{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,19]],"date-time":"2025-03-19T12:57:38Z","timestamp":1742389058102},"publisher-location":"Berlin, Heidelberg","reference-count":11,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540401896"},{"type":"electronic","value":"9783540448532"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2003]]},"DOI":"10.1007\/3-540-44853-5_34","type":"book-chapter","created":{"date-parts":[[2007,12,1]],"date-time":"2007-12-01T04:01:31Z","timestamp":1196481691000},"page":"379-384","source":"Crossref","is-referenced-by-count":8,"title":["An International Perspective on Fighting Cybercrime"],"prefix":"10.1007","author":[{"given":"Weiping","family":"Chang","sequence":"first","affiliation":[]},{"given":"Wingyan","family":"Chung","sequence":"additional","affiliation":[]},{"given":"Hsinchun","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Shihchieh","family":"Chou","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2003,5,27]]},"reference":[{"issue":"1","key":"34_CR1","doi-asserted-by":"publisher","first-page":"28","DOI":"10.1145\/602421.602441","volume":"46","author":"H. Chen","year":"2003","unstructured":"Chen, H., Zeng, D., Atabakhsh, H., Wyzga, W. and Schroeder, J. COPLINK: Managing Law Enforcement Data and Knowledge. Communications of the ACM 46, 1 (2003), 28\u201334.","journal-title":"Communications of the ACM"},{"key":"34_CR2","unstructured":"Freeh, L.J. Statement for the Record of Louis J. Freeh, Director, Federal Bureau of Investigation on Cybercrime Before the Senate Committee on Judiciary Subcommittee for the Technology, Terrorism, and Government Information, U.S. Department of Justice, http:\/\/www.usdoj.gov\/criminal\/cybercrime\/freeh328.htm , 2000."},{"key":"34_CR3","unstructured":"Garrison, L. and Grand, M. Network Defense: The Legal Aspects of Retaliation National Infrastructure Protection Center Highlights (Issue 7\u201301), 2001, 2."},{"key":"34_CR4","unstructured":"Parker, D.B. Fighting Computer Crime: A New Framework for Protecting Information. Wiley Computer Publishing, 1998."},{"issue":"1","key":"34_CR5","doi-asserted-by":"publisher","first-page":"53","DOI":"10.1016\/S0167-4048(01)01021-5","volume":"20","author":"S. Philippsohn","year":"2001","unstructured":"Philippsohn, S. Trends in cybercrime \u2014 an overview of current financial crimes on the Internet. Computers & Security 20, 1 (2001), 53\u201369.","journal-title":"Computers & Security"},{"key":"34_CR6","unstructured":"POST Regulating Internet Content. Parliamentary Office of Science and Technology 159 (2001), 1\u20134."},{"issue":"1","key":"34_CR7","first-page":"1","volume":"8","author":"R. 2. Power","year":"2002","unstructured":"Power, R. 2002 CSI\/FBI Computer Crime and Security Survey. Computer Security Issues & Trends 8, 1 (2002), 1\u201322.","journal-title":"Computer Security Issues & Trends"},{"key":"34_CR8","doi-asserted-by":"crossref","unstructured":"Power, R. Tangled Web: Tales of Digital Crime from the Shadows of Cyberspace. Que Corporation, 2000.","DOI":"10.1016\/S1353-4858(00)85022-9"},{"key":"34_CR9","doi-asserted-by":"crossref","unstructured":"Richards, J.R. Transnational criminal organizations, cybercrime, and money laundering: a handbook for law enforcement officers, auditors, and financial investigators. CRC Press, 1999.","DOI":"10.1201\/9781420048728"},{"key":"34_CR10","unstructured":"Smith, S.P., Perrit, H., Krent, H. and Mencik, S. Independent Technical Review of the Carnivore System, http:\/\/www.usdoj.gov\/jmd\/publications\/carniv_final.pdf , 2000."},{"key":"34_CR11","volume-title":"Cybercrime: Law enforcement, security and surveillance in the information age","author":"D. Thomas","year":"2000","unstructured":"Thomas, D. and Loader, B.D. Introduction \u2014 cybercrime: law enforcement, security and surveillance in the information age. in Cybercrime: Law enforcement, security and surveillance in the information age, Taylor & Francis Group, New York, NY, 2000."}],"container-title":["Lecture Notes in Computer Science","Intelligence and Security Informatics"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-44853-5_34","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,5]],"date-time":"2019-05-05T11:09:24Z","timestamp":1557054564000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-44853-5_34"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2003]]},"ISBN":["9783540401896","9783540448532"],"references-count":11,"URL":"https:\/\/doi.org\/10.1007\/3-540-44853-5_34","relation":{},"ISSN":["0302-9743"],"issn-type":[{"type":"print","value":"0302-9743"}],"subject":[],"published":{"date-parts":[[2003]]}}}