{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,28]],"date-time":"2025-12-28T13:47:27Z","timestamp":1766929647717,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":55,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642252365"},{"type":"electronic","value":"9783642252372"}],"license":[{"start":{"date-parts":[[2012,1,1]],"date-time":"2012-01-01T00:00:00Z","timestamp":1325376000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2012,1,1]],"date-time":"2012-01-01T00:00:00Z","timestamp":1325376000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-25237-2_14","type":"book-chapter","created":{"date-parts":[[2012,1,9]],"date-time":"2012-01-09T10:18:52Z","timestamp":1326104332000},"page":"237-258","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["Intelligence Techniques in Computer Security and Forensics: At the Boundaries of Ethics and Law"],"prefix":"10.1007","author":[{"given":"Bernd","family":"Stahl","sequence":"first","affiliation":[]},{"given":"Moira","family":"Carroll-Mayer","sequence":"additional","affiliation":[]},{"given":"David","family":"Elizondo","sequence":"additional","affiliation":[]},{"given":"Kutoma","family":"Wakunuma","sequence":"additional","affiliation":[]},{"given":"Yingqin","family":"Zheng","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2012,1,10]]},"reference":[{"unstructured":"DFWRS, A road map for digital forensics research. Digital Forensics Re-search Workshop (August 2001), \n                    http:\/\/www.dfrws.org\/2001\/dfrws-rm-final.pdf","key":"14_CR1"},{"doi-asserted-by":"crossref","unstructured":"Pachghare, V.K., Kulkarni, P., Nikam, D.M.: Intrusion Detection System using Self Organizing Maps. In: International Conference on Intelligent Agent & Multimedia-Agent Systems, IAMA (2009)","key":"14_CR2","DOI":"10.1109\/IAMA.2009.5228074"},{"doi-asserted-by":"crossref","unstructured":"Salvador, P., et al.: Framework for Zombie Detection Using Neural Networks. In: Fourth International Conference on Internet Monitoring and Protection, ICIMP (2009)","key":"14_CR3","DOI":"10.1109\/ICIMP.2009.10"},{"doi-asserted-by":"crossref","unstructured":"Wei, P., Zhang, W., Yang, H., Huang, S.: Combining neural networks and chaotic map to construct blind digital watermarking scheme. In: Proceeding of the Sixth International Conference on Intelligent Systems Design and Applications, ISDA (2006)","key":"14_CR4","DOI":"10.1109\/ISDA.2006.253858"},{"unstructured":"Lafferty, P., Ahmed, F.: Texture based steganalysis: results for color images. In: Mathematics of Data\/Image Coding. Compression and Encryption VII. The Catholic University of America, 620 Michigan Avenue, NE, Washington DC, (2006)","key":"14_CR5"},{"issue":"4","key":"14_CR6","doi-asserted-by":"publisher","first-page":"327","DOI":"10.1109\/TDSC.2006.53","volume":"3","author":"A. Ciaramella","year":"2006","unstructured":"Ciaramella, A., D\u2019Arco, P., De Santis, A., et al.: Neural Network Techniques for proac-tive passwords checking. IEEE Transactions on Dependable and Secure Computing\u00a03(4), 327\u2013339 (2006)","journal-title":"IEEE Transactions on Dependable and Secure Computing"},{"issue":"2","key":"14_CR7","doi-asserted-by":"publisher","first-page":"265","DOI":"10.1109\/TSMCC.2007.913901","volume":"38","author":"S. Wang","year":"2008","unstructured":"Wang, S., Wang, H.: Password authentication using Hopfield neural networks. IEEE Transactions on Systems Man and Cybernetics \u2013 Part C: Applications and Reviews\u00a038(2), 265\u2013268 (2008)","journal-title":"IEEE Transactions on Systems Man and Cybernetics \u2013 Part C: Applications and Reviews"},{"key":"14_CR8","doi-asserted-by":"publisher","first-page":"33","DOI":"10.1016\/j.forsciint.2006.06.046","volume":"162","author":"B.K.L. Fei","year":"2006","unstructured":"Fei, B.K.L., Eloff, J.H.P., Olivier, M.S., Venter, H.: The use of self-organizing maps of anomalous behaviour detection in a digital investigation. Forensic Science International\u00a0162, 33\u201337 (2006)","journal-title":"Forensic Science International"},{"key":"14_CR9","doi-asserted-by":"publisher","first-page":"49","DOI":"10.1016\/j.diin.2007.06.005","volume":"4S","author":"N.L. Beebe","year":"2007","unstructured":"Beebe, N.L., Clark, J.: Digital Forensic text string searching: Improving information retrieval effectiveness by thematically clustering search results. Digital Investigation\u00a04S, S49\u2013S54 (2007)","journal-title":"Digital Investigation"},{"key":"14_CR10","doi-asserted-by":"publisher","first-page":"1478","DOI":"10.1016\/j.eswa.2007.11.030","volume":"36","author":"H. Chen","year":"2009","unstructured":"Chen, H., Huang, S., Kuo, C.: Using the artificial neural networks to predict fraud litigation: Some empirical evidence from emerging markets. Expert Systems with Applications\u00a036, 1478\u20131484 (2009)","journal-title":"Expert Systems with Applications"},{"doi-asserted-by":"crossref","unstructured":"McClelland, J., Rumelhart, D.E.: And The PDP Research group, Parallel distributed processing: explorations in the microstructure of cognition. Foundations\u00a0I (1986A)","key":"14_CR11","DOI":"10.7551\/mitpress\/5236.001.0001"},{"doi-asserted-by":"crossref","unstructured":"McClelland, J., Rumelhart, D.E.: And The PDP Research group, Parallel distributed processing: explorations in the microstructure of cognition. Psychological and Biological Models\u00a0ll (1986B)","key":"14_CR12","DOI":"10.7551\/mitpress\/5237.001.0001"},{"unstructured":"Quinn, M.J.: Ethics for the Information Age, 2nd edn. Pearson International Edition (2006)","key":"14_CR13"},{"doi-asserted-by":"crossref","unstructured":"Floridi, L. (ed.): The Cambridge Handbook of Information and Computer Ethics. Cambridge University Press (2010)","key":"14_CR14","DOI":"10.1017\/CBO9780511845239"},{"volume-title":"The Handbook of Information and Computer Ethics","year":"2008","unstructured":"Himma, K.E., Tavani, H.T. (eds.): The Handbook of Information and Computer Ethics. Wiley, Hoboken (2008)","key":"14_CR15"},{"volume-title":"Information Technology and Moral Philosophy","year":"2008","unstructured":"Hoven, J.V.D., Weckert, J. (eds.): Information Technology and Moral Philosophy. Cambridge University Press, Cambridge (2008)","key":"14_CR16"},{"issue":"1","key":"14_CR17","doi-asserted-by":"publisher","first-page":"61","DOI":"10.1023\/A:1006223027879","volume":"23","author":"W.S. Brown","year":"2000","unstructured":"Brown, W.S.: Ontological Security, Existential Anxiety and Workplace Privacy. Journal of Business Ethics\u00a023(1), 61\u201365 (2000)","journal-title":"Journal of Business Ethics"},{"unstructured":"Conger, S., Landry, B.J.: The Intersection of Privacy and Security. Presented at the Association of Information Systems SIGSEC Workshop on Information Security & Privacy (WISP 2008), Paris (2008)","key":"14_CR18"},{"issue":"2","key":"14_CR19","doi-asserted-by":"publisher","first-page":"126","DOI":"10.1057\/ejis.2009.10","volume":"18","author":"L. Myyry","year":"2009","unstructured":"Myyry, L., Siponen, M., Pahnila, S., Vartiainen, T., Vance, A.: What levels of moral reasoning and values explain adherence to information security rules? An empirical study. European Journal of Information Systems\u00a018(2), 126\u2013139 (2009)","journal-title":"European Journal of Information Systems"},{"unstructured":"Lyon, D.: Surveillance society: Monitoring everyday life. Open University Press (2001)","key":"14_CR20"},{"issue":"2","key":"14_CR21","doi-asserted-by":"crossref","first-page":"210","DOI":"10.24908\/ss.v1i2.3354","volume":"1","author":"L.D. Introna","year":"2003","unstructured":"Introna, L.D.: Workplace Surveillance \u2018is\u2019 Unethical and Unfair [Opin-ion]. Surveillance & Society\u00a01(2), 210\u2013216 (2003)","journal-title":"Surveillance & Society"},{"issue":"2","key":"14_CR22","doi-asserted-by":"publisher","first-page":"167","DOI":"10.2190\/WR.13.2.e","volume":"13","author":"B.C. Stahl","year":"2008","unstructured":"Stahl, B.C.: Forensic Computing in the Workplace: Hegemony, Ideology, and the Perfect Panopticon? Journal of Workplace Rights\u00a013(2), 167\u2013183 (2008)","journal-title":"Journal of Workplace Rights"},{"unstructured":"Wiener, N.: The human use of human beings. Doubleday (1954)","key":"14_CR23"},{"key":"14_CR24","volume-title":"Computer Power and Human Reason","author":"J. Weizenbaum","year":"1976","unstructured":"Weizenbaum, J.: Computer Power and Human Reason. W. H. Freeman and Company, San Francisco (1976)"},{"doi-asserted-by":"crossref","unstructured":"Introna, L.D., Wood, D.: Picturing Algorithmic Surveillance: The Politics of Facial Recognition Systems. In: Norris, McCahill, Wood (eds.) Surveillance and Society CCTV Special, vol.\u00a02(2\/3) (2004)","key":"14_CR25","DOI":"10.24908\/ss.v2i2\/3.3373"},{"doi-asserted-by":"crossref","unstructured":"Peisert, S., Bishop, M.: Computer Forensics In Forensis (2007), \n                    http:\/\/www.cs.ucdavis.edu\/~peisert\/research\/2008-SADFE-ForensicsInForensis-PBM.pdf","key":"14_CR26","DOI":"10.1109\/SADFE.2008.18"},{"doi-asserted-by":"crossref","unstructured":"Jansen, W., Delaitre, A.: NIST, Mobile Forensic Reference Materials: A Methodology and Reifica-tion (2009)","key":"14_CR27","DOI":"10.6028\/NIST.IR.7617"},{"unstructured":"Hu, V.C., et al.: NIST, Interagency Report 7316 Access to Access Control Systems (2006), \n                    http:\/\/csrc.nist.gov\/publications\/nistir\/7316\/NISTIR-7316.pdf","key":"14_CR28"},{"unstructured":"NIST Homepage, \n                    http:\/\/www.necam.com\/IDS\/Validation\/","key":"14_CR29"},{"unstructured":"NEC Corporation of America (2011), NIST Validation, \n                    http:\/\/www.necam.com\/IDS\/Validation\/","key":"14_CR30"},{"unstructured":"Sommer, P.: Scientific, Technological and Expert Evidence in Law and Legal Proceedings. In: Artificial Intelligence and Forensic Computing Workshop (2009), \n                    http:\/\/www.ktn.qinetiq-tim.net\/content\/files\/groups\/aiforensics\/2009-04-02_PeterSommer.pdf","key":"14_CR31"},{"unstructured":"Robinson, et al: (RAND) Review of Data Protection Directive: Summary prepared for the Information Commisioner\u2019s (2009), \n                    http:\/\/www.ico.gov.uk\/upload\/documents\/library\/data_protection\/detailed_specialist_guides\/review_of_eu_dp_directive_summary.pdf","key":"14_CR32"},{"doi-asserted-by":"crossref","unstructured":"Delacroix, S.: You\u2019d better be committed: legal norms and normativity. American Journal of Jurisprudence (December 2009)","key":"14_CR33","DOI":"10.2139\/ssrn.1445455"},{"issue":"1","key":"14_CR34","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1093\/ajj\/52.1.1","volume":"52","author":"J. Gardner","year":"2007","unstructured":"Gardner, J.: Nearly natural law. American Journal of Jurisprudence\u00a052(1), 1\u201324 (2007)","journal-title":"American Journal of Jurisprudence"},{"unstructured":"Carley, K.: Dynamic Network Analysis in Counterterrorism Research. In: Proceedings of a Workshop on Statistics on Networks, Board of Mathematical Sciences (2007), \n                    http:\/\/books.nap.edu\/openbook.php?record_id=12083&page=169","key":"14_CR35"},{"unstructured":"Carley, K., Behrman, R.: Social Network Influences on Strategic Choices (2004), \n                    http:\/\/www.casos.cs.cmu.edu\/publications\/papers\/behrman_2004_socialnetworkinfluences.pdf","key":"14_CR36"},{"unstructured":"Hurwitz, E., Marwala, T.: State of the Art Review for Applying Computational Intelligence and Machine Learning Techniques to Portfolio Optimisation (2009)","key":"14_CR37"},{"key":"14_CR38","volume-title":"Foundations of Neural Networks, Fuzzy Systems, and Knowledge Engineering","author":"N. Kasabov","year":"1998","unstructured":"Kasabov, N.: Foundations of Neural Networks, Fuzzy Systems, and Knowledge Engineering. The MIT Press Cambridge, Massachusetts (1998)"},{"unstructured":"Kenneally, E.: Gatekeeping Out Of The Box: Open Source Software As A Mechanism To Assess Reliability For Digital Evidence. Virginia Journal of Law and Technology (Fall 2001), \n                    http:\/\/www.vjolt.net\/vol6\/issue3\/v6i3-a13-Kenneally.html","key":"14_CR39"},{"unstructured":"Krieger, C.: Neural Networks in Data Mining (1996), \n                    http:\/\/www.cs.uml.edu\/~ckrieger\/user\/Neural_Networks.pdf\n                   (retrieved on June 28, 2010)","key":"14_CR40"},{"key":"14_CR41","doi-asserted-by":"publisher","first-page":"89","DOI":"10.1007\/s12394-008-0005-z","volume":"1","author":"A. Cavoukian","year":"2008","unstructured":"Cavoukian, A.: Privacy in the clouds. Identity in Information Society\u00a0(1), 89\u2013108 (2008)","journal-title":"Identity in Information Society"},{"key":"14_CR42","doi-asserted-by":"publisher","first-page":"265","DOI":"10.1007\/s00146-007-0154-x","volume":"22","author":"S. Gill","year":"2008","unstructured":"Gill, S.: AI & Society\u00a022, 265\u2013270 (2008), \n                    http:\/\/people.na.infn.it\/~tamburrini\/pub\/Guest%20editorial.pdf","journal-title":"AI & Society"},{"key":"14_CR43","volume-title":"Neural Networks and Fuzzy Systems","author":"Kosko","year":"1992","unstructured":"Kosko, Bart: Neural Networks and Fuzzy Systems. Prentice Hall, New Jersey (1992)"},{"doi-asserted-by":"crossref","unstructured":"Carroll-Mayer, M., Fairweather, B., Carsten Stahl, B.: CCTV Identity Management and Implications for Criminal Justice. Some Considerations in Surveillance and Society\u00a05(1), 33\u201350 (2008) \n                    http:\/\/surveillance-and-society.org\/articles\/identity.pdf","key":"14_CR44","DOI":"10.24908\/ss.v5i1.3438"},{"unstructured":"Salmon, F., Stokes, J.: Algorithms Take Control of Wall Street. In: WIRED (January 2011)","key":"14_CR45"},{"unstructured":"Al-Zarouni, M.: Mobile Handset Forensic Evidence. A Challenge to Law Enforcement (2006)","key":"14_CR46"},{"doi-asserted-by":"crossref","unstructured":"Jansen, W., Ayers, R.: Guidelines on Cell Phone Forensics (2006), \n                    http:\/\/csrc.nist.gov\/publications\/drafts\/DraftSP800101","key":"14_CR47","DOI":"10.6028\/NIST.SP.800-101"},{"unstructured":"Shirk, E.: The Dangers of Do-It-Yourself Computer Forensics. In: Law Practice Today, The American Bar Association (2007)","key":"14_CR48"},{"unstructured":"Carroll, O. (2008) Computer Forensics: Digital Forensics Analysis and Methodology, US Attorneys\u2019 Bulletin (January 2007)","key":"14_CR49"},{"unstructured":"Vacca, J.: Computer Forensics: Computer Crime Scene Investigation, vol.\u00a01. Charles River Media (2005)","key":"14_CR50"},{"unstructured":"Bainbridge, D.: Intellectual Property. Pearson (2009)","key":"14_CR51"},{"doi-asserted-by":"crossref","unstructured":"Omenn, G.: Enhancing the Role of the Scientific Expert Witness\u00a0102(8) (August 1994)","key":"14_CR52","DOI":"10.1289\/ehp.94102674"},{"unstructured":"Bharadwaj, A.: Integrating Positivist and Interpretive Approaches to IS Research (2005)","key":"14_CR53"},{"key":"14_CR54","volume-title":"Perspectives on Politics","author":"B. Stephen","year":"2004","unstructured":"Stephen, B.: Review of The Diffusion of Military Technology and Ideas. In: Goldman, E., Eliason, L. (eds.) Perspectives on Politics, vol.\u00a03(3). Stanford University Press, Stanford (2004)"},{"unstructured":"Leveson, L.J.: Expert Evidence in Criminal Courts. The Problem (2010)","key":"14_CR55"}],"container-title":["Studies in Computational Intelligence","Computational Intelligence for Privacy and Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-25237-2_14","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,31]],"date-time":"2023-01-31T22:36:51Z","timestamp":1675204611000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-642-25237-2_14"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642252365","9783642252372"],"references-count":55,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-25237-2_14","relation":{},"ISSN":["1860-949X","1860-9503"],"issn-type":[{"type":"print","value":"1860-949X"},{"type":"electronic","value":"1860-9503"}],"subject":[],"published":{"date-parts":[[2012]]},"assertion":[{"value":"10 January 2012","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}