{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,17]],"date-time":"2026-04-17T07:40:32Z","timestamp":1776411632360,"version":"3.51.2"},"publisher-location":"Berlin, Heidelberg","reference-count":48,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783642195129","type":"print"},{"value":"9783642195136","type":"electronic"}],"license":[{"start":{"date-parts":[[2011,1,1]],"date-time":"2011-01-01T00:00:00Z","timestamp":1293840000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011]]},"DOI":"10.1007\/978-3-642-19513-6_1","type":"book-chapter","created":{"date-parts":[[2011,3,7]],"date-time":"2011-03-07T01:58:50Z","timestamp":1299463130000},"page":"1-18","source":"Crossref","is-referenced-by-count":13,"title":["Dealing with the Problem of Cybercrime"],"prefix":"10.1007","author":[{"given":"Ali","family":"Alkaabi","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"George","family":"Mohay","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Adrian","family":"McCullagh","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Nicholas","family":"Chantler","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","reference":[{"key":"1_CR1","volume-title":"Electronic Theft: Unlawful Acquisition in Cyberspace","author":"P. Grabosky","year":"2001","unstructured":"Grabosky, P., Smith, R.G., Dempsey, G.: Electronic Theft: Unlawful Acquisition in Cyberspace. Cambridge University Press, Cambridge (2001)"},{"key":"1_CR2","first-page":"22","volume-title":"Proceedings of the Asia Cyber Crime Summit","author":"P. Grabosky","year":"2001","unstructured":"Grabosky, P.: The Global and Regional Cyber Crime Problem. In: Broadhurst, R.G. (ed.) Proceedings of the Asia Cyber Crime Summit, pp. 22\u201342. Centre for Criminology, The University of Hong Kong, Hong Kong (2001)"},{"key":"1_CR3","unstructured":"Furnell, S.M.: The Problem of Categorising Cybercrime and Cybercriminals. In: 2nd Australian Information Warfare and Security Conference, Perth, Australia, pp. 29\u201336 (2001)"},{"key":"1_CR4","unstructured":"United Nations (UN). International Review of Criminal Policy - United Nations manual on the prevention and control of computer-related crime (1999), http:\/\/www.uncjin.org\/8th.pdf (cited December 6, 2006)"},{"key":"1_CR5","unstructured":"G8 Government\/Industry Conference on High-Tech Crime. Report of Workshop 3: Threat assessment and prevention. G8 Government\/Industry Conference on High-Tech Crime (2001), http:\/\/www.mofa.go.jp\/policy\/i_crime\/high_tec\/conf0105-6.html (cited March 6, 2007)"},{"key":"1_CR6","unstructured":"Krone, T.: High Tech Crime Brief: Concepts and terms (2005), http:\/\/www.aic.gov.au\/publications\/htcb\/htcb001.pdf (cited February 1, 2007)"},{"key":"1_CR7","unstructured":"Kelly, J.X.: Cybercrime - High tech crime (2002), http:\/\/www.jisclegal.ac.uk\/cybercrime\/Archived_cybercrime.htm (cited March 1, 2007)"},{"issue":"1","key":"1_CR8","doi-asserted-by":"publisher","first-page":"13","DOI":"10.1007\/s11416-006-0015-z","volume":"2","author":"S. Gordon","year":"2006","unstructured":"Gordon, S., Ford, R.: On the Definition and Classification of Cybercrime. Journal of Computer Virology\u00a02(1), 13\u201320 (2006)","journal-title":"Journal of Computer Virology"},{"key":"1_CR9","first-page":"434","volume-title":"Cyber-crime: The challenge in Asia","year":"2005","unstructured":"Broadhurst, R., Grabosky, P. (eds.): Cyber-crime: The challenge in Asia, p. 434. Hong Kong University Press, Hong Kong (2005)"},{"key":"1_CR10","doi-asserted-by":"publisher","first-page":"262","DOI":"10.1017\/CBO9780511481604","volume-title":"Cyber Criminals on Trial","author":"R.G. Smith","year":"2004","unstructured":"Smith, R.G., Grabosky, P., Urbas, G.: Cyber Criminals on Trial, p. 262. Cambridge University Press, Melbourne (2004)"},{"issue":"1","key":"1_CR11","doi-asserted-by":"publisher","first-page":"27","DOI":"10.1023\/B:CRIM.0000037565.32355.10","volume":"10","author":"F. Pokar","year":"2004","unstructured":"Pokar, F.: New Challenges for International Rules Against Cyber-crime. European Journal on Criminal Policy and Research\u00a010(1), 27\u201337 (2004)","journal-title":"European Journal on Criminal Policy and Research"},{"key":"1_CR12","unstructured":"Foreign Affairs and International Trade Canada. Cyber Crime, August 16 (2004), http:\/\/www.dfait-maeci.gc.ca\/internationalcrime\/cybercrime-en.asp (cited December 5, 2006)"},{"key":"1_CR13","unstructured":"Cybercitizenship. What is Cyber Crime? (2008), http:\/\/cybercitizenship.org\/crime\/crime.html (cited February 19, 2008)"},{"key":"1_CR14","unstructured":"Symantec Corporation. What is Cybercrime? (2007), http:\/\/www.symantec.com\/avcenter\/cybercrime\/index_page2.html (cited February 5, 2007)"},{"issue":"1","key":"1_CR15","doi-asserted-by":"publisher","first-page":"33","DOI":"10.1109\/MSP.2006.27","volume":"4","author":"N. Kshetri","year":"2006","unstructured":"Kshetri, N.: The Simple Economics of Cybercrimes. IEEE Security & Privacy\u00a04(1), 33\u201339 (2006)","journal-title":"IEEE Security & Privacy"},{"key":"1_CR16","volume-title":"Invisible Crimes: Their Victims and their Regulation","author":"D.S. Wall","year":"1999","unstructured":"Wall, D.S.: Cybercrimes: New wine, no bottles? In: Davies, P., Francis, P., Jupp, V. (eds.) Invisible Crimes: Their Victims and their Regulation. Macmillan, London (1999)"},{"issue":"2","key":"1_CR17","doi-asserted-by":"crossref","first-page":"243","DOI":"10.1177\/a017405","volume":"10","author":"P.N. Grabosky","year":"2001","unstructured":"Grabosky, P.N.: Virtual Criminality: Old Wine in New Bottles? Social & Legal Studies\u00a010(2), 243\u2013249 (2001)","journal-title":"Social & Legal Studies"},{"key":"1_CR18","unstructured":"Council of Europe. Convention on Cybercrime (2001), http:\/\/conventions.coe.int\/Treaty\/EN\/Treaties\/Html\/185.htm (cited February 10, 2009)"},{"key":"1_CR19","unstructured":"Computer Crime and Intellectual Property Section Criminal Division at U.S. Department of Justice. Prosecuting computer crimes (2007)"},{"key":"1_CR20","unstructured":"UK Metropolitan Police Service (MPS). Progress of MPS E-crime Strategy (2007), http:\/\/www.mpa.gov.uk\/print\/committees\/mpa\/2007\/070125\/10.htm (cited January 10, 2008)"},{"key":"1_CR21","unstructured":"Secretariat of the Parliamentary Joint Committee on the Australian Crime Commission. Cybercrime (2004), http:\/\/www.aph.gov.au\/senate\/committee\/acc_ctte\/completed_inquiries\/2002-04\/cybercrime\/report\/report.pdf (cited January 15, 2008)"},{"issue":"2","key":"1_CR22","doi-asserted-by":"publisher","first-page":"115","DOI":"10.1023\/B:ISFI.0000025780.94350.79","volume":"6","author":"S.W. Brenner","year":"2004","unstructured":"Brenner, S.W.: U.S. Cybercrime Law: Defining offences. Information Systems Frontiers\u00a06(2), 115\u2013132 (2004)","journal-title":"Information Systems Frontiers"},{"key":"1_CR23","doi-asserted-by":"crossref","first-page":"128","DOI":"10.1145\/1059524.1059553","volume-title":"Proceedings of the 1st Annual Conference on Information Security Curriculum Development, I.s.c. development, Editor","author":"N.B. Sukhai","year":"2004","unstructured":"Sukhai, N.B.: Hacking and Cybercrime. In: Proceedings of the 1st Annual Conference on Information Security Curriculum Development, I.s.c. development, Editor, pp. 128\u2013132. ACM Press, Kennesaw (2004)"},{"key":"1_CR24","unstructured":"Koenig, D.: Investigation of Cybercrime and Technology-related Crime (2002), http:\/\/www.neiassociates.org\/cybercrime.htm (cited June 25, 2008)"},{"key":"1_CR25","unstructured":"Wilson, C.: Botnets, Cybercrime, and Cyberterrorism: Vulnerabilities and policy issues for congress (2008), http:\/\/fas.org\/sgp\/crs\/terror\/RL32114.pdf (cited June 26, 2008)"},{"key":"1_CR26","unstructured":"Lewis, B.C.: Preventing of Computer Crime Amidst International Anarchy (2004), http:\/\/goliath.ecnext.com\/coms2\/summary_0199-3456285_ITM (cited November 17, 2008)"},{"key":"1_CR27","first-page":"4","volume":"80","author":"Australian High Tech Crime Centre (AHTCC)","year":"2003","unstructured":"Australian High Tech Crime Centre (AHTCC): Fighting the Invisible. Platypus Magazine: Journal of the Australian Federal Police\u00a080, 4\u20136 (2003), http:\/\/www.afp.gov.au\/~\/media\/afp\/pdf\/f\/fighting-the-invisible.ashx","journal-title":"Platypus Magazine: Journal of the Australian Federal Police"},{"key":"1_CR28","unstructured":"Urbas, G., Choo, K.-K.R.: Resources Materials on Technology-enabled Crime, No. 28 (2008), http:\/\/www.aic.gov.au\/publications\/tbp\/tbp028\/tbp028.pdf (cited November 16, 2008)"},{"issue":"5","key":"1_CR29","first-page":"12","volume":"48","author":"D. Thomas","year":"2006","unstructured":"Thomas, D.: An Uncertain World. The British Computer Society\u00a048(5), 12\u201313 (2006)","journal-title":"The British Computer Society"},{"key":"1_CR30","volume-title":"Digital Crime and Forensic Science in Cyberspace","year":"2006","unstructured":"Kanellis, P., et al. (eds.): Digital Crime and Forensic Science in Cyberspace. Idea Group Inc., London (2006)"},{"issue":"6","key":"1_CR31","doi-asserted-by":"publisher","first-page":"13","DOI":"10.1109\/MNET.2002.1081761","volume":"16","author":"A. Chakrabarti","year":"2002","unstructured":"Chakrabarti, A., Manimaran, G.: Internet Infrastructure Security: A taxonomy. IEEE Network\u00a016(6), 13\u201321 (2002)","journal-title":"IEEE Network"},{"key":"1_CR32","unstructured":"Krone, T.: High Tech Crime Brief: Hacking motives (2005), http:\/\/www.aic.gov.au\/publications\/htcb\/htcb006.html (cited February 12, 2007)"},{"issue":"2","key":"1_CR33","first-page":"287","volume":"12","author":"M. Keyser","year":"2003","unstructured":"Keyser, M.: The Council of Europe Convention on Cybercrime. Transnational Law and Policy Journal\u00a012(2), 287\u2013326 (2003)","journal-title":"Transnational Law and Policy Journal"},{"key":"1_CR34","first-page":"12","volume-title":"Cybercrime: The Investigation, Prosecution and Defence of a Computer-Related Crime","author":"S.W. Brenner","year":"2006","unstructured":"Brenner, S.W.: Defining Cybercrime: A review of the state and federal law. In: Clifford, R.D. (ed.) Cybercrime: The Investigation, Prosecution and Defence of a Computer-Related Crime, pp. 12\u201340. Carolina Academic Press, North Carolina (2006)"},{"key":"1_CR35","unstructured":"Coleman, K.: Cyber Terrorism (2003), http:\/\/www.directionsmag.com\/article.php?article_id=432&trv=1 (cited February 10, 2009)"},{"key":"1_CR36","unstructured":"The UK Parliament Office of Science and Technology. Computer crime (2006), http:\/\/www.parliament.uk\/documents\/upload\/postpn271.pdf (cited March 1, 2007)"},{"key":"1_CR37","unstructured":"Markoff, J.: Computer Intruder is put on Probation and Fined $10,000 (1990), http:\/\/query.nytimes.com\/gst\/fullpage.html?res=9C0CE1D71038F936A35756C0A966958260 (cited October 7, 2008)"},{"key":"1_CR38","unstructured":"Wyld, B.: Cyberterrorism: Fear factor (2004), http:\/\/www.crime-research.org\/analytics\/501\/ (cited October 7, 2008)"},{"key":"1_CR39","unstructured":"CIO Asia. A Hacker Story (2005), http:\/\/www.crime-research.org\/articles\/hacker0405\/ (cited May 28, 2008)"},{"key":"1_CR40","first-page":"3","volume-title":"United States v Gorshkov Detailed Forensics and Case Study: Expert witness perspective","author":"P. Attfield","year":"2005","unstructured":"Attfield, P.: United States v Gorshkov Detailed Forensics and Case Study: Expert witness perspective, pp. 3\u201324. IEEE Computer Society, Los Alamitos (2005)"},{"issue":"12","key":"1_CR41","doi-asserted-by":"publisher","first-page":"15","DOI":"10.1145\/1183236.1183252","volume":"49","author":"H. Berghel","year":"2006","unstructured":"Berghel, H.: Fungible Credentials and Next-generation Fraud. Communications of the ACM\u00a049(12), 15\u201319 (2006)","journal-title":"Communications of the ACM"},{"key":"1_CR42","unstructured":"Ninemsn. Cop\u2019s Child Porn Case Delayed to Friday (2008), http:\/\/news.ninemsn.com.au\/article.aspx?id=575167 (cited June 6, 2008)"},{"key":"1_CR43","unstructured":"Grow, B., Bush, J.: Hacker Hunters (2005), http:\/\/www.businessweek.com\/magazine\/content\/05_22\/b3935001_mz001.htm (cited October 21, 2006)"},{"key":"1_CR44","unstructured":"SCAMwatch. The Holiday Prize Which Nearly Cost Nicole Thousands of Dollars (2008), http:\/\/www.scamwatch.gov.au\/content\/index.phtml\/itemId\/699124 (cited October 17, 2008)"},{"key":"1_CR45","unstructured":"U.S. Department of Justice. Fourth defendant in massive Internet scam pleads guilty to fraud and money laundering charges (2004), http:\/\/www.usdoj.gov\/criminal\/cybercrime\/nordickPlea_triwest.htm (cited November 3, 2008)"},{"key":"1_CR46","unstructured":"Gulfnews. New Department to Fight Cyber Crimes (2009), http:\/\/gulfnews.com\/news\/gulf\/uae\/crime\/new-department-to-fight-cyber-crimes-1.554070 (cited December 25, 2009)"},{"key":"1_CR47","unstructured":"Alkaabi, A., et al.: A Comparative Analysis of the Extent of Money Laundering in Australia, UAE, UK and the USA. In: Finance and Corporate Governance Conference, Melbourne (2010), http:\/\/ssrn.com\/abstract=1539843"},{"key":"1_CR48","unstructured":"International Telecommunication Union. ITU Toolkit for Cybercrime Legislation (2009) (updated on February 2010), http:\/\/www.itu.int\/ITU-D\/cyb\/cybersecurity\/docs\/itu-toolkit-cybercrime-legislation.pdf (cited November 3, 2009)"}],"container-title":["Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","Digital Forensics and Cyber Crime"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-19513-6_1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,11,20]],"date-time":"2021-11-20T01:13:10Z","timestamp":1637370790000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-19513-6_1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011]]},"ISBN":["9783642195129","9783642195136"],"references-count":48,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-19513-6_1","relation":{},"ISSN":["1867-8211","1867-822X"],"issn-type":[{"value":"1867-8211","type":"print"},{"value":"1867-822X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2011]]}}}