{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,3]],"date-time":"2026-04-03T10:09:24Z","timestamp":1775210964274,"version":"3.50.1"},"reference-count":24,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2006,7,25]],"date-time":"2006-07-25T00:00:00Z","timestamp":1153785600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["J Comput Virol"],"published-print":{"date-parts":[[2006,8]]},"DOI":"10.1007\/s11416-006-0015-z","type":"journal-article","created":{"date-parts":[[2006,7,24]],"date-time":"2006-07-24T09:15:53Z","timestamp":1153732553000},"page":"13-20","source":"Crossref","is-referenced-by-count":197,"title":["On the definition and classification of cybercrime"],"prefix":"10.1007","volume":"2","author":[{"given":"Sarah","family":"Gordon","sequence":"first","affiliation":[]},{"given":"Richard","family":"Ford","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2006,7,25]]},"reference":[{"issue":"1","key":"15_CR1","first-page":"1","volume":"7","author":"P. Bocij","year":"2005","unstructured":"Bocij P. (2005) Reactive stalking: a new perspective on victimisation. Br J Forensic Pract 7(1): 1\u20135","journal-title":"Br J Forensic Pract"},{"key":"15_CR2","unstructured":"Chawki, M.: Cybercrime in France: an overview. Computer Crime Research Center. December, 2005. Downloaded January 23rd 2006 from: http:\/\/www.crime-research.org\/articles\/cybercrime-in-france-overview\/ (2005)"},{"key":"15_CR3","unstructured":"Davis E., Wright H., Tremaine C.: Beyond phishing: pharming and crimeware attacks. Downloaded Jan 23rd 2006 from: http:\/\/www.privsecblog.com\/archives\/phishingpharming-53-beyond-phishing-pharming-and-crimeware-attacks-.html (2005)"},{"key":"15_CR4","unstructured":"DOJ: Cyberstalking: a new challenge for law enforcement and industry\" a report from the Attorney General to the Vice President (August 1999) Downloaded January 23rd 2006 from http:\/\/www.usdoj.gov\/criminal\/cybercrime\/cyberstalking.htm. (1999)"},{"key":"15_CR5","unstructured":"DOJ: H.R. 3402 Department of Justice Appropriations Authorization Act, fiscal years 2006 through 2009. Downloaded January 23rd from: http:\/\/www.gop.gov\/Committeecentral\/bills\/hr3402.asp (2005)"},{"key":"15_CR6","unstructured":"Gordon, S.: Exploring spyware and adware risk assessment. Presentation to the Computers and Security Institute Conference, Phoenix, Arizona (2005)"},{"key":"15_CR7","unstructured":"Gordon S. Changing the way the World thinks about computer security. Ph.D. Thesis, University of Middlesex, Department of Computer Science. London, UK (2005)"},{"key":"15_CR8","unstructured":"Gordon S., Ford, R.: Cyberterrorism? In: Cybterterrorism. The International Library of Essays in Terrorism, Alan O\u2019Day, Ashgate, ISBN 0 7546 2426 9 (2004)"},{"key":"15_CR9","doi-asserted-by":"crossref","unstructured":"Grodzinsky F.S., Tavani, H.T.: Some ethical reflections on cyberstalking. In: ACM SIGCAS Computers and Society, vol. 32 Issue 1 (2002)","DOI":"10.1145\/511134.511138"},{"key":"15_CR10","unstructured":"Helpguide: Domestic violence and abuse: types, signs, symptoms, Causes, and Effects. A project of the Rotary Club of Santa Monica, California and the Center for Healthy Again. Downloaded January 23rd 2006 from: http:\/\/www.helpguide.org\/mental\/domestic_violence_abuse_types_signs_causes_effects.htm (2005)"},{"key":"15_CR11","unstructured":"Informit: Protecting yourself from internet crime. Part II. Downloaded Jan 23rd 2006 from: http:\/\/www.informit.com\/ guides\/content.asp?g=security&seqNum=144 (2005)"},{"key":"15_CR12","unstructured":"ISTR: Symantec internet security threat report. Trends for July 04- December 04, Vol VII (2005)"},{"key":"15_CR13","unstructured":"Krone T.: High tech crime brief. Australian Institute of Criminology, Canberra, Australia, ISSN 1832\u20133413 (2005)"},{"key":"15_CR14","doi-asserted-by":"crossref","unstructured":"Kshetri, N.: The simple economics of cybercrimes, security & privacy magazine. In: IEEE, vol. 4, Issue 1, pp. 33\u201339 (2006)","DOI":"10.1109\/MSP.2006.27"},{"key":"15_CR15","volume-title":"The structure of scientific revolution","author":"T. Kuhn","year":"1992","unstructured":"Kuhn T. (1992) The structure of scientific revolution 2nd ed. University of Chicago Press, Chicago Illinois","edition":"2"},{"key":"15_CR16","volume-title":"Fighting computer crime: a new framework for protecting information ISBN 0471163783","author":"D. Parker","year":"1998","unstructured":"Parker D. (1998) Fighting computer crime: a new framework for protecting information ISBN 0471163783. Wiley, New York"},{"key":"15_CR17","unstructured":"PC Magazine: PC magazine encyclopedia. Downloaded Jan 23rd 2006 from: http:\/\/www.pcmag.com\/encyclopedia_term\/ 0,2542, t=crimeware&i=55434,00.asp (2005)"},{"key":"15_CR18","unstructured":"Studycrime: Online resource guide to law and crime. Downloaded Jan 23rd 2006 from: http:\/\/www.studycrime.com\/Crime\/Crimeware.php (2005)"},{"key":"15_CR19","unstructured":"United Nations: The united Nations manual on the prevention and control of computer related crime, 1995, supra note 41, paragraphs 20 to 73 in International Review of Criminal Policy, pp. 43\u201344 (1995)"},{"key":"15_CR20","unstructured":"Wikipedia: Common usage crimeware definition. Downloaded Jan 23rd 2006 from http:\/\/en.wikipedia.org\/wiki\/Crimeware (2006)"},{"key":"15_CR21","unstructured":"ZD: 2.8 Billion in E-commerce revenues lost to fraud in 2005. ZD Online., Downloaded Jan 23rd 2006 from: http:\/\/blogs.zdnet.com\/ITFacts\/?p=9471 (2005)"},{"key":"15_CR22","unstructured":"Zeviar-Geese: The state of the law on cyberjurisdiction and cybercrime on the internet.In: California Pacific School of Law, Gonzaga Journal of International Law, vol. 1 (1997\u20131998)"},{"key":"15_CR23","doi-asserted-by":"crossref","first-page":"894","DOI":"10.1520\/JFS13486J","volume":"38","author":"M.A. Zona","year":"1993","unstructured":"Zona M.A., Sharma K.K., Lane M.D. (1993) A comparative study of erotomanic and obsessional subjects in a forensic sample. J Forensic Sci 38, 894\u2013903","journal-title":"J Forensic Sci"},{"key":"15_CR24","doi-asserted-by":"crossref","unstructured":"Zona M.A., Palarea R.E., Lane J.C. (1998). Psychiatric diagnosis and the offender-victim typology of stalking. In Meloy, J.R. The Psychology of Stalking: Clinical and Forensic Perspectives. Academic, San Diego, California: (1998)","DOI":"10.1016\/B978-012490560-3\/50023-2"}],"container-title":["Journal in Computer Virology"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11416-006-0015-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11416-006-0015-z\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11416-006-0015-z","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,10]],"date-time":"2025-01-10T01:36:27Z","timestamp":1736472987000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11416-006-0015-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006,7,25]]},"references-count":24,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2006,8]]}},"alternative-id":["15"],"URL":"https:\/\/doi.org\/10.1007\/s11416-006-0015-z","relation":{},"ISSN":["1772-9890","1772-9904"],"issn-type":[{"value":"1772-9890","type":"print"},{"value":"1772-9904","type":"electronic"}],"subject":[],"published":{"date-parts":[[2006,7,25]]}}}