{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,13]],"date-time":"2025-02-13T05:13:10Z","timestamp":1739423590630,"version":"3.37.0"},"publisher-location":"Berlin, Heidelberg","reference-count":33,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540884804"},{"type":"electronic","value":"9783642018206"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009]]},"DOI":"10.1007\/978-3-642-01820-6_8","type":"book-chapter","created":{"date-parts":[[2009,9,18]],"date-time":"2009-09-18T16:02:59Z","timestamp":1253289779000},"page":"315-347","source":"Crossref","is-referenced-by-count":1,"title":["Identity-Related Crime and Forensics"],"prefix":"10.1007","author":[{"given":"Bert-Jaap","family":"Koops","sequence":"first","affiliation":[]},{"given":"Zeno","family":"Geradts","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"8_CR1_8","first-page":"219","volume":"169","author":"L. Aalberg","year":"2007a","unstructured":"Aalberg, L., Andersson, K., Bertler, C., Bor\u00e9n, H., Cole, M. D., Dahl\u00e9n, J., Finnon, Y., Huizer, H., Jalava, K., Kaa, E., Lock, E., Lopes, A., Poortman-Van der Meer, A., Sip-pola, E. (2007a), \u2018Development of a harmonised method for the profiling of amphetamines I. Synthesis of standards and compilation of analytical data\u2019, Forensic Science International 169: 219\u2013229.","journal-title":"Forensic Science International"},{"key":"8_CR2_8","first-page":"231","volume":"169","author":"L. Aalberg","year":"2007b","unstructured":"Aalberg, L., Andersson, K., Bertler, C., Bor\u00e9n, H., Cole, M. D., Finnon, Y., Huizer, H., Jalava, K., Kaa, E., Lock, E., Lopes, A., Poortman-Van der Meer, A., Sippola, E., Dahl\u00e9n, J. (2007b), \u2018Development of a harmonised method for the profiling of amphetamines II. Stability of impurities in organic solvents\u2019, Forensic Science International 169: 231\u2013241.","journal-title":"Forensic Science International"},{"key":"8_CR3_8","doi-asserted-by":"publisher","DOI":"10.1002\/0470011238","volume-title":"Statistics and the Evaluation of Evidence for Forensic Scientists","author":"C. C. G. Aitken","year":"2004","unstructured":"Aitken, C. C. G. and Taroni, F. (2004), Statistics and the Evaluation of Evidence for Forensic Scientists. John Wiley & Sons, London."},{"key":"8_CR4_8","volume-title":"Spamscatter: Characterizing Internet Scam Hosting infrastructure","author":"D.S. Anderson","year":"2006","unstructured":"Anderson, D.S., Fleizach, C., Savage, S., Voelker, G. M. (2006), \u2018Spamscatter: Characterizing Internet Scam Hosting infrastructure\u2019, Proceedings of the USENIX Security Symposium, Boston, MA."},{"key":"8_CR5_8","unstructured":"Buitelaar, H. (ed.) (2007), FIDIS Deliverable D13.3: Study on ID Number Policies, Download: www.fidis.net\/resources\/deliverables\/ ."},{"key":"8_CR6_8","unstructured":"Byford, L. (1981), \u2018The Yorkshire Ripper Case: Review of the Police Investigation of the Case\u2019, H.M.s.I.o. Constabulary, Home Office."},{"key":"8_CR7_8","first-page":"103","volume":"38","author":"R. Cook","year":"1998","unstructured":"Cook, R., Evett, I. W., Jackson, G., Jones, P. J., Lambert, J. A. (1998), \u2018A hierarchy of propositions: deciding which level to address in casework\u2019,. Science & Justice 38: 103\u2013111.","journal-title":"Science & Justice"},{"key":"8_CR8_8","unstructured":"De Vries, U. R. M. T. et al. (2007), \u2018Identiteitsfraude: een afbakening. Een internationale begripsvergelijking en analyse van nationale strafbepalingen\u2019, WODC, Utrecht, http:\/\/www.wodc.nl\/images\/1496_%20volledige_tekst_tcm44-86343.pdf ."},{"issue":"3","key":"8_CR9_8","first-page":"348","volume":"12","author":"S.A. Egger","year":"1984","unstructured":"Egger, S.A. (1984), \u2018A Working Definition of Serial Murder and the Reduction of Linkage Blindness\u2019, Journal of Police Science and Administration 12(3): 348\u2013355.","journal-title":"Journal of Police Science and Administration"},{"key":"8_CR10_8","unstructured":"Frattini, F. (2007), \u2018Closing speech on Public Security (20 November 2007)\u2019, Speech \/07\/ 728. Privacy and Technology Conference on Public Security, Privacy and Technology, Brussels."},{"key":"8_CR11_8","unstructured":"Geradts, Z. and Sommer, P. (eds.) (2006), FIDIS Deliverable D6.1: Forensic Implications of Identity Management Systems, Download: www.fidis.net\/resources\/deliverables\/ ."},{"key":"8_CR12_8","unstructured":"Geradts, Z. and Sommer, P. (eds.) (2008), FIDIS Deliverable D6.7c: Forensic Profiling, Download: www.fidis.net\/resources\/deliverables\/ ."},{"key":"8_CR13_8","volume-title":"Problem Oriented Policing","author":"H. Goldstein","year":"1990","unstructured":"Goldstein, H. (1990), Problem Oriented Policing. Temple University Press, Philadelphia."},{"issue":"7","key":"8_CR14_8","doi-asserted-by":"crossref","first-page":"37","DOI":"10.5553\/JV\/2006004007003","volume":"32","author":"J. H. A. M. Grijpink","year":"2006","unstructured":"Grijpink, J. H. A. M. (2006), \u2018Identiteitsfraude en overheid\u2019, Justiti\u00eble verkenningen 32(7): 37\u201357.","journal-title":"Justiti\u00eble verkenningen"},{"key":"8_CR15_8","doi-asserted-by":"crossref","unstructured":"Hildebrandt, M. (2008a), \u2018Defining profiling: a new type of knowledge?\u2019 In: Hildebrandt, M. and Gutwirth, S. (eds.), Profiling the European Citizen: Cross Disciplinary Perspectives. Springer, pp 39\u201350.","DOI":"10.1007\/978-1-4020-6914-7_2"},{"key":"8_CR16_8","doi-asserted-by":"crossref","unstructured":"Hildebrandt, M. (2008b), \u2018Profiling and the Identity of the European Citizen\u2019. In: Hildebrandt, M. and Gutwirth, S. (eds.), Profiling the European Citizen: Cross Disciplinary Perspectives. Springer, pp 320\u2013360.","DOI":"10.1007\/978-1-4020-6914-7_15"},{"issue":"1\u20132","key":"8_CR17_8","first-page":"121","volume":"57","author":"S. Ioset","year":"2005","unstructured":"Ioset, S., Esseiva, P., Ribaux, O., Weyermann, C., Anglada, F., Lociciro, S., Hayoz, P., Baer, I., Gast\u00e9, L., Terrettaz-Zufferey, A. L., Delaporte, C., Margot, P. (2005), \u2018Establishment of an operational system for drug profiling: a Swiss experience\u2019, Bulletin of Narcotics 57 (1\u20132): 121\u2013146.","journal-title":"Bulletin of Narcotics"},{"key":"8_CR18_8","unstructured":"Jaquet-Chiffelle, D. O. (2008), \u2018Reply: Direct and Indirect Profiling in the Light of Virtual Persons\u2019. In: Hildebrandt, M. and Gutwirth, S. (eds.), Profiling the European Citizen: Cross Disciplinary Perspectives. Springer, pp 55\u201363."},{"key":"8_CR19_8","volume-title":"The Scientific Investigation of Crime","author":"S. S. Kind","year":"1987","unstructured":"Kind, S. S. (1987), The Scientific Investigation of Crime. Forensic Science Services Ltd, Harrogate."},{"issue":"3","key":"8_CR20_8","doi-asserted-by":"publisher","first-page":"155","DOI":"10.1016\/S0015-7368(94)72908-X","volume":"34","author":"S. S. Kind","year":"1994","unstructured":"Kind, S. S. (1994), \u2018Crime investigation and the criminal trial: a three chapter paradigm of evidence\u2019, Journal of the Forensic Science Society 34(3): 155\u2013164.","journal-title":"Journal of the Forensic Science Society"},{"key":"8_CR21_8","unstructured":"Koops, B.-J. (2005), FIDIS Deliverable D5.1: A survey on legislation on ID theft in the EU and a number of other countries, Download: www.fidis.net\/resources\/deliverables\/ ."},{"key":"8_CR22_8","doi-asserted-by":"crossref","unstructured":"Koops, B.-J. and Leenes, R. E. (2006), \u2018ID Theft, ID Fraud and\/or ID-related Crime. Definitions matter\u2019, Datenschutz und Datensicherheit (9): 553\u2013556.","DOI":"10.1007\/s11623-006-0141-2"},{"issue":"1","key":"8_CR23_8","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1080\/13691180802158516","volume":"12","author":"B.-J. Koops","year":"2009","unstructured":"Koops, B.-J. et al. (2009), \u2018A typology of identity-related crime: conceptual, technical, and legal issues\u2019, Information Communication & Society 12(1): 1\u201324.","journal-title":"Information Communication & Society"},{"key":"8_CR24_8","doi-asserted-by":"publisher","first-page":"343","DOI":"10.1080\/13600860701701728","volume":"21","author":"E. Kosta","year":"2007","unstructured":"Kosta, E., Coudert, F., Dumortier, J. (2007), \u2018Data protection in the third pillar: in the aftermath of the ECJ decision on PNR data and the data retention directive\u2019, International Review of Law, Computers and Technology 21: 343\u2013358.","journal-title":"International Review of Law, Computers and Technology"},{"key":"8_CR25_8","unstructured":"Leenes, R. E. (ed.) (2006), FIDIS Deliverable D5.2b: ID-related Crime: Towards a Common Ground for Interdisciplinary Research, Download: www.fidis.net\/resources\/deliv-erables\/ ."},{"key":"8_CR26_8","unstructured":"Peterson, M., Morehouse, B., Wright, R. (2000), \u2018Intelligence 2000: Revising the Basic Elements\u2019. Law Enforcement Intelligence Unit (L.E.I.U.) et International Association of Law Enforcement Intelligence Analysts (IALEIA), Sacramento, Lawrenceville."},{"key":"8_CR27_8","unstructured":"Pint\u00e9r, R. (ed.) (2007), FIDIS Deliverable D5.2c: Identity related crime in the world of films, Download: www.fidis.net\/resources\/deliverables\/ ."},{"key":"8_CR28_8","doi-asserted-by":"crossref","unstructured":"Rossmo, K. (1999) Geographical Profiling. CRC Press.","DOI":"10.1201\/9781420048780"},{"issue":"3","key":"8_CR29_8","doi-asserted-by":"publisher","first-page":"307","DOI":"10.1177\/1477370804044005","volume":"1","author":"J. Sheptycki","year":"2004","unstructured":"Sheptycki, J. (2004), \u2018Organizational Pathologies in Police Intelligence: Some Contributions to the Lexicon of Intelligence-led Policing\u2019, European Journal of Criminology 1(3): 307\u2013332.","journal-title":"European Journal of Criminology"},{"key":"8_CR30_8","doi-asserted-by":"crossref","unstructured":"Sproule, S. and Archer, N. (2006), \u2018Defining Identity Theft \u2014 A Discussion Paper\u2019, 6 April 2006, http:\/\/www.business.mcmaster.ca\/IDTDefinition\/lit&links.htm .","DOI":"10.1109\/WCMEB.2007.5"},{"key":"8_CR31_8","doi-asserted-by":"publisher","first-page":"242","DOI":"10.1016\/j.forsciint.2006.06.059","volume":"167","author":"A.-L. Terrettaz-Zufferey","year":"2007","unstructured":"Terrettaz-Zufferey, A.-L., Ratle, F., Ribaux, O., Esseiva, P., Khanevski, M. (2007), \u2018Pattern Detection in Forensic Case Data Using Graph-Theory: Application to Heroin Cutting Agents\u2019, Forensic Science International 167: 242\u2013246.","journal-title":"Forensic Science International"},{"key":"8_CR32_8","unstructured":"United States (2004) The 9\/11 Commission Report, National Commission on Terrorist Attacks, http:\/\/govinfo.library.unt.edu\/911\/report\/index.htm."},{"key":"8_CR33_8","unstructured":"Van der Meulen, N. and Koops, B.-J. (eds.) (2008), FIDIS Deliverable D12.7: Identity-related Crime in Europe \u2014 Big Problem or Big Hype?, Download: www.fidis.net\/resources\/deliverables\/ ."}],"container-title":["The Future of Identity in the Information Society"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-01820-6_8.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,12]],"date-time":"2025-02-12T07:40:27Z","timestamp":1739346027000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-01820-6_8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009]]},"ISBN":["9783540884804","9783642018206"],"references-count":33,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-01820-6_8","relation":{},"subject":[],"published":{"date-parts":[[2009]]}}}