{"id":"https://openalex.org/W2956622455","doi":"https://doi.org/10.1109/isdfs.2019.8757527","title":"Problems and Prospects of Anti-Theft and Mobile Phone Tracking: A case in Nigeria","display_name":"Problems and Prospects of Anti-Theft and Mobile Phone Tracking: A case in Nigeria","publication_year":2019,"publication_date":"2019-06-01","ids":{"openalex":"https://openalex.org/W2956622455","doi":"https://doi.org/10.1109/isdfs.2019.8757527","mag":"2956622455"},"language":"en","primary_location":{"id":"doi:10.1109/isdfs.2019.8757527","is_oa":false,"landing_page_url":"https://doi.org/10.1109/isdfs.2019.8757527","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2019 7th International Symposium on Digital Forensics and Security (ISDFS)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5026033945","display_name":"Iliyasu Yahaya Adam","orcid":null},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Iliyasu Yahaya Adam","raw_affiliation_strings":["Computer Science Department, Institute for information Technology, Kano State, Nigeria"],"affiliations":[{"raw_affiliation_string":"Computer Science Department, Institute for information Technology, Kano State, Nigeria","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5061796733","display_name":"Cihan Varol","orcid":"https://orcid.org/0000-0002-4940-6808"},"institutions":[{"id":"https://openalex.org/I191429286","display_name":"Sam Houston State University","ror":"https://ror.org/00yh3cz06","country_code":"US","type":"education","lineage":["https://openalex.org/I191429286"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Cihan Varol","raw_affiliation_strings":["Computer Science Department, Sam Houston State University, Huntsville, TX, USA"],"affiliations":[{"raw_affiliation_string":"Computer Science Department, Sam Houston State University, Huntsville, TX, USA","institution_ids":["https://openalex.org/I191429286"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5025744626","display_name":"Asaf Varol","orcid":"https://orcid.org/0000-0003-1606-4079"},"institutions":[{"id":"https://openalex.org/I143396566","display_name":"F\u0131rat University","ror":"https://ror.org/05teb7b63","country_code":"TR","type":"education","lineage":["https://openalex.org/I143396566"]}],"countries":["TR"],"is_corresponding":false,"raw_author_name":"Asaf Varol","raw_affiliation_strings":["Software Engineering Department, Firat University, Elazig, Turkey"],"affiliations":[{"raw_affiliation_string":"Software Engineering Department, Firat University, Elazig, Turkey","institution_ids":["https://openalex.org/I143396566"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5026033945"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":1.0174,"has_fulltext":false,"cited_by_count":4,"citation_normalized_percentile":{"value":0.82703051,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"5"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12519","display_name":"Cybercrime and Law Enforcement Studies","score":0.9980000257492065,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12519","display_name":"Cybercrime and Law Enforcement Studies","score":0.9980000257492065,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10574","display_name":"Crime Patterns and Interventions","score":0.9926000237464905,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T11045","display_name":"Privacy, Security, and Data Protection","score":0.9912999868392944,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6645766496658325},{"id":"https://openalex.org/keywords/mobile-phone","display_name":"Mobile phone","score":0.6502128839492798},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.6318987011909485},{"id":"https://openalex.org/keywords/gsm","display_name":"GSM","score":0.5742672085762024},{"id":"https://openalex.org/keywords/phone","display_name":"Phone","score":0.5251126885414124},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.48447656631469727},{"id":"https://openalex.org/keywords/tracking","display_name":"Tracking (education)","score":0.4139779806137085},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.41344478726387024},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.20500382781028748}],"concepts":[{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6645766496658325},{"id":"https://openalex.org/C2777421447","wikidata":"https://www.wikidata.org/wiki/Q17517","display_name":"Mobile phone","level":2,"score":0.6502128839492798},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.6318987011909485},{"id":"https://openalex.org/C59201141","wikidata":"https://www.wikidata.org/wiki/Q46904","display_name":"GSM","level":2,"score":0.5742672085762024},{"id":"https://openalex.org/C2778707766","wikidata":"https://www.wikidata.org/wiki/Q202064","display_name":"Phone","level":2,"score":0.5251126885414124},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.48447656631469727},{"id":"https://openalex.org/C2775936607","wikidata":"https://www.wikidata.org/wiki/Q466845","display_name":"Tracking (education)","level":2,"score":0.4139779806137085},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.41344478726387024},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.20500382781028748},{"id":"https://openalex.org/C15744967","wikidata":"https://www.wikidata.org/wiki/Q9418","display_name":"Psychology","level":0,"score":0.0},{"id":"https://openalex.org/C41895202","wikidata":"https://www.wikidata.org/wiki/Q8162","display_name":"Linguistics","level":1,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C19417346","wikidata":"https://www.wikidata.org/wiki/Q7922","display_name":"Pedagogy","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/isdfs.2019.8757527","is_oa":false,"landing_page_url":"https://doi.org/10.1109/isdfs.2019.8757527","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2019 7th International Symposium on Digital Forensics and Security (ISDFS)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16","score":0.8299999833106995}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":11,"referenced_works":["https://openalex.org/W1483229903","https://openalex.org/W2071973883","https://openalex.org/W2121635782","https://openalex.org/W2159412382","https://openalex.org/W2169418561","https://openalex.org/W2314573353","https://openalex.org/W2400514480","https://openalex.org/W2476075485","https://openalex.org/W2796959105","https://openalex.org/W4253693411","https://openalex.org/W6721010893"],"related_works":["https://openalex.org/W1823457431","https://openalex.org/W2553656238","https://openalex.org/W4238732447","https://openalex.org/W2155503889","https://openalex.org/W4243960761","https://openalex.org/W2084086966","https://openalex.org/W2116284816","https://openalex.org/W2360333859","https://openalex.org/W2370205415","https://openalex.org/W2046852935"],"abstract_inverted_index":{"The":[0,89],"study":[1],"addresses":[2],"some":[3,57],"security":[4],"challenges":[5],"and":[6,20,95,105,110],"opportunities":[7],"brought":[8],"by":[9],"mobile":[10,96,116],"phone":[11,108],"tracking":[12,97],"technologies,":[13,98],"especially":[14],"in":[15,68],"the":[16,29,38,42,50,66,82,100,111],"business":[17],"of":[18,31,37,56,84,102,114],"selling":[19],"buying":[21],"used":[22,115],"handsets.":[23],"Cases,":[24],"for":[25,107],"instant,":[26],"arise":[27],"on":[28,93],"issue":[30],"stolen":[32],"or":[33,75],"missing":[34],"phones.":[35],"Some":[36],"cases":[39],"may":[40,77],"involve":[41],"police,":[43],"who":[44,118],"make":[45],"digital":[46],"investigations":[47],"to":[48,60,120],"apprehend":[49],"culprits.":[51],"However,":[52],"as":[53,81],"a":[54,85],"result":[55],"complainants'":[58],"inability":[59],"provide":[61],"details":[62],"that":[63],"will":[64],"aid":[65],"police":[67],"making":[69],"successful":[70],"investigation,":[71],"an":[72],"innocent":[73],"person":[74],"persons":[76],"be":[78],"mistakenly":[79],"apprehended":[80],"culprit":[83],"phone-theft":[86],"related":[87,128],"crime.":[88],"paper":[90],"reviews":[91],"literature":[92],"Anti-Theft":[94],"with":[99],"aim":[101],"providing":[103],"guidance":[104],"awareness":[106],"owners":[109],"potential":[112],"buyers/sellers":[113],"phones":[117],"want":[119],"protect":[121],"their":[122],"handsets":[123],"against":[124],"any":[125],"other":[126],"GSM":[127],"issues.":[129]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2022,"cited_by_count":1},{"year":2020,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
