{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2023,7,11]],"date-time":"2023-07-11T11:41:02Z","timestamp":1689075662128},"reference-count":49,"publisher":"IGI Global","issue":"4","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,10,1]]},"abstract":"<p>While technology matures and becomes more productive, mobile devices can be affordable and, consequently, fully integrated in people's lives. After their unexpected bloom and acceptance, Online Social Networks are now sources of valuable information. The authors therefore use them for tasks varying from direct marketing to forensic analysis. The authors have already seen Social Network Forensics techniques focused on particular networks implementing methods that collect data from user accounts. During the forensic analysis it is common to aggregate information from different sources but, usually, this procedure causes correlation problems. Here, the authors present their method to correlate data gathered from various social networks in combination with smartphones creating a new form of social map of the user under investigation. In addition, the authors introduce a multi level graph that utilises the correlated information from the smartphone and the social networks and demonstrates in three dimensions the relevance of each contact with the suspect.<\/p>","DOI":"10.4018\/ijdcf.2013100103","type":"journal-article","created":{"date-parts":[[2014,3,21]],"date-time":"2014-03-21T13:53:20Z","timestamp":1395410000000},"page":"34-54","source":"Crossref","is-referenced-by-count":5,"title":["Multilevel Visualization Using Enhanced Social Network Analysis with Smartphone Data"],"prefix":"10.4018","volume":"5","author":[{"given":"Panagiotis","family":"Andriotis","sequence":"first","affiliation":[{"name":"University of Bristol, Bristol, UK"}]},{"given":"Zacharias","family":"Tzermias","sequence":"additional","affiliation":[{"name":"Institute of Computer Science, Foundation for Research and Technology Hellas, Heraklion, Greece"}]},{"given":"Anthi","family":"Mparmpaki","sequence":"additional","affiliation":[{"name":"Institute of Computer Science, Foundation for Research and Technology Hellas, Heraklion, Greece"}]},{"given":"Sotiris","family":"Ioannidis","sequence":"additional","affiliation":[{"name":"Institute of Computer Science, Foundation for Research and Technology Hellas, Heraklion, Greece"}]},{"given":"George","family":"Oikonomou","sequence":"additional","affiliation":[{"name":"University of Bristol, Bristol, UK"}]}],"member":"2432","reference":[{"key":"ijdcf.2013100103-0","unstructured":"A Facebook crime every 40 minutes: 12,300 cases are linked to the site. (2012). Mail Online. Retrieved April 26, 2013, from http:\/\/www.dailymail.co.uk\/news\/article-2154624\/A-Facebook-crime-40-minutes-12-300-cases-linked-site.html"},{"key":"ijdcf.2013100103-1","doi-asserted-by":"crossref","unstructured":"Andriotis, P., Oikonomou, G., & Tryfonas, T. (2012). Forensic analysis of wireless networking evidence of Android smartphones. In Proceedings of the 2012 IEEE International Workshop on Information Forensics and Security (WIFS) (pp. 109 - 114).","DOI":"10.1109\/WIFS.2012.6412634"},{"key":"ijdcf.2013100103-2","doi-asserted-by":"crossref","unstructured":"Bastian, M., Heymann, S., & Jacomy, M. (2009). Gephi: An open source software for exploring and manipulating networks. In Proceedings 3rd International AAAI Conference on Weblogs and Social Media, San Jose, CA (pp. 361-362).","DOI":"10.1609\/icwsm.v3i1.13937"},{"key":"ijdcf.2013100103-3","doi-asserted-by":"publisher","DOI":"10.1111\/j.1467-8659.2009.01687.x"},{"key":"ijdcf.2013100103-4","unstructured":"Developer rules of the road. (2013). Retrieved August 7, 2013, from http:\/\/dev.twitter.com.terms\/api-terms"},{"key":"ijdcf.2013100103-5","unstructured":"Documentation, Twitter developers. (2013). Retrieved April 26, 2013, from https:\/\/dev.twitter.com\/docs"},{"key":"ijdcf.2013100103-6","unstructured":"Downloading your info | Facebook Help Center. (2013). Facebook. Retrieved April 26, 2013, from http:\/\/www.facebook.com\/help\/131112897028467\/"},{"key":"ijdcf.2013100103-7","unstructured":"Facebook account lockout means better scam prevention. (2013). Digital Trends. Retrieved May 9, 2013, from http:\/\/www.digitaltrends.com\/social-media\/locking-you-out-of-your-facebook-account-is-the-new-way-to-prevent-scams\/"},{"key":"ijdcf.2013100103-8","unstructured":"Facebook has 83 million fake profiles. (n.d.). Retrieved May 9, 2013, from http:\/\/www.globalpost.com\/dispatch\/news\/business\/120802\/facebook-has-83-million-fake-profiles"},{"key":"ijdcf.2013100103-9","unstructured":"Facebook Newsroom. (2013). Key facts. Retrieved April 26, 2013, from http:\/\/newsroom.fb.com\/Key-Facts"},{"key":"ijdcf.2013100103-10","unstructured":"Facebook platform policies. (2013). Retrieved August 7, 2013, from http:\/\/developers.facebook.com\/policy"},{"key":"ijdcf.2013100103-11","unstructured":"Facebook report \u2013 Wolfram. (2013). Alpha. Retrieved April 26, 2013, from http:\/\/www.wolframalpha.com\/input\/?i=facebook%20report"},{"key":"ijdcf.2013100103-12","unstructured":"Facebook's name policy | Facebook Help Center. (n.d.). Facebook. Retrieved May 9, 2013, from https:\/\/www.facebook.com\/help\/292517374180078"},{"key":"ijdcf.2013100103-13","unstructured":"Facebook\/fbconsole \u2013 GitHub. (2013). Retrieved April 26, 2013, from https:\/\/github.com\/facebook\/fbconsole"},{"key":"ijdcf.2013100103-14","unstructured":"ForToo. (2013). Retrieved August 7, 2013, from http:\/\/www.fortoo.eu"},{"key":"ijdcf.2013100103-15","doi-asserted-by":"publisher","DOI":"10.1016\/j.diin.2010.05.009"},{"key":"ijdcf.2013100103-16","doi-asserted-by":"crossref","unstructured":"Gessiou, E., Athanasopoulos, E., & Ioannidis, S. (2011). Digging up social structures from documents on the web (Tech. Rep. No. 412). ICS - FORTH, Hellas.","DOI":"10.1109\/GLOCOM.2012.6503202"},{"key":"ijdcf.2013100103-17","unstructured":"GEXF file format. (2009). Retrieved August 7, 2013, from http:\/\/gexf.net\/format\/schema.html"},{"key":"ijdcf.2013100103-18","unstructured":"Global Smartphones Market 2012 \u2013 2016. (2013). Retrieved August 7, 2013, from http:\/\/www.technavio.com\/report\/global-smartphones-market-2012-2016"},{"key":"ijdcf.2013100103-19","unstructured":"Graph API \u2013 Facebook developers. (2013). Retrieved April 26, 2013, from https:\/\/developers.facebook.com\/docs\/reference\/api\/"},{"key":"ijdcf.2013100103-20","doi-asserted-by":"publisher","DOI":"10.1145\/2133806.2133821"},{"key":"ijdcf.2013100103-21","doi-asserted-by":"publisher","DOI":"10.1109\/2945.841119"},{"key":"ijdcf.2013100103-22","doi-asserted-by":"crossref","unstructured":"Huber, M., Mulazzani, M., Leithner, M., Schrittwieser, S., Wondracek, G., & Weippl, E. (2011). Social snapshots: Digital forensics for online social networks. In Proceedings of the 27th Annual Computer Security Applications Conference (ACSAC '11), New York, NY (pp. 113\u2013122).","DOI":"10.1145\/2076732.2076748"},{"key":"ijdcf.2013100103-23","unstructured":"infamous crimes committed and solved on Facebook [INFOGRAPHIC] (2013). Retrieved April 26, 2013, from http:\/\/mashable.com\/2012\/03\/01\/facebook-crimes\/5,000 people investigated by police for something they said on Facebook or Twitter as 'social network crime' soars 800%. (2013). Mail Online. Retrieved April 26, 2013, from http:\/\/www.dailymail.co.uk\/news\/article-2253692\/Facebook-Twitter-crime-sees-fold-increase-police-deal-5-000-cases-involving-websites.html"},{"key":"ijdcf.2013100103-24","doi-asserted-by":"crossref","unstructured":"Lampos, V., & Cristianini, N. (2011). Nowcasting events from the social web with statistical learning. ACM Transactions on Intelligent Systems and Technology (TIST), 3(4), 72:1-72:22.","DOI":"10.1145\/2337542.2337557"},{"key":"ijdcf.2013100103-25","doi-asserted-by":"publisher","DOI":"10.1111\/j.1740-9713.2012.00588.x"},{"key":"ijdcf.2013100103-26","unstructured":"Liverpool Echo. (2012). Reports of Facebook and Twitter crimes up by 400% in Merseyside, police figures show. Retrieved April 26, 2013, from http:\/\/www.liverpoolecho.co.uk\/liverpool-news\/local-news\/2012\/12\/28\/reports-of-facebook-and-twitter-crimes-up-by-400-in-merseyside-police-figures-show-100252-32504694\/"},{"key":"ijdcf.2013100103-27","doi-asserted-by":"crossref","unstructured":"Mao, H., Shuai, X., & Kapadia, A. (2011). Loose tweets: An analysis of privacy leaks on twitter. In Proceedings of the 10th Annual ACM Workshop on Privacy in the Electronic Society (WPES '11), New York, NY (pp. 1 \u2013 12).","DOI":"10.1145\/2046556.2046558"},{"key":"ijdcf.2013100103-28","doi-asserted-by":"crossref","unstructured":"Martin, S., Brown, W. M., Klavans, R., & Boyack, K. W. (2011). OpenOrd: An open-source toolbox for large graph layout. In Proceedings of the SPIE 7868, Visualization and Data Analysis 2011, 786809, CA.","DOI":"10.1117\/12.871402"},{"key":"ijdcf.2013100103-29","first-page":"427","article-title":"Interactive 3D graphs for web-based social networking platforms.","volume":"3","author":"N.Mattar","year":"2011","journal-title":"International Journal of Computer Information Systems and Industrial Management Applications"},{"key":"ijdcf.2013100103-30","doi-asserted-by":"crossref","unstructured":"Munzner, T. (1997). H3: Laying out large directed graphs in 3D hyperbolic space. In Proceedings of IEEE Symposium of Information Visualization, Phoenix, AZ (pp 2 - 10).","DOI":"10.1109\/INFVIS.1997.636718"},{"key":"ijdcf.2013100103-31","doi-asserted-by":"publisher","DOI":"10.1016\/j.diin.2012.05.007"},{"key":"ijdcf.2013100103-32","unstructured":"Nearly 75 percent of U.S. Android smartphone users accessed Facebook\u2019s website or app from their phones in March, according to NPD\u2019s connected intelligence. (2012). Retrieved August 7, 2013, from http:\/\/www.prweb.com\/releases\/2012\/5\/prweb9519156.htm"},{"key":"ijdcf.2013100103-33","doi-asserted-by":"publisher","DOI":"10.1006\/jvlc.1998.0086"},{"key":"ijdcf.2013100103-34","doi-asserted-by":"publisher","DOI":"10.1111\/j.1467-8659.2008.01231.x"},{"key":"ijdcf.2013100103-35","doi-asserted-by":"crossref","unstructured":"Read, H., Blyth, A., & Sutherland, I. (2009). A unified approach to network traffic and network security visualization. In Proceedings of the 2009 IEEE international conference on Communications (ICC'09) (pp. 614 \u2013 619). IEEE Press.","DOI":"10.1109\/ICC.2009.5198685"},{"key":"ijdcf.2013100103-36","doi-asserted-by":"publisher","DOI":"10.1109\/MCG.2009.48"},{"key":"ijdcf.2013100103-37","doi-asserted-by":"publisher","DOI":"10.1109\/MCG.2013.37"},{"key":"ijdcf.2013100103-38","unstructured":"Skype Community. (2012). Is chat history stored on Skype servers? Retrieved April 26, 2013, from http:\/\/community.skype.com\/t5\/Security-Privacy-Trust-and\/Is-chat-history-stored-on-Skype-servers\/td-p\/472379"},{"key":"ijdcf.2013100103-39","unstructured":"Skype Logs Reader\/Viewer (.dbb and main.db files). (2012). Retrieved May 8, 2013, from http:\/\/www.nirsoft.net\/utils\/skype_log_view.html"},{"key":"ijdcf.2013100103-40","unstructured":"Skype privacy policy. (2013). Retrieved August 7, 2013, from http:\/\/www.skype.com\/en\/legal\/privacy"},{"key":"ijdcf.2013100103-41","unstructured":"SkypeHistoryViewer. (2013). Free software downloads at SourceForge.net. Retrieved May 8, 2013, from http:\/\/sourceforge.net\/projects\/skypehistory\/"},{"key":"ijdcf.2013100103-42","doi-asserted-by":"publisher","DOI":"10.1016\/0378-8733(91)90008-H"},{"key":"ijdcf.2013100103-43","unstructured":"sqlite3 - DB-API 2.0 interface for SQLite databases - Python v2.7.4 documentation. (2013). Retrieved May 8, 2013, from http:\/\/docs.python.org\/2\/library\/sqlite3.html"},{"key":"ijdcf.2013100103-44","unstructured":"Supported graph formats. (2012). Retrieved August 7, 2013, from http:\/\/gephi.org\/users\/supported-graph-formats\/"},{"key":"ijdcf.2013100103-45","unstructured":"Twitter blog: Your Twitter archive. (2012). Retrieved April 26, 2013, from http:\/\/blog.twitter.com\/2012\/12\/your-twitter-archive.html"},{"key":"ijdcf.2013100103-46","unstructured":"Twitter to surpass 500 million registered users on Wednesday \u2013 AllTwitter. (2012). Retrieved April 26, 2013, from http:\/\/www.mediabistro.com\/alltwitter\/500-million-registered-users_b18842"},{"key":"ijdcf.2013100103-47","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2012.09.006"},{"key":"ijdcf.2013100103-48","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511815478"}],"container-title":["International Journal of Digital Crime and Forensics"],"original-title":[],"language":"ng","link":[{"URL":"https:\/\/www.igi-global.com\/viewtitle.aspx?TitleId=103936","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,7,11]],"date-time":"2023-07-11T11:24:42Z","timestamp":1689074682000},"score":1,"resource":{"primary":{"URL":"https:\/\/services.igi-global.com\/resolvedoi\/resolve.aspx?doi=10.4018\/ijdcf.2013100103"}},"subtitle":[""],"short-title":[],"issued":{"date-parts":[[2013,10,1]]},"references-count":49,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2013,10]]}},"URL":"https:\/\/doi.org\/10.4018\/ijdcf.2013100103","relation":{},"ISSN":["1941-6210","1941-6229"],"issn-type":[{"value":"1941-6210","type":"print"},{"value":"1941-6229","type":"electronic"}],"subject":[],"published":{"date-parts":[[2013,10,1]]}}}