (2004) Personal and service mobility in ubiquitous computing environments. Wirel Commun Mob Comput 4(6):595\u2013607","journal-title":"Wirel Commun Mob Comput"},{"key":"1349_CR11","doi-asserted-by":"crossref","first-page":"1143","DOI":"10.1111\/j.1083-6101.2007.00367.x","volume":"12","author":"N Ellison","year":"2007","unstructured":"Ellison N, Steinfield C, Lampe C (2007) The benefits of facebook \u201cfriends:\u201d social capital and college students use of online social network sites. J Comput Mediat Commun 12:1143\u20131168","journal-title":"J Comput Mediat Commun"},{"key":"1349_CR12","doi-asserted-by":"crossref","unstructured":"Fengyu D, Xuerong G (2009) An Advanced Location Based Service (A-LBS) on Mobile Social Network. Proc. IEEE International Conference on Broadband Network and Multimedia Technology, ICBNMT 09. IEEE Press, pp. 740-743, October 2009","DOI":"10.1109\/ICBNMT.2009.5347780"},{"key":"1349_CR13","unstructured":"GPS visualizer. http:\/\/www.gpsvisualizer.com"},{"issue":"3","key":"1349_CR14","first-page":"178","volume":"3","author":"MU Iqbal","year":"2008","unstructured":"Iqbal MU, Samsung L (2008) Legal and ethical implications of GPS vulnerabilities. J Int Commer Law Technol 3(3):178\u2013187","journal-title":"J Int Commer Law Technol"},{"key":"1349_CR15","doi-asserted-by":"crossref","first-page":"253","DOI":"10.1177\/0539018408092573","volume":"47","author":"P Joore","year":"2008","unstructured":"Joore P (2008) Social aspects of location-monitoring systems: the case of Guide Me and of My-SOS. Soc Sci Inf 47:253\u2013274","journal-title":"Soc Sci Inf"},{"key":"1349_CR16","first-page":"37","volume":"262","author":"T Keenan","year":"2008","unstructured":"Keenan T (2008) On the internet, things never go away completely. IFIP Int Fed Inf Process 262:37\u201350","journal-title":"IFIP Int Fed Inf Process"},{"issue":"1","key":"1349_CR17","first-page":"77","volume":"1","author":"N Kryvinska","year":"2010","unstructured":"Kryvinska N, Thanh DV, Strauss C (2010) Integrated management platform for seamless services provisioning in converged network. Int J Inf Technol Commun Converg 1(1):77\u201391","journal-title":"Int J Inf Technol Commun Converg"},{"key":"1349_CR18","unstructured":"Lee S, Kim H, Lee S, Lim J (2005) Digital evidence collection process in integrity and memory information gathering. In: Proceedings of Systematic Approaches to Digital Forensic Engineering. First International Work-shop. Proc. IEEE, pp. 236\u2013247"},{"key":"1349_CR19","doi-asserted-by":"crossref","unstructured":"Simon M, Slay J (2010) Recovery of skype application activity data from physical memory. Proceedings of the 5th international conference on availability, reliability and security. IEEE Publication, Krakow, Poland, pp 283\u2013288","DOI":"10.1109\/ARES.2010.73"},{"key":"1349_CR20","first-page":"263","volume":"4","author":"L Nan","year":"2009","unstructured":"Nan L, Guanling C (2009) Analysis of a location-based social network. Int Conf Comput Sci Eng 4:263\u2013270, August 2009, Vancouver, Canada","journal-title":"Int Conf Comput Sci Eng"},{"key":"1349_CR21","unstructured":"Nance K, Hay B, Bishop M (2009) Digital forensics: defining a research agenda. In: Proceedings of the 42nd Hawaii International Conference on System Sciences. IEEE Press, Waikoloa, HI, USA, Jan 2009"},{"key":"1349_CR22","unstructured":"PAPAGO. http:\/\/www.mactiontech.com"},{"key":"1349_CR23","unstructured":"Schapsis C (2010) Location based social networks links: a list of location based social networks, [online]. http:\/\/bdnooz.com\/lbsnlocation-based-social-networking-links\/"},{"key":"1349_CR24","doi-asserted-by":"crossref","unstructured":"Skeels MM, Grudin J (2009) When social networks cross boundaries: a case study of workplace use of facebook and linkedin. In: Proceedings of the ACM 2009 international conference on Supporting group work, Sanibel Island, Florida","DOI":"10.1145\/1531674.1531689"},{"key":"1349_CR25","doi-asserted-by":"crossref","first-page":"388","DOI":"10.1007\/978-3-642-04438-0_33","volume":"5450","author":"H Sohn","year":"2009","unstructured":"Sohn H, Ro YM, Plataniotis KN (2009) Content sharing based on personal information in virtually secured space. Lect Notes Comput Sci 5450:388\u2013400","journal-title":"Lect Notes Comput Sci"},{"issue":"1","key":"1349_CR26","first-page":"1","volume":"3","author":"C Strawn","year":"2009","unstructured":"Strawn C (2009) Expanding the potential for GPS evidence acquisition. Small Scale Digit Device Forensic J 3(1):1\u201312","journal-title":"Small Scale Digit Device Forensic J"},{"key":"1349_CR27","doi-asserted-by":"crossref","unstructured":"Troshynski E, Lee C, Dourish P (2008) Accountabilities of presence: reframing location-based systems. In: Proceeding of the twenty-sixth annual SIGCHI conference on Human factors in computing systems, Florence, Italy","DOI":"10.1145\/1357054.1357133"},{"key":"1349_CR28","doi-asserted-by":"crossref","unstructured":"Tsai JY, Kelley P (2009) Who\u2019s viewed you?: the impact of feedback in a mobile location-sharing application. In: Proceedings of the 27th international conference on Human factors in computing systems, Boston, MA","DOI":"10.1145\/1518701.1519005"},{"key":"1349_CR29","unstructured":"Walters A, Petroni N (2007) Volatools: integrating volatile memory forensics into the digital investigation process. Blackhat Federal, Washington, DC"},{"key":"1349_CR30","doi-asserted-by":"crossref","unstructured":"Wang JL, Loui M (2009) Privacy and ethical issues in location-based tracking systems. In: Proceedings of the IEEE Symposium on Technology and Society, Phoenix, Arizona","DOI":"10.1109\/ISTAS.2009.5155910"},{"issue":"1","key":"1349_CR31","first-page":"31","volume":"2","author":"L Xiong","year":"2011","unstructured":"Xiong L, Tan Q (2011) A configurable approach to toleration of soft errors via partial software protection. J Converg 2(1):31\u201338","journal-title":"J Converg"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-012-1349-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11042-012-1349-9\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-012-1349-9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,7,10]],"date-time":"2019-07-10T22:06:57Z","timestamp":1562796417000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11042-012-1349-9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,3,13]]},"references-count":31,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2014,7]]}},"alternative-id":["1349"],"URL":"https:\/\/doi.org\/10.1007\/s11042-012-1349-9","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"value":"1380-7501","type":"print"},{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2013,3,13]]}}}