<?xml version="1.0" encoding="UTF-8" standalone="yes"?>
<OAI-PMH xmlns="http://www.openarchives.org/OAI/2.0/" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns:dim="http://www.dspace.org/xmlns/dspace/dim" xsi:schemaLocation="http://www.openarchives.org/OAI/2.0/ http://www.openarchives.org/OAI/2.0/OAI-PMH.xsd">
    <responseDate>2026-05-10T06:38:42.710Z</responseDate>
    <request verb="GetRecord" identifier="ezaposleni.singidunum.ac.rs/rest/sciNaucniRezultati/oai:2:3012" metadataPrefix="dim">http://ezaposleni.singidunum.ac.rs/rest/sciNaucniRezultati/oai</request>
    <GetRecord>
        <record>
            <header>
                <identifier>ezaposleni.singidunum.ac.rs/rest/sciNaucniRezultati/oai:2:3012</identifier>
                <datestamp>2015-03-03T00:26:38Z</datestamp>
                <setSpec>2</setSpec>
            </header>
            <metadata>
                <dim:dim>
                    <dim:field mdschema="dc" element="title" lang="en">The Importance and the Role of Forensics of Mobile</dim:field>
                    <dim:field mdschema="dc" element="date" qualifier="issued">2012</dim:field>
                    <dim:field mdschema="dc" element="identifier" qualifier="uri">http://ezaposleni.singidunum.ac.rs/rest/sciNaucniRezultati/oai/record/2/3012</dim:field>
                    <dim:field mdschema="dc" element="identifier" qualifier="uri">http://www.doiserbia.nb.rs/img/doi/0353-3670/2012/0353-36701202121S.pdf</dim:field>
                    <dim:field mdschema="dc" element="contributor" qualifier="author" authority="orcid::0000-0001-8502-2038" confidence="-1">Ž. Spalević</dim:field>
                    <dim:field mdschema="dc" element="contributor" qualifier="author" authority="id:9697" confidence="-1">Ž. Bjelajac</dim:field>
                    <dim:field mdschema="dc" element="contributor" qualifier="author" authority="id:9698" confidence="-1">M. Carić</dim:field>
                    <dim:field mdschema="dc" element="description" qualifier="abstract">Scientific-technological development, along with initiating integrative forces
that offer improvement of the quality of human life, concurrently created prerequisites
for individuals to exploit certain innovations for performing criminal activities.
Modern criminals wander through electronic networks, and assisted by high technology,
perform a variety of criminal acts and “launder” large sums of money. Computer
forensics is a technological, systemic control of the computer system and its content for
the purpose of gathering evidence of a criminal act or other abuse that it has been used
for. Digital forensics requires particular expertise that goes beyond traditional data
collection, as well as employment of techniques available to the final user or system
support personnel. In this context, this article examines principles, methods and
procedures in mobile device investigation, which nowadays represent a multifunctional,
powerful computer weapon, and considers the necessity to update concrete procedures
in accordance with the developmentand growth of IT. </dim:field>
                    <dim:field mdschema="dc" element="type">article</dim:field>
                    <dim:field mdschema="dc" element="identifier" qualifier="doi">10.2298/FUEE1202121S</dim:field>
                    <dim:field mdschema="dc" element="citation" qualifier="volume">25</dim:field>
                    <dim:field mdschema="dc" element="citation" qualifier="issue">2</dim:field>
                    <dim:field mdschema="dc" element="citation" qualifier="spage">121</dim:field>
                    <dim:field mdschema="dc" element="citation" qualifier="epage">136</dim:field>
                    <dim:field mdschema="dc" element="identifier" qualifier="issn">0353-3670</dim:field>
                    <dim:field mdschema="dc" element="source">Facta universitatis-series: Electronics and Energetics</dim:field>
                </dim:dim>
            </metadata>
        </record>
    </GetRecord>
</OAI-PMH>
