{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T19:11:13Z","timestamp":1725909073594},"publisher-location":"Cham","reference-count":15,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319569901"},{"type":"electronic","value":"9783319569918"}],"license":[{"start":{"date-parts":[[2017,8,23]],"date-time":"2017-08-23T00:00:00Z","timestamp":1503446400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-319-56991-8_18","type":"book-chapter","created":{"date-parts":[[2017,8,22]],"date-time":"2017-08-22T03:57:16Z","timestamp":1503374236000},"page":"228-242","source":"Crossref","is-referenced-by-count":0,"title":["Multi-agent System for Safeguarding Children Online"],"prefix":"10.1007","author":[{"given":"Katrinna","family":"MacFarlane","sequence":"first","affiliation":[]},{"given":"Violeta","family":"Holmes","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,8,23]]},"reference":[{"key":"18_CR1","unstructured":"Unicef: What is the UNCRC? | children\u2019s rights | Unicef UK (2016). \nhttp:\/\/www.unicef.org.uk\/UNICEFs-Work\/UN-Convention\/\n\n. Accessed 12 May 2016"},{"key":"18_CR2","unstructured":"K9 web protection (2010). \nhttp:\/\/www1.k9webprotection.com\/\n\n. Accessed 12 May 2016"},{"key":"18_CR3","unstructured":"Hinks, J.: Best free parental control software: 5 programs to keep your kids safe in 2015 (2015). \nhttp:\/\/www.techradar.com\/news\/software\/applications\/best-free-parental-control-software-9-programs-to-keep-your-kids-safe-1140315\n\n. Accessed 12 May 2016"},{"key":"18_CR4","unstructured":"Reporter, D.M.: Teenage girl missing after going to meet a man she had fallen for on Facebook (2010). \nhttp:\/\/www.dailymail.co.uk\/news\/article-1260830\/Teenage-Facebook-user-missing-going-meet-man-met-online.html\n\n. Accessed 1 May 2016"},{"key":"18_CR5","unstructured":"Withnall, A.: Breck Bednar murder: Teenage video gamer admits killing British schoolboy after meeting arranged online (2014). \nhttp:\/\/www.independent.co.uk\/news\/uk\/crime\/breck-bednar-murder-teenage-video-gamer-admits-killing-british-schoolboy-after-meeting-arranged-9882590.html\n\n. Accessed 12 May 2016"},{"key":"18_CR6","volume-title":"An Introduction to Multi Agent Systems","author":"MJ Wooldridge","year":"2009","unstructured":"Wooldridge, M.J.: An Introduction to Multi Agent Systems, 2nd edn. Wiley, Chichester (2009)","edition":"2"},{"key":"18_CR7","volume-title":"Towards the Semantic Web (Ontology Driven Knowledge Management)","author":"J Davies","year":"2007","unstructured":"Davies, J., Fensel, D., Van Harmelen, F.: Towards the Semantic Web (Ontology Driven Knowledge Management). Wiley, Chichester (2007)"},{"key":"18_CR8","volume-title":"Model Driven Architecture and Ontology Development","author":"D Gasevic","year":"2006","unstructured":"Gasevic, D., Djuric, D., Devedjic, V.: Model Driven Architecture and Ontology Development. Springer, Berlin (2006)"},{"key":"18_CR9","unstructured":"Prot\u00e9g\u00e9 (2016). \nhttp:\/\/protege.stanford.edu\/\n\n. Accessed 1 May 2016"},{"key":"18_CR10","unstructured":"OWL - semantic web standards (2001). \nhttps:\/\/www.w3.org\/2001\/sw\/wiki\/OWL\n\n. Accessed 12 May 2016"},{"key":"18_CR11","unstructured":"Horridge, M., Knublauch, H., Rector, A, Steverns, R., Wroe, C.: A Practical Guide to Building Ontologies Using The Prot\u00e9g\u00e9- OWL Plugin and CO-ODE Tools. The University of Manchester 2004"},{"key":"18_CR12","unstructured":"Site, J.: JAVA agent dEvelopment framework (2015). \nhttp:\/\/jade.tilab.com\/\n\n. Accessed 1 May 2016"},{"key":"18_CR13","doi-asserted-by":"crossref","DOI":"10.1002\/9780470058411","volume-title":"Developing Multi-agent Systems with JADE","author":"F Bellifemine","year":"2007","unstructured":"Bellifemine, F., Caire, G., Greenwood, D.: Developing Multi-agent Systems with JADE. Wiley, Chichester (2007)"},{"key":"18_CR14","volume-title":"Speech and Language Processing (An Introduction to Natural Language Processing, Computational Linguistics and Speech Recognition)","author":"D Jurafsky","year":"2008","unstructured":"Jurafsky, D., Martin, J.: Speech and Language Processing (An Introduction to Natural Language Processing, Computational Linguistics and Speech Recognition). Prentice-Hall, Inc., New Jersey (2008)"},{"key":"18_CR15","unstructured":"MacFarlane, K., Holmes, V.: Agent-Mediated Information Exchange: Child Safety Online. In: Management and Service Science, 2009, MASS 2009"}],"container-title":["Lecture Notes in Networks and Systems","Proceedings of SAI Intelligent Systems Conference (IntelliSys) 2016"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-56991-8_18","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,8,22]],"date-time":"2017-08-22T04:05:26Z","timestamp":1503374726000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-56991-8_18"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,8,23]]},"ISBN":["9783319569901","9783319569918"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-56991-8_18","relation":{},"ISSN":["2367-3370","2367-3389"],"issn-type":[{"type":"print","value":"2367-3370"},{"type":"electronic","value":"2367-3389"}],"subject":[],"published":{"date-parts":[[2017,8,23]]}}}