{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T13:48:09Z","timestamp":1725544089404},"publisher-location":"Berlin, Heidelberg","reference-count":19,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540333616"},{"type":"electronic","value":"9783540333623"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2006]]},"DOI":"10.1007\/11734628_5","type":"book-chapter","created":{"date-parts":[[2006,3,9]],"date-time":"2006-03-09T14:13:59Z","timestamp":1141913639000},"page":"38-48","source":"Crossref","is-referenced-by-count":3,"title":["Cybercrime in Taiwan \u2013 An Analysis of Suspect Records"],"prefix":"10.1007","author":[{"given":"WenYuan","family":"Jen","sequence":"first","affiliation":[]},{"given":"Weiping","family":"Chang","sequence":"additional","affiliation":[]},{"given":"Shihchieh","family":"Chou","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"2","key":"5_CR1","first-page":"400","volume":"2","author":"E.D. Cordy","year":"2003","unstructured":"Cordy, E.D.: The Legal Regulation of E-Commerce Transactions. Journal of American Academy of Business\u00a02(2), 400\u2013407 (2003)","journal-title":"Journal of American Academy of Business"},{"key":"5_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"379","DOI":"10.1007\/3-540-44853-5_34","volume-title":"Intelligence and Security Informatics","author":"W. Chang","year":"2003","unstructured":"Chang, W., Chung, W., Chen, H., Chou, S.: An International Perspective on Fighting Cybercrime. In: Chen, H., Miranda, R., Zeng, D.D., Demchak, C.C., Schroeder, J., Madhusudan, T. (eds.) ISI 2003. LNCS, vol.\u00a02665, pp. 379\u2013384. Springer, Heidelberg (2003)"},{"key":"5_CR3","unstructured":"DS-MOI, Department Statistics, Ministrey of the Interior (2005, January). Annual population census (Retrieved October 5, 2005), from \n                    \n                      http:\/\/www.moi.gov.tw\/stat\/index.asp"},{"key":"5_CR4","unstructured":"FIND, Focus on Internet News and Data. The statistics report of Taiwan Internet Users (2005, June) (Retrieved October 5, 2005), from \n                    \n                      http:\/\/www.find.org.tw\/0105\/howmany\/usage_1.asp"},{"issue":"6","key":"5_CR5","doi-asserted-by":"publisher","first-page":"618","DOI":"10.1109\/MC.2005.201","volume":"38","author":"D. Geer","year":"2005","unstructured":"Geer, D.: Security Technologies Go Phishing. Computer\u00a038(6), 618\u2013621 (2005)","journal-title":"Computer"},{"issue":"8","key":"5_CR6","first-page":"10","volume":"70","author":"M. Goodman","year":"2001","unstructured":"Goodman, M.: Making Computer Crime Count. FBI Law Enforcement Bulletin\u00a070(8), 10\u201317 (2001)","journal-title":"FBI Law Enforcement Bulletin"},{"key":"5_CR7","unstructured":"IIPA.: Special 301 Report on Global Copyright Protection and Enforcement, pp. 303\u2013322. International Intellectual Property Alliance, Washington, DC"},{"issue":"2\/3","key":"5_CR8","doi-asserted-by":"publisher","first-page":"133","DOI":"10.1108\/08858620310463060","volume":"18","author":"K.F. McCrohan","year":"2003","unstructured":"McCrohan, K.F.: Facing the Threats to Electronic Commerce. The Journal of Business & Industrial Marketing\u00a018(2\/3), 133\u2013145 (2003)","journal-title":"The Journal of Business & Industrial Marketing"},{"key":"5_CR9","unstructured":"MacInnes, I., Musgrave, D., Laska, J.: Electronic Commerce Fraud: Towards An Understanding of the Phenomenon. In: 2005 Proceedings of the 38th Annual Hawaii International Conference (2005)"},{"issue":"1","key":"5_CR10","first-page":"3","volume":"23","author":"R. McCusker","year":"2002","unstructured":"McCusker, R.: E-Commerce, Business and Crime: Inextricably Linked, Diametrically Opposed. The Company Lawyer\u00a023(1), 3\u20138 (2002)","journal-title":"The Company Lawyer"},{"key":"5_CR11","unstructured":"Ministry of the Interior. The statistics report of National Police Agency (2005, October) (Retrieved October 5, 2005), from \n                    \n                      http:\/\/www.npa.gov.tw\/stats.php"},{"key":"5_CR12","volume-title":"Fighting Computer Crime: A New Framework for Protecting Information","author":"D.B. Parker","year":"1998","unstructured":"Parker, D.B.: Fighting Computer Crime: A New Framework for Protecting Information. Wiley Computer Publishing, Chichester (1998)"},{"issue":"1","key":"5_CR13","doi-asserted-by":"publisher","first-page":"53","DOI":"10.1016\/S0167-4048(01)01021-5","volume":"20","author":"S. Philippsohn","year":"2001","unstructured":"Philippsohn, S.: Trends in Cybercrime - An Overview of Current Financial Crimes on the Internet. Computers & Security\u00a020(1), 53\u201369 (2001)","journal-title":"Computers & Security"},{"issue":"2","key":"5_CR14","doi-asserted-by":"publisher","first-page":"29","DOI":"10.1080\/10696679.2002.11501914","volume":"10","author":"K.A. Saban","year":"2002","unstructured":"Saban, K.A., McGivern, E., Saykiewicz, J.N.: A Critical Look at the Impact of Cyber Crime on Consumer Internet Behavior. Journal of Marketing Theory and Practice\u00a010(2), 29\u201337 (2002)","journal-title":"Journal of Marketing Theory and Practice"},{"issue":"3","key":"5_CR15","doi-asserted-by":"publisher","first-page":"224","DOI":"10.1108\/14684520410543670","volume":"28","author":"A.D. Smith","year":"2004","unstructured":"Smith, A.D.: Cyberciminal Impacts on Online Business and Consumer Confidence. Online Information Review\u00a028(3), 224\u2013234 (2004)","journal-title":"Online Information Review"},{"issue":"4","key":"5_CR16","doi-asserted-by":"publisher","first-page":"178","DOI":"10.1108\/09685220210436976","volume":"10","author":"A.D. Smith","year":"2002","unstructured":"Smith, A.D., Rupp, W.T.: Issues In Cybersecurity: Understanding the Potential Risks Associated with Hackers\/Crackers. Information Management and Computer Security\u00a010(4), 178\u2013183 (2002)","journal-title":"Information Management and Computer Security"},{"key":"5_CR17","volume-title":"Cybercrime: Law Enforcement, Security and Surveillance in the Information Age","author":"D. Thomas","year":"2000","unstructured":"Thomas, D., Loader, B.D.: Introduction - Cybercrime: Law Enforcement, Security and Surveillance in the Information Age. In: Cybercrime: Law Enforcement, Security and Surveillance in the Information Age, Taylor & Francis Group, New York (2000)"},{"key":"5_CR18","unstructured":"Whitman, M.E., Mattord, H.J.: Management of Information Security, Boston (2004)"},{"key":"5_CR19","doi-asserted-by":"crossref","unstructured":"Wilson, C.: Holding Management Accountable: A New Policy for Protection Against Computer Crime. In: National Aerospace and Electronics Conference, Proceedings of the IEEE 2000, pp. 272\u2013281 (2000)","DOI":"10.1109\/NAECON.2000.894921"}],"container-title":["Lecture Notes in Computer Science","Intelligence and Security Informatics"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11734628_5.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T06:53:28Z","timestamp":1619506408000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11734628_5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006]]},"ISBN":["9783540333616","9783540333623"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/11734628_5","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2006]]}}}