{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,6]],"date-time":"2025-08-06T13:40:38Z","timestamp":1754487638417,"version":"3.33.0"},"publisher-location":"Berlin, Heidelberg","reference-count":13,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540715481"},{"type":"electronic","value":"9783540715498"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-3-540-71549-8_23","type":"book-chapter","created":{"date-parts":[[2007,6,28]],"date-time":"2007-06-28T09:11:58Z","timestamp":1183021918000},"page":"244-250","source":"Crossref","is-referenced-by-count":3,"title":["Trends in Computer Crime and Cybercrime Research During the Period 1974-2006: A Bibliometric Approach"],"prefix":"10.1007","author":[{"given":"Chichao","family":"Lu","sequence":"first","affiliation":[]},{"given":"Wenyuan","family":"Jen","sequence":"additional","affiliation":[]},{"given":"Weiping","family":"Chang","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"4","key":"23_CR1","doi-asserted-by":"publisher","first-page":"308","DOI":"10.1108\/eb026030","volume":"9","author":"R.E. Bell","year":"2002","unstructured":"Bell, R.E.: The Prosecution of Computer Crime. Journal Financial Crime\u00a09(4), 308\u2013325 (2002)","journal-title":"Journal Financial Crime"},{"issue":"2","key":"23_CR2","doi-asserted-by":"publisher","first-page":"33","DOI":"10.1145\/1083784.1083791","volume":"34","author":"E. Elmacioglu","year":"2005","unstructured":"Elmacioglu, E., Lee, D.: Research articles and surveys: On six degrees of separation in DBLP-DB and more. ACM SIGMOD Record\u00a034(2), 33\u201340 (2005)","journal-title":"ACM SIGMOD Record"},{"key":"23_CR3","doi-asserted-by":"crossref","unstructured":"Guzman, I.R., Kaarst-Brown, M.L.: Organizational survival and alignment: insights into conflicting perspectives on the role of the IT professional. In: ACM Proceedings of the 2004 SIGMIS, pp. 30\u201334 (2004)","DOI":"10.1145\/982372.982379"},{"issue":"4","key":"23_CR4","doi-asserted-by":"publisher","first-page":"541","DOI":"10.1016\/j.intman.2005.09.009","volume":"11","author":"N.. Kshetri","year":"2005","unstructured":"Kshetri, N.: Pattern of global cyber war and crime: A conceptual framework. Journal of International Management\u00a011(4), 541\u2013562 (2005)","journal-title":"Journal of International Management"},{"key":"23_CR5","volume-title":"E-Commerce: Business, Technology, Society","author":"K.C. Laudon","year":"2004","unstructured":"Laudon, K.C., Traver, C.G.: E-Commerce: Business, Technology, Society, 2nd edn. Addison-Wesley, Reading (2004)","edition":"2"},{"issue":"3","key":"23_CR6","doi-asserted-by":"publisher","first-page":"145","DOI":"10.3109\/07853899009147259","volume":"22","author":"T. Luukkonen","year":"1990","unstructured":"Luukkonen, T.: Bibliometrics and evaluation of research performance. Annals of Medicine\u00a022(3), 145\u2013150 (1990)","journal-title":"Annals of Medicine"},{"key":"23_CR7","doi-asserted-by":"crossref","unstructured":"Mann, G.S., Mimno, D., McCallum, A.: Bibliometric impact measures leveraging topic analysis. In: Proceedings of the 6th ACM\/IEEE-CS joint conference on Digital libraries, pp. 65\u201374 (2006)","DOI":"10.1145\/1141753.1141765"},{"key":"23_CR8","doi-asserted-by":"crossref","unstructured":"Matsuura, K., Ebato, K.: University-industry collaboration networks in the information security field in Japan: problems and a particular success. In: 2004 IEEE International Engineering Management Conference, vol.\u00a02, 18-21 Oct. 2004, pp. 839\u2013844 (2004)","DOI":"10.1109\/IEMC.2004.1407499"},{"key":"23_CR9","doi-asserted-by":"crossref","unstructured":"Pilkington, A.: Defining technology management: a citation\/co-citation study. In: IEEE International Engineering Management Conference, vol. 1, 18-21 Oct. 2004, pp. 337\u2013341 (2004)","DOI":"10.1109\/IEMC.2004.1407131"},{"issue":"2","key":"23_CR10","doi-asserted-by":"publisher","first-page":"265","DOI":"10.1007\/BF02018484","volume":"35","author":"I.K.R. Rao","year":"1996","unstructured":"Rao, I.K.R.: Methodological and conceptual questions of bibliometric standards. Scientometrics\u00a035(2), 265\u2013270 (1996)","journal-title":"Scientometrics"},{"issue":"3","key":"23_CR11","doi-asserted-by":"publisher","first-page":"433","DOI":"10.1007\/BF02457603","volume":"45","author":"H. Skoie","year":"1999","unstructured":"Skoie, H.: Bibliometrics - some warnings from the north. Scientometrics\u00a045(3), 433\u2013437 (1999)","journal-title":"Scientometrics"},{"key":"23_CR12","volume-title":"Cybercrime: Law Enforcement, Security and Surveillance in the Information Age","author":"D. Thomas","year":"2000","unstructured":"Thomas, D., Loader, B.D.: Cybercrime: Law Enforcement, Security and Surveillance in the Information Age. Taylor & Francis Group, New York (2000)"},{"key":"23_CR13","unstructured":"Verton, D.: FBI chief: Lack of incident reporting slows cybercrime fight. Computerworld (31 Oct. 2002), http:\/\/computerworld.com\/securitytopics\/security\/cybercrime\/story\/0,10801,75532,00.html"}],"container-title":["Lecture Notes in Computer Science","Intelligence and Security Informatics"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-71549-8_23.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,17]],"date-time":"2025-01-17T23:02:56Z","timestamp":1737154976000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-71549-8_23"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540715481","9783540715498"],"references-count":13,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-71549-8_23","relation":{},"subject":[]}}