{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,8]],"date-time":"2025-11-08T22:46:03Z","timestamp":1762641963148,"version":"3.40.3"},"publisher-location":"Cham","reference-count":54,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319584591"},{"type":"electronic","value":"9783319584607"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-58460-7_38","type":"book-chapter","created":{"date-parts":[[2017,5,12]],"date-time":"2017-05-12T11:08:42Z","timestamp":1494587322000},"page":"539-556","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["How Might Crime-Scripts Be Used to Support the Understanding and Policing of Cloud Crime?"],"prefix":"10.1007","author":[{"given":"Steve","family":"Warren","sequence":"first","affiliation":[]},{"given":"Gavin","family":"Oxburgh","sequence":"additional","affiliation":[]},{"given":"Pam","family":"Briggs","sequence":"additional","affiliation":[]},{"given":"David","family":"Wall","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,5,13]]},"reference":[{"issue":"7","key":"38_CR1","doi-asserted-by":"publisher","first-page":"715","DOI":"10.1037\/0003-066X.36.7.715","volume":"36","author":"RP Abelson","year":"1981","unstructured":"Abelson, R.P.: Psychological status of the script concept. Am. Psychol. 36(7), 715 (1981)","journal-title":"Am. Psychol."},{"key":"38_CR2","doi-asserted-by":"crossref","unstructured":"Aggarwal, A., Rajadesingan, A., Kumaraguru, P.: Phishari: automatic realtime phishing detection on twitter. In: eCrime Researchers Summit (eCrime), pp. 1\u201312. IEEE, October 2012","DOI":"10.1109\/eCrime.2012.6489521"},{"issue":"5","key":"38_CR3","first-page":"81","volume":"273","author":"E Anderson","year":"1994","unstructured":"Anderson, E.: The code of the streets. Atl. Mon. 273(5), 81\u201394 (1994)","journal-title":"Atl. Mon."},{"key":"38_CR4","first-page":"107","volume-title":"Code of the Street","author":"E Anderson","year":"1999","unstructured":"Anderson, E.: Code of the Street, pp. 107\u2013141. Norton, New York (1999)"},{"key":"38_CR5","doi-asserted-by":"crossref","unstructured":"Aoki, P.M., Woodruff, A.: Making space for stories: ambiguity in the design of personal communication systems. In: Proceedings of the CHI 2005, pp. 181\u2013190. ACM (2005)","DOI":"10.1145\/1054972.1054998"},{"key":"38_CR6","unstructured":"Bogatin, D.: Google CEO\u2019s new paradigm: \u2018cloud computing and advertising go hand-in-hand\u2019. ZDNet, 23 August 2006"},{"issue":"1","key":"38_CR7","doi-asserted-by":"publisher","first-page":"6","DOI":"10.1186\/2193-7680-2-6","volume":"2","author":"H Borrion","year":"2013","unstructured":"Borrion, H.: Quality assurance in crime scripting. Crime Sci. 2(1), 6 (2013)","journal-title":"Crime Sci."},{"issue":"3","key":"38_CR8","doi-asserted-by":"publisher","first-page":"251","DOI":"10.1177\/088626086001003001","volume":"1","author":"AW Burgess","year":"1986","unstructured":"Burgess, A.W., Hartman, C.R., Ressler, R.K., Douglas, J.E., McCormack, A.: Sexual homicide a motivational model. J. Interpers. Violence 1(3), 251\u2013272 (1986)","journal-title":"J. Interpers. Violence"},{"key":"38_CR9","doi-asserted-by":"crossref","unstructured":"Briggs, P., Olivier, P., Blythe, M., Vines, J., Lindsay, S., Dunphy, P., Nicholson, J., Green, D., Kitson, J., Monk, A.: Invisible design: exploring insights and ideas through ambiguous film scenarios. In: Designing Interactive Systems Conference (DIS 2012), 11\u201315 June 2012, Newcastle-upon Tyne (2012)","DOI":"10.1145\/2317956.2318036"},{"key":"38_CR10","volume-title":"Scenario-Based Design: Envisioning Work and Technology in System Development","author":"J Carroll","year":"1995","unstructured":"Carroll, J.: Scenario-Based Design: Envisioning Work and Technology in System Development. Wiley, New York (1995)"},{"issue":"2","key":"38_CR11","doi-asserted-by":"publisher","first-page":"355","DOI":"10.1093\/bjc\/azr005","volume":"51","author":"YN Chiu","year":"2011","unstructured":"Chiu, Y.N., Leclerc, B., Townsley, M.: Crime script analysis of drug manufacturing in clandestine laboratories implications for prevention. Br. J. Criminol. 51(2), 355\u2013374 (2011)","journal-title":"Br. J. Criminol."},{"key":"38_CR12","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-322-99786-9_1","volume-title":"The Inmates Are Running the Asylum","author":"A Cooper","year":"1999","unstructured":"Cooper, A.: The Inmates Are Running the Asylum. SAMS Publishing, Indianapolis (1999)"},{"key":"38_CR13","first-page":"151","volume":"3","author":"DB Cornish","year":"1994","unstructured":"Cornish, D.B.: The procedural analysis of offending and its relevance for situational prevention. Crime Prev. Stud. 3, 151\u2013196 (1994)","journal-title":"Crime Prev. Stud."},{"key":"38_CR14","unstructured":"Cornish, D.B., Clarke, R.V.: The rational choice perspective. In: Environmental Criminology and Crime Analysis, p. 21 (2008)"},{"issue":"1","key":"38_CR15","first-page":"3550","volume":"1","author":"C Cormick","year":"2012","unstructured":"Cormick, C.: Ten big questions on public engagement on science and technology. Int. J. Delib. Mech. Sci. 1(1), 3550 (2012)","journal-title":"Int. J. Delib. Mech. Sci."},{"issue":"1","key":"38_CR16","doi-asserted-by":"publisher","first-page":"195","DOI":"10.1177\/107906329801000304","volume":"1","author":"EL Daleiden","year":"1998","unstructured":"Daleiden, E.L., Kaufman, K.L., Hilliker, D.R., O\u2019neil, J.N.: The sexual histories and fantasies of youthful males: a comparison of sexual offending, nonsexual offending, and nonoffending groups. Sex. Abuse: J. Res. Treat. 1(1), 195\u2013209 (1998)","journal-title":"Sex. Abuse: J. Res. Treat."},{"key":"38_CR17","unstructured":"Desisto, R.P., Plummer, D.C., Smith, D.M.: Tutorial for understanding the relationship between cloud computing and SaaS. Analysis 2(2) (2008)"},{"issue":"3","key":"38_CR18","doi-asserted-by":"publisher","first-page":"315","DOI":"10.1177\/1079063210375975","volume":"22","author":"N Deslauriers-Varin","year":"2010","unstructured":"Deslauriers-Varin, N., Beauregard, E.: Victims\u2019 routine activities and sex offenders\u2019 target selection scripts: a latent class analysis. Sex. Abuse 22(3), 315\u2013342 (2010)","journal-title":"Sex. Abuse"},{"key":"38_CR19","unstructured":"Ekblom, P.: Talking to offenders: practical lessons for local crime prevention. In: Urban Crime Statistical Approaches and Analyses. International Seminar Held Under the Auspices of Ajuntament de Barcelona Forum des Collectives Territoriales Europeenes pour la Securit6 Urbaine. Institut d\u2019Estudis Metropolitans de Barcelona, Barcelona (1991)"},{"issue":"2","key":"38_CR20","doi-asserted-by":"publisher","first-page":"319","DOI":"10.1007\/s10610-015-9291-9","volume":"22","author":"P Ekblom","year":"2016","unstructured":"Ekblom, P., Gill, M.: Rewriting the script: cross-disciplinary exploration and conceptual consolidation of the procedural analysis of crime. Eur. J. Crim. Policy Res. 22(2), 319\u2013339 (2016)","journal-title":"Eur. J. Crim. Policy Res."},{"key":"38_CR21","doi-asserted-by":"crossref","unstructured":"Ekblom, P., Tilley, N.: Going equipped: criminology, situational crime prevention and the resourceful offender. Br. J. Criminol., 376\u2013398 (2000)","DOI":"10.1093\/bjc\/40.3.376"},{"issue":"2","key":"38_CR22","first-page":"389","volume":"15","author":"H Gavin","year":"2010","unstructured":"Gavin, H., Hockey, D.: Criminal careers and cognitive scripts: an investigation into criminal versatility. Qual. Rep. 15(2), 389 (2010)","journal-title":"Qual. Rep."},{"issue":"6","key":"38_CR23","doi-asserted-by":"publisher","first-page":"44","DOI":"10.1145\/1029036.1029037","volume":"11","author":"K Go","year":"2004","unstructured":"Go, K., Carroll, J.: The blind men and the elephant: views of scenario-based system design. Interactions 11(6), 44\u201353 (2004). ACM","journal-title":"Interactions"},{"key":"38_CR24","doi-asserted-by":"publisher","DOI":"10.1057\/978-1-137-54613-5","volume-title":"Crime Script Analysis: Preventing Crimes Against Business","author":"H Haelterman","year":"2016","unstructured":"Haelterman, H.: Crime Script Analysis: Preventing Crimes Against Business. Springer, Heidelberg (2016)"},{"key":"38_CR25","doi-asserted-by":"crossref","unstructured":"Henson, B., Swartz, K., Reyns, B.W.: # Respect: applying Anderson\u2019s Code of the street to the online context. Deviant Behav., 1\u201313 (2016)","DOI":"10.1080\/01639625.2016.1197682"},{"key":"38_CR26","doi-asserted-by":"crossref","unstructured":"Hillman, S., Procyk, J., Neustaedter, C.: Tumblr fandoms, community & culture. In: Proceedings of the Companion Publication of the 17th ACM Conference on Computer Supported Cooperative Work & Social Computing, pp. 285\u2013288. ACM, February 2014","DOI":"10.1145\/2556420.2557634"},{"key":"38_CR27","unstructured":"HMIC Report: Real lives, real crimes: a study of digital crime and policing (2015)"},{"issue":"4","key":"38_CR28","doi-asserted-by":"publisher","first-page":"344","DOI":"10.1111\/j.1468-2311.2009.00572.x","volume":"48","author":"A Holt","year":"2009","unstructured":"Holt, A.: (En) Gendering responsibilities: experiences of parenting a \u2018young offender\u2019. Howard J. Crim. Justice 48(4), 344\u2013356 (2009)","journal-title":"Howard J. Crim. Justice"},{"issue":"4","key":"38_CR29","doi-asserted-by":"publisher","first-page":"308","DOI":"10.1080\/01639625.2011.584050","volume":"33","author":"TJ Holt","year":"2012","unstructured":"Holt, T.J., Turner, M.G.: Examining risks and protective factors of on-line identity theft. Deviant Behav. 33(4), 308\u2013323 (2012)","journal-title":"Deviant Behav."},{"key":"38_CR30","doi-asserted-by":"crossref","unstructured":"Hutchings, A., Holt, T.J.: The online stolen data market: disruption and intervention approaches. Glob. Crime, 1\u201320 (2016)","DOI":"10.1080\/17440572.2016.1197123"},{"issue":"4","key":"38_CR31","doi-asserted-by":"publisher","first-page":"389","DOI":"10.1177\/1748895808096470","volume":"8","author":"M Levi","year":"2008","unstructured":"Levi, M.: Organized fraud and organizing frauds Unpacking research on networks and organization. Criminol. Crim. Justice 8(4), 389\u2013419 (2008)","journal-title":"Criminol. Crim. Justice"},{"issue":"6","key":"38_CR32","first-page":"50","volume":"53","author":"P Mell","year":"2009","unstructured":"Mell, P., Grance, T.: The NIST definition of cloud computing. Natl. Inst. Stand. Technol. 53(6), 50 (2009)","journal-title":"Natl. Inst. Stand. Technol."},{"issue":"1","key":"38_CR33","doi-asserted-by":"publisher","first-page":"71","DOI":"10.1111\/j.1745-9125.2008.00103.x","volume":"46","author":"C Morselli","year":"2008","unstructured":"Morselli, C., Roy, J.: Brokerage qualifications in ringing operations. Criminology 46(1), 71\u201398 (2008)","journal-title":"Criminology"},{"issue":"1","key":"38_CR34","doi-asserted-by":"publisher","first-page":"26","DOI":"10.1177\/1075547008320520","volume":"30","author":"M Powell","year":"2008","unstructured":"Powell, M., Collin, M.: Meaningful citizen engagement in science and technology. What would it really take? Sci. Commun. 30(1), 26\u201336 (2008)","journal-title":"Sci. Commun."},{"key":"38_CR35","doi-asserted-by":"crossref","unstructured":"Pruitt, J., Grudin, J.: Personas: practice and theory. In: Proceedings of the DUX 2003, pp. 1\u201315. ACM Press (2003)","DOI":"10.1145\/997078.997089"},{"key":"38_CR36","doi-asserted-by":"publisher","first-page":"47","DOI":"10.1007\/1-84628-601-8_3","volume-title":"Networked Neighbourhoods","author":"H Rheingold","year":"2006","unstructured":"Rheingold, H.: Social networks and the nature of communities. In: Purcell, P. (ed.) Networked Neighbourhoods, pp. 47\u201375. Springer, London (2006)"},{"key":"38_CR37","unstructured":"Schank, R.C., Abelson, R.: Scripts, goals, plans, and understanding (1977)"},{"key":"38_CR38","unstructured":"Scotford, E., Yeung, K. (eds): The Oxford Handbook on the Law and Regulation of Technology. Oxford University Press, Oxford"},{"key":"38_CR39","first-page":"39","volume":"14","author":"T Somer","year":"2016","unstructured":"Somer, T., Hallaq, B., Watson, T.: Utilising journey mapping and crime scripting to combat cyber crime and cyber warfare attacks. J. Inf. Warfare 14, 39\u201349 (2016)","journal-title":"J. Inf. Warfare"},{"issue":"1","key":"38_CR40","doi-asserted-by":"publisher","first-page":"53","DOI":"10.1080\/01639625.2012.707536","volume":"34","author":"KF Steinmetz","year":"2013","unstructured":"Steinmetz, K.F., Tunnell, K.D.: Under the pixelated jolly roger: a study of on-line pirates. Deviant Behav. 34(1), 53\u201367 (2013)","journal-title":"Deviant Behav."},{"issue":"4","key":"38_CR41","doi-asserted-by":"crossref","first-page":"1125","DOI":"10.1111\/j.1539-6924.2008.01069.x","volume":"28","author":"T Sanquist","year":"2008","unstructured":"Sanquist, T., Morris, F., Mahy, H.: An exploratory risk perception study of attitudes toward homeland security systems. Risk Anal. 28(4), 1125\u20131133 (2008)","journal-title":"Risk Anal."},{"key":"38_CR42","doi-asserted-by":"publisher","first-page":"410","DOI":"10.1111\/j.1439-0310.1963.tb01161.x","volume":"20","author":"N Tinbergen","year":"1963","unstructured":"Tinbergen, N.: On aims and methods of ethology. Zeitschrift f\u00fcr Tierpsychologie 20, 410\u2013433 (1963)","journal-title":"Zeitschrift f\u00fcr Tierpsychologie"},{"issue":"3","key":"38_CR43","doi-asserted-by":"publisher","first-page":"179","DOI":"10.1007\/s10610-011-9146-y","volume":"17","author":"L Tompson","year":"2011","unstructured":"Tompson, L., Chainey, S.: Profiling illegal waste activity: using crime scripts as a data collection and analytical strategy. Eur. J. Crim. Policy Res. 17(3), 179 (2011)","journal-title":"Eur. J. Crim. Policy Res."},{"key":"38_CR44","volume-title":"Cybercrime the Transformation of Crime in the Information Age","author":"D Wall","year":"2007","unstructured":"Wall, D.: Cybercrime the Transformation of Crime in the Information Age, vol. 4. Polity, Cambridge (2007)"},{"key":"38_CR45","doi-asserted-by":"crossref","unstructured":"Wall, D.S.: Crime, security and information communication technologies: the changing cybersecurity threat landscape and implications for regulation and policing. In: Brownsword, R., E (2017)","DOI":"10.2139\/ssrn.3005872"},{"issue":"1","key":"38_CR46","first-page":"151","volume":"1","author":"B Wellman","year":"2002","unstructured":"Wellman, B., Boase, J., Chen, W.: The networked nature of community: online and offline. IT Soc. 1(1), 151\u2013165 (2002)","journal-title":"IT Soc."},{"issue":"7","key":"38_CR47","doi-asserted-by":"publisher","first-page":"1154","DOI":"10.1080\/07418825.2015.1046393","volume":"33","author":"B Westlake","year":"2016","unstructured":"Westlake, B., Bouchard, M.: Criminal careers in cyberspace: examining website failure within child exploitation networks. Justice Q. 33(7), 1154\u20131181 (2016)","journal-title":"Justice Q."},{"issue":"2","key":"38_CR48","doi-asserted-by":"publisher","first-page":"1","DOI":"10.2202\/1944-2866.1126","volume":"3","author":"BG Westlake","year":"2011","unstructured":"Westlake, B.G., Bouchard, M., Frank, R.: Finding the key players in online child exploitation networks. Policy Internet 3(2), 1\u201332 (2011)","journal-title":"Policy Internet"},{"issue":"3","key":"38_CR49","doi-asserted-by":"publisher","first-page":"404","DOI":"10.3390\/socsci3030404","volume":"3","author":"HC Whittle","year":"2014","unstructured":"Whittle, H.C., Hamilton-Giachritsis, C.E., Beech, A.R.: \u201cUnder His Spell\u201d: victims\u2019 perspectives of being Groomed Online. Soc. Sci. 3(3), 404\u2013426 (2014)","journal-title":"Soc. Sci."},{"key":"38_CR50","doi-asserted-by":"publisher","first-page":"1185","DOI":"10.4236\/psych.2014.510131","volume":"5","author":"HC Whittle","year":"2014","unstructured":"Whittle, H.C., Hamilton-Giachritsis, C.E., Beech, A.R.: In their own words: young peoples\u2019 vulnerabilities to being groomed and sexually abused online. Psychology 5, 1185\u20131196 (2014)","journal-title":"Psychology"},{"issue":"1","key":"38_CR51","doi-asserted-by":"publisher","first-page":"62","DOI":"10.1016\/j.avb.2012.09.003","volume":"18","author":"H Whittle","year":"2013","unstructured":"Whittle, H., Hamilton-Giachritsis, C., Beech, A., Collings, G.: A review of online grooming: characteristics and concerns. Aggress. Violent. Beh. 18(1), 62\u201370 (2013)","journal-title":"Aggress. Violent. Beh."},{"key":"38_CR52","doi-asserted-by":"crossref","DOI":"10.5040\/9798400671708","volume-title":"Internet child pornography: causes, investigation, and prevention","author":"R Wortley","year":"2012","unstructured":"Wortley, R., Smallbone, S.: Internet child pornography: causes, investigation, and prevention. ABC-CLIO, Santa Barbara (2012)"},{"key":"38_CR53","doi-asserted-by":"crossref","unstructured":"Yang, C., Harkreader, R., Zhang, J., Shin, S., Gu, G.: Analyzing spammers\u2019 social networks for fun and profit: a case study of cyber criminal ecosystem on twitter. In: Proceedings of the 21st International Conference on World Wide Web, pp. 71\u201380. ACM, April 2012","DOI":"10.1145\/2187836.2187847"},{"key":"38_CR54","doi-asserted-by":"crossref","unstructured":"Yardi, S., Romero, D., Schoenebeck, G.: Detecting spam in a twitter network. First Monday, 15(1) (2009)","DOI":"10.5210\/fm.v15i1.2793"}],"container-title":["Lecture Notes in Computer Science","Human Aspects of Information Security, Privacy and Trust"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-58460-7_38","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,6,24]],"date-time":"2024-06-24T02:46:13Z","timestamp":1719197173000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-58460-7_38"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319584591","9783319584607"],"references-count":54,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-58460-7_38","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2017]]},"assertion":[{"value":"13 May 2017","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"HAS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Human Aspects of Information Security, Privacy, and Trust","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Vancouver, BC","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Canada","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2017","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"9 July 2017","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"14 July 2017","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"5","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"has2017","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}