{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T17:30:15Z","timestamp":1742923815791,"version":"3.40.3"},"publisher-location":"Cham","reference-count":26,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319777115"},{"type":"electronic","value":"9783319777122"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-319-77712-2_101","type":"book-chapter","created":{"date-parts":[[2018,3,24]],"date-time":"2018-03-24T09:03:18Z","timestamp":1521882198000},"page":"1056-1066","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Possible Risks in Social Networks: Awareness of Future Law-Enforcement Officers"],"prefix":"10.1007","author":[{"given":"Edita","family":"Butrime","sequence":"first","affiliation":[]},{"given":"Vaiva","family":"Zuzeviciute","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,5,17]]},"reference":[{"issue":"55","key":"101_CR1","first-page":"43","volume":"6","author":"E Gar\u0161va","year":"2004","unstructured":"Gar\u0161va, E., Skudutis, J.: Secure computer system design. Electron. Electr. Eng. 6(55), 43\u201348 (2004)","journal-title":"Electron. Electr. Eng."},{"key":"101_CR2","doi-asserted-by":"publisher","DOI":"10.1002\/9781119183631","volume-title":"Secrets and Lies\u2013 Digital Security in a Networked World","author":"B Schneier","year":"2015","unstructured":"Schneier, B.: Secrets and Lies\u2013 Digital Security in a Networked World. Wiley, New York (2015)"},{"key":"101_CR3","unstructured":"Number of social media users worldwide from 2010 to 2020 (in billions). Statista. The Statistics Portal. https:\/\/www.statista.com\/statistics\/278414\/number-of-worldwide-social-network-users\/"},{"key":"101_CR4","unstructured":"Malinauskaite-van de Castel, I.: Rights of the Data Subject in Online Social Networks. Doctoral thesis. MRU, Vilnius (2017)"},{"issue":"77","key":"101_CR5","first-page":"30","volume":"3","author":"V Kalpokas","year":"2012","unstructured":"Kalpokas, V., Marcinauskaite, R.: Identity theft in cyberspace: technological aspects and criminal legal assessment. Teis\u0117s problemos 3(77), 30\u201352 (2012)","journal-title":"Teis\u0117s problemos"},{"key":"101_CR6","unstructured":"Lee, P.: Learning from Tay\u2019s introduction. Official Microsoft Blog. http:\/\/blogs.microsoft.com\/blog\/2016\/03\/25\/learning-tays-introduction\/#sm.000jh14di129ee0ov1u1atn7zsco3"},{"key":"101_CR7","unstructured":"Vincent, J.: Twitter taught Microsoft\u2019s AI chatbot to be a racist asshole in less than a day, 24 March 2016. http:\/\/www.theverge.com\/2016\/3\/24\/11297050\/tay-microsoft-chatbot-racist"},{"key":"101_CR8","unstructured":"Butrime, E., Zuzeviciute, V.: Students\u2019\/future law - enforcement officers\u2019 perspective on safety in the digital space \/\/ Kultura bezpiecze\u0144stwa : Nauka \u2013 Praktyka \u2013 Refleksje. Wy\u017csza Szko\u0142a Bezpiecze\u0144stwa Publicznego i Indywidualnego \u201cApeiron\u201d, Krak\u00f3w, no. 23, pp. 46\u201455 (2016)"},{"issue":"1","key":"101_CR9","doi-asserted-by":"publisher","first-page":"210","DOI":"10.1111\/j.1083-6101.2007.00393.x","volume":"13","author":"DM Boyd","year":"2007","unstructured":"Boyd, D.M., Ellison, N.B.: Social network sites: definition, history, and scholarship. J. Comput. Mediat. Commun. 13(1), 210\u2013230 (2007). http:\/\/onlinelibrary.wiley.com\/doi\/10.1111\/j.1083-6101.2007.00393.x\/full","journal-title":"J. Comput. Mediat. Commun."},{"issue":"4","key":"101_CR10","first-page":"453","volume":"8","author":"Y Anzai","year":"2009","unstructured":"Anzai, Y.: Digital trends among Japanese university students: Podcasting and Wikis as tools for learning. Int. J. E-Learn. 8(4), 453\u2013467 (2009)","journal-title":"Int. J. E-Learn."},{"key":"101_CR11","unstructured":"Davidson, A.L., Waddington, D.: E-Learning in the university: when will it really happen? eLearning Papers. no. 21, September 2010. http:\/\/www.elearningeuropa.info\/files\/media\/media23710.pdf"},{"key":"101_CR12","unstructured":"Fraser, M., Dutta, S.: Mano virtualieji a\u0161. Kaip socialiniai tinklai kei\u010dia gyvenim\u0105, darb\u0105 ir pasaul\u012f (Throwing Sheep in the Boardroom: How Online Social Networking Will Transform Your Life, Work and World). Eugrimas, Vilnius (2010)"},{"issue":"1","key":"101_CR13","doi-asserted-by":"publisher","first-page":"53","DOI":"10.13165\/ST-13-3-1-04","volume":"3","author":"G Zibeniene","year":"2013","unstructured":"Zibeniene, G., Brasiene, D.: Using the internet, online social networks and potentially incurred risk: student opinions. Soc. Technol. 3(1), 53\u201367 (2013)","journal-title":"Soc. Technol."},{"key":"101_CR14","doi-asserted-by":"crossref","unstructured":"Bacys, B.: Teenagers\u2019 Addiction to Social Networks on the Internet. Socialin\u0117 teorija, empirija, politika ir praktika, no. 7, 9\u201423. Vilnius University, Vilnius (2013)","DOI":"10.15388\/STEPP.2013.0.1390"},{"key":"101_CR15","unstructured":"CERT-LT: Lithuanian national Computer Emergency Response Team. https:\/\/www.cert.lt\/en\/"},{"key":"101_CR16","unstructured":"E|saugumas. https:\/\/esaugumas.lt\/lt\/tikslas\/89"},{"key":"101_CR17","unstructured":"Quantitative Survey of Parents and Teenagers Using the Internet. ITC \u0160vietimo informacini\u0173 technologij\u0173 centras. Sprinter tyrimai, Vilnius (2016). http:\/\/www.draugiskasinternetas.lt\/repository\/dokumentai\/Ataskaita%20-%20SITC_bendras_201606.pdf"},{"key":"101_CR18","unstructured":"20 proc. Lietuvos interneto naudotoj\u0173 pernai susid\u016br\u0117 su saugumo problemomis, Penki, 10 February 2016. http:\/\/www.penki.lt\/Sauga-saugos-sprendimai\/20-proc-Lietuvos-interneto-naudotoju-pernai-susidure-su-saugumo-problemomis.im?id=354489&tid=449"},{"key":"101_CR19","doi-asserted-by":"crossref","unstructured":"Jastiuginas S.: Information Security Management in Lithuania\u2019s Public Sector. Informacijos mokslai no. 57, pp. 7\u201325 (2011). http:\/\/www.journals.vu.lt\/informacijos-mokslai\/article\/view\/3137\/2755","DOI":"10.15388\/Im.2011.0.3137"},{"key":"101_CR20","unstructured":"CIO Magazine, CSO Magazine, PricewaterhouseCoopers: The Global State of Information Security (2010). http:\/\/www.pwc.com\/en_GX\/gx\/information-security-survey\/pdf\/pwcsurvey2010_report.pdf"},{"key":"101_CR21","unstructured":"Ernst & Young\u2019s 12th annual global information security survey. http:\/\/www.ey.com\/Publication\/vwLUAssets\/12th_annual_GISS\/$FILE\/12th_annual_GISS.pdf"},{"key":"101_CR22","unstructured":"NATO: Strategic Concept for the Defence and Security of the Members of the North Atlantic Treaty Organisation (2010). http:\/\/www.nato.int\/cps\/en\/natolive\/official_texts_68580.htm"},{"key":"101_CR23","unstructured":"The International Consortium of Investigative Journalists: The Panama Papers: Politicians, Criminals and the Rogue Industry That Hides Their Cash, 04 December 2016. http:\/\/community.globaleditorsnetwork.org\/content\/panama-papers-politicians-criminals-and-rogue-industry-hides-their-cash-0"},{"key":"101_CR24","doi-asserted-by":"publisher","first-page":"79","DOI":"10.1111\/j.1083-6101.2008.01432","volume":"14","author":"K Lewis","year":"2008","unstructured":"Lewis, K., Kaufman, J., Christakis, N.: Taste for privacy: an analysis of college student privacy settings in an online social network. J. Comput. Mediat. Commun. 14, 79\u2013126 (2008). https:\/\/doi.org\/10.1111\/j.1083-6101.2008.01432","journal-title":"J. Comput. Mediat. Commun."},{"key":"101_CR25","doi-asserted-by":"publisher","unstructured":"Zaleskis, J.: EU General Data Protection Regulation: Significance for the Data Protection Law. TEIS\u0116. no. 103, pp. 45\u201454, (2017). https:\/\/doi.org\/10.15388\/Teise.2017.103.10779","DOI":"10.15388\/Teise.2017.103.10779"},{"key":"101_CR26","unstructured":"Langas \u012f ateit\u012f (\u201cWindow to the Future\u201d). http:\/\/www.epilietis.eu\/index.php\/about-the-project . Accessed 2015"}],"container-title":["Advances in Intelligent Systems and Computing","Trends and Advances in Information Systems and Technologies"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-77712-2_101","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,13]],"date-time":"2019-10-13T07:35:45Z","timestamp":1570952145000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-77712-2_101"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783319777115","9783319777122"],"references-count":26,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-77712-2_101","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2018]]}}}