{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2023,9,11]],"date-time":"2023-09-11T22:25:29Z","timestamp":1694471129105},"reference-count":32,"publisher":"Elsevier BV","issue":"3","license":[{"start":{"date-parts":[[2012,6,1]],"date-time":"2012-06-01T00:00:00Z","timestamp":1338508800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Computer Law & Security Review"],"published-print":{"date-parts":[[2012,6]]},"DOI":"10.1016\/j.clsr.2012.03.006","type":"journal-article","created":{"date-parts":[[2012,5,22]],"date-time":"2012-05-22T11:17:19Z","timestamp":1337685439000},"page":"335-339","source":"Crossref","is-referenced-by-count":6,"title":["Digital evidence from mobile telephone applications"],"prefix":"10.1016","volume":"28","author":[{"given":"Mark","family":"Taylor","sequence":"first","affiliation":[]},{"given":"Glyn","family":"Hughes","sequence":"additional","affiliation":[]},{"given":"John","family":"Haggerty","sequence":"additional","affiliation":[]},{"given":"David","family":"Gresty","sequence":"additional","affiliation":[]},{"given":"Peter","family":"Almond","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/j.clsr.2012.03.006_bib1","series-title":"Good practice guide for computer-based electronic evidence, Version 4","author":"ACPO","year":"2007"},{"issue":"3","key":"10.1016\/j.clsr.2012.03.006_bib2","doi-asserted-by":"crossref","first-page":"216","DOI":"10.1016\/j.avb.2008.03.007","article-title":"The internet and child sexual offending: a criminological review","volume":"13","author":"Beech","year":"2008","journal-title":"Aggression and Violent Behavior"},{"key":"10.1016\/j.clsr.2012.03.006_bib3","doi-asserted-by":"crossref","first-page":"136","DOI":"10.1016\/j.diin.2010.01.004","article-title":"Introduction to windows mobile forensics","volume":"6","author":"Casey","year":"2010","journal-title":"Digital Investigations"},{"key":"10.1016\/j.clsr.2012.03.006_bib4","series-title":"Children and mobile phones: an agenda for action","author":"Childnet","year":"2004"},{"key":"10.1016\/j.clsr.2012.03.006_bib5","series-title":"UK Computer Misuse Act 1990","author":"CMA","year":"1990"},{"key":"10.1016\/j.clsr.2012.03.006_bib6","series-title":"UK Communications Act 2003","author":"COMA","year":"2003"},{"issue":"3","key":"10.1016\/j.clsr.2012.03.006_bib7","doi-asserted-by":"crossref","first-page":"15","DOI":"10.4018\/jdcf.2010070102","article-title":"Mobile phone forensic analysis","volume":"2","author":"Curran","year":"2010","journal-title":"International Journal of Digital Crime and Forensics"},{"key":"10.1016\/j.clsr.2012.03.006_bib8","series-title":"Mobile phone tracking from crystal ball","author":"Crystal ball","year":"2011"},{"key":"10.1016\/j.clsr.2012.03.006_bib9","series-title":"Digital Economy Act 2010","author":"DEA","year":"2010"},{"key":"10.1016\/j.clsr.2012.03.006_bib10","series-title":"Moves for a crime-free mobile phone","author":"Directgov","year":"2010"},{"key":"10.1016\/j.clsr.2012.03.006_bib11","doi-asserted-by":"crossref","first-page":"121","DOI":"10.1016\/j.diin.2008.05.010","article-title":"An overall assessment of mobile internal acquisition tool","volume":"5","author":"Distefano","year":"2008","journal-title":"Digital Investigation"},{"key":"10.1016\/j.clsr.2012.03.006_bib12","series-title":"UK Data Protection Act 1998","author":"DPA","year":"1998"},{"issue":"14","key":"10.1016\/j.clsr.2012.03.006_bib13","doi-asserted-by":"crossref","first-page":"78","DOI":"10.1049\/et:20081420","article-title":"Mobile\u2019s game of risk","volume":"3","author":"Edwards","year":"2008","journal-title":"IEEE Engineering and Technology"},{"key":"10.1016\/j.clsr.2012.03.006_bib14","series-title":"EnCase smartphone examiner","author":"EnCase","year":"2011"},{"issue":"1","key":"10.1016\/j.clsr.2012.03.006_bib15","doi-asserted-by":"crossref","first-page":"50","DOI":"10.1109\/MSP.2009.26","article-title":"Understanding android security","volume":"7","author":"Enck","year":"2009","journal-title":"IEEE Security and Privacy"},{"key":"10.1016\/j.clsr.2012.03.006_bib16","series-title":"The federation against copyright theft","author":"FACT","year":"2011"},{"key":"10.1016\/j.clsr.2012.03.006_bib17","series-title":"FTK mobile phone examiner","author":"FTK","year":"2011"},{"key":"10.1016\/j.clsr.2012.03.006_bib18","doi-asserted-by":"crossref","first-page":"12","DOI":"10.1016\/S1361-3723(08)70127-1","article-title":"Beyond the PIN: enhancing user authentication for mobile devices","volume":"8","author":"Furnell","year":"2008","journal-title":"Computer Fraud and Security"},{"issue":"4","key":"10.1016\/j.clsr.2012.03.006_bib19","doi-asserted-by":"crossref","first-page":"204","DOI":"10.1108\/09685221011079171","article-title":"Exploring the supply of pirate software for mobile devices: an analysis of software types and piracy groups","volume":"18","author":"Goode","year":"2010","journal-title":"Information Management and Computer Security"},{"issue":"3","key":"10.1016\/j.clsr.2012.03.006_bib20","first-page":"251","article-title":"The effect of the digital Economy Act 2010 upon semiotic democracy, International review of law","volume":"24","author":"Griffin","year":"2010","journal-title":"Computers and Technology"},{"issue":"3","key":"10.1016\/j.clsr.2012.03.006_bib21","doi-asserted-by":"crossref","first-page":"295","DOI":"10.1108\/13590790810882883","article-title":"Identity theft complaints: exploring the state-level correlates","volume":"15","author":"Higgins","year":"2008","journal-title":"Journal of Financial Crime"},{"issue":"4","key":"10.1016\/j.clsr.2012.03.006_bib22","doi-asserted-by":"crossref","first-page":"387","DOI":"10.1504\/IJESDF.2009.027671","article-title":"Criminal investigation and forensic tools for smartphones","volume":"2","author":"Jahankhani","year":"2009","journal-title":"International Journal of Electronic Security and Digital Forensics"},{"issue":"5","key":"10.1016\/j.clsr.2012.03.006_bib32","doi-asserted-by":"crossref","first-page":"12","DOI":"10.1109\/MC.2008.159","article-title":"Is it finally time to worry about mobile malware?","volume":"41","author":"Lawton","year":"2008","journal-title":"IEEE Computer"},{"issue":"5","key":"10.1016\/j.clsr.2012.03.006_bib23","first-page":"12","article-title":"Mobile phones: the next frontier for hackers?","volume":"41","author":"Leavitt","year":"2005","journal-title":"IEEE Computer"},{"issue":"6","key":"10.1016\/j.clsr.2012.03.006_bib24","doi-asserted-by":"crossref","first-page":"132","DOI":"10.1145\/1516046.1516080","article-title":"Forensics of computers and handheld devices: identical or fraternal twins?","volume":"52","author":"Lim","year":"2009","journal-title":"Communications of the ACM"},{"key":"10.1016\/j.clsr.2012.03.006_bib25","series-title":"UK money laundering regulations","author":"MLR","year":"2007"},{"key":"10.1016\/j.clsr.2012.03.006_bib26","series-title":"UK Police and Justice Act 2006","author":"PJA","year":"2006"},{"key":"10.1016\/j.clsr.2012.03.006_bib27","unstructured":"R V Emmanuel Nimley (2010) [2010] EWCA Crim 2752."},{"key":"10.1016\/j.clsr.2012.03.006_bib28","unstructured":"R V Gerald Bourne (2011) [2011] EWCA Crim 1671."},{"key":"10.1016\/j.clsr.2012.03.006_bib29","series-title":"UK regulation of Investigatory Powers Act 2000","author":"RIPA","year":"2000"},{"issue":"4","key":"10.1016\/j.clsr.2012.03.006_bib30","doi-asserted-by":"crossref","first-page":"478","DOI":"10.1108\/02635570810868344","article-title":"Security aspects of mobile phone virus: a critical survey","volume":"108","author":"Shih","year":"2008","journal-title":"Industrial Management and Data Systems"},{"key":"10.1016\/j.clsr.2012.03.006_bib31","doi-asserted-by":"crossref","first-page":"74","DOI":"10.1016\/j.diin.2010.05.010","article-title":"Live memory forensics of mobile phones","volume":"7","author":"Thing","year":"2010","journal-title":"Digital Investigations"}],"container-title":["Computer Law & Security Review"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0267364912000581?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0267364912000581?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2018,11,23]],"date-time":"2018-11-23T09:22:45Z","timestamp":1542964965000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0267364912000581"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,6]]},"references-count":32,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2012,6]]}},"alternative-id":["S0267364912000581"],"URL":"http:\/\/dx.doi.org\/10.1016\/j.clsr.2012.03.006","relation":{},"ISSN":["0267-3649"],"issn-type":[{"value":"0267-3649","type":"print"}],"subject":[],"published":{"date-parts":[[2012,6]]}}}