{"id":"https://openalex.org/W4327939547","doi":"https://doi.org/10.1016/j.fsidi.2023.301502","title":"Discovering spoliation of evidence through identifying traces on deleted files in macOS","display_name":"Discovering spoliation of evidence through identifying traces on deleted files in macOS","publication_year":2023,"publication_date":"2023-03-01","ids":{"openalex":"https://openalex.org/W4327939547","doi":"https://doi.org/10.1016/j.fsidi.2023.301502"},"language":"en","primary_location":{"is_oa":true,"landing_page_url":"https://doi.org/10.1016/j.fsidi.2023.301502","pdf_url":null,"source":{"id":"https://openalex.org/S4210178067","display_name":"Forensic Science International Digital Investigation","issn_l":"2666-2817","issn":["2666-2817","2666-2825"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320990","host_organization_name":"Elsevier BV","host_organization_lineage":["https://openalex.org/P4310320990"],"host_organization_lineage_names":["Elsevier BV"],"type":"journal"},"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true},"type":"article","type_crossref":"journal-article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"hybrid","oa_url":"https://doi.org/10.1016/j.fsidi.2023.301502","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5045624408","display_name":"Jihun Joun","orcid":"https://orcid.org/0000-0002-5294-4113"},"institutions":[{"id":"https://openalex.org/I197347611","display_name":"Korea University","ror":"https://ror.org/047dqcg40","country_code":"KR","type":"education","lineage":["https://openalex.org/I197347611"]}],"countries":["KR"],"is_corresponding":false,"raw_author_name":"Jihun Joun","raw_affiliation_strings":["School of Cybersecurity, Korea University, 145 Anam-Ro, Seongbuk-Gu, Seoul, South Korea"],"affiliations":[{"raw_affiliation_string":"School of Cybersecurity, Korea University, 145 Anam-Ro, Seongbuk-Gu, Seoul, South Korea","institution_ids":["https://openalex.org/I197347611"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100413944","display_name":"Sangjin Lee","orcid":"https://orcid.org/0000-0002-6809-5179"},"institutions":[{"id":"https://openalex.org/I197347611","display_name":"Korea University","ror":"https://ror.org/047dqcg40","country_code":"KR","type":"education","lineage":["https://openalex.org/I197347611"]}],"countries":["KR"],"is_corresponding":false,"raw_author_name":"Sangjin Lee","raw_affiliation_strings":["School of Cybersecurity, Korea University, 145 Anam-Ro, Seongbuk-Gu, Seoul, South Korea"],"affiliations":[{"raw_affiliation_string":"School of Cybersecurity, Korea University, 145 Anam-Ro, Seongbuk-Gu, Seoul, South Korea","institution_ids":["https://openalex.org/I197347611"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5077445662","display_name":"Jungheum Park","orcid":"https://orcid.org/0000-0001-7796-7699"},"institutions":[{"id":"https://openalex.org/I197347611","display_name":"Korea University","ror":"https://ror.org/047dqcg40","country_code":"KR","type":"education","lineage":["https://openalex.org/I197347611"]}],"countries":["KR"],"is_corresponding":true,"raw_author_name":"Jungheum Park","raw_affiliation_strings":["School of Cybersecurity, Korea University, 145 Anam-Ro, Seongbuk-Gu, Seoul, South Korea"],"affiliations":[{"raw_affiliation_string":"School of Cybersecurity, Korea University, 145 Anam-Ro, Seongbuk-Gu, Seoul, South Korea","institution_ids":["https://openalex.org/I197347611"]}]}],"institution_assertions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":["https://openalex.org/A5077445662"],"corresponding_institution_ids":["https://openalex.org/I197347611"],"apc_list":{"value":2950,"currency":"USD","value_usd":2950,"provenance":"doaj"},"apc_paid":{"value":2950,"currency":"USD","value_usd":2950,"provenance":"doaj"},"fwci":3.641,"has_fulltext":false,"cited_by_count":4,"citation_normalized_percentile":{"value":0.999981,"is_in_top_1_percent":true,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":87,"max":90},"biblio":{"volume":"44","issue":null,"first_page":"301502","last_page":"301502"},"is_retracted":false,"is_paratext":false,"primary_topic":{"id":"https://openalex.org/T12034","display_name":"Digital and Cyber Forensics","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12034","display_name":"Digital and Cyber Forensics","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9978,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T13192","display_name":"Forensic Fingerprint Detection Methods","score":0.9809,"subfield":{"id":"https://openalex.org/subfields/3311","display_name":"Safety Research"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/circumstantial-evidence","display_name":"Circumstantial evidence","score":0.79915285},{"id":"https://openalex.org/keywords/suspect","display_name":"Suspect","score":0.63057894},{"id":"https://openalex.org/keywords/digital-evidence","display_name":"Digital evidence","score":0.6134528},{"id":"https://openalex.org/keywords/carving","display_name":"Carving","score":0.51245815}],"concepts":[{"id":"https://openalex.org/C80114427","wikidata":"https://www.wikidata.org/wiki/Q634260","display_name":"Circumstantial evidence","level":2,"score":0.79915285},{"id":"https://openalex.org/C93518851","wikidata":"https://www.wikidata.org/wiki/Q180160","display_name":"Metadata","level":2,"score":0.7019819},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.65965503},{"id":"https://openalex.org/C84418412","wikidata":"https://www.wikidata.org/wiki/Q3246940","display_name":"Digital forensics","level":2,"score":0.6386465},{"id":"https://openalex.org/C2778223634","wikidata":"https://www.wikidata.org/wiki/Q224952","display_name":"Suspect","level":2,"score":0.63057894},{"id":"https://openalex.org/C2781357168","wikidata":"https://www.wikidata.org/wiki/Q5276084","display_name":"Digital evidence","level":3,"score":0.6134528},{"id":"https://openalex.org/C2777370761","wikidata":"https://www.wikidata.org/wiki/Q18448934","display_name":"Carving","level":2,"score":0.51245815},{"id":"https://openalex.org/C2522767166","wikidata":"https://www.wikidata.org/wiki/Q2374463","display_name":"Data science","level":1,"score":0.3764288},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.35969862},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3510388},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.146754},{"id":"https://openalex.org/C95457728","wikidata":"https://www.wikidata.org/wiki/Q309","display_name":"History","level":0,"score":0.108703464},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.10091168},{"id":"https://openalex.org/C78519656","wikidata":"https://www.wikidata.org/wiki/Q101333","display_name":"Mechanical engineering","level":1,"score":0.0},{"id":"https://openalex.org/C166957645","wikidata":"https://www.wikidata.org/wiki/Q23498","display_name":"Archaeology","level":1,"score":0.0},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"is_oa":true,"landing_page_url":"https://doi.org/10.1016/j.fsidi.2023.301502","pdf_url":null,"source":{"id":"https://openalex.org/S4210178067","display_name":"Forensic Science International Digital Investigation","issn_l":"2666-2817","issn":["2666-2817","2666-2825"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320990","host_organization_name":"Elsevier BV","host_organization_lineage":["https://openalex.org/P4310320990"],"host_organization_lineage_names":["Elsevier BV"],"type":"journal"},"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true}],"best_oa_location":{"is_oa":true,"landing_page_url":"https://doi.org/10.1016/j.fsidi.2023.301502","pdf_url":null,"source":{"id":"https://openalex.org/S4210178067","display_name":"Forensic Science International Digital Investigation","issn_l":"2666-2817","issn":["2666-2817","2666-2825"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320990","host_organization_name":"Elsevier BV","host_organization_lineage":["https://openalex.org/P4310320990"],"host_organization_lineage_names":["Elsevier BV"],"type":"journal"},"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true},"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/5","display_name":"Gender equality","score":0.42},{"id":"https://metadata.un.org/sdg/16","display_name":"Peace, justice, and strong institutions","score":0.42}],"grants":[{"funder":"https://openalex.org/F4320322030","funder_display_name":"Ministry of Science, ICT and Future Planning","award_id":null},{"funder":"https://openalex.org/F4320334869","funder_display_name":"Korean National Police Agency","award_id":"210121M07"}],"datasets":[],"versions":[],"referenced_works_count":18,"referenced_works":["https://openalex.org/W1506349570","https://openalex.org/W1969240345","https://openalex.org/W1998957169","https://openalex.org/W2001436649","https://openalex.org/W2078469142","https://openalex.org/W2114314514","https://openalex.org/W2167136511","https://openalex.org/W2320959862","https://openalex.org/W2477006094","https://openalex.org/W2508545160","https://openalex.org/W2625580212","https://openalex.org/W2914637290","https://openalex.org/W2927424308","https://openalex.org/W3084384076","https://openalex.org/W3105816187","https://openalex.org/W3145370310","https://openalex.org/W3204686276","https://openalex.org/W4251093698"],"related_works":["https://openalex.org/W831794578","https://openalex.org/W4327939547","https://openalex.org/W4242633011","https://openalex.org/W3107271146","https://openalex.org/W3022674454","https://openalex.org/W2948024755","https://openalex.org/W2548916099","https://openalex.org/W2074106648","https://openalex.org/W2067157203","https://openalex.org/W1671229291"],"abstract_inverted_index":{"Spoliation":[0],"of":[1,78,93],"evidence":[2,72],"is":[3],"a":[4,108],"critical":[5],"concern":[6],"in":[7,81,124],"various":[8,118],"crimes":[9],"such":[10,28],"as":[11,29,43,69,73],"information":[12],"leakage,":[13],"digital":[14,24],"sexual":[15],"crimes,":[16],"accounting":[17],"fraud,":[18],"and":[19,32,48,62,103,116],"copyright":[20],"infringement.":[21],"Several":[22],"traditional":[23],"forensic":[25],"investigation":[26],"methods":[27],"recovery,":[30],"carving,":[31],"anti-forensic":[33],"behavior":[34],"tracking":[35],"are":[36],"used":[37],"to":[38,67,110],"investigate":[39],"these":[40],"crimes.":[41],"However,":[42,84],"technology":[44],"has":[45],"advanced,":[46],"recovery":[47,56],"carving":[49],"have":[50],"become":[51],"increasingly":[52],"challenging.":[53],"Shortly,":[54],"data":[55,79],"will":[57,64],"reach":[58],"its":[59],"technological":[60],"limit,":[61],"it":[63],"be":[65],"essential":[66],"obtain":[68],"much":[70],"circumstantial":[71],"possible":[74],"based":[75],"on":[76,100],"traces":[77],"left":[80],"suspect":[82],"systems.":[83,126],"no":[85],"existing":[86],"method":[87,109],"can":[88],"systematically":[89],"track":[90,111],"the":[91],"spoliation":[92],"evidence;":[94],"contemporary":[95],"investigations":[96],"typically":[97],"depend":[98],"solely":[99],"investigators'":[101],"skills":[102],"knowledge.":[104],"This":[105],"paper":[106],"proposes":[107],"deleted":[112],"files":[113],"by":[114],"identifying":[115],"analyzing":[117],"sources":[119],"that":[120],"manage":[121],"file-related":[122],"metadata":[123],"macOS":[125]},"cited_by_api_url":"https://api.openalex.org/works?filter=cites:W4327939547","counts_by_year":[{"year":2024,"cited_by_count":3},{"year":2023,"cited_by_count":1}],"updated_date":"2025-01-08T21:54:56.671467","created_date":"2023-03-21"}