{"id":"https://openalex.org/W2052771561","doi":"https://doi.org/10.1109/icoin.2013.6496687","title":"Mobile communications challenges to cross-border tracking operations carried out by law enforcement authorities","display_name":"Mobile communications challenges to cross-border tracking operations carried out by law enforcement authorities","publication_year":2013,"publication_date":"2013-01-01","ids":{"openalex":"https://openalex.org/W2052771561","doi":"https://doi.org/10.1109/icoin.2013.6496687","mag":"2052771561"},"language":"en","primary_location":{"is_oa":false,"landing_page_url":"https://doi.org/10.1109/icoin.2013.6496687","pdf_url":null,"source":{"id":"https://openalex.org/S4363608592","display_name":"2022 International Conference on Information Networking (ICOIN)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_indexed_in_scopus":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false},"type":"article","type_crossref":"proceedings-article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5024770606","display_name":"Jyri Rajam\u00e4ki","orcid":null},"institutions":[{"id":"https://openalex.org/I5188418","display_name":"Laurea University of Applied Sciences","ror":"https://ror.org/05h664633","country_code":"FI","type":"funder","lineage":["https://openalex.org/I5188418"]}],"countries":["FI"],"is_corresponding":false,"raw_author_name":"Jyri Rajamaki","raw_affiliation_strings":["Laurea SID Leppavaara, Laurea Univ. of Appl. Sci., Espoo, Finland"],"affiliations":[{"raw_affiliation_string":"Laurea SID Leppavaara, Laurea Univ. of Appl. Sci., Espoo, Finland","institution_ids":["https://openalex.org/I5188418"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5032620803","display_name":"Pasi K\u00e4mppi","orcid":"https://orcid.org/0000-0003-1559-9039"},"institutions":[{"id":"https://openalex.org/I5188418","display_name":"Laurea University of Applied Sciences","ror":"https://ror.org/05h664633","country_code":"FI","type":"funder","lineage":["https://openalex.org/I5188418"]}],"countries":["FI"],"is_corresponding":false,"raw_author_name":"P. Kamppi","raw_affiliation_strings":["Laurea SID Leppavaara, Laurea Univ. of Appl. Sci., Espoo, Finland"],"affiliations":[{"raw_affiliation_string":"Laurea SID Leppavaara, Laurea Univ. of Appl. Sci., Espoo, Finland","institution_ids":["https://openalex.org/I5188418"]}]}],"institution_assertions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.455,"has_fulltext":true,"fulltext_origin":"ngrams","cited_by_count":4,"citation_normalized_percentile":{"value":0.502164,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":78,"max":80},"biblio":{"volume":null,"issue":null,"first_page":"560","last_page":"565"},"is_retracted":false,"is_paratext":false,"primary_topic":{"id":"https://openalex.org/T12203","display_name":"Mobile Agent-Based Network Management","score":0.9954,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12203","display_name":"Mobile Agent-Based Network Management","score":0.9954,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12042","display_name":"Satellite Communication Systems","score":0.9495,"subfield":{"id":"https://openalex.org/subfields/2202","display_name":"Aerospace Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12799","display_name":"Mobile and Web Applications","score":0.9361,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/eavesdropping","display_name":"Eavesdropping","score":0.73966616},{"id":"https://openalex.org/keywords/tracking","display_name":"Tracking (education)","score":0.45811573},{"id":"https://openalex.org/keywords/organised-crime","display_name":"Organised crime","score":0.4346748}],"concepts":[{"id":"https://openalex.org/C2780262971","wikidata":"https://www.wikidata.org/wiki/Q44554","display_name":"Law enforcement","level":2,"score":0.777217},{"id":"https://openalex.org/C2776788033","wikidata":"https://www.wikidata.org/wiki/Q320769","display_name":"Eavesdropping","level":2,"score":0.73966616},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6148311},{"id":"https://openalex.org/C2780451532","wikidata":"https://www.wikidata.org/wiki/Q759676","display_name":"Task (project management)","level":2,"score":0.5592997},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5484345},{"id":"https://openalex.org/C108170787","wikidata":"https://www.wikidata.org/wiki/Q3951828","display_name":"Agency (philosophy)","level":2,"score":0.5465538},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.49334112},{"id":"https://openalex.org/C2779777834","wikidata":"https://www.wikidata.org/wiki/Q4202277","display_name":"Enforcement","level":2,"score":0.46703455},{"id":"https://openalex.org/C2775936607","wikidata":"https://www.wikidata.org/wiki/Q466845","display_name":"Tracking (education)","level":2,"score":0.45811573},{"id":"https://openalex.org/C27219730","wikidata":"https://www.wikidata.org/wiki/Q46952","display_name":"Organised crime","level":2,"score":0.4346748},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.3500095},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.17150098},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.12641385},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.095881134},{"id":"https://openalex.org/C15744967","wikidata":"https://www.wikidata.org/wiki/Q9418","display_name":"Psychology","level":0,"score":0.0},{"id":"https://openalex.org/C19417346","wikidata":"https://www.wikidata.org/wiki/Q7922","display_name":"Pedagogy","level":1,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C201995342","wikidata":"https://www.wikidata.org/wiki/Q682496","display_name":"Systems engineering","level":1,"score":0.0},{"id":"https://openalex.org/C111472728","wikidata":"https://www.wikidata.org/wiki/Q9471","display_name":"Epistemology","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"is_oa":false,"landing_page_url":"https://doi.org/10.1109/icoin.2013.6496687","pdf_url":null,"source":{"id":"https://openalex.org/S4363608592","display_name":"2022 International Conference on Information Networking (ICOIN)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_indexed_in_scopus":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.71,"id":"https://metadata.un.org/sdg/16","display_name":"Peace, justice, and strong institutions"}],"grants":[],"datasets":[],"versions":[],"referenced_works_count":5,"referenced_works":["https://openalex.org/W183334210","https://openalex.org/W2074997915","https://openalex.org/W2092669225","https://openalex.org/W2142221222","https://openalex.org/W2732055910"],"related_works":["https://openalex.org/W4387918499","https://openalex.org/W4386360526","https://openalex.org/W2786267942","https://openalex.org/W2772112465","https://openalex.org/W2769254131","https://openalex.org/W2766105476","https://openalex.org/W2735171729","https://openalex.org/W2368710903","https://openalex.org/W2158905603","https://openalex.org/W1536265672"],"abstract_inverted_index":{"Organised":[0],"crime":[1],"is":[2,88,91,100,129],"a":[3,92],"real":[4],"cross-border":[5,119],"threat":[6],"with":[7],"the":[8,107,111,132,138,151],"emergence":[9],"of":[10,13,97,106,114],"international":[11],"warehouses":[12],"crime.":[14],"For":[15],"improving":[16],"their":[17,37],"evidence-gathering":[18],"abilities,":[19],"law":[20],"enforcement":[21],"authorities":[22],"(LEAs)":[23],"are":[24,63,74],"constantly":[25],"seeking":[26],"new":[27,70],"technological":[28],"recording,":[29],"retrieving":[30],"and":[31,52,85,90,110,134],"monitoring":[32],"solutions":[33],"that":[34],"would":[35],"facilitate":[36],"combat":[38],"against":[39],"criminal":[40],"organisations.":[41],"The":[42,66,95,127,144],"criminals'":[43],"counter":[44],"measure":[45],"activities,":[46],"such":[47],"as":[48],"electronic":[49],"counter-surveillance,":[50],"jamming":[51],"constant":[53],"changes":[54],"in":[55,150],"behaviour":[56],"for":[57],"preventing":[58],"eavesdropping":[59],"or":[60],"physical":[61],"surveillance":[62],"continuously":[64],"increasing.":[65],"pressure":[67],"to":[68,76,83,101,118],"find":[69],"intelligent":[71],"technologies,":[72],"which":[73],"harder":[75],"detect,":[77],"more":[78,86],"strongly":[79],"encrypted,":[80],"longer-lasting,":[81],"quicker":[82],"install":[84],"adaptive,":[87],"emerging":[89],"high-priority":[93],"task.":[94],"aim":[96],"this":[98],"study":[99,128,145],"provide":[102],"an":[103],"improved":[104],"understanding":[105],"structural":[108],"characteristics":[109],"dynamic":[112],"evolution":[113],"mobile":[115],"communication":[116],"challenges":[117],"satellite-based":[120],"tracking":[121],"operations":[122],"carried":[123],"out":[124],"by":[125],"LEAs.":[126],"based":[130],"on":[131],"results":[133,146],"lessons":[135],"learned":[136],"from":[137],"SATERISK":[139],"research":[140,155],"project":[141,156],"executed":[142],"2008-2011.":[143],"will":[147],"be":[148],"exploited":[149],"ongoing":[152],"2.5":[153],"years":[154],"Multi-Agency":[157],"Cooperation":[158],"In":[159],"Cross-border":[160],"Operations":[161],"(MACICO).":[162]},"abstract_inverted_index_v3":null,"cited_by_api_url":"https://api.openalex.org/works?filter=cites:W2052771561","counts_by_year":[{"year":2018,"cited_by_count":1},{"year":2015,"cited_by_count":2},{"year":2014,"cited_by_count":1}],"updated_date":"2025-02-20T23:12:36.999053","created_date":"2016-06-24"}