{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,13]],"date-time":"2026-03-13T13:45:53Z","timestamp":1773409553551,"version":"3.50.1"},"publisher-location":"Berlin, Heidelberg","reference-count":10,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783540715481","type":"print"},{"value":"9783540715498","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-3-540-71549-8_3","type":"book-chapter","created":{"date-parts":[[2007,6,28]],"date-time":"2007-06-28T09:11:58Z","timestamp":1183021918000},"page":"34-45","source":"Crossref","is-referenced-by-count":5,"title":["An Empirical Analysis of Online Gaming Crime Characteristics from 2002 to 2004"],"prefix":"10.1007","author":[{"given":"Yungchang","family":"Ku","sequence":"first","affiliation":[]},{"given":"Ying-Chieh","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Kuo-Ching","family":"Wu","sequence":"additional","affiliation":[]},{"given":"Chaochang","family":"Chiu","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"3_CR1","unstructured":"The Online Game Market, DFC Intelligence 2004, Game Industry Report by GITISS (2004)"},{"key":"3_CR2","unstructured":"The collision of new industry \u2013 Taiwan online games are getting stronger, Digital content promotion website, Available: http:\/\/www.nmipo.org.tw\/files\/3-2\/6\/6-4.pdf"},{"key":"3_CR3","unstructured":"Lineage 2 Kain Lvl 57Silver Ranger, Accessed June 20, 2004, Available: http:\/\/cgi.ebay.com\/ws\/eBayISAPI.dll?ViewItem&item=8113549502&indexURL=0&photoDisplayType=2#ebayphotohosting"},{"key":"3_CR4","unstructured":"Chen, Y.C., Lin, S.K., Hwang, J.J.: The influence of computer crime in online gaming on E-society - taking example for Taiwan in 2002. In: International Conference on Innovative Information Technology Policy and E-Society, National Cheng-Chi University, Taiwan (2003)"},{"key":"3_CR5","unstructured":"Chen, Y.C., et al.: Online Gaming Crime and Security Issues \u2013 Cases and Countermeasures from Taiwan. In: PST 2004 Conference, Fredericton, Canada (2004)"},{"key":"3_CR6","unstructured":"Chen, Y.C., et al.: Classification of Online Gaming Crime and Security. Submitted to IRMA 2005 International Conference, San Diego, California, USA (2005)"},{"key":"3_CR7","doi-asserted-by":"crossref","unstructured":"Chen, Y.C., et al.: An Analysis of Online Gaming Crime Characteristics. Journal of Internet Research (2005)","DOI":"10.1108\/10662240510602672"},{"key":"3_CR8","unstructured":"\u201cBest Practices - User Authentication Mechanisms\u201d, retrieved June 20, 2004, from: http:\/\/www.itsc.state.md.us\/oldsite\/info\/InternetSecurity\/BestPractices\/Authentic.htm"},{"key":"3_CR9","unstructured":"Unreal Playground, \u201cExclusive Interview with Dr. Sin of Epic Games\u201d (October, 2002), retrieved June 20, 2004, from: http:\/\/www.unrealplayground.com\/interview.php?id=1"},{"key":"3_CR10","unstructured":"Martin, W.: Honey Pots and Honey Nets \u2013 Security through Deception (May 2001), retrieved Sept. 27, 2004, from: http:\/\/www.sans.org\/rr\/papers\/4\/41.pdf"}],"container-title":["Lecture Notes in Computer Science","Intelligence and Security Informatics"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-71549-8_3.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,19]],"date-time":"2020-11-19T05:22:44Z","timestamp":1605763364000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-71549-8_3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540715481","9783540715498"],"references-count":10,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-71549-8_3","relation":{},"subject":[]}}