{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2023,2,20]],"date-time":"2023-02-20T06:03:09Z","timestamp":1676872989026},"reference-count":28,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2009,5,8]],"date-time":"2009-05-08T00:00:00Z","timestamp":1241740800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Inf Syst Front"],"published-print":{"date-parts":[[2010,7]]},"DOI":"10.1007\/s10796-009-9178-8","type":"journal-article","created":{"date-parts":[[2009,5,7]],"date-time":"2009-05-07T04:40:01Z","timestamp":1241671201000},"page":"267-275","source":"Crossref","is-referenced-by-count":7,"title":["Knowledge management technology for organized crime risk assessment"],"prefix":"10.1007","volume":"12","author":[{"given":"Petter","family":"Gottschalk","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2009,5,8]]},"reference":[{"key":"9178_CR1","first-page":"623","volume-title":"Handbook of Knowledge Management","author":"A Bennet","year":"2005a","unstructured":"Bennet, A., & Bennet, D. (2005a). Designing the knowledge organization of the future: The intelligent complex adaptive system. In C. W. Holsapple (Ed.), Handbook of Knowledge Management (Vol. 2, pp. 623\u2013638). Netherlands: Springer Science & Business Media."},{"key":"9178_CR2","first-page":"5","volume-title":"Handbook of Knowledge Management","author":"D Bennet","year":"2005b","unstructured":"Bennet, D., & Bennet, A. (2005b). The rise of the knowledge organization. In C. W. Holsapple (Ed.), Handbook of Knowledge Management (Vol. 1, pp. 5\u201320). Netherlands: Springer Science & Business Media."},{"issue":"1","key":"9178_CR3","doi-asserted-by":"crossref","first-page":"7","DOI":"10.1080\/10439460500399304","volume":"16","author":"JP Brodeur","year":"2006","unstructured":"Brodeur, J. P., & Dupont, B. (2006). Knowledge workers or 'knowledge' workers? Policing and Society, 16(1), 7\u201326. doi: 10.1080\/10439460500399304 .","journal-title":"Policing and Society"},{"issue":"4","key":"9178_CR4","doi-asserted-by":"crossref","first-page":"336","DOI":"10.1350\/ijps.2007.9.4.336","volume":"9","author":"SD Brown","year":"2007","unstructured":"Brown, S. D. (2007). The meaning of criminal intelligence. International Journal of Police Science & Management, 9(4), 336\u2013340. doi: 10.1350\/ijps.2007.9.4.336 .","journal-title":"International Journal of Police Science & Management"},{"key":"9178_CR5","doi-asserted-by":"crossref","first-page":"473","DOI":"10.1007\/s10796-008-9103-6","volume":"10","author":"L Carter","year":"2008","unstructured":"Carter, L., & Weerakkody, V. (2008). E-government adoption: a cultural comparison. Information Systems Frontiers, 10, 473\u2013482. doi: 10.1007\/s10796-008-9103-6 .","journal-title":"Information Systems Frontiers"},{"key":"9178_CR6","volume-title":"Guidance on the national intelligence model","author":"Centre","year":"2005b","unstructured":"Centre. (2005b). Guidance on the national intelligence model. Bedford: Centrex, National Centre for Policing Excellence, UK."},{"key":"9178_CR7","volume-title":"Practice advice on core investigative doctrine","author":"Centrex","year":"2005a","unstructured":"Centrex. (2005a). Practice advice on core investigative doctrine. Bedford: National Centre for Policing Excellence, UK."},{"issue":"4","key":"9178_CR8","doi-asserted-by":"crossref","first-page":"445","DOI":"10.1504\/EG.2008.019526","volume":"5","author":"J Davidson","year":"2008","unstructured":"Davidson, J., & Gottschalk, P. (2008). Digital forensics in law enforcement: the case of online victimization of children. Electronic Government - International Journal (Toronto, Ont.), 5(4), 445\u2013451.","journal-title":"Electronic Government - International Journal (Toronto, Ont.)"},{"key":"9178_CR9","unstructured":"ERA. (2008). Combating fraud and financial crime, Academy of European Law, Trier, Germany, www.era.int ."},{"key":"9178_CR10","unstructured":"FBI. (2008). Department of Justice launches new law enforcement strategy to combat increasing threat of international organized crime, Press Release April 23, Federal Bureau of Investigation, www.fbi.gov . \u201cOverview of the Law Enforcement Strategy to Combat International Organized Crime\u201d, U.S. Departement of Justice, Washington, D.C."},{"key":"9178_CR11","doi-asserted-by":"crossref","first-page":"3","DOI":"10.4135\/9781412976183.n1","volume-title":"Handbook of Transnational Crime and Justice","author":"D Felsen","year":"2005","unstructured":"Felsen, D., & Kalaitzidis, A. (2005). A historical overview of transnational crime. In P. Reichel (Ed.), Handbook of Transnational Crime and Justice (pp. 3\u201319). London: Sage."},{"issue":"1","key":"9178_CR12","doi-asserted-by":"crossref","first-page":"9","DOI":"10.2307\/25148666","volume":"29","author":"R Garud","year":"2005","unstructured":"Garud, R., & Kumaraswamy, A. (2005). Vicious and virtuous circles in the management of knowledge: the case of Infosys Technologies. MIS Quarterly, 29(1), 9\u201333.","journal-title":"MIS Quarterly"},{"key":"9178_CR13","doi-asserted-by":"crossref","DOI":"10.4018\/978-1-59904-307-4","volume-title":"Knowledge management systems in law enforcement - technologies and techniques","author":"P Gottschalk","year":"2007","unstructured":"Gottschalk, P. (2007). Knowledge management systems in law enforcement - technologies and techniques. Hershey: Idea Group Publishing."},{"issue":"5","key":"9178_CR14","doi-asserted-by":"crossref","first-page":"1320","DOI":"10.1037\/0021-9010.92.5.1320","volume":"92","author":"T Haerem","year":"2007","unstructured":"Haerem, T., & Rau, D. (2007). The influence of expertise and objective task complexity on perceived task complexity and performance. The Journal of Applied Psychology, 92(5), 1320\u20131331. doi: 10.1037\/0021-9010.92.5.1320 .","journal-title":"The Journal of Applied Psychology"},{"issue":"1","key":"9178_CR15","doi-asserted-by":"crossref","first-page":"63","DOI":"10.1093\/police\/pan008","volume":"2","author":"C Harfield","year":"2008","unstructured":"Harfield, C. (2008). Paradigms, pathologies, and practicalities - policing organized crime in England and Wales. Policing, 2(1), 63\u201373. doi: 10.1093\/police\/pan008 .","journal-title":"Policing"},{"key":"9178_CR16","unstructured":"Johnson, S. D., Birks, D. J., McLaughlin, L., Bowers, K. J., & Pease, K. (2007). Prospective crime mapping in operational context, Home Office, UK, Online Report 19\/07, www.homeoffice.gov.uk ."},{"issue":"1","key":"9178_CR17","doi-asserted-by":"crossref","first-page":"6","DOI":"10.1108\/13639510510580959","volume":"28","author":"TM Kelley","year":"2005","unstructured":"Kelley, T. M. (2005). Mental health and prospective police professionals. Policing: An International Journal of Police Strategies & Management, 28(1), 6\u201329. doi: 10.1108\/13639510510580959 .","journal-title":"Policing: An International Journal of Police Strategies & Management"},{"key":"9178_CR18","doi-asserted-by":"crossref","first-page":"499","DOI":"10.1007\/s10796-008-9110-7","volume":"10","author":"L Li","year":"2008","unstructured":"Li, L., Valerdi, R., & Warfield, J. N. (2008). Advances in enterprise information systems. Information Systems Frontiers, 10, 499\u2013501. doi: 10.1007\/s10796-008-9110-7 .","journal-title":"Information Systems Frontiers"},{"key":"9178_CR19","unstructured":"Lind, H., Hjelm, J., & Lind, M. (2007). Privacy surviving data retention in Europe? W3C Workshop on Languages for Privacy Policy Negotiation and Semantics-Driven Enforcement, www.w3.org ."},{"key":"9178_CR20","doi-asserted-by":"crossref","first-page":"483","DOI":"10.1007\/s10796-008-9102-7","volume":"10","author":"DA Mirchandani","year":"2008","unstructured":"Mirchandani, D. A., Johnson, J. H., & Joshi, K. (2008). Perspectives of citizens towards e-government in Thailand and Indonesia: a multigroup analysis. Information Systems Frontiers, 10, 483\u2013497. doi: 10.1007\/s10796-008-9102-7 .","journal-title":"Information Systems Frontiers"},{"key":"9178_CR21","unstructured":"Rassel, J. v., & Komarnicki, J. (2007). Gangs ranked \u2013 Crazy Dragons head list of Alberta crime threats, Calgary Herald, Saturday, July 21."},{"key":"9178_CR22","doi-asserted-by":"crossref","first-page":"321","DOI":"10.1007\/s10796-008-9076-5","volume":"10","author":"H Scheepers","year":"2008","unstructured":"Scheepers, H., & Scheepers, R. (2008). A process-focused decision framework for analyzing the business value potential of IT investments. Information Systems Frontiers, 10, 321\u2013330. doi: 10.1007\/s10796-008-9076-5 .","journal-title":"Information Systems Frontiers"},{"key":"9178_CR23","first-page":"51","volume-title":"Transformations of Policing","author":"J Sheptycki","year":"2007","unstructured":"Sheptycki, J. (2007). Police ethnography in the house of serious and organized crime. In A. Henry & D. J. Smith (Eds.), Transformations of Policing (pp. 51\u201377). Oxford: Ashgate."},{"key":"9178_CR24","doi-asserted-by":"crossref","first-page":"4295","DOI":"10.1016\/j.ins.2007.05.008","volume":"177","author":"KG Srinivasa","year":"2007","unstructured":"Srinivasa, K. G., Venugopal, K. R., & Patnaik, L. M. (2007). A self-adaptive migration modell genethic algorithm for data mining applications. Information Sciences, 177, 4295\u20134313. doi: 10.1016\/j.ins.2007.05.008 .","journal-title":"Information Sciences"},{"key":"9178_CR25","doi-asserted-by":"crossref","first-page":"519","DOI":"10.1007\/s10796-008-9107-2","volume":"10","author":"WA Tan","year":"2008","unstructured":"Tan, W. A., Jiang, C. Q., Li, L., & Lv, Z. (2008). Role-oriented process-driven enterprise cooperative work using the combined rule scheduling strategies. Information Systems Frontiers, 10, 519\u2013529. doi: 10.1007\/s10796-008-9107-2 .","journal-title":"Information Systems Frontiers"},{"issue":"1","key":"9178_CR26","doi-asserted-by":"crossref","first-page":"35","DOI":"10.2307\/25148667","volume":"29","author":"MM Wasko","year":"2005","unstructured":"Wasko, M. M., & Faraj, S. (2005). Why should i share? Examining social capital and knowledge contribution in electronic networks of practice. MIS Quarterly, 29(1), 35\u201357.","journal-title":"MIS Quarterly"},{"key":"9178_CR27","unstructured":"Weir, R., & Bangs, M. (2007). The use of Geographic Information Systems by crime analysts in England and Wales, Online Report 03\/07, Home Office, www.homeoffice.gov.uk ."},{"key":"9178_CR28","doi-asserted-by":"crossref","first-page":"473","DOI":"10.1016\/S0167-9236(03)00117-9","volume":"38","author":"JJ Xu","year":"2004","unstructured":"Xu, J. J., & Chen, H. (2004). Fighting organized crimes: using shortest-path algorithms to identify associations in criminal networks. Decision Support Systems, 38, 473\u2013487. doi: 10.1016\/S0167-9236(03)00117-9 .","journal-title":"Decision Support Systems"}],"container-title":["Information Systems Frontiers"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10796-009-9178-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10796-009-9178-8\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10796-009-9178-8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,31]],"date-time":"2019-05-31T00:36:12Z","timestamp":1559262972000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10796-009-9178-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,5,8]]},"references-count":28,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2010,7]]}},"alternative-id":["9178"],"URL":"https:\/\/doi.org\/10.1007\/s10796-009-9178-8","relation":{},"ISSN":["1387-3326","1572-9419"],"issn-type":[{"value":"1387-3326","type":"print"},{"value":"1572-9419","type":"electronic"}],"subject":[],"published":{"date-parts":[[2009,5,8]]}}}