{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T11:17:51Z","timestamp":1730200671558,"version":"3.28.0"},"reference-count":11,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,10]]},"DOI":"10.1109\/bigdata.2015.7364119","type":"proceedings-article","created":{"date-parts":[[2015,12,28]],"date-time":"2015-12-28T16:36:21Z","timestamp":1451320581000},"page":"2910-2912","source":"Crossref","is-referenced-by-count":0,"title":["A case study to apply mobile technology into individual's local community"],"prefix":"10.1109","author":[{"given":"Yunkai","family":"Liu","sequence":"first","affiliation":[]},{"given":"Christopher","family":"Magno","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref4","first-page":"431","volume":"34","author":"dodge","year":"2007","journal-title":"Outlines of a world coming into existence Pervasive computing and the ethics of forgetting Environment and Planning B"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1111\/j.0197-6664.2004.00040.x"},{"key":"ref10","first-page":"14","article-title":"Location based services using android mobile operating system","volume":"1","author":"kushwaha","year":"2011","journal-title":"International Journal of Advances in Engineering & Technology"},{"journal-title":"Big Data and privacy A technological perspective","article-title":"Executive Office of the President","year":"2014","key":"ref6"},{"key":"ref11","article-title":"Crowdsafe: crowd sourcing of crime incidents and safe routing on mobile devices","author":"sumit","year":"2011","journal-title":"Proceedings of the 19th ACM SIGSPATIAL International Conference on Advances in Geographic Information Systems"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1561\/1500000033"},{"key":"ref8","article-title":"Android forensics: investigation","author":"hoog","year":"2011","journal-title":"analysis and mobile security for Google Android"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/MPRV.2008.34"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1007\/BF00922689"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1016\/j.diin.2013.06.002"},{"journal-title":"Rrisk Society Toward a New Modernity","year":"1992","author":"risk","key":"ref1"}],"event":{"name":"2015 IEEE International Conference on Big Data (Big Data)","start":{"date-parts":[[2015,10,29]]},"location":"Santa Clara, CA, USA","end":{"date-parts":[[2015,11,1]]}},"container-title":["2015 IEEE International Conference on Big Data (Big Data)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7347101\/7363706\/07364119.pdf?arnumber=7364119","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,24]],"date-time":"2017-03-24T15:59:18Z","timestamp":1490371158000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7364119\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,10]]},"references-count":11,"URL":"https:\/\/doi.org\/10.1109\/bigdata.2015.7364119","relation":{},"subject":[],"published":{"date-parts":[[2015,10]]}}}