{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T21:11:13Z","timestamp":1725570673843},"publisher-location":"Berlin, Heidelberg","reference-count":18,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642155055"},{"type":"electronic","value":"9783642155062"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-15506-2_9","type":"book-chapter","created":{"date-parts":[[2010,11,26]],"date-time":"2010-11-26T07:20:33Z","timestamp":1290756033000},"page":"121-132","source":"Crossref","is-referenced-by-count":11,"title":["Evaluation of Evidence in Internet Auction Fraud Investigations"],"prefix":"10.1007","author":[{"given":"Michael","family":"Kwan","sequence":"first","affiliation":[]},{"given":"Richard","family":"Overill","sequence":"additional","affiliation":[]},{"given":"Kam-Pui","family":"Chow","sequence":"additional","affiliation":[]},{"given":"Jantje","family":"Silomon","sequence":"additional","affiliation":[]},{"given":"Hayson","family":"Tse","sequence":"additional","affiliation":[]},{"given":"Frank","family":"Law","sequence":"additional","affiliation":[]},{"given":"Pierre","family":"Lai","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"4","key":"9_CR1","doi-asserted-by":"publisher","first-page":"2991","DOI":"10.1016\/j.eswa.2009.09.034","volume":"37","author":"M. Chae","year":"2010","unstructured":"M. Chae, S. Shim, H. Cho and B. Lee, Empirical analysis of online auction fraud: Credit card phantom transactions, Expert Systems with Applications, vol. 37(4), pp. 2991\u20132999, 2010.","journal-title":"Expert Systems with Applications"},{"key":"9_CR2","unstructured":"China Internet Network Information Center, Statistical Survey Report on Internet Development in China (Abridged Edition), Beijing, China (www.cnnic.net.cn\/uploadfiles\/pdf\/2008\/8\/15\/145744.pdf), 2008."},{"issue":"3","key":"9_CR3","doi-asserted-by":"publisher","first-page":"270","DOI":"10.1007\/s12117-008-9038-9","volume":"11","author":"R. Choo","year":"2008","unstructured":"R. Choo, Organized crime groups in cyberspace: A typology, Trends in Organized Crime, vol. 11(3), pp. 270\u2013295, 2008.","journal-title":"Trends in Organized Crime"},{"key":"9_CR4","unstructured":"C. Chua and J. Wareham, Self-regulation for online auctions: An analysis, Proceedings of the Twenty-Third International Conference on Information Systems, pp. 115\u2013125, 2002."},{"key":"9_CR5","unstructured":"Data Center of the China Internet, The First Half of 2008 China Internet User Measurement Data IUI Index Report, Beijing, China, 2008."},{"issue":"2","key":"9_CR6","doi-asserted-by":"publisher","first-page":"83","DOI":"10.1016\/S0015-7368(93)72985-0","volume":"33","author":"I. Evett","year":"1993","unstructured":"I. Evett, Establishing the evidential value of a small quantity of material found at a crime scene, Journal of the Forensic Science Society, vol. 33(2), pp. 83\u201386, 1993.","journal-title":"Journal of the Forensic Science Society"},{"key":"9_CR7","doi-asserted-by":"crossref","unstructured":"S. Gajek and A. Sadeghi, A forensic framework for tracing phishers, Proceedings of the Third International Conference on the Future of Identity in the Information Society, pp. 19\u201333, 2008.","DOI":"10.1007\/978-0-387-79026-8_2"},{"issue":"4","key":"9_CR8","doi-asserted-by":"publisher","first-page":"69","DOI":"10.1145\/1330311.1330326","volume":"51","author":"D. Gregg","year":"2008","unstructured":"D. Gregg and J. Scott, A typology of complaints about eBay sellers, Communications of the ACM, vol. 51(4), pp. 69\u201374, 2008.","journal-title":"Communications of the ACM"},{"key":"9_CR9","unstructured":"Internet Crime Complaint Center, 2008 Internet Crime Report, National White Collar Crime Center, Richmond, Virginia, 2008."},{"key":"9_CR10","doi-asserted-by":"crossref","unstructured":"J. Keppens, Towards qualitative approaches to Bayesian evidential reasoning, Proceedings of the Eleventh International Conference on Artificial Intelligence and Law, pp. 17\u201325, 2007.","DOI":"10.1145\/1276318.1276322"},{"key":"9_CR11","doi-asserted-by":"publisher","first-page":"87","DOI":"10.1007\/978-3-540-77809-7_7","volume":"110","author":"M. Kobayashi","year":"2008","unstructured":"M. Kobayashi and T. Ito, A transactional relationship visualization system in Internet auctions, Studies in Computational Intelligence, vol. 110, pp. 87\u201399, 2008.","journal-title":"Studies in Computational Intelligence"},{"key":"9_CR12","doi-asserted-by":"crossref","unstructured":"Y. Ku, Y. Chen and C. Chiu, A proposed data mining approach for Internet auction fraud detection, Proceedings of the Pacific Asia Workshop on Intelligence and Security Informatics, pp. 238\u2013243, 2007.","DOI":"10.1007\/978-3-540-71549-8_22"},{"key":"9_CR13","doi-asserted-by":"publisher","first-page":"275","DOI":"10.1007\/978-0-387-84927-0_22","volume-title":"Advances in Digital Forensics IV","author":"M. Kwan","year":"2008","unstructured":"M. Kwan, K. Chow, F. Law and P. Lai, Reasoning about evidence using Bayesian networks, in Advances in Digital Forensics IV, I. Ray and S. Shenoi (Eds.), Springer, Boston, Massachusetts, pp. 275\u2013289, 2008."},{"key":"9_CR14","volume-title":"Introduction to Statistics for Forensic Scientists","author":"D. Lucy","year":"2005","unstructured":"D. Lucy, Introduction to Statistics for Forensic Scientists, Wiley, Chichester, United Kingdom, 2005."},{"issue":"1","key":"9_CR15","doi-asserted-by":"publisher","first-page":"95","DOI":"10.1007\/s00453-007-9106-6","volume":"52","author":"M. Morzy","year":"2008","unstructured":"M. Morzy, New algorithms for mining the reputation of participants of online auctions, Algorithmica, vol. 52(1), pp. 95\u2013112, 2008.","journal-title":"Algorithmica"},{"key":"9_CR16","unstructured":"K. Ochaeta, Fraud Detection for Internet Auctions: A Data Mining Approach, Ph.D. Thesis, College of Technology Management, National Tsing-Hua University, Hsinchu, Taiwan, 2008."},{"key":"9_CR17","doi-asserted-by":"publisher","first-page":"231","DOI":"10.1007\/978-3-642-04155-6_17","volume-title":"Advances in Digital Forensics V","author":"R. Overill","year":"2009","unstructured":"R. Overill, M. Kwan, K. Chow, P. Lai and F. Law, A cost-effective model for digital forensic investigations, in Advances in Digital Forensics V, G. Peterson and S. Shenoi (Eds.), Springer, Heidelberg, Germany, pp. 231\u2013240, 2009."},{"key":"9_CR18","doi-asserted-by":"crossref","unstructured":"Y. Sakurai and M. Yokoo, A false-name-proof double auction protocol for arbitrary evaluation values, Proceedings of the Second International Joint Conference on Autonomous Agents and Multiagent Systems, pp. 329\u2013336, 2003.","DOI":"10.1145\/860575.860629"}],"container-title":["IFIP Advances in Information and Communication Technology","Advances in Digital Forensics VI"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-15506-2_9.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,30]],"date-time":"2021-04-30T08:56:00Z","timestamp":1619772960000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-15506-2_9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642155055","9783642155062"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-15506-2_9","relation":{},"ISSN":["1868-4238","1861-2288"],"issn-type":[{"type":"print","value":"1868-4238"},{"type":"electronic","value":"1861-2288"}],"subject":[],"published":{"date-parts":[[2010]]}}}