{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,5]],"date-time":"2025-11-05T11:02:18Z","timestamp":1762340538650},"publisher-location":"Berlin, Heidelberg","reference-count":28,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642304279"},{"type":"electronic","value":"9783642304286"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-30428-6_3","type":"book-chapter","created":{"date-parts":[[2012,5,23]],"date-time":"2012-05-23T12:03:15Z","timestamp":1337774595000},"page":"36-44","source":"Crossref","is-referenced-by-count":2,"title":["CybercrimeIR \u2013 A Technological Perspective to Fight Cybercrime"],"prefix":"10.1007","author":[{"given":"Weiping","family":"Chang","sequence":"first","affiliation":[]},{"given":"Yungchang","family":"Ku","sequence":"additional","affiliation":[]},{"given":"Sinru","family":"Wu","sequence":"additional","affiliation":[]},{"given":"Chaochang","family":"Chiu","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"3_CR1","doi-asserted-by":"publisher","first-page":"259","DOI":"10.1023\/A:1008332132218","volume":"34","author":"D.L. Speer","year":"2000","unstructured":"Speer, D.L.: Redefining borders: The challenges of cybercrime. Crime, Law and Social Change\u00a034, 259\u2013273 (2000)","journal-title":"Crime, Law and Social Change"},{"key":"3_CR2","doi-asserted-by":"publisher","first-page":"669","DOI":"10.1016\/j.dss.2004.06.006","volume":"41","author":"W. Chung","year":"2006","unstructured":"Chung, W., Chen, H., Chang, W., Chou, S.: Fighting cybercrime: a review and the Taiwan experience. Decision Support Systems\u00a041, 669\u2013682 (2006)","journal-title":"Decision Support Systems"},{"key":"3_CR3","series-title":"LNCS","doi-asserted-by":"publisher","first-page":"32","DOI":"10.1007\/978-3-540-69304-8_4","volume-title":"Intelligence and Security Informatics","author":"S. Chou","year":"2008","unstructured":"Chou, S., Chang, W.: CyberIR \u2013 A Technological Approach to Fight Cybercrime. In: Yang, C.C., Chen, H., Chau, M., Chang, K., Lang, S.-D., Chen, P.S., Hsieh, R., Zeng, D., Wang, F.-Y., Carley, K.M., Mao, W., Zhan, J. (eds.) ISI Workshops 2008. LNCS, vol.\u00a05075, pp. 32\u201343. Springer, Heidelberg (2008)"},{"key":"3_CR4","doi-asserted-by":"publisher","first-page":"20","DOI":"10.1016\/S1754-4548(11)70021-3","volume":"8","author":"L. Moraski","year":"2011","unstructured":"Moraski, L.: Cybercrime Knows No Borders. Infosecurity\u00a08, 20\u201323 (2011)","journal-title":"Infosecurity"},{"key":"3_CR5","first-page":"674","volume":"19","author":"B. Hancock","year":"2000","unstructured":"Hancock, B.: US Department of Defense Prepares Cybercrime Database. Computers & Security\u00a019, 674 (2000)","journal-title":"Computers & Security"},{"key":"3_CR6","unstructured":"EUROPOL: High Tech Crimes with the EU: Threat Assessment 2007 (2007)"},{"key":"3_CR7","unstructured":"Shinder, D.: What makes cybercrime laws so difficult to enforce. IT Security (2011)"},{"key":"3_CR8","doi-asserted-by":"publisher","first-page":"528","DOI":"10.1016\/j.clsr.2009.09.005","volume":"25","author":"P. Hunton","year":"2009","unstructured":"Hunton, P.: The growing phenomenon of crime and the internet: A cybercrime execution and analysis model. Computer Law & Security Review\u00a025, 528\u2013535 (2009)","journal-title":"Computer Law & Security Review"},{"key":"3_CR9","unstructured":"Williams, L.Y.: Catch Me if You Can: A Taxonomically Structured Approach to Cybercrime. The Forum on Public Policy (2008)"},{"key":"3_CR10","series-title":"LNCS","doi-asserted-by":"publisher","first-page":"28","DOI":"10.1007\/978-3-642-13601-6_4","volume-title":"Intelligence and Security Informatics","author":"W. Chang","year":"2010","unstructured":"Chang, W.: Fighting Cybercrime: A KM Perspective. In: Chen, H., Chau, M., Li, S.-H., Urs, S., Srinivasa, S., Wang, G.A. (eds.) PAISI 2010. LNCS, vol.\u00a06122, pp. 28\u201330. Springer, Heidelberg (2010)"},{"key":"3_CR11","series-title":"LNICST","doi-asserted-by":"publisher","first-page":"160","DOI":"10.1007\/978-3-642-02312-5_18","volume-title":"Forensics in Telecommunications, Information and Multimedia","author":"H. Park","year":"2009","unstructured":"Park, H., Cho, S., Kwon, H.-C.: Cyber Forensics Ontology for Cyber Criminal Investigation. In: Sorell, M. (ed.) e-Forensics 2009. LNICST, vol.\u00a08, pp. 160\u2013165. Springer, Heidelberg (2009)"},{"key":"3_CR12","volume-title":"Automatic information organization and retrieval","author":"G. Salton","year":"1968","unstructured":"Salton, G.: Automatic information organization and retrieval. McGraw-Hill, New York (1968)"},{"key":"3_CR13","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/505282.505283","volume":"34","author":"F. Sebastiani","year":"2002","unstructured":"Sebastiani, F.: Machine learning in automated text categorization. ACM Computing Surveys\u00a034, 1\u201347 (2002)","journal-title":"ACM Computing Surveys"},{"key":"3_CR14","doi-asserted-by":"publisher","first-page":"842","DOI":"10.1016\/j.ejor.2004.09.010","volume":"171","author":"R. Meiri","year":"2006","unstructured":"Meiri, R., Zahavi, J.: Using simulated annealing to optimize the feature selection problem in marketing applications. European Journal of Operational Research\u00a0171, 842\u2013858 (2006)","journal-title":"European Journal of Operational Research"},{"key":"3_CR15","doi-asserted-by":"crossref","unstructured":"Abbasi, A., Chen, H., Salem, A.: Sentiment analysis in multiple languages: Feature selection for opinion classification in Web forums. ACM Transactions on Information Systems\u00a026 (2008)","DOI":"10.1145\/1361684.1361685"},{"key":"3_CR16","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/1462198.1462204","volume":"27","author":"R.P. Schumaker","year":"2009","unstructured":"Schumaker, R.P., Chen, H.: Textual analysis of stock market prediction using breaking financial news: The AZFin text system. ACM Trans. Inf. Syst.\u00a027, 1\u201319 (2009)","journal-title":"ACM Trans. Inf. Syst."},{"key":"3_CR17","doi-asserted-by":"publisher","first-page":"508","DOI":"10.1016\/j.dss.2009.04.016","volume":"47","author":"Y. Zhang","year":"2009","unstructured":"Zhang, Y., Dang, Y., Chen, H., Thurmond, M., Larson, C.: Automatic online news monitoring and classification for syndromic surveillance. Decision Support Systems\u00a047, 508\u2013517 (2009)","journal-title":"Decision Support Systems"},{"key":"3_CR18","doi-asserted-by":"publisher","first-page":"538","DOI":"10.1002\/asi.21001","volume":"60","author":"E. Stamatatos","year":"2009","unstructured":"Stamatatos, E.: A Survey of Modern Authorship Attribution Methods. Journal of the American Society for Information Science and Technology\u00a060, 538\u2013556 (2009)","journal-title":"Journal of the American Society for Information Science and Technology"},{"key":"3_CR19","doi-asserted-by":"publisher","first-page":"2474","DOI":"10.1002\/asi.21206","volume":"60","author":"C.L. Zhang","year":"2009","unstructured":"Zhang, C.L., Zeng, D., Li, J.X., Wang, F.Y., Zuo, W.L.: Sentiment Analysis of Chinese Documents: From Sentence to Document Level. Journal of the American Society for Information Science and Technology\u00a060, 2474\u20132487 (2009)","journal-title":"Journal of the American Society for Information Science and Technology"},{"key":"3_CR20","doi-asserted-by":"publisher","first-page":"352","DOI":"10.1002\/(SICI)1097-4571(2000)51:4<352::AID-ASI5>3.0.CO;2-8","volume":"51","author":"K.M. Tolle","year":"2000","unstructured":"Tolle, K.M., Chen, H.C.: Comparing noun phrasing techniques for use with medical digital library tools. Journal of the American Society for Information Science\u00a051, 352\u2013370 (2000)","journal-title":"Journal of the American Society for Information Science"},{"key":"3_CR21","doi-asserted-by":"publisher","first-page":"131","DOI":"10.1016\/S1088-467X(97)00008-5","volume":"1","author":"M. Dash","year":"1997","unstructured":"Dash, M., Liu, H.: Feature selection for classification. Intelligent Data Analysis\u00a01, 131\u2013156 (1997)","journal-title":"Intelligent Data Analysis"},{"key":"3_CR22","doi-asserted-by":"publisher","first-page":"6843","DOI":"10.1016\/j.eswa.2008.08.022","volume":"36","author":"M.H. Aghdam","year":"2009","unstructured":"Aghdam, M.H., Ghasem-Aghaee, N., Basiri, M.E.: Text feature selection using ant colony optimization. Expert Systems with Applications\u00a036, 6843\u20136853 (2009)","journal-title":"Expert Systems with Applications"},{"key":"3_CR23","unstructured":"Yang, Y., Pedersen, J.O.: A Comparative Study on Feature Selection in Text Categorization. In: Proceedings of the Fourteenth International Conference on Machine Learning, pp. 412\u2013420. Morgan Kaufmann Publishers Inc. (1997)"},{"key":"3_CR24","first-page":"1289","volume":"3","author":"G. Forman","year":"2003","unstructured":"Forman, G.: An extensive empirical study of feature selection metrics for text classification. The Journal of Machine Learning Research\u00a03, 1289\u20131305 (2003)","journal-title":"The Journal of Machine Learning Research"},{"key":"3_CR25","doi-asserted-by":"publisher","first-page":"1375","DOI":"10.1287\/mnsc.1070.0704","volume":"53","author":"S.R. Das","year":"2007","unstructured":"Das, S.R., Chen, M.Y.: Yahoo! for Amazon: Sentiment extraction from small talk on the web. Management Science\u00a053, 1375\u20131388 (2007)","journal-title":"Management Science"},{"key":"3_CR26","doi-asserted-by":"publisher","first-page":"378","DOI":"10.1002\/asi.20316","volume":"57","author":"R. Zheng","year":"2006","unstructured":"Zheng, R., Li, J., Chen, H., Huang, Z.: A framework for authorship identification of online messages: Writing-style features and classification techniques. Journal of the American Society for Information Science and Technology\u00a057, 378\u2013393 (2006)","journal-title":"Journal of the American Society for Information Science and Technology"},{"key":"3_CR27","unstructured":"Vapnik, V.: Statistical learning theory. Wiley (1998)"},{"key":"3_CR28","doi-asserted-by":"crossref","first-page":"67","DOI":"10.1109\/MIS.2005.81","volume":"20","author":"A. Abbasi","year":"2005","unstructured":"Abbasi, A., Chen, H.: Applying authorship analysis to extremist-group Web forum messages. IEEE Intelligent Systems\u00a020, 67\u201375 (2005)","journal-title":"IEEE Intelligent Systems"}],"container-title":["Lecture Notes in Computer Science","Intelligence and Security Informatics"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-30428-6_3.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,4]],"date-time":"2021-05-04T11:39:14Z","timestamp":1620128354000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-30428-6_3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642304279","9783642304286"],"references-count":28,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-30428-6_3","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2012]]}}}