{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T14:14:17Z","timestamp":1742912057694,"version":"3.40.3"},"publisher-location":"Cham","reference-count":33,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319914695"},{"type":"electronic","value":"9783319914701"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-319-91470-1_26","type":"book-chapter","created":{"date-parts":[[2018,6,2]],"date-time":"2018-06-02T06:55:42Z","timestamp":1527922542000},"page":"316-328","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Automatically Unaware: Using Data Analytics to Detect Physiological Markers of Cybercrime"],"prefix":"10.1007","author":[{"given":"Nancy","family":"Mogire","sequence":"first","affiliation":[]},{"given":"Randall K.","family":"Minas","sequence":"additional","affiliation":[]},{"given":"Martha E.","family":"Crosby","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,6,3]]},"reference":[{"key":"26_CR1","unstructured":"Cybercrime: Legal Guidance: Crown Prosecution Service. Cps.gov.uk (2017). http:\/\/www.cps.gov.uk\/legal\/a_to_c\/cybercrime\/#a03. Accessed 28 Oct 2017"},{"issue":"1","key":"26_CR2","doi-asserted-by":"publisher","first-page":"20","DOI":"10.1080\/01639625.2013.822209","volume":"35","author":"T Holt","year":"2013","unstructured":"Holt, T., Bossler, A.: An assessment of the current state of cybercrime scholarship. Deviant Behav. 35(1), 20\u201340 (2013)","journal-title":"Deviant Behav."},{"key":"26_CR3","volume-title":"Thinking, Fast and Slow","author":"D Kahneman","year":"2015","unstructured":"Kahneman, D.: Thinking, Fast and Slow. Farrar, Straus and Giroux, New York (2015)"},{"issue":"5","key":"26_CR4","doi-asserted-by":"publisher","first-page":"645","DOI":"10.1017\/S0140525X00003435","volume":"23","author":"K Stanovich","year":"2000","unstructured":"Stanovich, K., West, R.: Individual differences in reasoning: implications for the rationality debate? Behav. Brain Sci. 23(5), 645\u2013665 (2000)","journal-title":"Behav. Brain Sci."},{"key":"26_CR5","doi-asserted-by":"crossref","unstructured":"Hausknecht, K., Gruicic, S.: Anti-computer forensics. In: 2017 40th International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO) (2017)","DOI":"10.23919\/MIPRO.2017.7973612"},{"key":"26_CR6","unstructured":"Resendez, I., Martinez, P., Abraham, J.: An introduction to digital forensics (2017)"},{"key":"26_CR7","doi-asserted-by":"crossref","unstructured":"Baggili, I., Oduro, J., Anthony, K., Breitinger, F., McGee, G.: Watch what you wear: preliminary forensic analysis of smart watches. In: 2015 10th International Conference on Availability, Reliability and Security (2015)","DOI":"10.1109\/ARES.2015.39"},{"key":"26_CR8","doi-asserted-by":"crossref","unstructured":"Neuner, S., Mulazzani, M., Schrittwieser, S., Weippl, E.: Gradually improving the forensic process. In: 2015 10th International Conference on Availability, Reliability and Security (2015)","DOI":"10.1109\/ARES.2015.32"},{"key":"26_CR9","doi-asserted-by":"publisher","first-page":"44","DOI":"10.1016\/j.diin.2006.06.005","volume":"3","author":"R Harris","year":"2006","unstructured":"Harris, R.: Arriving at an anti-forensics consensus: examining how to define and control the anti-forensics problem. Digit. Invest. 3, 44\u201349 (2006)","journal-title":"Digit. Invest."},{"key":"26_CR10","unstructured":"Endicott-Popovsky, B.: Digital evidence and forensic readiness (2017)"},{"key":"26_CR11","unstructured":"Carrier, B., Spafford, E.: An event-based digital forensic investigation framework (2004). http:\/\/www.digital-evidence.org\/papers\/dfrws_event.pdf. Accessed 28 Oct 2017"},{"key":"26_CR12","doi-asserted-by":"crossref","unstructured":"Kazadi, J., Jazri, H.: Using digital forensic readiness model to increase the forensic readiness of a computer system. In: 2015 International Conference on Emerging Trends in Networks and Computer Communications (ETNCC) (2015)","DOI":"10.1109\/ETNCC.2015.7184822"},{"issue":"1","key":"26_CR13","first-page":"1","volume":"1","author":"G Palmer","year":"2002","unstructured":"Palmer, G.: Forensic analysis in a digital world. Int. J. Digit. Evid. 1(1), 1\u20136 (2002)","journal-title":"Int. J. Digit. Evid."},{"key":"26_CR14","unstructured":"Cohen, F.: Challenges to Digital Forensic Evidence, 129 p. Fred Cohen & Associates, Livermore (2008). ISBN 1-878109-41-3"},{"key":"26_CR15","unstructured":"Boddington, R., Hobbs,V., Mann, G.: Validating digital evidence for legal argument. In: Australian Digital Forensics Conference (2017)"},{"key":"26_CR16","doi-asserted-by":"crossref","unstructured":"Mondal, S., Bours, P.: Continuous authentication and identification for mobile devices: combining security and forensics. In: 2015 IEEE International Workshop on Information Forensics and Security (WIFS) (2015)","DOI":"10.1109\/WIFS.2015.7368591"},{"key":"26_CR17","volume-title":"Electric Fields of the Brain","author":"P Nunez","year":"1981","unstructured":"Nunez, P., Katznelson, R.: Electric Fields of the Brain. Oxford University Press, New York (1981)"},{"key":"26_CR18","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-72192-2","volume-title":"Brain Function and Oscillations","author":"E Ba\u015far","year":"1998","unstructured":"Ba\u015far, E.: Brain Function and Oscillations. Springer, Heidelberg (1998). https:\/\/doi.org\/10.1007\/978-3-642-72192-2"},{"key":"26_CR19","first-page":"1","volume-title":"Human Brain Electrophysiology","author":"D Regan","year":"1989","unstructured":"Regan, D.: Human Brain Electrophysiology, pp. 1\u2013147. Elsevier, New York (1989)"},{"issue":"2","key":"26_CR20","first-page":"185","volume":"5","author":"A Zuquete","year":"2010","unstructured":"Zuquete, A., Quintela, B., Cunha, J.: Biometric authentication using electroencephalograms: a practical study using visual evoked potentials. Electr\u00f3nica e Telecomunica\u00e7\u00f5es 5(2), 185\u2013194 (2010)","journal-title":"Electr\u00f3nica e Telecomunica\u00e7\u00f5es"},{"key":"26_CR21","doi-asserted-by":"publisher","first-page":"29","DOI":"10.1007\/978-1-4471-6584-2_2","volume-title":"Guide to Brain-Computer Music Interfacing","author":"R Palaniappan","year":"2014","unstructured":"Palaniappan, R.: Electroencephalogram-based Brain\u2013Computer Interface: an introduction. In: Miranda, E.R., Castet, J. (eds.) Guide to Brain-Computer Music Interfacing, pp. 29\u201341. Springer, London (2014). https:\/\/doi.org\/10.1007\/978-1-4471-6584-2_2"},{"issue":"2","key":"26_CR22","doi-asserted-by":"publisher","first-page":"174","DOI":"10.1037\/0278-7393.6.2.174","volume":"6","author":"J Snodgrass","year":"1980","unstructured":"Snodgrass, J., Vanderwart, M.: A standardized set of 260 pictures: norms for name agreement, image agreement, familiarity, and visual complexity. J. Exp. Psychol. Hum. Learn. Memory 6(2), 174\u2013215 (1980)","journal-title":"J. Exp. Psychol. Hum. Learn. Memory"},{"key":"26_CR23","doi-asserted-by":"crossref","unstructured":"Gui, Q., Jin, Z., Xu, W.: Exploring EEG-based biometrics for user identification and authentication. In: 2014 IEEE Signal Processing in Medicine and Biology Symposium (SPMB) (2014)","DOI":"10.1109\/SPMB.2014.7002950"},{"issue":"4","key":"26_CR24","doi-asserted-by":"publisher","first-page":"401","DOI":"10.1016\/j.bspc.2011.07.007","volume":"7","author":"U Acharya","year":"2012","unstructured":"Acharya, U., Molinari, F., Sree, S., Chattopadhyay, S., Ng, K., Suri, J.: Automated diagnosis of epileptic EEG using entropies. Biomed. Signal Process. Control 7(4), 401\u2013408 (2012)","journal-title":"Biomed. Signal Process. Control"},{"key":"26_CR25","doi-asserted-by":"publisher","first-page":"559","DOI":"10.1016\/j.eswa.2016.02.041","volume":"55","author":"T da Silveira","year":"2016","unstructured":"da Silveira, T., Kozakevicius, A., Rodrigues, C.: Automated drowsiness detection through wavelet packet analysis of a single EEG channel. Expert Syst. Appl. 55, 559\u2013565 (2016)","journal-title":"Expert Syst. Appl."},{"key":"26_CR26","doi-asserted-by":"publisher","first-page":"151","DOI":"10.1016\/j.cmpb.2016.08.010","volume":"136","author":"X Li","year":"2016","unstructured":"Li, X., Hu, B., Sun, S., Cai, H.: EEG-based mild depressive detection using feature selection methods and classifiers. Comput. Methods Programs Biomed. 136, 151\u2013161 (2016)","journal-title":"Comput. Methods Programs Biomed."},{"key":"26_CR27","doi-asserted-by":"crossref","unstructured":"Cakmak, R., Zeki, A.: Neuro signal based lie detection. In: 2015 IEEE International Symposium on Robotics and Intelligent Sensors (IRIS) (2015)","DOI":"10.1109\/IRIS.2015.7451606"},{"key":"26_CR28","doi-asserted-by":"crossref","unstructured":"Al Solami, E., Boyd, C., Clark, A., Islam, A.: Continuous biometric authentication: can it be more practical? In: 2010 IEEE 12th International Conference on High Performance Computing and Communications (HPCC) (2010)","DOI":"10.1109\/HPCC.2010.65"},{"key":"26_CR29","doi-asserted-by":"crossref","unstructured":"Yu, H., Li, C., Dauwels, J.: Network inference and change point detection for piecewise-stationary time series. In: 2014 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP) (2014)","DOI":"10.1109\/ICASSP.2014.6854453"},{"key":"26_CR30","doi-asserted-by":"crossref","unstructured":"Aminikhanghahi, S., Cook, D.: Using change point detection to automate daily activity segmentation. In: 2017 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops) (2017)","DOI":"10.1109\/PERCOMW.2017.7917569"},{"key":"26_CR31","unstructured":"Granjon, P.: The CUSUM algorithm a small review (2012). http:\/\/chamilo2.grenet.fr\/inp\/courses\/ENSE3A35EMIAAZ0\/document\/change_detection.pdf. Accessed 28 Oct 2017"},{"issue":"6","key":"26_CR32","doi-asserted-by":"publisher","first-page":"808","DOI":"10.1016\/j.neubiorev.2006.06.007","volume":"30","author":"J Onton","year":"2006","unstructured":"Onton, J., Westerfield, M., Townsend, J., Makeig, S.: Imaging human EEG dynamics using independent component analysis. Neurosci. Biobehav. Rev. 30(6), 808\u2013822 (2006)","journal-title":"Neurosci. Biobehav. Rev."},{"key":"26_CR33","unstructured":"Validity (statistics): En.wikipedia.org (2017). https:\/\/en.wikipedia.org\/wiki\/Validity_(statistics). Accessed 28 Oct 2017"}],"container-title":["Lecture Notes in Computer Science","Augmented Cognition: Intelligent Technologies"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-91470-1_26","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,7]],"date-time":"2022-07-07T00:23:13Z","timestamp":1657153393000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-91470-1_26"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783319914695","9783319914701"],"references-count":33,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-91470-1_26","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2018]]},"assertion":[{"value":"3 June 2018","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"AC","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Augmented Cognition","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Las Vegas, NV","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"USA","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"15 July 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"20 July 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"ac2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/2018.hci.international\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}