{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T00:51:02Z","timestamp":1740099062503,"version":"3.37.3"},"publisher-location":"Cham","reference-count":68,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319788159"},{"type":"electronic","value":"9783319788166"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-319-78816-6_16","type":"book-chapter","created":{"date-parts":[[2018,4,24]],"date-time":"2018-04-24T03:02:48Z","timestamp":1524538968000},"page":"218-233","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["Situational Crime Prevention and the Mitigation of Cloud Computing Threats"],"prefix":"10.1007","author":[{"given":"Chaz","family":"Vidal","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9208-5336","authenticated-orcid":false,"given":"Kim-Kwang Raymond","family":"Choo","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,4,25]]},"reference":[{"key":"16_CR1","doi-asserted-by":"publisher","first-page":"45","DOI":"10.1016\/j.cose.2014.11.006","volume":"49","author":"NH Ab Rahman","year":"2015","unstructured":"Ab Rahman, N.H., Choo, K.-K.R.: A survey of information security incident handling in the cloud. Comput. Secur. 49, 45\u201369 (2015)","journal-title":"Comput. Secur."},{"key":"16_CR2","unstructured":"Abdollahifar, A.: Network and Security Challenges in Cloud Computing Infrastructure as a Service Model (2013)"},{"issue":"6","key":"16_CR3","doi-asserted-by":"publisher","first-page":"1259","DOI":"10.1109\/TIFS.2016.2646639","volume":"12","author":"Q Alam","year":"2017","unstructured":"Alam, Q., Malik, S.U.R., Akhunzada, A., Choo, K.-K.R., Tabbasum, S., Alam, M.: A cross tenant access control (CTAC) model for cloud computing: formal specification and verification. IEEE Trans. Inf. Forensics Secur. 12(6), 1259\u20131268 (2017)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"16_CR4","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-84996-241-4","volume-title":"Cloud Computing: Principles, Systems and Applications","author":"N Antonopoulos","year":"2010","unstructured":"Antonopoulos, N., Gillam, L.: Cloud Computing: Principles, Systems and Applications. Springer, Heidelberg (2010). https:\/\/doi.org\/10.1007\/978-1-84996-241-4"},{"key":"16_CR5","unstructured":"Archer, J., Boehm, A.: Security guidance for critical areas of focus in cloud computing. Cloud Security Alliance (2009)"},{"key":"16_CR6","unstructured":"AS\/NZS: ISO\/IEC 27002:2006 - Information Technology - Security Techniques - Code of Practice for Information Security Management (2006)"},{"key":"16_CR7","unstructured":"Attorney-General\u2019s Department: National Plan to Combat Cybercrime. Attorney-General\u2019s Department, Canberra, ACT, Australia (2013)"},{"key":"16_CR8","unstructured":"Australian Signals Directorate: Strategies to Mitigate Cyber Security Incidents. Australian Department of Defense, Canberra (2017)"},{"key":"16_CR9","unstructured":"Beebe, N.L., Rao, V.S.: Using situational crime prevention theory to explain the effectiveness of information systems security. In: Proceedings of the 2005 Software Conference, Las Vegas (2005)"},{"key":"16_CR10","unstructured":"Bowen, P., Hash, J., Wilson, M.: SP 800-100. Information Security Handbook: A Guide for Managers (2006). https:\/\/nvlpubs.nist.gov\/nistpubs\/Legacy\/SP\/nistspecialpublication800-100.pdf. Accessed 26 Mar 2018"},{"key":"16_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"254","DOI":"10.1007\/978-3-642-13136-3_26","volume-title":"Algorithms and Architectures for Parallel Processing","author":"M Brock","year":"2010","unstructured":"Brock, M., Goscinski, A.: Toward a framework for cloud security. In: Hsu, C.-H., Yang, Laurence T., Park, J.H., Yeo, S.-S. (eds.) ICA3PP 2010. LNCS, vol. 6082, pp. 254\u2013263. Springer, Heidelberg (2010). https:\/\/doi.org\/10.1007\/978-3-642-13136-3_26"},{"key":"16_CR12","doi-asserted-by":"crossref","unstructured":"Carroll, M., Van Der Merwe, A., Kotze, P.: Secure cloud computing: benefits, risks and controls. In: Information Security South Africa (ISSA), pp. 1\u20139. IEEE (2011)","DOI":"10.1109\/ISSA.2011.6027519"},{"key":"16_CR13","doi-asserted-by":"crossref","DOI":"10.52922\/ti281703","volume-title":"Cloud Computing Challenges and Future Directions","author":"K-KR Choo","year":"2010","unstructured":"Choo, K.-K.R.: Cloud Computing Challenges and Future Directions. Australian Institute of Criminology, Canberra (2010)"},{"key":"16_CR14","doi-asserted-by":"publisher","first-page":"81","DOI":"10.1007\/978-1-4899-7439-6_6","volume-title":"ICTs and the Millennium Development Goals","author":"K-KR Choo","year":"2014","unstructured":"Choo, K.-K.R.: A conceptual interdisciplinary plug-and-play cyber security framework. In: Kaur, H., Tao, X. (eds.) ICTs and the Millennium Development Goals, pp. 81\u201399. Springer, Boston (2014). https:\/\/doi.org\/10.1007\/978-1-4899-7439-6_6"},{"key":"16_CR15","unstructured":"Christie, S.: 2011 CWE\/SANS Top 25 Most Dangerous Software Errors (2011). http:\/\/cwe.mitre.org\/top25\/ . Accessed 5 Sept 2013"},{"key":"16_CR16","volume-title":"Situational Crime Prevention","author":"R Clarke","year":"1997","unstructured":"Clarke, R.: Situational Crime Prevention. Criminal Justice Press, Monsey (1997)"},{"key":"16_CR17","doi-asserted-by":"publisher","first-page":"225","DOI":"10.1086\/449090","volume":"4","author":"RV Clarke","year":"1983","unstructured":"Clarke, R.V.: Situational crime prevention: its theoretical basis and practical scope. Crime Justice 4, 225\u2013256 (1983)","journal-title":"Crime Justice"},{"key":"16_CR18","unstructured":"Cloud Security Alliance: \u2018The Treacherous Twelve\u2019 Cloud Computing Top Threats in 2016. Cloud Security Alliance (2016)"},{"key":"16_CR19","first-page":"151","volume":"3","author":"DB Cornish","year":"1994","unstructured":"Cornish, D.B.: The procedural analysis of offending and its relevance for situational prevention. Crime Prev. Stud. 3, 151\u2013196 (1994)","journal-title":"Crime Prev. Stud."},{"key":"16_CR20","first-page":"41","volume":"16","author":"DB Cornish","year":"2003","unstructured":"Cornish, D.B., Clarke, R.V.: Opportunities, precipitators and criminal decisions: a reply to Wortley\u2019s critique of situational crime prevention. Crime Prev. Stud. 16, 41\u201396 (2003)","journal-title":"Crime Prev. Stud."},{"key":"16_CR21","doi-asserted-by":"publisher","first-page":"366","DOI":"10.1016\/j.future.2016.08.019","volume":"74","author":"CJ D\u2019Orazio","year":"2017","unstructured":"D\u2019Orazio, C.J., Choo, K.-K.R.: A technique to circumvent SSL\/TLS validations on iOS devices. Future Gener. Comput. Syst. 74, 366\u2013374 (2017)","journal-title":"Future Gener. Comput. Syst."},{"issue":"2","key":"16_CR22","doi-asserted-by":"publisher","first-page":"524","DOI":"10.1109\/JIOT.2016.2569094","volume":"4","author":"CJ D\u2019Orazio","year":"2017","unstructured":"D\u2019Orazio, C.J., Choo, K.-K.R., Yang, L.T.: Data exfiltration from internet of things devices: iOS devices as case studies. IEEE Internet Things J. 4(2), 524\u2013535 (2017)","journal-title":"IEEE Internet Things J."},{"key":"16_CR23","unstructured":"Dawoud, W., Takouna, I., Meinel, C.: Infrastructure as a service security: challenges and solutions. In: 2010 The 7th International Conference on Informatics and Systems (INFOS), pp. 1\u20138. IEEE (2010)"},{"key":"16_CR24","doi-asserted-by":"crossref","unstructured":"Duncan, A.J., Creese, S., Goldsmith, M.: Insider attacks in cloud computing. In: 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), pp. 857\u2013862. IEEE (2012)","DOI":"10.1109\/TrustCom.2012.188"},{"key":"16_CR25","volume-title":"Opportunity Makes the Thief: Practical Theory for Crime Prevention","author":"M Felson","year":"1998","unstructured":"Felson, M., Clarke, R.V.G.: Opportunity Makes the Thief: Practical Theory for Crime Prevention. Home Office, Policing and Reducing Crime Unit, Research, Development and Statistics Directorate, London (1998)"},{"key":"16_CR26","volume-title":"Network Attacks","author":"AA Ghorbani","year":"2010","unstructured":"Ghorbani, A.A., Lu, W., Tavallaee, M.: Network Attacks, 1st edn. Springer, Boston (2010)","edition":"1"},{"key":"16_CR27","volume-title":"Information Security: Policy, Processes and Practices","author":"S Goodman","year":"2008","unstructured":"Goodman, S., Straub, D.W., Baskerville, R., Goodman, S.E., Ebrary, I.: Information Security: Policy, Processes and Practices. M. E. Sharpe Incorporated, Armonk (2008)"},{"issue":"1","key":"16_CR28","doi-asserted-by":"publisher","first-page":"68","DOI":"10.1145\/1496091.1496103","volume":"39","author":"A Greenberg","year":"2008","unstructured":"Greenberg, A., Hamilton, J., Maltz, D.A., Patel, P.: The cost of a cloud: research problems in data center networks. ACM SIGCOMM Comput. Commun. Rev. 39(1), 68\u201373 (2008)","journal-title":"ACM SIGCOMM Comput. Commun. Rev."},{"key":"16_CR29","unstructured":"Gu, L., Zeng, D., Guo, D.: Vehicular cloud computing: a survey. In: IEEE Globecom Workshops, pp. 403\u2013407 (2013)"},{"key":"16_CR30","unstructured":"Hartel, P., Junger, M., Wieringa, R.: Cyber-crime Science\u00a0=\u00a0Crime Science + Information Security (2010). https:\/\/research.utwente.nl\/en\/publications\/cyber-crime-science-crime-science-information-security . Accessed 29 Aug 2017"},{"issue":"3","key":"16_CR31","doi-asserted-by":"publisher","first-page":"236","DOI":"10.1016\/j.clsr.2013.03.003","volume":"29","author":"JS Hiller","year":"2013","unstructured":"Hiller, J.S., Russell, R.S.: The challenge and imperative of private sector cybersecurity: an international comparison. Comput. Law Secur. Rev. 29(3), 236\u2013245 (2013)","journal-title":"Comput. Law Secur. Rev."},{"issue":"4","key":"16_CR32","doi-asserted-by":"publisher","first-page":"383","DOI":"10.1057\/sj.2013.25","volume":"26","author":"S Hinduja","year":"2013","unstructured":"Hinduja, S., Kooi, B.: Curtailing cyber and information security vulnerabilities through situational crime prevention. Secur. J. 26(4), 383\u2013402 (2013)","journal-title":"Secur. J."},{"issue":"3","key":"16_CR33","doi-asserted-by":"publisher","first-page":"320","DOI":"10.1057\/sj.2012.32","volume":"27","author":"ME Hollis-Peel","year":"2014","unstructured":"Hollis-Peel, M.E., Welsh, B.C.: What makes a guardian capable? A test of guardianship in action. Secur. J. 27(3), 320\u2013337 (2014)","journal-title":"Secur. J."},{"issue":"2","key":"16_CR34","doi-asserted-by":"publisher","first-page":"152","DOI":"10.1016\/j.clsr.2013.01.006","volume":"29","author":"C Hooper","year":"2013","unstructured":"Hooper, C., Martini, B., Choo, K.-K.R.: Cloud computing and its implications for cybercrime investigations in Australia. Comput. Law Secur. Rev. 29(2), 152\u2013163 (2013)","journal-title":"Comput. Law Secur. Rev."},{"issue":"1","key":"16_CR35","doi-asserted-by":"publisher","first-page":"61","DOI":"10.1016\/j.clsr.2010.11.001","volume":"27","author":"P Hunton","year":"2011","unstructured":"Hunton, P.: The stages of cybercrime investigations: bridging the gap between technology examination and law enforcement investigation. Comput. Law Secur. Rev. 27(1), 61\u201367 (2011)","journal-title":"Comput. Law Secur. Rev."},{"key":"16_CR36","doi-asserted-by":"publisher","first-page":"98","DOI":"10.1016\/j.jnca.2016.08.016","volume":"74","author":"S Iqbal","year":"2016","unstructured":"Iqbal, S., Kiah, M.L.M., Dhaghighi, B., Hussain, M., Khan, S., Khan, M.K., Choo, K.-K.R.: On cloud security attacks: a taxonomy and intrusion detection and prevention as a service. J. Netw. Comput. Appl. 74, 98\u2013120 (2016)","journal-title":"J. Netw. Comput. Appl."},{"key":"16_CR37","doi-asserted-by":"crossref","unstructured":"Julidotter, N., Choo, K.-K.R.: CATRA: conceptual cloud attack taxonomy and risk assessment framework. In: Ko, R., Choo, K-K.R. (ed.) Cloud Security Ecosystem. Syngress, an Imprint of Elsevier, Amsterdam (2015)","DOI":"10.1016\/B978-0-12-801595-7.00003-3"},{"issue":"9","key":"16_CR38","doi-asserted-by":"publisher","first-page":"39","DOI":"10.5815\/ijmecs.2012.09.05","volume":"4","author":"Muhammad Fahad Khan","year":"2012","unstructured":"Khan, M.F., Ullah, M.A., Aziz-Ur-Rehman: An approach towards customized multi-tenancy. Int. J. Mod. Educ. Comput. Sci. 4(9), 39 (2012)","journal-title":"International Journal of Modern Education and Computer Science"},{"issue":"4","key":"16_CR39","doi-asserted-by":"publisher","first-page":"470","DOI":"10.1177\/0894439311422689","volume":"30","author":"A Kigerl","year":"2012","unstructured":"Kigerl, A.: Routine activity theory and the determinants of high cybercrime countries. Soc. Sci. Comput. Rev. 30(4), 470\u2013486 (2012)","journal-title":"Soc. Sci. Comput. Rev."},{"issue":"8","key":"16_CR40","doi-asserted-by":"publisher","first-page":"551","DOI":"10.1089\/cyber.2014.0008","volume":"17","author":"ER Leukfeldt","year":"2014","unstructured":"Leukfeldt, E.R.: Phishing for suitable targets in the Netherlands: routine activity theory and phishing victimization. Cyberpsychology Behav. Soc. Netw. 17(8), 551\u2013555 (2014)","journal-title":"Cyberpsychology Behav. Soc. Netw."},{"key":"16_CR41","unstructured":"Litke, P., Stewart, J.: BGP Hijacking for Cryptocurrency Profit (2014). http:\/\/www.secureworks.com\/cyber-threat-intelligence\/threats\/bgp-hijacking-for-cryptocurrency-profit\/"},{"issue":"6","key":"16_CR42","first-page":"70","volume":"4","author":"MTS Lokhande","year":"2013","unstructured":"Lokhande, M.T.S., Shelke, P.R.R.: A review paper on cloud computing security. Int. J. Adv. Res. Comput. Sci. 4(6), 70 (2013)","journal-title":"Int. J. Adv. Res. Comput. Sci."},{"key":"16_CR43","doi-asserted-by":"crossref","unstructured":"Mell, P., Grance, T.: The NIST Definition of Cloud Computing (2011). http:\/\/dx.doi.org\/10.6028\/NIST.SP.800-145 . Accessed 29 Aug 2017","DOI":"10.6028\/NIST.SP.800-145"},{"key":"16_CR44","unstructured":"Microsoft 2017: Microsoft Security Intelligence Report, vol. 22, January\u2013March 2017. http:\/\/download.microsoft.com\/download\/F\/C\/4\/FC41DE26-E641-4A20-AE5B-E38A28368433\/Security_Intelligence_Report_Volume_22.pdf . Accessed 29 Aug 2017"},{"key":"16_CR45","unstructured":"National Institute of Standards and Technology (NIST): Security and Privacy Controls for Information Systems and Organizations (2017). http:\/\/csrc.nist.gov\/publications\/drafts\/800-53\/sp800-53r5-draft.pdf . Accessed 29 Aug 2017"},{"issue":"4","key":"16_CR46","doi-asserted-by":"publisher","first-page":"286","DOI":"10.1080\/08974454.2013.784225","volume":"23","author":"JN Navarro","year":"2013","unstructured":"Navarro, J.N., Jasinski, J.L.: Why girls? Using routine activities theory to predict cyberbullying experiences between girls and boys. Women Crim. Justice 23(4), 286\u2013303 (2013)","journal-title":"Women Crim. Justice"},{"key":"16_CR47","unstructured":"O\u2019Connor, F.: Rackspace DNS Recovers After DDoS Brings System Down. In: PCWorld (2014). http:\/\/www.pcworld.com\/article\/2863592\/rackspace-dns-recovers-after-ddos-brings-system-down.html . Accessed 29 Aug 2017"},{"key":"16_CR48","doi-asserted-by":"publisher","first-page":"147","DOI":"10.1016\/j.jnca.2016.01.001","volume":"67","author":"O Osanaiye","year":"2016","unstructured":"Osanaiye, O., Choo, K.-K.R., Dlodlo, M.: Distributed denial of service (DDoS) resilience in cloud: review and conceptual cloud ddos mitigation framework. J. Netw. Comput. Appl. 67, 147\u2013165 (2016)","journal-title":"J. Netw. Comput. Appl."},{"key":"16_CR49","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1016\/j.cose.2013.01.007","volume":"38","author":"M Ouedraogo","year":"2013","unstructured":"Ouedraogo, M., Mouratidis, H.: Selecting a cloud service provider in the age of cybercrime. Comput. Secur. 38, 3\u201313 (2013)","journal-title":"Comput. Secur."},{"key":"16_CR50","unstructured":"Paganini, P.: 2013 - The Impact of Cybercrime (2013). http:\/\/resources.infosecinstitute.com\/2013-impact-cybercrime\/ . Accessed 29 Aug 2017"},{"issue":"3","key":"16_CR51","doi-asserted-by":"publisher","first-page":"267","DOI":"10.1177\/0022427810365903","volume":"47","author":"TC Pratt","year":"2010","unstructured":"Pratt, T.C., Holtfreter, K., Reisig, M.D.: Routine online activity and internet fraud targeting: extending the generality of routine activity theory. J. Res. Crime Delinq. 47(3), 267\u2013296 (2010)","journal-title":"J. Res. Crime Delinq."},{"issue":"3","key":"16_CR52","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3064005","volume":"50","author":"GS Poh","year":"2017","unstructured":"Poh, G.S., Chin, J.J., Yau, W.C., Choo, K.-K.R., Mohamad, M.S.: Searchable symmetric encryption: designs and challenges. ACM Comput. Surv. 50(3), 1\u201337 (2017). Article 40","journal-title":"ACM Comput. Surv."},{"key":"16_CR53","unstructured":"PWC: US Cybercrime: Rising Risks, Reduced Readiness. Key Findings from the 2014 US State of Cybercrime Survey (2014). http:\/\/www.pwc.com\/us\/en\/increasing-it-effectiveness\/publications\/assets\/2014-us-state-of-cybercrime.pdf . Accessed 29 Aug 2017"},{"key":"16_CR54","volume-title":"Cloud Storage Forensics","author":"D Quick","year":"2013","unstructured":"Quick, D., Martini, B., Choo, K.-K.R.: Cloud Storage Forensics. Syngress, an Imprint of Elseiver, Amsterdam (2013)"},{"key":"16_CR55","doi-asserted-by":"crossref","unstructured":"Rogers, A.: From Peer-to-Peer Networks to cloud Computing: How Technology is Redefining Child Pornography Laws (2012). Available at SSRN 2006664","DOI":"10.2139\/ssrn.2006664"},{"key":"16_CR56","unstructured":"Samonas, S.: Insider Fraud and Routine Activity Theory (2013). http:\/\/eprints.lse.ac.uk\/50344\/ . Accessed 29 Aug 2017"},{"key":"16_CR57","unstructured":"Sawers, P.: Playstation Network and Xbox Live Ddos Arrest: U.K. Authorities Grab an 18-Year-Old Man. Venture Beat (2015)"},{"key":"16_CR58","first-page":"1","volume":"473","author":"RG Smith","year":"2014","unstructured":"Smith, R.G.: Responding to organised crime through intervention in recruitment pathways. Trends Issues Crime Crim. Justice 473, 1\u20136 (2014)","journal-title":"Trends Issues Crime Crim. Justice"},{"key":"16_CR59","doi-asserted-by":"crossref","unstructured":"Stockman, M.: Insider hacking: applying situational crime prevention to a new white-collar crime. In: RIIT Proceedings of the 3rd Annual Conference on Research in Information Technology, pp. 53\u201356 (2014)","DOI":"10.1145\/2656434.2656436"},{"key":"16_CR60","doi-asserted-by":"crossref","unstructured":"Stoneburner, G., Hayden, C., Feringa, A.: Engineering Principles for Information Technology Security (a Baseline for Achieving Security). DTIC Document (2001)","DOI":"10.6028\/NIST.SP.800-27"},{"key":"16_CR61","doi-asserted-by":"crossref","unstructured":"Takabi, H., Joshi, J.B., Ahn, G.J.: Securecloud: towards a comprehensive security framework for cloud computing environments. In: IEEE 34th Annual Computer Software and Applications Conference Workshops (COMPSACW), pp. 393\u2013398. IEEE (2010)","DOI":"10.1109\/COMPSACW.2010.74"},{"key":"16_CR62","unstructured":"TrendLabs: Small Business is Big Business in Cybercrime (2015). https:\/\/www.trendmicro.de\/cloud-content\/us\/pdfs\/internet-safety\/tlp_small-business-big-for-cybercrime.pdf . Accessed 29 Aug 2017"},{"issue":"1","key":"16_CR63","doi-asserted-by":"publisher","first-page":"60","DOI":"10.1109\/TNSM.2014.041614.120394","volume":"11","author":"V Varadharajan","year":"2014","unstructured":"Varadharajan, V., Tupakula, U.: Security as a service model for cloud environment. IEEE Trans. Netw. Serv. Manag. 11(1), 60\u201375 (2014)","journal-title":"IEEE Trans. Netw. Serv. Manag."},{"key":"16_CR64","unstructured":"Verizon: Verizon 2015 Data Breach Investigations Report. Verizon Enterprise Solutions (2015). http:\/\/www.verizonenterprise.com\/resources\/reports\/rp_data-breach-investigation-report_2015_en_xg.pdf . Accessed 29 Aug 2017"},{"key":"16_CR65","doi-asserted-by":"publisher","first-page":"401","DOI":"10.1016\/B978-0-12-801595-7.00018-5","volume-title":"The Cloud Security Ecosystem: Technical, Legal, Business and Management Issues","author":"C Vidal","year":"2015","unstructured":"Vidal, C., Choo, K.-K.R.: The current state of an IaaS provider. In: Ko, R., Choo, K.-K.R. (eds.) The Cloud Security Ecosystem: Technical, Legal, Business and Management Issues, pp. 401\u2013426. Syngress, Boston (2015)"},{"issue":"3","key":"16_CR66","doi-asserted-by":"publisher","first-page":"201","DOI":"10.1108\/eb025940","volume":"7","author":"R Willison","year":"2000","unstructured":"Willison, R.: Understanding and addressing criminal opportunity: the application of situational crime prevention to is security. J. Financ. Crime 7(3), 201\u2013210 (2000)","journal-title":"J. Financ. Crime"},{"issue":"4","key":"16_CR67","doi-asserted-by":"publisher","first-page":"403","DOI":"10.1057\/palgrave.ejis.3000592","volume":"15","author":"R Willison","year":"2006","unstructured":"Willison, R., Backhouse, J.: Opportunities for computer crime: considering systems risk from a criminological perspective. Eur. J. Inf. Syst. 15(4), 403\u2013414 (2006)","journal-title":"Eur. J. Inf. Syst."},{"issue":"4","key":"16_CR68","doi-asserted-by":"publisher","first-page":"407","DOI":"10.1177\/147737080556056","volume":"2","author":"M Yar","year":"2005","unstructured":"Yar, M.: The novelty of \u2018Cybercrime\u2019 an assessment in light of routine activity theory. Eur. J. Criminol. 2(4), 407\u2013427 (2005)","journal-title":"Eur. J. Criminol."}],"container-title":["Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","Security and Privacy in Communication Networks"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-78816-6_16","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,7,6]],"date-time":"2024-07-06T07:28:25Z","timestamp":1720250905000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-78816-6_16"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783319788159","9783319788166"],"references-count":68,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-78816-6_16","relation":{},"ISSN":["1867-8211","1867-822X"],"issn-type":[{"type":"print","value":"1867-8211"},{"type":"electronic","value":"1867-822X"}],"subject":[],"published":{"date-parts":[[2018]]}}}