{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T06:05:41Z","timestamp":1725516341787},"publisher-location":"Berlin, Heidelberg","reference-count":16,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540692072"},{"type":"electronic","value":"9783540692096"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-3-540-69209-6_7","type":"book-chapter","created":{"date-parts":[[2008,8,11]],"date-time":"2008-08-11T09:20:59Z","timestamp":1218446459000},"page":"121-134","source":"Crossref","is-referenced-by-count":0,"title":["Exploring Gray Web Forums: Analysis and Investigation of Forum-Based Communities in Taiwan"],"prefix":"10.1007","author":[{"given":"Jau-Hwang","family":"Wang","sequence":"first","affiliation":[]},{"given":"Tianjun","family":"Fu","sequence":"additional","affiliation":[]},{"given":"Hong-Ming","family":"Lin","sequence":"additional","affiliation":[]},{"given":"Hsinchun","family":"Chen","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"7_CR1","unstructured":"Barlow, J.P.: Crime and puzzlement. Whole Earth Review, 45\u201357 (1990)"},{"key":"7_CR2","unstructured":"Bock, W.: Christmas, Communities, and Cyberspace (2001), \n                    \n                      http:\/\/www.bockinfo.com\/docs\/community.htm"},{"key":"7_CR3","unstructured":"Chen, H.: The Terrorism Knowledge Portal: Advanced Methodologies for Collecting and Analyzing Information from the Dark Web and Terrorism Research Resources, Sandia National Laboratories, August 14 (2003)"},{"key":"7_CR4","volume-title":"Inhabiting the Virtual City: The design of social environments for electronic communities","author":"J.S. Donath","year":"1996","unstructured":"Donath, J.S.: Inhabiting the Virtual City: The design of social environments for electronic communities. MIT, Cambridge (1996)"},{"key":"7_CR5","doi-asserted-by":"publisher","first-page":"141","DOI":"10.1016\/j.compedu.2004.05.003","volume":"45","author":"L.P. Dringus","year":"2004","unstructured":"Dringus, L.P., Ellis, T.: Using Data Mining as a Strategy for Assessing Asynchro-nous Discussion Forums. Computer & Education\u00a045, 141\u2013160 (2004)","journal-title":"Computer & Education"},{"key":"7_CR6","doi-asserted-by":"publisher","first-page":"127","DOI":"10.1080\/00377990009602455","volume":"91","author":"W. Elison","year":"2000","unstructured":"Elison, W.: Netwar: Studying Rebels on the Internet. The Social Studies\u00a091, 127\u2013131 (2000)","journal-title":"The Social Studies"},{"key":"7_CR7","doi-asserted-by":"crossref","unstructured":"Marcella, A.J., Greenfield, R.S.: Cyber Forensics: A Field Manual for Collecting, Examining, and Preserving Evidence of Computer Crimes. Auerbach Publications (2002)","DOI":"10.1201\/9781420000115"},{"key":"7_CR8","volume-title":"Night as Frontier","author":"M. Melbin","year":"1987","unstructured":"Melbin, M.: Night as Frontier. Free Press, Glencoe (1987)"},{"key":"7_CR9","unstructured":"Mena, J.: Investigative Data Mining for Security and Criminal Detection. Butter-worth Heinemann (2003)"},{"key":"7_CR10","doi-asserted-by":"publisher","first-page":"317","DOI":"10.1080\/10576100290101214","volume":"25","author":"Y. Tsfati","year":"2002","unstructured":"Tsfati, Y., Weimann, G.: Terror on the Internet. Studies in Conflict & Terrorism\u00a025, 317\u2013332 (2002), \n                    \n                      http:\/\/www.terrorism.com","journal-title":"Studies in Conflict & Terrorism"},{"key":"7_CR11","unstructured":"Spaceman (2001), \n                    \n                      http:\/\/www.vbulletin.com\/forum\/showthread.php?t=32329"},{"key":"7_CR12","volume-title":"Managing Cyber Threats: Issues, Approaches and Challenge","author":"J.H. Wang","year":"2005","unstructured":"Wang, J.H.: Cyber Forensics \u2013 Issues and Approaches. In: Managing Cyber Threats: Issues, Approaches and Challenge. Kluwer Academic Publishers, Dordrecht (2005)"},{"key":"7_CR13","unstructured":"Wang, J.H., et al.: A study of Automatic Search System on Cyber Crimes. Special Research Report to Telecommunication Bureau, Ministry of Traffic and Communication, Taiwan (1999)"},{"key":"7_CR14","unstructured":"Weimann, G.: How Modern Terrorism Uses the Internet. Special Report 116, U.S. Institute of Peace (2004), \n                    \n                      www.terrorism.net\n                    \n                    \n                  , \n                    \n                      http:\/\/usip.org\/pubs"},{"key":"7_CR15","unstructured":"Wooley, D.R.: Forum Software for the Web: An independent guide to discussion forum & message board software (2006), \n                    \n                      http:\/\/www.thinkofit.com\/webconf\/forumsoft.htm"},{"issue":"5","key":"7_CR16","first-page":"44","volume":"20","author":"Y. Zhou","year":"2005","unstructured":"Zhou, Y., Reid, E., Qin, J., Lai, G., Chen, H.: U.S. Domestic Extremist Groups on the Web: Link and Content Analysis. IEEE Intelligent Systems, Special Issue on Artificial Intelligence for National and Homeland Security\u00a020(5), 44\u201351 (2005)","journal-title":"IEEE Intelligent Systems, Special Issue on Artificial Intelligence for National and Homeland Security"}],"container-title":["Studies in Computational Intelligence","Intelligence and Security Informatics"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-69209-6_7.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,3]],"date-time":"2021-05-03T00:31:28Z","timestamp":1620001888000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-69209-6_7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540692072","9783540692096"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-69209-6_7","relation":{},"ISSN":["1860-949X","1860-9503"],"issn-type":[{"type":"print","value":"1860-949X"},{"type":"electronic","value":"1860-9503"}],"subject":[]}}