{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,2]],"date-time":"2026-01-02T07:24:48Z","timestamp":1767338688007,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":30,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,8,25]],"date-time":"2020-08-25T00:00:00Z","timestamp":1598313600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,8,25]]},"DOI":"10.1145\/3407023.3409213","type":"proceedings-article","created":{"date-parts":[[2020,8,25]],"date-time":"2020-08-25T10:24:32Z","timestamp":1598351072000},"page":"1-9","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":8,"title":["4P based forensics investigation framework for smart connected toys"],"prefix":"10.1145","author":[{"given":"Benjamin","family":"Yankson","sequence":"first","affiliation":[{"name":"University at Albany"}]},{"given":"Farkhund","family":"Iqbal","sequence":"additional","affiliation":[{"name":"Zayed University, Abu Dhabi"}]},{"given":"Patrick C. K.","family":"Hung","sequence":"additional","affiliation":[{"name":"OntarioTech University, Oshawa, Ontario"}]}],"member":"320","published-online":{"date-parts":[[2020,8,25]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"MarketWatch, 2019","author":"Market Connected Toys","year":"2018","unstructured":"Marketwatch.com, \" Connected Toys Market 2018 -2026 with data by product types, applications, and regional analysis \", MarketWatch, 2019 . [Online]. Available:https:\/\/www.marketwatch.com\/press-release\/connected-toys-market- 2018-2026-with-data-by-product-types-applications-and-regional-analysis-2019-01-31. [Accessed: 18-Jun-2019]. Marketwatch.com, \"Connected Toys Market 2018-2026 with data by product types, applications, and regional analysis\", MarketWatch, 2019. [Online]. Available:https:\/\/www.marketwatch.com\/press-release\/connected-toys-market-2018-2026-with-data-by-product-types-applications-and-regional-analysis-2019-01-31. [Accessed: 18-Jun-2019]."},{"key":"e_1_3_2_1_2_1","volume-title":"N. Bill, \"Guide to Computer Forensics and Investigations.\"","year":"2016","unstructured":"N. Bill, \"Guide to Computer Forensics and Investigations.\" 5 th Edition. Published by Thomson Course Technology , 2016 . N. Bill, \"Guide to Computer Forensics and Investigations.\" 5th Edition. Published by Thomson Course Technology, 2016.","edition":"5"},{"key":"e_1_3_2_1_3_1","volume-title":"New Barbie 'Video Girl' doll could be used for child porn","author":"Martinez M.","year":"2010","unstructured":"M. Martinez , \"FBI : New Barbie 'Video Girl' doll could be used for child porn .\" 2010 . [Online]. Available:http:\/\/newsroom.blogs.cnn.com\/2010\/12\/06\/fbi-new-barbie-video-girl-doll-could-be-used-for-child-porn-2\/ [Accessed : 31-Jul. -2019] M. Martinez, \"FBI: New Barbie 'Video Girl' doll could be used for child porn.\" 2010. [Online]. Available:http:\/\/newsroom.blogs.cnn.com\/2010\/12\/06\/fbi-new-barbie-video-girl-doll-could-be-used-for-child-porn-2\/ [Accessed : 31-Jul. -2019]"},{"key":"e_1_3_2_1_4_1","unstructured":"P. C. K. Hung \"Children Privacy Protection Engine for Smart Anthropomorphic Toys Proposal.\" 2015.  P. C. K. Hung \"Children Privacy Protection Engine for Smart Anthropomorphic Toys Proposal.\" 2015."},{"key":"e_1_3_2_1_5_1","first-page":"6","volume-title":"A Framework for Context-Aware Privacy of Sensor Data on Mobile Systems,\" the Fourteenth Workshop on Mobile Computing Systems and Applications","author":"Chakraborty S.","unstructured":"S. Chakraborty , K. R. Raghavan , M. P. Johnson , and M. B. Srivastava , \" A Framework for Context-Aware Privacy of Sensor Data on Mobile Systems,\" the Fourteenth Workshop on Mobile Computing Systems and Applications , pp. 6 . 2013. S. Chakraborty, K. R. Raghavan, M. P. Johnson, and M. B. Srivastava, \"A Framework for Context-Aware Privacy of Sensor Data on Mobile Systems,\" the Fourteenth Workshop on Mobile Computing Systems and Applications, pp. 6. 2013."},{"key":"e_1_3_2_1_6_1","volume-title":"11th International Conference on Information and Communication Systems (ICICS)","author":"Haifa H.","year":"2020","unstructured":"H. Haifa , M. Yousef , S. Shaima & F. Iqbal , \"State of the Art in Digital Forensics for Small Scale Digital Devices\". 11th International Conference on Information and Communication Systems (ICICS) , 2020 H. Haifa, M. Yousef, S. Shaima & F. Iqbal, \"State of the Art in Digital Forensics for Small Scale Digital Devices\". 11th International Conference on Information and Communication Systems (ICICS), 2020"},{"key":"e_1_3_2_1_7_1","article-title":"A Systematic Approach Toward Description and Classification of Cybercrime Incidents","author":"Tsakalidis G.","year":"2017","unstructured":"G. Tsakalidis , and K. Vergidis \" A Systematic Approach Toward Description and Classification of Cybercrime Incidents ,\" IEEE Transactions on Systems, Man, and Cybernetics: Systems. 2017 . G. Tsakalidis, and K. Vergidis \"A Systematic Approach Toward Description and Classification of Cybercrime Incidents,\" IEEE Transactions on Systems, Man, and Cybernetics: Systems. 2017.","journal-title":"IEEE Transactions on Systems, Man, and Cybernetics: Systems."},{"key":"e_1_3_2_1_8_1","unstructured":"FBI and NW3C \"2014 Internet Crime Report\". 2015. [Online]. Available:https:\/\/pdf.ic3.gov\/2014_IC3Report.pdf [Accessed on July 21 2017].  FBI and NW3C \"2014 Internet Crime Report\". 2015. [Online]. Available:https:\/\/pdf.ic3.gov\/2014_IC3Report.pdf [Accessed on July 21 2017]."},{"key":"e_1_3_2_1_9_1","volume-title":"Available: http:\/\/www.coe.int\/el\/web\/conventions\/full-list\/-\/. [Accessed","author":"Council of Europe, \"Convention on Cybercrime.\" Nov. 23, 2001. [Online].","year":"2017","unstructured":"Council of Europe, \"Convention on Cybercrime.\" Nov. 23, 2001. [Online]. Available: http:\/\/www.coe.int\/el\/web\/conventions\/full-list\/-\/. [Accessed : Jul. 21, 2017 ]. Council of Europe, \"Convention on Cybercrime.\" Nov. 23, 2001. [Online]. Available: http:\/\/www.coe.int\/el\/web\/conventions\/full-list\/-\/. [Accessed: Jul. 21, 2017]."},{"key":"e_1_3_2_1_10_1","unstructured":"\"Internet Crime Complaint Center (IC3) | Search.\" [Online]. Available:https:\/\/www.ic3.gov\/search.aspx?q=\"personal_choice_outfitters\"&p=4. [Accessed: 22-May-2020].  \"Internet Crime Complaint Center (IC3) | Search.\" [Online]. Available:https:\/\/www.ic3.gov\/search.aspx?q=\"personal_choice_outfitters\"&p=4. [Accessed: 22-May-2020]."},{"key":"e_1_3_2_1_11_1","unstructured":"P. C. K. Hung \"Children Privacy Protection Engine for Smart Anthropomorphic Toys Proposal.\" 2015.  P. C. K. Hung \"Children Privacy Protection Engine for Smart Anthropomorphic Toys Proposal.\" 2015."},{"key":"e_1_3_2_1_12_1","volume-title":"The Intercept","author":"McLaughlin J.","year":"2016","unstructured":"J. McLaughlin , \" New Court Filing Reveals Apple Faces 12 Other Requests to Break Into Locked iPhones\". The Intercept . February 23, 2016 . J. McLaughlin, \"New Court Filing Reveals Apple Faces 12 Other Requests to Break Into Locked iPhones\". The Intercept. February 23, 2016."},{"key":"e_1_3_2_1_13_1","volume-title":"Sep. 30, 2014. [Online]. Available: http:\/\/www.pwccn.com\/webmedia\/doc\/635527689739110925_rcs_info_security_2015","author":"\"The Global State of Information Security_Survey","year":"2015","unstructured":"PricewaterhouseCoopers, \"The Global State of Information Security_Survey 2015 ---Managing Cyber Risks in an Interconnected World \". Sep. 30, 2014. [Online]. Available: http:\/\/www.pwccn.com\/webmedia\/doc\/635527689739110925_rcs_info_security_2015 .pdf. [Accessed: Jul. 21, 2017]. PricewaterhouseCoopers, \"The Global State of Information Security_Survey 2015---Managing Cyber Risks in an Interconnected World\". Sep. 30, 2014. [Online]. Available: http:\/\/www.pwccn.com\/webmedia\/doc\/635527689739110925_rcs_info_security_2015.pdf. [Accessed: Jul. 21, 2017]."},{"key":"e_1_3_2_1_14_1","volume-title":"2.3.4 Payload","author":"Howard F.","year":"2012","unstructured":"F. Howard , \" Exploring the Blackhole exploit kit : 2.3.4 Payload \". March 29, 2012 . [Online]. Available:https:\/\/nakedsecurity.sophos.com\/exploringthe-blackhole-exploitkit14\/. [Accessed: 31-Jul-2019]. F. Howard, \"Exploring the Blackhole exploit kit: 2.3.4 Payload\". March 29, 2012. [Online]. Available:https:\/\/nakedsecurity.sophos.com\/exploringthe-blackhole-exploitkit14\/. [Accessed: 31-Jul-2019]."},{"key":"e_1_3_2_1_15_1","volume-title":"Scene of the Cybercrime","author":"Shinder D. L.","year":"2008","unstructured":"D. L. Shinder and M. Cross , Scene of the Cybercrime . Burlington, MA, USA : Syngress , 2008 . D. L. Shinder and M. Cross, Scene of the Cybercrime. Burlington, MA, USA: Syngress, 2008."},{"key":"e_1_3_2_1_16_1","volume-title":"A Study of Privacy Requirements for Smart Toys,\" The 20th Pacific Asia Conference on Information Systems (PACIS","author":"Hung P. C. K.","year":"2016","unstructured":"P. C. K. Hung , M. Fantinato , and L. Rafferty , \" A Study of Privacy Requirements for Smart Toys,\" The 20th Pacific Asia Conference on Information Systems (PACIS 2016 ), Chiayi , Taiwan, June 27 - July 1, 2016. P. C. K. Hung, M. Fantinato, and L. Rafferty, \"A Study of Privacy Requirements for Smart Toys,\" The 20th Pacific Asia Conference on Information Systems (PACIS 2016), Chiayi, Taiwan, June 27 - July 1, 2016."},{"key":"e_1_3_2_1_17_1","first-page":"2016","article-title":"Investigation of privacy and security issues with smart toys","volume":"2016","author":"Forbrukerra D.","unstructured":"D. Forbrukerra , \" Investigation of privacy and security issues with smart toys ,\" Available:https:\/\/fil.forbrukerradet.no\/wp-content\/uploads\/ 2016\/12 \/ 2016 - 2011 -technical-analysis-of-the-dolls-bouvet.pdf, Nov.2016. D. Forbrukerra, \"Investigation of privacy and security issues with smart toys,\" Available:https:\/\/fil.forbrukerradet.no\/wp-content\/uploads\/2016\/12\/2016-11-technical-analysis-of-the-dolls-bouvet.pdf, Nov.2016.","journal-title":"Available:https:\/\/fil.forbrukerradet.no\/wp-content\/uploads\/"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.clsr.2016.05.007"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-62072-5_9"},{"key":"e_1_3_2_1_20_1","first-page":"111","volume-title":"Security Tests for Smart Toys.\" ICEIS (2)","author":"de Carvalho L. G.","unstructured":"L. G. de Carvalho and M. M. Eler , \" Security Tests for Smart Toys.\" ICEIS (2) . pp. 111 . 2018. L. G. de Carvalho and M. M. Eler, \"Security Tests for Smart Toys.\" ICEIS (2). pp.111. 2018."},{"key":"e_1_3_2_1_21_1","article-title":"PDCA Based Privacy Preservation Framework","author":"Yankson B.","unstructured":"B. Yankson , \" PDCA Based Privacy Preservation Framework .\" International Journal of Information Security, Springer B. Yankson, \"PDCA Based Privacy Preservation Framework.\" International Journal of Information Security, Springer","journal-title":"International Journal of Information Security, Springer"},{"volume-title":"Sept.","year":"2015","key":"e_1_3_2_1_22_1","unstructured":"Rapid7. HACKING IoT: A Case Study on Baby Monitor Exposures and Vulnerabilities. https:\/\/www.rapid7.com\/docs\/Hacking-IoT-A-Case-Study-on-Baby-Monitor-Exposures-and-Vulnerabilities.pdf , Sept. 2015 . Rapid7. HACKING IoT: A Case Study on Baby Monitor Exposures and Vulnerabilities. https:\/\/www.rapid7.com\/docs\/Hacking-IoT-A-Case-Study-on-Baby-Monitor-Exposures-and-Vulnerabilities.pdf, Sept. 2015."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/MTS.2016.2527078"},{"key":"e_1_3_2_1_24_1","unstructured":"Inc. Somerset Recon \"Hello Barbie Initial Security Analysis \" Jan. 2016.  Inc. Somerset Recon \"Hello Barbie Initial Security Analysis \" Jan. 2016."},{"key":"e_1_3_2_1_25_1","first-page":"105","volume-title":"A spotlight on security and privacy risks with future household robots: attacks and lessons.\" The ACM international conference on Ubiquitous computing","author":"Denning T.","year":"2009","unstructured":"T. Denning , C. Matuszek , K. Koscher , J. R. Smith , and T. Kohno , \" A spotlight on security and privacy risks with future household robots: attacks and lessons.\" The ACM international conference on Ubiquitous computing pp. 105 -- 114 . 2009 . T. Denning, C. Matuszek, K. Koscher, J. R. Smith, and T. Kohno, \"A spotlight on security and privacy risks with future household robots: attacks and lessons.\" The ACM international conference on Ubiquitous computing pp. 105--114. 2009."},{"volume-title":"Forensics of \"Hello Barbie\" Smart Toy,\" Student Paper","author":"Dhanhani M.","key":"e_1_3_2_1_26_1","unstructured":"M. Dhanhani , B. AlRasebi , A. Nuaimi , and F. Iqbal , \" Forensics of \"Hello Barbie\" Smart Toy,\" Student Paper , Zayed University College of Technological Innovation M. Dhanhani, B. AlRasebi, A. Nuaimi, and F. Iqbal, \"Forensics of \"Hello Barbie\" Smart Toy,\" Student Paper, Zayed University College of Technological Innovation"},{"key":"e_1_3_2_1_27_1","unstructured":"Barbiemedia.com \"Mattel Focuses on Dad with New Campaign.\" Jan 23 2017. [Online]. Available:http:\/\/www.barbiemedia.com\/news\/detail\/150.html. \/. [Accessed: 31-Jul-2019].  Barbiemedia.com \"Mattel Focuses on Dad with New Campaign.\" Jan 23 2017. [Online]. Available:http:\/\/www.barbiemedia.com\/news\/detail\/150.html. \/. [Accessed: 31-Jul-2019]."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/CMI48017.2019.8962141"},{"key":"e_1_3_2_1_29_1","first-page":"1696","volume-title":"Proceedings of the 52nd Hawaii International Conference on System Sciences","author":"Yankson B.","year":"2019","unstructured":"B. Yankson , F. Iqbal , Z. Lu , X. Wang , and P.C.K Hung , P. \" Modelling Privacy Preservation in Smart Connected Toys by Petri-Nets ,\" Proceedings of the 52nd Hawaii International Conference on System Sciences , pp. 1696 -- 1705 , January 8 - 12 , 2019 . B. Yankson, F. Iqbal, Z. Lu, X. Wang, and P.C.K Hung, P. \"Modelling Privacy Preservation in Smart Connected Toys by Petri-Nets,\" Proceedings of the 52nd Hawaii International Conference on System Sciences, pp. 1696--1705, January 8 - 12, 2019."},{"key":"e_1_3_2_1_30_1","volume-title":"Every step you fake: A comparative analysis of fitness tracker privacy and security","author":"Hilts A.","year":"2016","unstructured":"A. Hilts , C. Parsons , and J. Knockel , \" Every step you fake: A comparative analysis of fitness tracker privacy and security ,\" 2016 . A. Hilts, C. Parsons, and J. Knockel, \"Every step you fake: A comparative analysis of fitness tracker privacy and security,\" 2016."}],"event":{"name":"ARES 2020: The 15th International Conference on Availability, Reliability and Security","acronym":"ARES 2020","location":"Virtual Event Ireland"},"container-title":["Proceedings of the 15th International Conference on Availability, Reliability and Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3407023.3409213","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3407023.3409213","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:41:23Z","timestamp":1750200083000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3407023.3409213"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,8,25]]},"references-count":30,"alternative-id":["10.1145\/3407023.3409213","10.1145\/3407023"],"URL":"https:\/\/doi.org\/10.1145\/3407023.3409213","relation":{},"subject":[],"published":{"date-parts":[[2020,8,25]]},"assertion":[{"value":"2020-08-25","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}