{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T10:22:08Z","timestamp":1743070928711,"version":"3.40.3"},"publisher-location":"Cham","reference-count":25,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030816346"},{"type":"electronic","value":"9783030816353"}],"license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"DOI":"10.1007\/978-3-030-81635-3_29","type":"book-chapter","created":{"date-parts":[[2021,7,16]],"date-time":"2021-07-16T23:08:20Z","timestamp":1626476900000},"page":"354-365","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Knowledge Management Applied in the Comparative Study of the IRETE Intrusion Methodology to Access to the Computer Systems"],"prefix":"10.1007","author":[{"given":"Flor Nancy","family":"Diaz-Piraquive","sequence":"first","affiliation":[]},{"given":"Emanuel","family":"Ortiz-Ruiz","sequence":"additional","affiliation":[]},{"given":"Jansen Jair","family":"Gonz\u00e1lez-Arag\u00f3n","sequence":"additional","affiliation":[]},{"given":"Harlinzo Hernan","family":"Avila-Bermeo","sequence":"additional","affiliation":[]},{"given":"Wilmer David","family":"Parada-Jaimes","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,7,17]]},"reference":[{"key":"29_CR1","volume-title":"Neuromancer","author":"W Gibson","year":"1984","unstructured":"Gibson, W.: Neuromancer. ACE, New York (1984)"},{"key":"29_CR2","unstructured":"Choi, K.-S., Toro-Alvarez, M.M.: Cibercriminolog\u00eda: Gu\u00eda para la investigaci\u00f3n del cibercrimen y mejores pr\u00e1cticas en seguridad digital. Bogot\u00e1: Fondo Editorial UAN (2017)"},{"key":"29_CR3","volume-title":"Cybercriminology and Digital Investigation","author":"K Choi","year":"2015","unstructured":"Choi, K.: Cybercriminology and Digital Investigation. LFB Scholarly Publishing LLC, El Paso. TX (2015)"},{"key":"29_CR4","unstructured":"RedCiber: Diagn\u00f3stico del cibercrimen, delitos inform\u00e1ticos y comportamiento desviado en el ciberespacio en Colombia. Bogot\u00e1: RedCiber (2018)"},{"key":"29_CR5","first-page":"456","volume-title":"Crimes of the Internet","author":"D Shoemaker","year":"2009","unstructured":"Shoemaker, D., Kennedy, D.: Criminal profiling and cyber-criminal investigations. In: Schmalleger, F., Pittaro, M. (eds.) Crimes of the Internet, pp. 456\u2013476. Prentice Hall, Upper Saddle River, NJ (2009)"},{"key":"29_CR6","volume-title":"Risk Factors in Computer-Crime Victimization","author":"K Choi","year":"2014","unstructured":"Choi, K.: Risk Factors in Computer-Crime Victimization. LFB Scholarly Publishing, El Paso, TX (2014)"},{"key":"29_CR7","unstructured":"IC3: Annual Report on Internet Crime 2004. Internet Crime Complaint Center. Recuperado el 15 de Agosto, 2015 de (2005). https:\/\/www.ic3.gov\/media\/annualreports.aspx"},{"key":"29_CR8","unstructured":"IC3: Internet Crime Report. Internet Crime Complaint Center. Recuperado el 15 de Agosto, 2015 de (2009). www.nw3c.org\/docs\/downloads\/2008_ic3_annual-report_3_27_09_small.pdf"},{"key":"29_CR9","unstructured":"IC3: Annual Report on Internet Crime Released. Internet Crime Complaint Center. Identity Theft 2013 Bureau of Justice Statistics. U.S. Government Printing Office (2014)"},{"key":"29_CR10","unstructured":"IC3: Annual Report on Internet Crime Released. Internet Crime Complaint Center. Identity Theft 2014 Bureau of Justice Statistics. U.S. Government Printing Office (2015)"},{"key":"29_CR11","unstructured":"Toro-Alvarez, M.M.: Programa de entrenamiento integral de prevenci\u00f3n y contenci\u00f3n del cibercrimen contra ni\u00f1os, ni\u00f1as y adolescentes. Bogot\u00e1. Escuela de Postgrados de Polic\u00eda (ESPOL) (2018)"},{"key":"29_CR12","unstructured":"APWG: The Global Phishing Survey. Anti-Phishing Working Group. Recuperado el 1 de mayo, 2010 (2009)"},{"issue":"2","key":"29_CR13","doi-asserted-by":"publisher","first-page":"14","DOI":"10.1016\/S1361-3723(01)02017-6","volume":"2001","author":"R Barber","year":"2001","unstructured":"Barber, R.: Hackers profiled: \u00bfWho are they and what are their motivations? Comput. Fraud Secur. 2001(2), 14\u201317 (2001). https:\/\/doi.org\/10.1016\/S1361-3723(01)02017-6","journal-title":"Comput. Fraud Secur."},{"key":"29_CR14","unstructured":"Comando de entrenamiento y doctrina del ej\u00e9rcito estadounidense: DCSINT Handbook No. 1.02, Critical Infrastructure Threats and Terrorism. Recuperado el 10 de agosto, 2010, de (2006). https:\/\/fas.org\/irp\/threat\/terrorism\/sup2.pdf"},{"key":"29_CR15","doi-asserted-by":"publisher","unstructured":"Garc\u00eda, L.E., G\u00f3mez, C.P., Cort\u00e9s, Y.L.: Policing Strengthen for knowledge society challenges: Series 1-Policing Beliefs, 11, December, 2018. Technical report PSKSC-S1-20181211, p. 14 (2018). https:\/\/doi.org\/10.13140\/RG.2.2.23479.57766. https:\/\/www.researchgate.net\/publication\/329574001_Policing_Strengthen_for_knowledge_society_challenges_Series_1-Policing_Beliefs","DOI":"10.13140\/RG.2.2.23479.57766"},{"key":"29_CR16","unstructured":"Valdez, A.: OSSTMM 3. RITS. Revista de Inf. Tecnol. y Soc. 8, 29\u201330 (2013)"},{"key":"29_CR17","unstructured":"NIST: Special publication 800-42. Computer security resource center. Disponible en (2003). https:\/\/csrc.nist.gov\/publications\/detail\/sp\/800\/final"},{"key":"29_CR18","unstructured":"NIST: Federal guidelines for searching and seizing computers, Recommendations of the National Institute of Standards and Technology. National Institute of Standards and Technology. Recuperado el 23 de marzo, 2015, de (2006). http:\/\/nvlpubs.nist.gov\/nistpubs\/Legacy\/SP\/nistspecialpublication800-86.pdf"},{"key":"29_CR19","unstructured":"Symantec: Corporate profile. Recuperado el 1 de mayo, 2010, de (2016). http:\/\/www.symantec.com\/about\/profile\/index.jsp"},{"key":"29_CR20","doi-asserted-by":"crossref","unstructured":"Liu, B., Shi, L., Cai, Z., Li, M.: Software vulnerability discovery techniques: a survey. In: Multimedia Information Networking and Security (MINES), 2012 Fourth International Conference on, pp. 152\u2013156, IEEE, November, 2012","DOI":"10.1109\/MINES.2012.202"},{"key":"29_CR21","unstructured":"Microsoft: Microsoft, the FBI, Europol and industry partners disrupt the notorious ZeroAccess botnet. Microsoft News Center. Recuperado de (2013). https:\/\/news.microsoft.com\/2013\/12\/05\/microsoft-the-fbi-europol-and-industry-partners-disrupt-the-notorious-zeroaccess-botnet\/"},{"key":"29_CR22","doi-asserted-by":"publisher","unstructured":"Motta, D., Toro-Alvarez, M.M.: Social innovation articulators to counter threats to public safety (2017). https:\/\/doi.org\/10.22335\/rlct.v8i2.315","DOI":"10.22335\/rlct.v8i2.315"},{"key":"29_CR23","unstructured":"Wilson, C.: Computer Attack and Cyberterrorism: Vulnerabilities and policy issues for Congress, Congressional Research Service Report for Congress (2005)"},{"key":"29_CR24","unstructured":"De La Espriella, L., Garc\u00eda, J., D\u00edaz-Piraquive, F.N.: La sextorsi\u00f3n: pr\u00e1cticas de ingenier\u00eda social en las redes sociales. In: \u201cDesaf\u00edos en Ingenier\u00eda: Investigaci\u00f3n Aplicada\u201d Ediciones Fundaci\u00f3n Tecnol\u00f3gica Antonio Ar\u00e9valo TECNAR (2019)"},{"key":"29_CR25","unstructured":"Pineda, S., Matta, J., Torres, J., D\u00edaz-Piraquive, F.N.: Blockchain: estrategia en la seguridad e integridad de los sistemas de informaci\u00f3n de la polic\u00eda nacional. In: \u201cDesaf\u00edos en Ingenier\u00eda: Investigaci\u00f3n Aplicada\u201d Ediciones Fundaci\u00f3n Tecnol\u00f3gica Antonio Ar\u00e9valo TECNAR (2019)"}],"container-title":["Communications in Computer and Information Science","Knowledge Management in Organizations"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-81635-3_29","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,7,16]],"date-time":"2021-07-16T23:16:13Z","timestamp":1626477373000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-81635-3_29"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"ISBN":["9783030816346","9783030816353"],"references-count":25,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-81635-3_29","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2021]]},"assertion":[{"value":"17 July 2021","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"KMO","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Knowledge Management in Organizations","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Kaohsiung","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Taiwan","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2021","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"20 July 2021","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"21 July 2021","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"15","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"kmo2021","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.kmo2020.com\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"86","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"28","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"9","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"33% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"5","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}