{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T20:34:34Z","timestamp":1743107674355,"version":"3.40.3"},"publisher-location":"Cham","reference-count":23,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030820985"},{"type":"electronic","value":"9783030820992"}],"license":[{"start":{"date-parts":[[2021,7,28]],"date-time":"2021-07-28T00:00:00Z","timestamp":1627430400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,7,28]],"date-time":"2021-07-28T00:00:00Z","timestamp":1627430400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"DOI":"10.1007\/978-3-030-82099-2_32","type":"book-chapter","created":{"date-parts":[[2021,12,18]],"date-time":"2021-12-18T23:16:35Z","timestamp":1639869395000},"page":"355-367","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Uncertainty to Avoid Entrapment: Comparing Internet Stings to Real Victim Conversations"],"prefix":"10.1007","author":[{"given":"Tatiana","family":"Ringenberg","sequence":"first","affiliation":[]},{"given":"Kathryn","family":"Seigfried-Spellar","sequence":"additional","affiliation":[]},{"given":"Julia Taylor","family":"Rayz","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,7,28]]},"reference":[{"issue":"9","key":"32_CR1","doi-asserted-by":"publisher","first-page":"1170","DOI":"10.1080\/01639625.2017.1410372","volume":"39","author":"S Aitken","year":"2018","unstructured":"Aitken, S., Gaskell, D., Hodkinson, A.: Online sexual grooming: exploratory comparison of themes arising from male offenders\u2019 communications with male victims compared to female victims. Deviant Behav. 39(9), 1170\u20131190 (2018)","journal-title":"Deviant Behav."},{"issue":"10","key":"32_CR2","doi-asserted-by":"publisher","first-page":"1275","DOI":"10.1177\/0093854812453120","volume":"39","author":"E Beauregard","year":"2012","unstructured":"Beauregard, E., Leclerc, B., Lussier, P.: Decision making in the crime commission process: comparing rapists, child molesters, and victim-crossover sex offenders. Crim. Justice Behav. 39(10), 1275\u20131295 (2012)","journal-title":"Crim. Justice Behav."},{"key":"32_CR3","doi-asserted-by":"publisher","first-page":"140","DOI":"10.1016\/j.chiabu.2014.12.004","volume":"44","author":"PJ Black","year":"2015","unstructured":"Black, P.J., Wollis, M., Woodworth, M., Hancock, J.T.: A linguistic analysis of grooming strategies of online child sex offenders: implications for our understanding of predatory sexual behavior in an increasingly computer-mediated world. Child Abuse Neglect 44, 140\u2013149 (2015)","journal-title":"Child Abuse Neglect"},{"issue":"1","key":"32_CR4","doi-asserted-by":"publisher","first-page":"72","DOI":"10.1177\/1079063210384275","volume":"23","author":"P Briggs","year":"2011","unstructured":"Briggs, P., Simon, W.T., Simonsen, S.: An exploratory study of internet-initiated sexual offenses and the chat room sex offender: has the internet enabled a new typology of sex offender? Sex. Abuse 23(1), 72\u201391 (2011)","journal-title":"Sex. Abuse"},{"key":"32_CR5","doi-asserted-by":"publisher","first-page":"2037","DOI":"10.3389\/fpsyg.2017.02037","volume":"8","author":"S Calderon","year":"2017","unstructured":"Calderon, S., Mac Giolla, E., Granhag, P.A., Ask, K.: Do true and false intentions differ in level of abstraction? A test of construal level theory in deception contexts. Front. Psychol. 8, 2037 (2017)","journal-title":"Front. Psychol."},{"issue":"1","key":"32_CR6","doi-asserted-by":"publisher","first-page":"77","DOI":"10.1080\/13552600.2016.1241309","volume":"23","author":"D DeHart","year":"2017","unstructured":"DeHart, D., Dwyer, G., Seto, M.C., Moran, R., Letourneau, E., Schwarz-Watts, D.: Internet sexual solicitation of children: a proposed typology of offenders based on their chats, e-mails, and social network posts. J. Sex. Aggress. 23(1), 77\u201389 (2017)","journal-title":"J. Sex. Aggress."},{"issue":"5","key":"32_CR7","doi-asserted-by":"publisher","first-page":"577","DOI":"10.1080\/10538712.2016.1189473","volume":"25","author":"EL van Gijn-Grosvenor","year":"2016","unstructured":"van Gijn-Grosvenor, E.L., Lamb, M.E.: Behavioural differences between online sexual groomers approaching boys and girls. J. Child Sex. Abuse 25(5), 577\u2013596 (2016)","journal-title":"J. Child Sex. Abuse"},{"key":"32_CR8","unstructured":"Gupta, A., Kumaraguru, P., Sureka, A.: Characterizing pedophile conversations on the internet using online grooming. arXiv preprint arXiv:1208.4324 (2012)"},{"issue":"2","key":"32_CR9","first-page":"9","volume":"13","author":"J Holmes","year":"1982","unstructured":"Holmes, J.: Expressing doubt and certainty in English. Reg. Lang. Cent. J. 13(2), 9\u201328 (1982)","journal-title":"Reg. Lang. Cent. J."},{"issue":"1","key":"32_CR10","first-page":"13","volume":"22","author":"E Hovy","year":"2010","unstructured":"Hovy, E., Lavid, J.: Towards a \u2018science\u2019 of corpus annotation: a new methodological challenge for corpus linguistics. Int. J. Transl. 22(1), 13\u201336 (2010)","journal-title":"Int. J. Transl."},{"issue":"6","key":"32_CR11","doi-asserted-by":"publisher","first-page":"563","DOI":"10.1177\/1079063215612442","volume":"29","author":"JA Kloess","year":"2017","unstructured":"Kloess, J.A., Seymour-Smith, S., Hamilton-Giachritsis, C.E., Long, M.L., Shipley, D., Beech, A.R.: A qualitative analysis of offenders\u2019 modus operandi in sexually exploitative interactions with children online. Sex. Abuse 29(6), 563\u2013591 (2017)","journal-title":"Sex. Abuse"},{"key":"32_CR12","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.esp.2020.08.002","volume":"61","author":"C Liu","year":"2021","unstructured":"Liu, C., Tseng, M.Y.: Paradigmatic variation in hedging and boosting: a comparative study of discussions in narrative inquiry and grounded theory research. Engl. Specif. Purp. 61, 1\u201316 (2021)","journal-title":"Engl. Specif. Purp."},{"key":"32_CR13","unstructured":"O\u2019Connell, R.: A typology of child cybers exploitation and online grooming practices. Cyberspace Research Unit, University of Central Lancashire (2003)"},{"key":"32_CR14","doi-asserted-by":"crossref","unstructured":"Prabhakaran, V., Ganeshkumar, P., Rambow, O.: Author commitment and social power: automatic belief tagging to infer the social context of interactions. arXiv preprint arXiv:1805.06016 (2018)","DOI":"10.18653\/v1\/N18-1096"},{"key":"32_CR15","unstructured":"Prokofieva, A., Hirschberg, J.: Hedging and speaker commitment. In: 5th International Workshop on Emotion, Social Signals, Sentiment & Linked Open Data, Reykjavik, Iceland (2014)"},{"key":"32_CR16","doi-asserted-by":"crossref","unstructured":"Ringenberg, T.R., Seigfried-Spellar, K.C., Rayz, J.T.: Using fuzzy sets to assess differences in online grooming conversations with victims, decoys, and law enforcement. In: 2020 Annual Conference of the North American Fuzzy Information Processing Society (NAFIPS) (2020)","DOI":"10.1007\/978-3-030-81561-5_15"},{"key":"32_CR17","unstructured":"Rubin, V.L.: Identifying certainty in texts. Doctoral thesis, Syracuse University, Syracuse, NY (2006)"},{"issue":"5","key":"32_CR18","doi-asserted-by":"publisher","first-page":"533","DOI":"10.1016\/j.ipm.2010.02.006","volume":"46","author":"VL Rubin","year":"2010","unstructured":"Rubin, V.L.: Epistemic modality: from uncertainty to certainty in the context of information seeking as interactions with texts. Inf. Process. Manag. 46(5), 533\u2013540 (2010)","journal-title":"Inf. Process. Manag."},{"key":"32_CR19","unstructured":"Sanchez, L.M.: Certainty assessment in informal language, p. 253 (2015)"},{"key":"32_CR20","unstructured":"Sanchez, L.M., Vogel, C.: A hedging annotation scheme focused on epistemic phrases for informal language. In: Proceedings of the Workshop on Models for Modality Annotation (2015)"},{"issue":"2","key":"32_CR21","doi-asserted-by":"publisher","first-page":"261","DOI":"10.1162\/COLI_a_00096","volume":"38","author":"R Saur\u00ed","year":"2012","unstructured":"Saur\u00ed, R., Pustejovsky, J.: Are you sure that this happened? Assessing the factuality degree of events in text. Comput. Linguist. 38(2), 261\u2013299 (2012)","journal-title":"Comput. Linguist."},{"issue":"20","key":"32_CR22","doi-asserted-by":"publisher","first-page":"4303","DOI":"10.1177\/0886260519869235","volume":"34","author":"R Wortley","year":"2019","unstructured":"Wortley, R., Leclerc, B., Reynald, D.M., Smallbone, S.: What deters child sex offenders? A comparison between completed and noncompleted offenses. J. Interpers. Violence 34(20), 4303\u20134327 (2019)","journal-title":"J. Interpers. Violence"},{"key":"32_CR23","first-page":"3","volume":"11","author":"LA Zadeh","year":"1979","unstructured":"Zadeh, L.A.: Fuzzy sets and information granularity. Adv. Fuzzy Set Theory Appl. 11, 3\u201318 (1979)","journal-title":"Adv. Fuzzy Set Theory Appl."}],"container-title":["Lecture Notes in Networks and Systems","Explainable AI and Other Applications of Fuzzy Techniques"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-82099-2_32","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,12,18]],"date-time":"2021-12-18T23:17:03Z","timestamp":1639869423000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-82099-2_32"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,7,28]]},"ISBN":["9783030820985","9783030820992"],"references-count":23,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-82099-2_32","relation":{},"ISSN":["2367-3370","2367-3389"],"issn-type":[{"type":"print","value":"2367-3370"},{"type":"electronic","value":"2367-3389"}],"subject":[],"published":{"date-parts":[[2021,7,28]]},"assertion":[{"value":"28 July 2021","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"NAFIPS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"North American Fuzzy Information Processing Society Annual Conference","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"West Lafayette, IN","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"USA","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2021","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"7 June 2021","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"9 June 2021","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"nafips2021","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/polytechnic.purdue.edu\/nafips2021","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}