{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,10]],"date-time":"2026-02-10T01:58:18Z","timestamp":1770688698563,"version":"3.49.0"},"publisher-location":"Berlin, Heidelberg","reference-count":20,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783642353611","type":"print"},{"value":"9783642353628","type":"electronic"}],"license":[{"start":{"date-parts":[[2012,1,1]],"date-time":"2012-01-01T00:00:00Z","timestamp":1325376000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-35362-8_7","type":"book-chapter","created":{"date-parts":[[2012,11,30]],"date-time":"2012-11-30T03:55:47Z","timestamp":1354247747000},"page":"66-76","source":"Crossref","is-referenced-by-count":22,"title":["Detecting Illicit Drugs on Social Media Using Automated Social Media Intelligence Analysis (ASMIA)"],"prefix":"10.1007","author":[{"given":"Paul A.","family":"Watters","sequence":"first","affiliation":[]},{"given":"Nigel","family":"Phair","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"7_CR1","doi-asserted-by":"crossref","unstructured":"Stabek, A., Watters, P.A., Brown, S.: The Case for a Consistent Cyberscam Classification Framework (CCCF). In: Symposia and Workshops on Ubiquitous, Autonomic and Trusted Computing, Brisbane, pp. 525\u2013530 (2009)","DOI":"10.1109\/UIC-ATC.2009.77"},{"key":"7_CR2","unstructured":"Urbas, G., Choo, K.K.R.: Resource materials on technology-enabled crime. Technical and background paper No 28. Australian Institute of Criminology, Canberra, http:\/\/www.aic.gov.au\/publications\/current%20series\/tbp\/21-40\/tbp028.aspx"},{"key":"7_CR3","doi-asserted-by":"crossref","unstructured":"Stabek, A., Watters, P.A., Layton, R.: The Seven Scam Types: Mapping the Terrain of Cybercrime. In: Proceedings of th 2nd Cybercrime and Trustworthy Computing Workshop, Ballarat, pp. 41\u201351 (2010)","DOI":"10.1109\/CTC.2010.14"},{"key":"7_CR4","doi-asserted-by":"crossref","unstructured":"Tanner, A., Warner, G., Stern, H., Olechowsi, S.: Koobface: The evolution of the social botnet. In: Proceedings of the eCrime Researchers Summit (eCrime), pp. 1\u201310 (2010)","DOI":"10.1109\/ecrime.2010.5706694"},{"key":"7_CR5","unstructured":"Ormsby, E.: The drug\u2019s in the mail, The Age (2012), http:\/\/www.theage.com.au\/victoria\/the-drugs-in-the-mail-20120426-1xnth.html (retrieved)"},{"key":"7_CR6","doi-asserted-by":"crossref","unstructured":"Watters, P.A., McCombie, S., Layton, R., Pieprzyk, J.: Characterising and Predicting Cyber Attacks Using the Cyber Attacker Model Profile (CAMP). Journal of Money Laundering Control\u00a015(4) (2012)","DOI":"10.1108\/13685201211266015"},{"issue":"S2","key":"7_CR7","doi-asserted-by":"publisher","first-page":"615","DOI":"10.1086\/340507","volume":"44","author":"J. Miron","year":"2001","unstructured":"Miron, J.: Violencem, guns, and drugs: A cross-country analysis. Journal of Law and Economics\u00a044(S2), 615\u2013633 (2001)","journal-title":"Journal of Law and Economics"},{"key":"7_CR8","first-page":"5","volume":"10","author":"D. Bradbury","year":"2011","unstructured":"Bradbury, D.: Data mining with Linkedin. Computer Fraud & Security\u00a010, 5\u20138 (2011)","journal-title":"Computer Fraud & Security"},{"key":"7_CR9","unstructured":"Blake, A.: Case. Cambridge University Press (2001)"},{"issue":"1","key":"7_CR10","doi-asserted-by":"publisher","first-page":"91","DOI":"10.1016\/j.artint.2005.03.001","volume":"165","author":"Etzioni","year":"2005","unstructured":"Etzioni, Cafarella, M., Downey, D., Popescu, A., Shaked, T., Soderland, S., Weld, D., Yates, A.: Unsupervised named-entity extraction from the Web: An experimental study. Artificial Intelligence\u00a0165(1), 91\u2013134 (2005)","journal-title":"Artificial Intelligence"},{"issue":"6","key":"7_CR11","doi-asserted-by":"publisher","first-page":"799","DOI":"10.1016\/j.im.2004.08.005","volume":"42","author":"Y. Duan","year":"2005","unstructured":"Duan, Y., Edwards, J.S., Xu, M.X.: Web-based expert systems: benefits and challenges. Information & Management\u00a042(6), 799\u2013811 (2005)","journal-title":"Information & Management"},{"key":"7_CR12","unstructured":"DEEWR, Redi: A drug information resource for Australian school communities (2011), http:\/\/www.deewr.gov.au\/schooling\/programs\/redi\/Pages\/default.aspx (retrieved)"},{"issue":"1","key":"7_CR13","doi-asserted-by":"publisher","first-page":"77","DOI":"10.1076\/jqul.9.1.77.8479","volume":"9","author":"P.A. Watters","year":"2002","unstructured":"Watters, P.A.: Discriminating English word senses using cluster analysis. Journal of Quantitative Linguistics\u00a09(1), 77\u201386 (2002)","journal-title":"Journal of Quantitative Linguistics"},{"key":"7_CR14","unstructured":"Ho, S., Watters, P.A.: Structural and statistical approaches to filtering Internet pornography. In: Proceedings of the IEEE Conference on Systems, Man & Cybernetics, The Hague, Netherlands (2004)"},{"key":"7_CR15","doi-asserted-by":"crossref","unstructured":"Prichard, J., Foon, Y., Lai, Y., Kirkbride, P., Bruno, R., Ort, C., Carter, S., Hall, W., Gartner, C., Phone, K., Mueller, J.: Measuring drug use patterns in Queensland through wastewater analysis. Trends and Issues in Crime and Criminal Justice\u00a0(422), 1\u20138 (2012)","DOI":"10.52922\/ti250435"},{"key":"7_CR16","series-title":"Research in Public Policy Series","volume-title":"The market for amphetamine-type stimulants and their precursors in Oceania","author":"A. Schloenhardt","year":"2007","unstructured":"Schloenhardt, A.: The market for amphetamine-type stimulants and their precursors in Oceania. Research in Public Policy Series, vol.\u00a081. Australian Institute of Criminology, Canberra (2007)"},{"key":"7_CR17","unstructured":"Facebook. Facebook Advertising Guidelines, https:\/\/www.facebook.com\/ad_guidelines.php (retrieved)"},{"issue":"2","key":"7_CR18","doi-asserted-by":"publisher","first-page":"153","DOI":"10.1108\/10662249910265025","volume":"9","author":"P.A. Watters","year":"2009","unstructured":"Watters, P.A., Patel, M.: Semantic processing performance of Internet machine translation systems. Internet Research\u00a09(2), 153\u2013160 (2009)","journal-title":"Internet Research"},{"key":"7_CR19","unstructured":"Tran, H., Watters, P.A., Hitchens, M., Varadharajan, V.: Trust and authorization in the grid: a recommendation model. In: Proceedings of International Conference on Pervasive Services, pp. 433\u2013436 (2005)"},{"key":"7_CR20","doi-asserted-by":"publisher","first-page":"264","DOI":"10.1007\/s002130050565","volume":"136","author":"P.A. Watters","year":"1997","unstructured":"Watters, P.A., Martin, F., Schreter, Z.: Quadratic dose-response relationship between caffeine (1, 3, 7-trimethylxanthine) and EEG correlation dimension. Psychopharmacology\u00a0136, 264\u2013271 (1997)","journal-title":"Psychopharmacology"}],"container-title":["Lecture Notes in Computer Science","Cyberspace Safety and Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-35362-8_7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,5,2]],"date-time":"2024-05-02T06:58:26Z","timestamp":1714633106000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-35362-8_7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642353611","9783642353628"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-35362-8_7","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2012]]}}}