{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,12]],"date-time":"2025-11-12T20:33:53Z","timestamp":1762979633710,"version":"3.35.0"},"publisher-location":"Berlin, Heidelberg","reference-count":35,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540853022"},{"type":"electronic","value":"9783540853039"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-3-540-85303-9_12","type":"book-chapter","created":{"date-parts":[[2008,8,12]],"date-time":"2008-08-12T12:33:48Z","timestamp":1218544428000},"page":"122-134","source":"Crossref","is-referenced-by-count":17,"title":["Supporting Law Enforcement in Digital Communities through Natural Language Analysis"],"prefix":"10.1007","author":[{"given":"Danny","family":"Hughes","sequence":"first","affiliation":[]},{"given":"Paul","family":"Rayson","sequence":"additional","affiliation":[]},{"given":"James","family":"Walkerdine","sequence":"additional","affiliation":[]},{"given":"Kevin","family":"Lee","sequence":"additional","affiliation":[]},{"given":"Phil","family":"Greenwood","sequence":"additional","affiliation":[]},{"given":"Awais","family":"Rashid","sequence":"additional","affiliation":[]},{"given":"Corinne","family":"May-Chahal","sequence":"additional","affiliation":[]},{"given":"Margaret","family":"Brennan","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"12_CR1","unstructured":"MySpace (April 2008), http:\/\/www.myspace.com\/"},{"key":"12_CR2","unstructured":"MSN Messenger (April 2008), http:\/\/webmessenger.msn.com\/"},{"key":"12_CR3","unstructured":"The Gnutella Protocol Specification, version 0.4 (retrieved, April 2008), http:\/\/www9.limewire.com\/developer\/gnutella_protocol0.4.pdf"},{"key":"12_CR4","unstructured":"Ellison, L.: Cyberstalking: Tackling Harassment on the Internet. In: 14th BILETA Conference: CYBERSPACE 1999: Crime, Criminal Justice and the Internet (1999)"},{"key":"12_CR5","unstructured":"Pallister, D.: Internet paedophile gets nine years for sex with schoolgirls, Guardian Newspaper (June 23, 2006), http:\/\/www.guardian.co.uk\/uk\/2006\/jun\/23\/ukcrime.davidpallister"},{"key":"12_CR6","doi-asserted-by":"crossref","unstructured":"Hughes, D., Gibson, S., Walkerdine, J., Coulson, G.: Is Deviant Behaviour the Norm on P2P File Sharing Networks? IEEE Distributed Systems Online\u00a07(2) (February 2006)","DOI":"10.1109\/MDSO.2006.13"},{"key":"12_CR7","unstructured":"Bittorrent Protocol Specification, version 1.0 (retrieved, April 2008), http:\/\/cs.ecs.baylor.edu\/~donahoo\/classes\/5321\/projects\/bittorrent\/BitTorrent%20Protocol%20Specification.doc"},{"key":"12_CR8","doi-asserted-by":"crossref","unstructured":"Karagiannis, T., Broido, A., Brownlee, N., Faloutsos, M.: Is P2P Dying or Just Hiding? In: Proceedings of Globecom 2004, Dallas, Texas, USA (December 2004)","DOI":"10.1109\/GLOCOM.2004.1378239"},{"key":"12_CR9","doi-asserted-by":"crossref","unstructured":"Lee, K., Walkerdine, J., Hughes, D.: On the Penetration of Business Networks by P2P File Sharing. In: Proceedings of the 2nd International Conference on Internet Monitoring and Protection (ICIMP 2007), Santa Clara, California, USA (July 2007)","DOI":"10.1109\/ICIMP.2007.30"},{"key":"12_CR10","unstructured":"RFC 1459: Internet Relay Chat (IRC) Protocol (retrieved, April 2008), http:\/\/www.irchelp.org\/irchelp\/rfc\/"},{"key":"12_CR11","unstructured":"Skype (April 2008), www.skype.com"},{"key":"12_CR12","unstructured":"BBC News 24, Chat room Paedophile Jailed, http:\/\/news.bbc.co.uk\/1\/hi\/england\/2969020.stm"},{"key":"12_CR13","unstructured":"BBC News 24, Men Jailed for Online Rape Plot (April 2008), http:\/\/news.bbc.co.uk\/1\/hi\/england\/6331517.stm"},{"key":"12_CR14","unstructured":"The Virtual Global Task Force (April 2008), http:\/\/www.virtualglobaltaskforce.com\/"},{"key":"12_CR15","unstructured":"The UK Child Exploitation and Online Protection Centre (CEOP) (April 2008), www.ceop.gov.uk"},{"key":"12_CR16","unstructured":"Scottish Parliament, The Protection of Children and Prevention of Sexual Offences (Scotland) Bill (April 2008), http:\/\/www.scottish.parliament.uk\/business\/bills\/pdfs\/b30s2-aspassed.pdf"},{"key":"12_CR17","unstructured":"Facebook (April 2008), http:\/\/www.facebook.com"},{"key":"12_CR18","unstructured":"Social Media Today, Facebook Explodes (June 2007), http:\/\/www.socialmediatoday.com\/SMC\/10670"},{"key":"12_CR19","unstructured":"Office of Public Sector Information, Malicious Communications Act 1988 (April 2008), http:\/\/www.opsi.gov.uk\/ACTS\/acts1988\/Ukpga_19880027_en_1.htm"},{"key":"12_CR20","unstructured":"Crime Library (2007), Cyberstalking- A Case Study (April 2008), http:\/\/www.crimelibrary.com\/criminal_mind\/psychology\/cyberstalking\/5.html"},{"key":"12_CR21","unstructured":"Panorama Transcript: One click from Danger (2008) (April 2008), http:\/\/news.bbc.co.uk\/1\/hi\/programmes\/panorama\/7180769.stm"},{"key":"12_CR22","unstructured":"Scott, M.: Focusing on the text and its key words. In: Burnard, L., McEnery, T. (eds.) Rethinking Language Pedagogy from a Corpus Perspective, Peter Lang, Frankfurt, pp. 104\u2013121 (2000)"},{"issue":"1","key":"12_CR23","doi-asserted-by":"crossref","first-page":"133","DOI":"10.1075\/ijcl.2.1.07ray","volume":"2","author":"P. Rayson","year":"1997","unstructured":"Rayson, P., Leech, G., Hodges, M.: Social differentiation in the use of English vo-cabulary: some analyses of the conversational component of the British National Corpus. Intl. Journal of Corpus Linguistics\u00a02(1), 133\u2013152 (1997)","journal-title":"Intl. Journal of Corpus Linguistics"},{"key":"12_CR24","unstructured":"Hofland, K., Johansson, S.: Word frequencies in British and American English, NCCH, Bergen, Norway (1982)"},{"key":"12_CR25","unstructured":"Rayson, P.: Matrix: A statistical method and software tool for linguistic analysis through corpus comparison, Ph.D. thesis, Lancaster University (2003)"},{"issue":"2","key":"12_CR26","doi-asserted-by":"publisher","first-page":"87","DOI":"10.1007\/BF01830689","volume":"28","author":"D.I. Holmes","year":"1994","unstructured":"Holmes, D.I.: Authorship attribution, Computers and the humanities\u00a028(2), 87\u2013106 (1994)","journal-title":"Authorship attribution, Computers and the humanities"},{"key":"12_CR27","doi-asserted-by":"publisher","first-page":"169","DOI":"10.1093\/llc\/fql019","volume":"21","author":"P. Juola","year":"2006","unstructured":"Juola, P., Sofko, J., Brennan, P.: A prototype for authorship attribution studies. Literary and Linguistic Computing\u00a021, 169\u2013178 (2006)","journal-title":"Literary and Linguistic Computing"},{"key":"12_CR28","unstructured":"Wmatrix (April 2008), http:\/\/ucrel.lancs.ac.uk\/wmatrix\/"},{"key":"12_CR29","unstructured":"SpectorSoft \u2018Spector Pro\u2019 (April 2008), http:\/\/www.spectorsoft.com"},{"key":"12_CR30","unstructured":"Protecting Each Other, Crisp ctingeachother (April 2008), http:\/\/www.prote"},{"key":"12_CR31","unstructured":"SpyTech \u2018Spy Agent\u2019 (April 2008), http:\/\/www.spytech-web.com"},{"key":"12_CR32","doi-asserted-by":"crossref","unstructured":"Rayson, P., Garside, R.: Comparing corpora using frequency profiling. In: Proceedings of the workshop on Comparing Corpora, held in conjunction with ACL 2000, Hong Kong, October 1-8, pp. 1\u20136 (2000)","DOI":"10.3115\/1117729.1117730"},{"issue":"11","key":"12_CR33","doi-asserted-by":"publisher","first-page":"969","DOI":"10.1109\/TSE.2005.129","volume":"31","author":"P. Sawyer","year":"2005","unstructured":"Sawyer, P., Rayson, P., Cosh, K.: Shallow Knowledge as an Aid to Deep Understand-ing in Early Phase Requirements Engineering. IEEE Transactions on Software Engineering\u00a031(11), 969\u2013981 (2005)","journal-title":"IEEE Transactions on Software Engineering"},{"key":"12_CR34","unstructured":"Face Book Press Information, http:\/\/www.facebook.com\/press\/info.php?statistics"},{"key":"12_CR35","doi-asserted-by":"crossref","unstructured":"Peng, H.: A Data Mining Approach Based on Grey Prediction Model in Web Environment. Semantics, Knowledge and Grid, 76 (2006)","DOI":"10.1109\/SKG.2006.2"}],"container-title":["Lecture Notes in Computer Science","Computational Forensics"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-85303-9_12.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,31]],"date-time":"2025-01-31T11:53:24Z","timestamp":1738324404000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-85303-9_12"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540853022","9783540853039"],"references-count":35,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-85303-9_12","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[]}}