{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T10:30:30Z","timestamp":1725791430907},"publisher-location":"Cham","reference-count":23,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319066769"},{"type":"electronic","value":"9783319066776"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-319-06677-6_2","type":"book-chapter","created":{"date-parts":[[2014,4,6]],"date-time":"2014-04-06T23:39:36Z","timestamp":1396827576000},"page":"8-17","source":"Crossref","is-referenced-by-count":5,"title":["Knowledge Management in Cybercrime Investigation \u2013 A Case Study of Identifying Cybercrime Investigation Knowledge in Taiwan"],"prefix":"10.1007","author":[{"given":"Weiping","family":"Chang","sequence":"first","affiliation":[]},{"given":"Peifang","family":"Chung","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"2_CR1","unstructured":"Beckman, T.: Implementing the Knowledge Organization in Government. Paper and Presentation at the 10th National Conference on Federal Quality (1997)"},{"key":"2_CR2","unstructured":"Casey, E.: Digital Evidence and Computer Crime, 2nd edn, pp. 92\u2013113. Elsevier (2004)"},{"key":"2_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"28","DOI":"10.1007\/978-3-642-13601-6_4","volume-title":"Intelligence and Security Informatics","author":"W. Chang","year":"2010","unstructured":"Chang, W.: Fighting Cybercrime: A KM Perspective. In: Chen, H., Chau, M., Li, S., Urs, S., Srinivasa, S., Wang, G.A. (eds.) PAISI 2010. LNCS, vol.\u00a06122, pp. 28\u201330. Springer, Heidelberg (2010)"},{"issue":"1","key":"2_CR4","doi-asserted-by":"publisher","first-page":"28","DOI":"10.1145\/602421.602441","volume":"46","author":"H. Chen","year":"2003","unstructured":"Chen, H., Zeng, D., Atabakhsh, H., Wyzga, W., Schroeder, J.: COPLINK- Managing Law Enforcement Data and Knowledge. Communication of the ACM\u00a046(1), 28\u201334 (2003)","journal-title":"Communication of the ACM"},{"key":"2_CR5","doi-asserted-by":"crossref","unstructured":"Donalds, C., OseiBryson, K.: Criminal Investigation Knowledge System: CRIKS. In: Proceedings of the 39th Hawaii International Conference on System Sciences, pp. 155\u2013164 (2006)","DOI":"10.1109\/HICSS.2006.102"},{"issue":"3","key":"2_CR6","doi-asserted-by":"publisher","first-page":"366","DOI":"10.1016\/S0024-6301(97)90248-X","volume":"30","author":"L. Edvinsson","year":"1997","unstructured":"Edvinsson, L.: Developing intellectual capital at Skandia. Long Range Planning\u00a030(3), 366 (1997)","journal-title":"Long Range Planning"},{"issue":"2","key":"2_CR7","doi-asserted-by":"publisher","first-page":"191","DOI":"10.1504\/EG.2007.013983","volume":"4","author":"P. Gottschalk","year":"2007","unstructured":"Gottschalk, P.: Information systems in police knowledge management. Electronic Government\u00a04(2), 191\u2013203 (2007)","journal-title":"Electronic Government"},{"key":"2_CR8","unstructured":"Gultekin, K.: Knowledge management and law enforcement: An examination of knowledge management strategies of the police information system (POLNET) in the Turkish National Police, Doctoral thesis of University of North Texas (2009)"},{"issue":"1","key":"2_CR9","doi-asserted-by":"publisher","first-page":"17","DOI":"10.1108\/02635570010273018","volume":"100","author":"B. Gupta","year":"2000","unstructured":"Gupta, B., lyer, L.S., Aronson, J.E.: Knowledge Management: practices and challenges. Industrial Management + Data Systems\u00a0100(1), 17\u201321 (2000)","journal-title":"Industrial Management + Data Systems"},{"issue":"1","key":"2_CR10","first-page":"1","volume":"1","author":"S. Hinduja","year":"2007","unstructured":"Hinduja, S.: Computer Crime Investigations in the United States: Leveraging Knowledge from the Past to Address the Future. International Journal of Cyber Criminology\u00a01(1), 1\u201326 (2007)","journal-title":"International Journal of Cyber Criminology"},{"key":"2_CR11","unstructured":"Housel, T., Bell, A.: Measuring and Managing Knowledge. McGraw Hill Companies (2001)"},{"issue":"1","key":"2_CR12","doi-asserted-by":"crossref","first-page":"113","DOI":"10.2307\/25148670","volume":"29","author":"T. Kankanhalli","year":"2005","unstructured":"Kankanhalli, T., Kwok, K.: Contributing Knowledge to Electronic Knowledge Repositories: An Empirical Investigation. MIS Quarterly\u00a029(1), 113\u2013145 (2005)","journal-title":"MIS Quarterly"},{"key":"2_CR13","unstructured":"Koenig, E.D., Srikantaiah, T.K.: Knowledge management lessons learned: what works and what doesn\u2019t. Medford, NJ: Information Today (2004)"},{"key":"2_CR14","volume-title":"e-Business Intelligence Turning Information into Knowledge into Profit","author":"B. Liautaud","year":"2001","unstructured":"Liautaud, B., Hammond, M.: e-Business Intelligence Turning Information into Knowledge into Profit. McGraw-Hill, New York (2001)"},{"key":"2_CR15","unstructured":"National Police Agency, 2012 Police Statistical News No. 5 (2013)"},{"key":"2_CR16","unstructured":"National Police Agency, 2013 Police Statistical News No. 14 (2013)"},{"key":"2_CR17","unstructured":"National Police Agency, 2013 Police Statistical News No. 3 (2013)"},{"key":"2_CR18","unstructured":"Osterburg, J., Ward, R.: Criminal Investigation: A Method for Reconstructing the Past. Anderson Publishing Co. (2000)"},{"issue":"4","key":"2_CR19","doi-asserted-by":"publisher","first-page":"611","DOI":"10.1108\/13673271011059554","volume":"14","author":"I. Seba","year":"2010","unstructured":"Seba, I., Rowley, J.: Knowledge management in UK police forces. Journal of Knowledge Management\u00a014(4), 611\u2013626 (2010)","journal-title":"Journal of Knowledge Management"},{"issue":"4","key":"2_CR20","first-page":"143","volume":"2","author":"N. Shaghaei","year":"2013","unstructured":"Shaghaei, N., Turgay, T.: Performance Improvement through Knowledge Management and Innovation in Educational Institutions: Teachers\u2019 Perception. GSTF Business Review\u00a02(4), 143 (2013)","journal-title":"GSTF Business Review"},{"key":"2_CR21","volume-title":"Intellectual Capital: The New Wealth of Organization","author":"T. Stewart","year":"1997","unstructured":"Stewart, T.: Intellectual Capital: The New Wealth of Organization. Bantam Doubleday Dell Publishing, New York (1997)"},{"key":"2_CR22","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"59","DOI":"10.1007\/3-540-44853-5_5","volume-title":"Intelligence and Security Informatics","author":"R. Zheng","year":"2003","unstructured":"Zheng, R., Qin, Y., Huang, Z., Chen, H.: Authorship Analysis in Cybercrime Investigation. In: Chen, H., Miranda, R., Zeng, D.D., Demchak, C., Schroeder, J., Madhusudan, T. (eds.) ISI 2003. LNCS, vol.\u00a02665, pp. 59\u201373. Springer, Heidelberg (2003)"},{"key":"2_CR23","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"621","DOI":"10.1007\/11760146_67","volume-title":"Intelligence and Security Informatics","author":"Y. Zhou","year":"2006","unstructured":"Zhou, Y., Qin, J., Lai, G., Reid, E., Chen, H.: Exploring the Dark Side of the Web: Collection and Analysis of U.S. Extremist Online Forums. In: Mehrotra, S., Zeng, D.D., Chen, H., Thuraisingham, B., Wang, F. (eds.) ISI 2006. LNCS, vol.\u00a03975, pp. 621\u2013626. Springer, Heidelberg (2006)"}],"container-title":["Lecture Notes in Computer Science","Intelligence and Security Informatics"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-06677-6_2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,26]],"date-time":"2019-05-26T10:32:25Z","timestamp":1558866745000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-06677-6_2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783319066769","9783319066776"],"references-count":23,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-06677-6_2","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2014]]}}}