{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,31]],"date-time":"2026-03-31T04:35:07Z","timestamp":1774931707862,"version":"3.50.1"},"publisher-location":"Cham","reference-count":36,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783031179945","type":"print"},{"value":"9783031179952","type":"electronic"}],"license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"DOI":"10.1007\/978-3-031-17995-2_27","type":"book-chapter","created":{"date-parts":[[2022,10,9]],"date-time":"2022-10-09T23:03:46Z","timestamp":1665356626000},"page":"380-394","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["Modeling Cybercrime with\u00a0UFO: An Ontological Analysis of\u00a0Non-Consensual Pornography Cases"],"prefix":"10.1007","author":[{"given":"Mattia","family":"Falduti","sequence":"first","affiliation":[]},{"given":"Cristine","family":"Griffo","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,10,10]]},"reference":[{"key":"27_CR1","unstructured":"Asaro, C., Biasiotti, M., Guidotti, P., Papini, M., Sagri, M.T., Tiscornia, D.: A domain ontology: Italian crime ontology. In: Proceedings of the Workshop on Legal Ontologies and Web Based Legal Information Management (LegOnt 2003), pp. 1\u20137. Edinburgh, UK (2003)"},{"key":"27_CR2","unstructured":"Breuker, J.: The construction and use of ontologies of criminal law in the e-Court European project. In: Proceedings of Means of Electronic Communication in Court Administration, pp. 15\u201340 (2003)"},{"key":"27_CR3","unstructured":"Breuker, J., Hoekstra, R.: Core concepts of law: Taking common-sense seriously. In: Proceedings of the 3rd International Conference on Formal Ontologies in Information Systems (FOIS 2004), pp. 210\u2013221. Torino, Italy (2004)"},{"key":"27_CR4","unstructured":"Bundeskriminalamt: BKA - Police Crime Statistics. https:\/\/www.bka.de\/EN\/CurrentInformation\/PoliceCrimeStatistics (2022)"},{"key":"27_CR5","unstructured":"Caletti, G.M.: Can affirmative consent save \u201cRevenge Porn\u201d Laws? Lessons from the Italian criminalization of non-consensual pornography. Virginia J. Law Technol. 25(3), 112\u2013174 (2021)"},{"key":"27_CR6","doi-asserted-by":"crossref","unstructured":"Castano, S., Falduti, M., Ferrara, A., Montanelli, S.: Crime knowledge extraction: an ontology-driven approach for detecting abstract terms in case law decisions. In: Proceedings of the 17th International Conference on Artificial Intelligence and Law (ICAIL19), pp. 179\u2013183. Montreal, Canada (2019)","DOI":"10.1145\/3322640.3326730"},{"key":"27_CR7","doi-asserted-by":"publisher","unstructured":"Castano, S., Falduti, M., Ferrara, A., Montanelli, S.: A knowledge-centered framework for exploration and retrieval of legal documents. Inf. Syst. 106, 101842 (2021). https:\/\/doi.org\/10.1016\/j.is.2021.101842","DOI":"10.1016\/j.is.2021.101842"},{"key":"27_CR8","unstructured":"Degiorgio, E.: Criminalising Revenge Porn. Ph.D. thesis, University of Malta (2016)"},{"key":"27_CR9","unstructured":"European Institute for Gender Equality: Cyber Violence against Women and Girls. Vilnius, European Institute for Gender Equality (EIGE) (2017)"},{"key":"27_CR10","unstructured":"Falduti, M.: Law and Data Science: Knowledge Modeling and Extraction from Court Decisions. Ph.D. thesis, Universit\u00e0 degli Studi di Milano (2021)"},{"issue":"4","key":"27_CR11","doi-asserted-by":"publisher","first-page":"453","DOI":"10.1007\/s00354-019-00070-2","volume":"37","author":"B Fawei","year":"2019","unstructured":"Fawei, B., Pan, J.Z., Kollingbaum, M.J., Wyner, A.Z.: A semi-automated ontology construction for legal question answering. N. Gener. Comput. 37(4), 453\u2013478 (2019)","journal-title":"N. Gener. Comput."},{"key":"27_CR12","series-title":"Palgrave Studies in Cyberpsychology","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-030-59284-4_1","volume-title":"Non-consensual Image-based Sexual Offending","author":"D Fido","year":"2020","unstructured":"Fido, D., Harper, C.A.: An introduction to image-based sexual abuse. In: Non-consensual Image-based Sexual Offending. PSC, pp. 1\u201326. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-59284-4_1"},{"key":"27_CR13","doi-asserted-by":"publisher","first-page":"632","DOI":"10.1016\/j.procs.2017.08.109","volume":"112","author":"ME Ghosh","year":"2017","unstructured":"Ghosh, M.E., Naja, H., Abdulrab, H., Khalil, M.: Towards a legal rule-based system grounded on the integration of criminal domain ontology and rules. Proc. Comput. Sci. 112, 632\u2013642 (2017)","journal-title":"Proc. Comput. Sci."},{"key":"27_CR14","unstructured":"Griffo, C., Almeida, J.P.A., Guizzardi, G.: A systematic mapping of the literature on legal core ontologies. In: Proceedings of the 7th Brazilian Symposium on Ontology Research (ONTOBRAS 2015), pp. 79\u201390, Sao Paolo, Brazil (2015)"},{"key":"27_CR15","doi-asserted-by":"publisher","unstructured":"Griffo, C., Almeida, J.P.A., Guizzardi, G.: Conceptual modeling of legal relations. In: Trujillo, J.C., Davis, K.C., Du, X., Li, Z., Ling, T.W., Li, G., Lee, M.L. (eds.) Conceptual Modeling. LNCS, vol. 11157, pp. 169\u2013183. Springe, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-030-00847-5-14","DOI":"10.1007\/978-3-030-00847-5-14"},{"key":"27_CR16","doi-asserted-by":"publisher","DOI":"10.1016\/j.is.2019.101454","volume":"101","author":"C Griffo","year":"2021","unstructured":"Griffo, C., Almeida, J.P.A., Guizzardi, G., Nardi, J.C.: Service contract modeling in enterprise architecture: an ontology-based approach. Inf. Syst. 101, 101454 (2021). https:\/\/doi.org\/10.1016\/j.is.2019.101454","journal-title":"Inf. Syst."},{"key":"27_CR17","unstructured":"Guizzardi, G.: Ontological foundations for structural conceptual models. Ph.D. thesis, University of Twente, October 2005"},{"key":"27_CR18","unstructured":"Harriet Thurley: Bristol man found guilty of revenge porn against his ex \u2013 via WhatsApp. Cosmopolitan (2015)"},{"issue":"39","key":"27_CR19","doi-asserted-by":"publisher","first-page":"319","DOI":"10.1093\/slr\/hmx008","volume":"3","author":"J Haynes","year":"2018","unstructured":"Haynes, J.: Legislative approaches to combating \u2018revenge porn\u2019: a multijurisdictional perspective. Statut. Law Rev. 3(39), 319\u2013336 (2018)","journal-title":"Statut. Law Rev."},{"key":"27_CR20","unstructured":"Kleeman, J.: The YouTube star who fought back against revenge porn \u2013 and won. The Guardian (2018)"},{"key":"27_CR21","doi-asserted-by":"publisher","unstructured":"Benjamins, V.R., Casanovas, P., Breuker, J., Gangemi, A.: Law and the Semantic Web. Legal Ontologies, Methodologies, Legal Information Retrieval, and Applications. LNCS (LNAI), vol. 3369. Springer, Heidelberg (2005). https:\/\/doi.org\/10.1007\/b106624","DOI":"10.1007\/b106624"},{"key":"27_CR22","doi-asserted-by":"publisher","unstructured":"Mezghanni, I., Gargouri, F.: CrimAr: A criminal Arabic ontology for a benchmark based evaluation. In: Proceedings of the 21st International Conference on Knowledge-Based and Intelligent Information & Engineering Systems (KES 2017), pp. 653\u2013662. Procedia Computer Science, Marseille, France (2017). https:\/\/doi.org\/10.1016\/j.procs.2017.08.113","DOI":"10.1016\/j.procs.2017.08.113"},{"key":"27_CR23","doi-asserted-by":"publisher","unstructured":"O\u2019Malley, R.L., Holt, K.M.: Cyber sextortion: an exploratory analysis of different perpetrators engaging in a similar crime. J. Interpers. Violence. 37, 258\u2013283 (2020). https:\/\/doi.org\/10.1177\/0886260520909186","DOI":"10.1177\/0886260520909186"},{"key":"27_CR24","unstructured":"Postale, P.: I dati 2021 della Polizia postale. https:\/\/www.poliziadistato.it\/articolo\/23393"},{"key":"27_CR25","unstructured":"Resourcehub: Fighting Domestic Violence - Belgium. Technical report, Bakermckenzie (2021)"},{"key":"27_CR26","doi-asserted-by":"publisher","unstructured":"Rocha, R.L.M., Pedrinha, R.D., de Oliveira, M.H.B.: O tratamento da pornografia de vingan\u00e7a pelo ordenamento jur\u00eddico brasileiro. Sa\u00fade em Debate 43(spe4), 178\u2013189 (2019). https:\/\/doi.org\/10.1590\/0103-11042019s415","DOI":"10.1590\/0103-11042019s415"},{"key":"27_CR27","unstructured":"Roffer, J.: Nonconsensual pornography: an old crime updates its software. Fordham Intellect. Prop. Media Entertain. Law J. 27(4), 935 (2017)"},{"key":"27_CR28","unstructured":"Sara De Vido, Sosa, L.: Criminalisation of gender-based violence against women in European States, including ICT-facilitated violence. Technical report, European network of legal experts in gender equality and non-discrimination, European Commission (2021)"},{"key":"27_CR29","doi-asserted-by":"publisher","unstructured":"Semenzin, S., Bainotti, L.: The use of telegram for non-consensual dissemination of intimate images: gendered affordances and the construction of Masculinities. Soc. Media + Soc. 6(4), 205630512098445 (2020). https:\/\/doi.org\/10.1177\/2056305120984453","DOI":"10.1177\/2056305120984453"},{"issue":"3","key":"27_CR30","first-page":"21","volume":"7","author":"GK Shankhdhar","year":"2014","unstructured":"Shankhdhar, G.K., Singh, V.K., Darbari, M.: Legal semantic web - a recommendation system. Int. J. Appl. Inf. Syst. 7(3), 21\u201327 (2014)","journal-title":"Int. J. Appl. Inf. Syst."},{"key":"27_CR31","doi-asserted-by":"publisher","unstructured":"Pagallo, U., Palmirani, M., Casanovas, P., Sartor, G., Villata, S.: AI Approaches to the Complexity of Legal Systems. AICOL 2015-2017. LNCS (LNAI), vol. 10791. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-030-00178-0","DOI":"10.1007\/978-3-030-00178-0"},{"key":"27_CR32","unstructured":"Maddocks, S.: \u201cRevenge Porn\u201d: 5 Important Reasons Why We Should Not Call It By That Name. GenderIt.org (2019)"},{"key":"27_CR33","unstructured":"Stephanie Kirchgaessner: Tiziana Cantone: Seeking justice for woman who killed herself over sex tape. The Guardian (2016)"},{"key":"27_CR34","unstructured":"Terry, K.: Pandemic fuels 329\\% rise in revenge porn offences in London: Met Police records 1,185 cases of private snaps and videos illegally shared online in last year - with victims as young as TEN. https:\/\/www.dailymail.co.uk\/news\/article-10303961\/Pandemic-fuels-329-rise-revenge-porn-offences-London-victims-young-TEN.html (2021)"},{"key":"27_CR35","doi-asserted-by":"publisher","unstructured":"Trojahn, C., Vieira, R., Schmidt, D., Pease, A., Guizzardi, G.: Foundational ontologies meet ontology matching: a survey. Semant. Web. 1\u201320 (2021). https:\/\/doi.org\/10.3233\/SW-210447","DOI":"10.3233\/SW-210447"},{"key":"27_CR36","doi-asserted-by":"publisher","first-page":"149","DOI":"10.4324\/9781315107752-12","volume-title":"Ethics and the Contemporary World","author":"C V\u00e9liz","year":"2019","unstructured":"V\u00e9liz, C.: The internet and privacy. In: Edmonds, D. (ed.) Ethics and the Contemporary World, pp. 149\u2013159. Abingdon, UK (2019)"}],"container-title":["Lecture Notes in Computer Science","Conceptual Modeling"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-17995-2_27","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,10,9]],"date-time":"2022-10-09T23:07:13Z","timestamp":1665356833000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-17995-2_27"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"ISBN":["9783031179945","9783031179952"],"references-count":36,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-17995-2_27","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022]]},"assertion":[{"value":"10 October 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ER","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Conceptual Modeling","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Hyderabad","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"India","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2022","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"17 October 2022","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"20 October 2022","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"41","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"er2022","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/er2022web.github.io\/ER2022\/index.html","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"82","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"19","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"11","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"23% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"The conference took place in a virtual mode.","order":10,"name":"additional_info_on_review_process","label":"Additional Info on Review Process","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}