The platform will undergo maintenance on Sep 14 at about 7:45 AM EST and will be unavailable for approximately 2 hours.
2015
DOI: 10.1080/00450618.2015.1066854
|View full text |Cite
|
Sign up to set email alerts
|

Investigating Social Networking applications on smartphones detecting Facebook, Twitter, LinkedIn and Google+ artefacts on Android and iOS platforms

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
17
0
2

Year Published

2016
2016
2019
2019

Publication Types

Select...
6
3

Relationship

3
6

Authors

Journals

citations
Cited by 67 publications
(25 citation statements)
references
References 30 publications
0
17
0
2
Order By: Relevance
“…In [ 57 ], for instance, researchers were able to recover important details related to bank accounts and financial transactions from mobile banking applications. It was also found that remnants of social networking applications installed on smartphones (such as Twitter and LinkedIn applications) could be utilized for revealing personal information about smartphone users and understanding their social contexts [ 60 ]. Cloud storage mobile applications have also been found to store important information that could be useful for inferring knowledge about the types of files users share and for constructing useful information about users’ activities [ 61 67 ].…”
Section: Related Workmentioning
confidence: 99%
“…In [ 57 ], for instance, researchers were able to recover important details related to bank accounts and financial transactions from mobile banking applications. It was also found that remnants of social networking applications installed on smartphones (such as Twitter and LinkedIn applications) could be utilized for revealing personal information about smartphone users and understanding their social contexts [ 60 ]. Cloud storage mobile applications have also been found to store important information that could be useful for inferring knowledge about the types of files users share and for constructing useful information about users’ activities [ 61 67 ].…”
Section: Related Workmentioning
confidence: 99%
“…Iqbal et al, Hirst and Feiguina, Afroz et al, and Chen et al all profile users' writing styles by extracting lexical and syntactic information from the users' text. Iqbal et al used decision trees and support vector machine to determine authorship of 2000 emails from about 160 employees in the Enron Company (this data set has also been used in a number of forensic investigations). Their first experiment shows that the accuracy can reach up to 80% when there are no more than 10 suspects .…”
Section: Related Workmentioning
confidence: 99%
“…For example, researchers are focusing their efforts on extracting cloud storage information from client cloud software such as Dropbox and Google Drive [32,33,35], social networking applications such as Facebook, Twitter and Google+ [65], and different mobile devices [37,38]. Other researchers are working on techniques to deal with the large amount of data found on the cloud.…”
Section: Discussionmentioning
confidence: 99%