{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T10:17:25Z","timestamp":1743070645897,"version":"3.40.3"},"publisher-location":"Cham","reference-count":21,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319270715"},{"type":"electronic","value":"9783319270722"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-27072-2_24","type":"book-chapter","created":{"date-parts":[[2015,12,29]],"date-time":"2015-12-29T07:40:18Z","timestamp":1451374818000},"page":"191-196","source":"Crossref","is-referenced-by-count":0,"title":["The Terrorist Threat to the Critical Information Infrastructure in South East Europe"],"prefix":"10.1007","author":[{"given":"Metodi","family":"Hadji-Janev","sequence":"first","affiliation":[]},{"given":"Mitko","family":"Bogdanoski","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,12,30]]},"reference":[{"issue":"24","key":"24_CR1","first-page":"59","volume":"13","author":"M Bogdanoski","year":"2013","unstructured":"Bogdanoski, M., Petreski, D.: Cyber terrorism-global security threat. Contemp. Maced. Defense-Int. Sci. Defense, Secur. Peace J. 13(24), 59\u201373 (2013)","journal-title":"Contemp. Maced. Defense-Int. Sci. Defense, Secur. Peace J."},{"unstructured":"The United Nations Office on Drugs and Crime, The Use of the Internet for Terrorist Purposes, The United Nations New York (2012)","key":"24_CR2"},{"unstructured":"Rollins, J.: Al Qaeda and Affiliates: Historical Perspective, Global Presence, and Implications for U.S. Policy, CRS Report R41070 (2011)","key":"24_CR3"},{"unstructured":"Weimann, G.: How modern terrorism uses the Internet. United states institute of peace. Accessed 22 March 2015 (2004). \n                    http:\/\/www.terror.net\n                    \n                  , \n                    http:\/\/www.usip.org\/pubs\/specialreports\/sr116.pdf","key":"24_CR4"},{"unstructured":"House of Commons Intelligence and Security Committee. Report into the London Terrorist Attacks on 7 July 2005, May 2006","key":"24_CR5"},{"key":"24_CR6","volume-title":"An Indonesian\u2019s Prison Memoir Takes Holy War into Cyberspace","author":"A Sipress","year":"2004","unstructured":"Sipress, A.: An Indonesian\u2019s Prison Memoir Takes Holy War into Cyberspace. Washington Post, New York (2004). \n                    http:\/\/www.washingtonpost.com\/wp-dyn\/articles\/A62095-2004Dec13.html\n                    \n                  . Accessed 14 December 2004"},{"key":"24_CR7","first-page":"D01","volume-title":"Three Worked the Web to Help Terrorists","author":"B Krebs","year":"2007","unstructured":"Krebs, B.: Three Worked the Web to Help Terrorists, p. D01. Washington Post, New York (2007)"},{"unstructured":"Aaronson, M., Diessen, A., de Kermabon, Y., Long, M.B., Miklaucic, M.: NATO countering the hybrid threat. Prism 2(4), 111\u2013124 (2012)","key":"24_CR8"},{"unstructured":"Amaruso, J.: Romania Global Center for Cyber Crime in USA, USA Toaday, 14 January 2014. \n                    http:\/\/guardianlv.com\/2014\/01\/romania-global-center-for-cybercrime-in-u-s\/\n                    \n                  . Accessed 22 March 2014","key":"24_CR9"},{"unstructured":"FBI Arrested Young Hacker from Struga, Press 24, November 20 2012. \n                    http:\/\/star.press24.mk\/story\/poznato\/foto-fbi-uapsi-mlad-haker-od-struga-sin-na-poznata-struzhanka\n                    \n                  . Accessed 22 September 2013","key":"24_CR10"},{"unstructured":"10 arrested in cyber-crime probe, Express UK, 13 December 2012. \n                    http:\/\/www.express.co.uk\/news\/world\/364435\/10-arrested-in-cyber-crime-probe\n                    \n                  . Accessed 24 March 2014","key":"24_CR11"},{"issue":"4","key":"24_CR12","first-page":"378","volume":"12","author":"D Maja","year":"2010","unstructured":"Maja, D., Bojan, D.: Perception of cyber crime in slovenia. J. Crim. Justice Secur. 12(4), 378\u2013396 (2010)","journal-title":"J. Crim. Justice Secur."},{"unstructured":"Oklop\u010di\u0107, Z., Brestovec, B., Dalibor, S., Njavro, B.: IT solution for gas supply management in open gas market conditions. \n                    http:\/\/www.koncar-ket.hr\/docs\/koncarketHR\/documents\/158\/1_0\/Original.pdf\n                    \n                  . Accessed 17 April 2014","key":"24_CR13"},{"unstructured":"Kennedy, D., Besant-Jones, J.: World Bank Framework for Development of Regional Energy Trade in South East Europe, Energy and Mining Sector Board Discussion Paper, No.12, March 2004","key":"24_CR14"},{"unstructured":"Likmeta, B.: Al Qaeda Using Sical Media to find new Recruits, Global Post, 24 January 2014). \n                    http:\/\/www.globalpost.com\/dispatch\/news\/regions\/europe\/140123\/albania-isis-al-qaeda-social-media-europe\n                    \n                  . Accessed 22 April 2014","key":"24_CR15"},{"unstructured":"Albanian Jihadists Recruit Fighters for Syria on Facebook, BalkanInsight. \n                    http:\/\/www.balkaninsight.com\/en\/article\/albanian-jihadist-use-internet-to-recruit-fighters\n                    \n                  . Accessed 15 January 2014","key":"24_CR16"},{"unstructured":"Theohary, C.A., Rollins, J.: Terrrorist Use of Internet: Information operations in Cyberspace, CRS Report, R41674 (2001)","key":"24_CR17"},{"unstructured":"Gerwehr, S., Daly, S.: Al-Qaida: terrorist selection and recruitment. In: Kamien, D., (ed.) The McGraw-Hill Homeland Security Handbook, McGraw-Hill. New York (2006)","key":"24_CR18"},{"unstructured":"European Commission, Expert Group on Violent Radicalisation, Radicalisation processes leading to acts of terrorism (2008). \n                    www.clingendael.nl\/publications\/2008\/20080500_cscp_report_vries.pdf","key":"24_CR19"},{"unstructured":"Associated press, Kosovan Albanian admits killing two US airmen in Frankfurt terror attack. \n                    http:\/\/www.theguardian.com\/world\/2011\/aug\/31\/kosovan-albanian-admits-killing-airmen\n                    \n                  . Accessed 31 August 2011","key":"24_CR20"},{"unstructured":"Tereshchenko, N.: Financing Terrorism: The European Nexus. In: Research Institute for European and American Studies, 25 March 2013. \n                    http:\/\/www.rieas.gr\/research-areas\/editorial\/1939-financing-terrorism-the-european-nexus-.html\n                    \n                  . Accessed 23 April 2014","key":"24_CR21"}],"container-title":["Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","Future Access Enablers for Ubiquitous and Intelligent Infrastructures"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-27072-2_24","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,1]],"date-time":"2019-06-01T02:25:59Z","timestamp":1559355959000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-27072-2_24"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319270715","9783319270722"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-27072-2_24","relation":{},"ISSN":["1867-8211","1867-822X"],"issn-type":[{"type":"print","value":"1867-8211"},{"type":"electronic","value":"1867-822X"}],"subject":[],"published":{"date-parts":[[2015]]}}}