{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,3]],"date-time":"2026-03-03T13:35:05Z","timestamp":1772544905916,"version":"3.50.1"},"reference-count":14,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[1992,1,1]],"date-time":"1992-01-01T00:00:00Z","timestamp":694224000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Artif Intell Rev"],"published-print":{"date-parts":[[1992]]},"DOI":"10.1007\/bf00150234","type":"journal-article","created":{"date-parts":[[2004,11,6]],"date-time":"2004-11-06T00:43:31Z","timestamp":1099701811000},"page":"203-215","source":"Crossref","is-referenced-by-count":7,"title":["A forensic methodology for countering computer crime"],"prefix":"10.1007","volume":"6","author":[{"given":"P. A.","family":"Collier","sequence":"first","affiliation":[]},{"given":"B. J.","family":"Spaul","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"CR1","unstructured":"Albrecht, W. S., Howe, K. R. and Romney, M. B. (1984) Deterring Fraud: The Internal Auditor's Perspective, The Institute of Internal Auditors Research Foundation."},{"key":"CR2","volume-title":"Survey of Computer Fraud and Abuse","author":"Audit Commission","year":"1990","unstructured":"Audit Commission (1990) Survey of Computer Fraud and Abuse, HMSO, London."},{"key":"CR3","volume-title":"Beating the System","author":"O. Bowcott","year":"1990","unstructured":"Bowcott, O. and Hamilton, S. (1990) Beating the System, Bloomsbury, London."},{"key":"CR4","unstructured":"Comer, M. J. (1985) Corporate Fraud (2nd ed.), McGraw-Hill."},{"key":"CR5","unstructured":"Council of Europe Committee of Ministers (1989) Recommendation No. R (89) 9 of the Committee f Ministers to Member States on Computer-related Crime, Council of Europe."},{"key":"CR6","unstructured":"Cornwall, H. (1988) Hacking away at computer law reform, New Law Journal 30 (September)."},{"key":"CR7","unstructured":"Hoffer, J. A. and Straub, D. W. Jr. (1989) The 9 to 5 underground: Are you policing computer crimes? Sloan Management Review (Summer)."},{"key":"CR8","doi-asserted-by":"crossref","unstructured":"Hollinger, R. C. and Lanza-Kaduce, L. (1988) The process of criminalisation: The case of computer crime laws, Criminology 26 (1).","DOI":"10.1111\/j.1745-9125.1988.tb00834.x"},{"key":"CR9","unstructured":"Law Commission (1989) Computer Misuse (Law Com. No. 186 Cm 819), HMSO."},{"key":"CR10","volume-title":"Jurisdiction over Offenses of Fraud and Dishonesty with a Foreign Element","author":"Law Commission","year":"1990","unstructured":"Law Commission (1990) Jurisdiction over Offenses of Fraud and Dishonesty with a Foreign Element (Law Com. 180 Cm 801), HMSO, London."},{"key":"CR11","unstructured":"Nasuti, F. W. (1986) Investigating computer crime, Journal of Accounting and EDP (Fall), 13?19."},{"key":"CR12","doi-asserted-by":"crossref","first-page":"309","DOI":"10.1016\/0167-4048(86)90051-9","volume":"5","author":"P. M. Stanley","year":"1986","unstructured":"Stanley, P. M. (1986) Computer crime investigation and investigators, Computers and Security 5, 309?313.","journal-title":"Computers and Security"},{"key":"CR13","volume-title":"Computer Law","author":"C. Tapper","year":"1990","unstructured":"Tapper, C. (1990) Computer Law, Longmans, London."},{"key":"CR14","volume-title":"EDI and the Law","author":"I. Walden","year":"1989","unstructured":"Walden, I. (1989) EDI and the Law, Addison Wesley, New York."}],"container-title":["Artificial Intelligence Review"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/BF00150234.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/BF00150234\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/BF00150234","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,4,3]],"date-time":"2019-04-03T11:02:26Z","timestamp":1554289346000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/BF00150234"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1992]]},"references-count":14,"journal-issue":{"issue":"2","published-print":{"date-parts":[[1992]]}},"alternative-id":["BF00150234"],"URL":"https:\/\/doi.org\/10.1007\/bf00150234","relation":{},"ISSN":["0269-2821","1573-7462"],"issn-type":[{"value":"0269-2821","type":"print"},{"value":"1573-7462","type":"electronic"}],"subject":[],"published":{"date-parts":[[1992]]}}}