{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,7]],"date-time":"2026-04-07T12:02:38Z","timestamp":1775563358116,"version":"3.50.1"},"reference-count":64,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/legal\/tdmrep-license"},{"start":{"date-parts":[[2026,3,1]],"date-time":"2026-03-01T00:00:00Z","timestamp":1772323200000},"content-version":"vor","delay-in-days":59,"URL":"http:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0\/"}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Procedia Computer Science"],"published-print":{"date-parts":[[2026]]},"DOI":"10.1016\/j.procs.2026.02.461","type":"journal-article","created":{"date-parts":[[2026,3,24]],"date-time":"2026-03-24T12:39:40Z","timestamp":1774355980000},"page":"254-263","update-policy":"https:\/\/doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":0,"special_numbering":"C","title":["Forensic psychiatric examinations of cyber criminals in Finland: court cases from the years 2015 to 2019"],"prefix":"10.1016","volume":"278","author":[{"given":"Mikko","family":"Luomala","sequence":"first","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/j.procs.2026.02.461_bib1","unstructured":"Wall, David. (2001) \u201dCybercrimes and the Internet\u201d, Crime and the Internet, Abingdon, UK, Taylor & Francis"},{"key":"10.1016\/j.procs.2026.02.461_bib2","unstructured":"Calcar, Giulio, Sund, Peter, and Tolvanen, Matti. \u201cCybercrime, Law and Technology in Finland and Beyond\u201d, Tampere, 2019"},{"issue":"1","key":"10.1016\/j.procs.2026.02.461_bib3","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1007\/s10611-016-9645-3","article-title":"\u201cAssessing the trends, scale and nature of economic cybercrimes: overview and Issues\u201d","volume":"67","author":"Levi","year":"2017","journal-title":"In Cybercrimes, Cybercriminals and Their Policing, in Crime, Law and Social Change"},{"key":"10.1016\/j.procs.2026.02.461_bib4","doi-asserted-by":"crossref","unstructured":"De Paoli, Stefano. (2018) \u201cThe engineer\u2013criminologist and \u201cthe novelty of cybercrime\u201d: a situated genealogical study of timesharing systems\u201d Internet Histories 2 (1\u20132): 20\u201337.","DOI":"10.1080\/24701475.2018.1448498"},{"key":"10.1016\/j.procs.2026.02.461_bib5","unstructured":"Wall, S David. (2007) \u201cCybercrime: The Transformation of Crime in the Information Age\u201d Polity"},{"issue":"1","key":"10.1016\/j.procs.2026.02.461_bib6","doi-asserted-by":"crossref","first-page":"9","DOI":"10.1007\/s44282-023-00007-7","article-title":"\u201cTrends of cybercrime from 2001 to 2021: cybersecurity action plan for Papua New Guinea\u201d","volume":"1","author":"Ige","year":"2023","journal-title":"Discover Global Society"},{"key":"10.1016\/j.procs.2026.02.461_bib7","first-page":"1","article-title":"\u201dVaarallisuuden arviointi\u2013sattuman summaako?\u201d","volume":"41","author":"Ahlgr\u00e9n-Rimpil\u00e4inen","year":"2020","journal-title":"Edilex"},{"issue":"19","key":"10.1016\/j.procs.2026.02.461_bib8","first-page":"2375","article-title":"\u201dVaarallisuuden arviointi- Miss\u00e4 tilanteissa ja miten v\u00e4kivaltaisuuden vaaraa arvioidaan Suomessa\u201d","volume":"123","author":"Eronen","year":"2007","journal-title":"L\u00e4\u00e4ketieteellinen Aikakauskirja Duodecim"},{"issue":"19","key":"10.1016\/j.procs.2026.02.461_bib9","first-page":"2391","article-title":"\u201dKriminaalipotilaille harkitaan velvoitteista avohoitoa\u201d","volume":"123","author":"Suontaka","year":"2007","journal-title":"L\u00e4\u00e4ketieteellinen Aikakauskirja Duodecim"},{"issue":"1","key":"10.1016\/j.procs.2026.02.461_bib10","doi-asserted-by":"crossref","first-page":"29","DOI":"10.1186\/s13033-020-00362-x","article-title":"\u201cForensic psychiatry in Finland: an overview of past, present and future\u201d","volume":"14","author":"Sepp\u00e4nen","year":"2020","journal-title":"International Journal of Mental Health Systems"},{"issue":"3","key":"10.1016\/j.procs.2026.02.461_bib11","doi-asserted-by":"crossref","first-page":"463","DOI":"10.1590\/0102-311x00036114","article-title":"\u201cCyberbullying and adolescent mental health: systematic review\u201d","volume":"31","author":"Bottino","year":"2015","journal-title":"Cadernos de Sa\u00fade P\u00fablica"},{"issue":"4","key":"10.1016\/j.procs.2026.02.461_bib12","doi-asserted-by":"crossref","first-page":"18","DOI":"10.1007\/s11920-021-01228-w","article-title":"\u201cIncreasing Cybercrime Since the Pandemic: Concerns for Psychiatry\u201d","volume":"23","author":"Monteith","year":"2021","journal-title":"Current Psychiatry Reports"},{"issue":"3","key":"10.1016\/j.procs.2026.02.461_bib13","doi-asserted-by":"crossref","first-page":"101","DOI":"10.1016\/S0899-3467(07)60142-6","article-title":"\u201cWriting narrative literature reviews for peer-reviewed journals: secrets of the trade\u201d","volume":"5","author":"Green","year":"2006","journal-title":"Journal of chiropractic medicine"},{"key":"10.1016\/j.procs.2026.02.461_bib14","unstructured":"Salminen, Ari. (2011) \u201dMik\u00e4 kirjallisuuskatsaus?\u202f: johdatus kirjallisuuskatsauksen tyyppeihin ja hallintotieteellisiin sovelluksiin\u201d Vaasa, University of Vaasa"},{"key":"10.1016\/j.procs.2026.02.461_bib15","unstructured":"Rosoff, S, Pontell, H, and Tillman, R. (2002) \u201cProfit without honor: White-collar crime and the looting of America.\u201d Upper Saddle River, NJ, Prentice Hall"},{"key":"10.1016\/j.procs.2026.02.461_bib16","unstructured":"Marcum, Catherine D, and Higgins, George E. (2019) \u201cCybercrime\u2019, in Handbook on Crime and Deviance\u201d, in Krohn Marvin D. and Hendrix Nicole and Penly Hall Gina and Lizotte Alan J. (eds) Handbook on Crime and Deviance, Springer International Publishing"},{"key":"10.1016\/j.procs.2026.02.461_bib17","doi-asserted-by":"crossref","unstructured":"Holt, Thomas J, Bossler, Adam M, and Seigfried-Spellar, Kathryn C. (2018) \u201cCybercrime and Digital Forensics.\u201d Abingdon, Oxon, New York, Routledge","DOI":"10.4324\/9781315296975"},{"key":"10.1016\/j.procs.2026.02.461_bib18","unstructured":"McGuire, Mike, and Dowling, Samantha. (2013) \u201cCyber crime: A review of the evidence - Chapter 3: Cyber-enabled crimes\u2013sexual offending against children- Home Office Research Report 75\u201d london, Home Office Research Report"},{"issue":"1","key":"10.1016\/j.procs.2026.02.461_bib19","doi-asserted-by":"crossref","first-page":"66","DOI":"10.1093\/police\/pax055","article-title":"\u201cCrime Drop or Police Recording Flop? On the Relationship between the Decrease of Offline Crime and the Increase of Online and Hybrid Crimes\u201d","volume":"13","author":"Caneppele","year":"2019","journal-title":"Policing: A Journal of Policy and Practice"},{"issue":"1","key":"10.1016\/j.procs.2026.02.461_bib20","doi-asserted-by":"crossref","first-page":"76","DOI":"10.1177\/00048658211003925","article-title":"\u201cEnhancing relationships between criminology and cybersecurity\u201d","volume":"54","author":"Dupont","year":"2021","journal-title":"Journal of Criminology"},{"key":"10.1016\/j.procs.2026.02.461_bib21","doi-asserted-by":"crossref","unstructured":"Alkaabi, Ali, Mohay, George, Mccullagh, Adrian, and Chantler, Nicholas. (2010) \u201cDealing with the Problem of Cybercrime\u201d, Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST","DOI":"10.1007\/978-3-642-19513-6_1"},{"key":"10.1016\/j.procs.2026.02.461_bib22","unstructured":"Peter N., Grabosky, Russell G., Smith, and Gillian, Dempsey. (2001) \u201cCrime in the Digital Age: Controlling Telecommunications and Cyberspace Illegalities.\u201d Cambridge, Cambridge University Press"},{"key":"10.1016\/j.procs.2026.02.461_bib23","unstructured":"Russell G., Smith, and Peter N., Grabosky. (1998) \u201cCrime in the Digital Age: Controlling Telecommunications and Cyberspace Illegalities.\u201d, Routledge"},{"key":"10.1016\/j.procs.2026.02.461_bib24","doi-asserted-by":"crossref","unstructured":"Farrell, Graham, Tilley, Nick, and Tseloni, Andromachi. (2014) \u201cWhy the Crime Drop?\u201d Crime and Justice 43 421\u2013490.","DOI":"10.1086\/678081"},{"issue":"1","key":"10.1016\/j.procs.2026.02.461_bib25","doi-asserted-by":"crossref","first-page":"12","DOI":"10.1186\/s40163-019-0107-y","article-title":"\u201cWhat about cyberspace (and cybercrime alongside it)? A reply to Farrell and Birks \u201cDid cybercrime cause the crime drop?\u201d\u201d","volume":"8","author":"Mir\u00f3-Llinares","year":"2019","journal-title":"Crime Science"},{"issue":"4","key":"10.1016\/j.procs.2026.02.461_bib26","first-page":"1","article-title":"\u201cFurther rejection of the cybercrime hypothesis\u201d","volume":"9","author":"Farrell","year":"2020","journal-title":"Crime Science"},{"key":"10.1016\/j.procs.2026.02.461_bib27","doi-asserted-by":"crossref","unstructured":"Holt, Thomas J, and Bossler, Adam M. (2016) \u201cTechnology and Violence\u201d, The Wiley Handbook on the Psychology of Violence, Chichester, UK, John Wiley & Sons Ltd","DOI":"10.1002\/9781118303092.ch30"},{"key":"10.1016\/j.procs.2026.02.461_bib28","unstructured":"Kivivuori, Janne Kustaa Antinpoika, Aaltonen, Mikko, N\u00e4si, Matti Johannes, Suonp\u00e4\u00e4, Karoliina Eeva-Maria, and Danielsson, Petri Mikael. (2018) \u201dKriminologia: Rikollisuus ja kontrolli muuttuvassa yhteiskunnassa.\u201d Suomi, Gaudeamus"},{"issue":"1","key":"10.1016\/j.procs.2026.02.461_bib29","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1108\/PIJPSM-07-2019-0115","article-title":"\u201cWillingness to report crime to the police: Traditional crime, cybercrime, and procedural justice\u201d","volume":"43","author":"Graham","year":"2019","journal-title":"Policing: An International Journal"},{"key":"10.1016\/j.procs.2026.02.461_bib30","unstructured":"Paasonen, Jyri, Aaltonen, Mikko, and Luomala, Mikko. (2021) \u201dKyberrikokset tuomioistuimissa\u2013tarkastelussa rikoslain 38 luvun mukaiset tieto- ja viestint\u00e4rikokset\u201d Defensor Legis 4 966\u2013987."},{"issue":"4","key":"10.1016\/j.procs.2026.02.461_bib31","doi-asserted-by":"crossref","first-page":"860","DOI":"10.1177\/08944393211011584","article-title":"\u201cThe Human Factor of Cybercrime\u201d","volume":"40","author":"Dupont","year":"2022","journal-title":"Social Science Computer Review"},{"issue":"5","key":"10.1016\/j.procs.2026.02.461_bib32","doi-asserted-by":"crossref","first-page":"695","DOI":"10.17150\/2500-4255.2019.13(5).695-706","article-title":"\u201cTheoretical Foundations of Comparative Criminology in a Global Dimension\u201d","volume":"13","author":"Me\u0161ko","year":"2019","journal-title":"Russian Journal of Criminology"},{"key":"10.1016\/j.procs.2026.02.461_bib33","unstructured":"Nickerson, Robert C, Varshney, Upkar, Muntermann, Jan, and Isaac, Henri. (2009) \u201cTaxonomy development in information systems: Developing a taxonomy of mobile applications\u201d ECIS Proceedings 388."},{"key":"10.1016\/j.procs.2026.02.461_bib34","unstructured":"Warren, W Esty. (2011) \u201cReexamining Mathematics\u2019, The language of mathematics"},{"key":"10.1016\/j.procs.2026.02.461_bib35","unstructured":"Malaty, George. (2003) \u201dMit\u00e4 matematiikka on?\u201d, in H\u00f6gman, E. (eds) Johdatus matematiikan rakenteeseen, Helsinki, Finnish National Agency for Education"},{"issue":"3","key":"10.1016\/j.procs.2026.02.461_bib36","doi-asserted-by":"crossref","first-page":"e2005075","DOI":"10.1371\/journal.pbio.2005075","article-title":"\u201cTaxonomy based on science is necessary for global conservation\u201d","volume":"16","author":"Thomson","year":"2018","journal-title":"PLOS Biology"},{"issue":"3","key":"10.1016\/j.procs.2026.02.461_bib37","doi-asserted-by":"crossref","first-page":"40","DOI":"10.1007\/s40656-020-00337-8","article-title":"\u201cThe history and philosophy of taxonomy as an information science\u201d","volume":"42","author":"Kendig","year":"2020","journal-title":"History and Philosophy of the Life Sciences"},{"key":"10.1016\/j.procs.2026.02.461_bib38","doi-asserted-by":"crossref","first-page":"608","DOI":"10.1136\/bmj.325.7365.608","article-title":"\u201cThe global response to mental illness\u201d","volume":"325","author":"Thornicroft","year":"2002","journal-title":"BMJ"},{"key":"10.1016\/j.procs.2026.02.461_bib39","unstructured":"Murray, Christopher J L, Lopez, Alan D, World Health Organization, World Bank, and Harvard School of Public Health. (1996) \u201cThe Global burden of disease\u202f: a comprehensive assessment of mortality and disability from diseases, injuries, and risk factors in 1990 and projected to 2020\u201d, Harvard University Press"},{"issue":"3","key":"10.1016\/j.procs.2026.02.461_bib40","doi-asserted-by":"crossref","first-page":"1201","DOI":"10.1016\/j.rasd.2011.01.007","article-title":"\u201cCyber bullying in ADHD and Asperger Syndrome populations\u201d","volume":"5","author":"Kowalski","year":"2011","journal-title":"Research in Autism Spectrum Disorders"},{"key":"10.1016\/j.procs.2026.02.461_bib41","doi-asserted-by":"crossref","unstructured":"Woods, Naomi. (2022) \u201cUsers\u2019 Psychopathologies: Impact on Cybercrime Vulnerabilities and Cybersecurity Behavior\u201d","DOI":"10.1007\/978-3-030-91293-2_5"},{"issue":"4","key":"10.1016\/j.procs.2026.02.461_bib42","doi-asserted-by":"crossref","first-page":"18","DOI":"10.1007\/s11920-021-01228-w","article-title":"\u201cIncreasing Cybercrime Since the Pandemic: Concerns for Psychiatry\u201d","volume":"23","author":"Monteith","year":"2021","journal-title":"Current Psychiatry Reports"},{"key":"10.1016\/j.procs.2026.02.461_bib43","unstructured":"Jadhav, Swapnali, Sonone, Swaroop, Singh Sankhla, Mahipal, Kumari, Mayuri, Kacker, Priyanka, and Kumar, Rajeev. (2022) \u201cPsychological Influences of Cyber Crimes on Human Mind and Behaviour\u201d The Indian Police Journal 69 31\u201342."},{"key":"10.1016\/j.procs.2026.02.461_bib44","doi-asserted-by":"crossref","unstructured":"Weulen Kranenbarg, Marleen, van Gelder, Jean-Louis, Barends, Ard J, and de Vries, Reinout E. (2023) \u201cIs there a cybercriminal personality? Comparing cyber offenders and offline offenders on HEXACO personality domains and their underlying facets\u201d Computers in Human Behavior 140 107576.","DOI":"10.1016\/j.chb.2022.107576"},{"key":"10.1016\/j.procs.2026.02.461_bib45","unstructured":"National Crime Agency. (2017) \u201cPathways into cyber crime.\u201d, National Crime Agency"},{"issue":"10","key":"10.1016\/j.procs.2026.02.461_bib46","doi-asserted-by":"crossref","first-page":"4159","DOI":"10.1007\/s10803-019-04119-5","article-title":"\u201cIs There a Relationship Between Cyber-Dependent Crime, Autistic-Like Traits and Autism?\u201d","volume":"49","author":"Payne","year":"2019","journal-title":"Journal of Autism and Developmental Disorders"},{"key":"10.1016\/j.procs.2026.02.461_bib47","doi-asserted-by":"crossref","unstructured":"Wagner, Jennifer, Bolgan, Samuela, and Rusconi, Elena. (2022) \u201cOn the relation between hacking and autism or autistic traits: A systematic review of the scientific evidence\u201d Cybersecurity and Cognitive Science, Elsevier","DOI":"10.1016\/B978-0-323-90570-1.00016-4"},{"issue":"4","key":"10.1016\/j.procs.2026.02.461_bib48","doi-asserted-by":"crossref","first-page":"1319","DOI":"10.1007\/s10803-021-05207-1","article-title":"\u201cRevisiting the Relationship between Cybercrime, Autistic Traits, and Autism\u201d","volume":"53","author":"Lim","year":"2023","journal-title":"Journal of Autism and Developmental Disorders"},{"key":"10.1016\/j.procs.2026.02.461_bib49","doi-asserted-by":"crossref","unstructured":"Brosnan, Mark. (2021) \u201cCyber-Dependent Crime, Autism, and Autistic-Like Traits\u201d Handbook of Autism Spectrum Disorder and the Law, Cham, Springer International Publishing","DOI":"10.1007\/978-3-030-70913-6_10"},{"key":"10.1016\/j.procs.2026.02.461_bib50","doi-asserted-by":"crossref","unstructured":"Payne, K, Maras, K L, Russell, A J, Brosnan, M J, and Mills, R. (2020) \u201cSelf-reported motivations for engaging or declining to engage in cyber-dependent offending and the role of autistic traits\u201d Research in Developmental Disabilities 104 103681.","DOI":"10.1016\/j.ridd.2020.103681"},{"issue":"1","key":"10.1016\/j.procs.2026.02.461_bib51","doi-asserted-by":"crossref","first-page":"3","DOI":"10.5817\/MUJLT2020-1-1","article-title":"\u201cCyber Extortion and Threats: Analysis of the United States Case Law\u201d","volume":"14","author":"Vasiu","year":"2020","journal-title":"Masaryk University Journal of Law and Technology"},{"issue":"1","key":"10.1016\/j.procs.2026.02.461_bib52","doi-asserted-by":"crossref","first-page":"15","DOI":"10.1017\/S003329170003957X","article-title":"\u201cScientific thought and the boundary of insanity and criminal responsibility\u201d","volume":"10","author":"Smith","year":"1980","journal-title":"Psychological Medicine"},{"issue":"6","key":"10.1016\/j.procs.2026.02.461_bib53","doi-asserted-by":"crossref","first-page":"191","DOI":"10.4103\/0019-5545.196832","article-title":"\u201cThe insanity defense: Related issues\u201d","volume":"58","author":"Asokan","year":"2016","journal-title":"Indian Journal of Psychiatry"},{"key":"10.1016\/j.procs.2026.02.461_bib54","doi-asserted-by":"crossref","unstructured":"Ajmal, Ali. (2023) \u201cInsanity, Insanity Defense, and the Elements of Crime: A Review\u201d Pakistan languages and humanities review 7 (III).","DOI":"10.47205\/plhr.2023(7-III)46"},{"key":"10.1016\/j.procs.2026.02.461_bib55","doi-asserted-by":"crossref","unstructured":"Malatesti, Luca, Jurjako, Marko, and Meynen, Gerben. (2020) \u201cThe insanity defence without mental illness? Some considerations\u201d International Journal of Law and Psychiatry 71 101571.","DOI":"10.1016\/j.ijlp.2020.101571"},{"key":"10.1016\/j.procs.2026.02.461_bib56","doi-asserted-by":"crossref","unstructured":"Vitacco, Michael J, Nelson Aguiar, Rebecca J, Porter Staats, Megan L, and Coleman, Savanna. (2024) \u201cNeuroscience and the insanity defense: Trying to put a round peg in a square hole\u201d Forensic Science International: Mind and Law 5 100131.","DOI":"10.1016\/j.fsiml.2024.100131"},{"key":"10.1016\/j.procs.2026.02.461_bib57","unstructured":"Wex Definitions Team. (2025) \u201ccriminal insanity\u201d, Cornell Law School, Legal Information Institute"},{"key":"10.1016\/j.procs.2026.02.461_bib58","doi-asserted-by":"crossref","unstructured":"Gr\u00f6ning, Linda, Haukvik, Unn K, Morse, Stephen J, and Radovic, Susanna. (2022) \u201cRemodelling criminal insanity: Exploring philosophical, legal, and medical premises of the medical model used in Norwegian law\u201d International Journal of Law and Psychiatry 81 101776.","DOI":"10.1016\/j.ijlp.2022.101776"},{"issue":"3","key":"10.1016\/j.procs.2026.02.461_bib59","doi-asserted-by":"crossref","first-page":"320","DOI":"10.1057\/palgrave.ejis.3000589","article-title":"\u201cDoing interpretive research\u201d","volume":"15","author":"Walsham","year":"2006","journal-title":"European Journal of Information Systems"},{"issue":"9","key":"10.1016\/j.procs.2026.02.461_bib60","doi-asserted-by":"crossref","first-page":"1277","DOI":"10.1177\/1049732305276687","article-title":"\u201cThree Approaches to Qualitative Content Analysis\u201d","volume":"15","author":"Hsieh","year":"2005","journal-title":"Qualitative Health Research"},{"key":"10.1016\/j.procs.2026.02.461_bib61","doi-asserted-by":"crossref","unstructured":"Luomala, Mikko, Naarmala, Jyri, and Tuomi, Ville. (2025) \u201cTechnology-Assisted Literature Reviews with Technology of Artificial Intelligence: Ethical and Credibility Challenges\u201d Procedia Computer Science 256 378\u2013387.","DOI":"10.1016\/j.procs.2025.02.133"},{"issue":"3","key":"10.1016\/j.procs.2026.02.461_bib62","doi-asserted-by":"crossref","first-page":"12","DOI":"10.1177\/160940690600500304","article-title":"\u201cGrounded Theory and Sensitizing Concepts\u201d","volume":"5","author":"Bowen","year":"2006","journal-title":"International Journal of Qualitative Methods"},{"key":"10.1016\/j.procs.2026.02.461_bib63","doi-asserted-by":"crossref","unstructured":"Charette, Yanick, and Koppen, M. (2016) \u201cA capture-recapture model to estimate the effects of extra-legal disparities on crime funnel selectivity and punishment avoidance\u201d Security Journal 29.","DOI":"10.1057\/sj.2015.30"},{"issue":"4","key":"10.1016\/j.procs.2026.02.461_bib64","doi-asserted-by":"crossref","first-page":"486","DOI":"10.1177\/1477370818773610","article-title":"\u201cDeterminants of reporting cybercrime: A comparison between identity theft, consumer fraud, and hacking\u201d","volume":"16","author":"van de Weijer","year":"2019","journal-title":"European Journal of Criminology"}],"container-title":["Procedia Computer Science"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S187705092600582X?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S187705092600582X?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2026,4,7]],"date-time":"2026-04-07T11:17:57Z","timestamp":1775560677000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S187705092600582X"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026]]},"references-count":64,"alternative-id":["S187705092600582X"],"URL":"https:\/\/doi.org\/10.1016\/j.procs.2026.02.461","relation":{},"ISSN":["1877-0509"],"issn-type":[{"value":"1877-0509","type":"print"}],"subject":[],"published":{"date-parts":[[2026]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"Forensic psychiatric examinations of cyber criminals in Finland: court cases from the years 2015 to 2019","name":"articletitle","label":"Article Title"},{"value":"Procedia Computer Science","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.procs.2026.02.461","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2026 The Author(s). Published by Elsevier B.V.","name":"copyright","label":"Copyright"}]}}