{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,4,2]],"date-time":"2022-04-02T17:54:45Z","timestamp":1648922085408},"reference-count":65,"publisher":"Elsevier BV","issue":"4","license":[{"start":{"date-parts":[[1997,1,1]],"date-time":"1997-01-01T00:00:00Z","timestamp":852076800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Computers &amp; Security"],"published-print":{"date-parts":[[1997,1]]},"DOI":"10.1016\/s0167-4048(97)90153-x","type":"journal-article","created":{"date-parts":[[2003,7,16]],"date-time":"2003-07-16T13:35:31Z","timestamp":1058362531000},"page":"307-315","source":"Crossref","is-referenced-by-count":0,"title":["Where have all the hackers gone?"],"prefix":"10.1016","volume":"16","author":[{"given":"Tom","family":"Mulhall","sequence":"first","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/S0167-4048(97)90153-X_BIB1","series-title":"Survey of Computer Fraud and Abuse","author":"Audit Commission for England and Wales","year":"1988"},{"key":"10.1016\/S0167-4048(97)90153-X_BIB2","series-title":"An analysis of Computer Abuse \u2014 \u2018Opportunity Makes a Thief\u2019","author":"Audit Commission for England and Wales","year":"1994"},{"key":"10.1016\/S0167-4048(97)90153-X_BIB3","first-page":"288","author":"Bevan","year":"1985"},{"key":"10.1016\/S0167-4048(97)90153-X_BIB4","series-title":"Computer Audit Update","first-page":"26","article-title":"The Embattled Internet","author":"Bequai","year":"1996"},{"key":"10.1016\/S0167-4048(97)90153-X_BIB5_1","series-title":"Blackstones Criminal Practice","first-page":"644","article-title":"Computer Misuse Act 1990","author":"Blackstone","year":"1995"},{"key":"10.1016\/S0167-4048(97)90153-X_BIB5_2","series-title":"Blackstones Criminal Practice","first-page":"2045","article-title":"Computer Misuse Act 1990","author":"Blackstone","year":"1995"},{"key":"10.1016\/S0167-4048(97)90153-X_BIB6","series-title":"Blackstones Criminal Practice","first-page":"391","article-title":"Criminal Damage Act 1971","author":"Blackstone","year":"1995"},{"key":"10.1016\/S0167-4048(97)90153-X_BIB7","series-title":"Blackstones Criminal Practice","first-page":"648","article-title":"Data Protection Act 1984","author":"Blackstone","year":"1995"},{"key":"10.1016\/S0167-4048(97)90153-X_BIB8","series-title":"Blackstones Criminal Practice","first-page":"268","article-title":"Theft Act 1968","author":"Blackstone","year":"1995"},{"key":"10.1016\/S0167-4048(97)90153-X_BIB9","series-title":"Blackstones Criminal Practice","first-page":"268","article-title":"Telecommunications Act 1984","author":"Blackstone","year":"1995"},{"key":"10.1016\/S0167-4048(97)90153-X_BIB10","series-title":"Hackers in the Mist","author":"Blake","year":"1994"},{"key":"10.1016\/S0167-4048(97)90153-X_BIB11","series-title":"Spectacular Computer Crimes","author":"Bloombecker","year":"1990"},{"key":"10.1016\/S0167-4048(97)90153-X_BIB12","series-title":"The Guardian","first-page":"8","article-title":"Hacker Who Shook a Secret Service","author":"Bowcott","year":"1988"},{"key":"10.1016\/S0167-4048(97)90153-X_BIB13","series-title":"Beating the System: hackers, phreakers, and electronic spies","author":"Bowcott","year":"1990"},{"key":"10.1016\/S0167-4048(97)90153-X_BIB14","series-title":"The Guardian","article-title":"Intellectual Joy Riders Jailed","author":"Campbell","year":"1993"},{"key":"10.1016\/S0167-4048(97)90153-X_BIB15","series-title":"Approaching Zero \u2014 data crime and the underworld","author":"Clough","year":"1994"},{"key":"10.1016\/S0167-4048(97)90153-X_BIB16","series-title":"Voicemail latest Target for Hackers","first-page":"19","year":"1993"},{"key":"10.1016\/S0167-4048(97)90153-X_BIB17","series-title":"Computer theft costs UK industry \u00a31 billion a year","first-page":"5","year":"1996"},{"key":"10.1016\/S0167-4048(97)90153-X_BIB18","series-title":"Legal Milestone in UK Computer Crime Law","first-page":"9","year":"1988"},{"key":"10.1016\/S0167-4048(97)90153-X_BIB19","series-title":"Hurd Pornographic Statement","first-page":"4","year":"1989"},{"key":"10.1016\/S0167-4048(97)90153-X_BIB20","first-page":"16","year":"1991"},{"key":"10.1016\/S0167-4048(97)90153-X_BIB21","first-page":"20","year":"1995"},{"key":"10.1016\/S0167-4048(97)90153-X_BIB22","series-title":"Operator of \u00a3500,000 Pirate Software Library Jailed","first-page":"6","year":"1996"},{"key":"10.1016\/S0167-4048(97)90153-X_BIB23","series-title":"Cyber Skiving Cost Millions","first-page":"5","year":"1996"},{"key":"10.1016\/S0167-4048(97)90153-X_BIB24","series-title":"Net Surfing is Corporate Time Waster","first-page":"3","year":"1996"},{"key":"10.1016\/S0167-4048(97)90153-X_BIB25","series-title":"Computer Misuse Executive Briefing","author":"Coopers","year":"1990"},{"key":"10.1016\/S0167-4048(97)90153-X_BIB26","series-title":"The Deterrence Factor","first-page":"3","year":"1990"},{"key":"10.1016\/S0167-4048(97)90153-X_BIB27","series-title":"Police Review","first-page":"8","article-title":"Met Targets Internet Pornography","author":"Crandon","year":"1996"},{"key":"10.1016\/S0167-4048(97)90153-X_BIB28","series-title":"Police Trap Star Wars Hacker","first-page":"19","year":"1988"},{"key":"10.1016\/S0167-4048(97)90153-X_BIB29","series-title":"Boy Sets Up Bogus Chatline","year":"1995"},{"key":"10.1016\/S0167-4048(97)90153-X_BIB30","author":"Data Protection Registrar","year":"1994"},{"key":"10.1016\/S0167-4048(97)90153-X_BIB31","series-title":"Black Barons Computer Virus Plague","year":"1995"},{"key":"10.1016\/S0167-4048(97)90153-X_BIB32","series-title":"Cyberpunk, outlaws and hackers on the computer frontier","author":"Hafner","year":"1993"},{"key":"10.1016\/S0167-4048(97)90153-X_BIB33","series-title":"The Guardian","first-page":"1","article-title":"Hole in the Wall Gang","author":"Harding","year":"1996"},{"key":"10.1016\/S0167-4048(97)90153-X_BIB34","series-title":"Press Release 21 April 1988","article-title":"Regina v Gold and another (respondent) on appeal from the court of appeal (criminal division)","author":"House of Lords","year":"1988"},{"key":"10.1016\/S0167-4048(97)90153-X_BIB35","series-title":"Copyright Designs and Patens Act 1988","author":"HMSO","year":"1990"},{"key":"10.1016\/S0167-4048(97)90153-X_BIB36","series-title":"Electronic Freedom Foundation Home Pages, Internet","article-title":"Comment from M Jenkins, Asst Director of US Secret Service on Internet","author":"Jenkins","year":"1996"},{"key":"10.1016\/S0167-4048(97)90153-X_BIB37","series-title":"Cybercops put byte on criminals","year":"1994"},{"key":"10.1016\/S0167-4048(97)90153-X_BIB64","unstructured":"Keltic, Phrost. (Undated) \u2018Getting Busted \u2014 Smoother Operation\u2019, in: the Internet."},{"key":"10.1016\/S0167-4048(97)90153-X_BIB38","series-title":"Computing","first-page":"7","article-title":"Bedworth Case Puts Law on Trial","author":"Lauchlan","year":"1993"},{"key":"10.1016\/S0167-4048(97)90153-X_BIB39","series-title":"Compsec 94 Conference Papers","first-page":"404","article-title":"The Cyberpunk Age","author":"Lindup","year":"1994"},{"key":"10.1016\/S0167-4048(97)90153-X_BIB40","series-title":"Network Security","first-page":"19","article-title":"Commercial Internet Use \u2014 a New Risk","author":"Lindup","year":"1994"},{"key":"10.1016\/S0167-4048(97)90153-X_BIB41","series-title":"Banking Technology","first-page":"2","article-title":"Attack of the Hackers","author":"Mc Kenzie","year":"1995"},{"key":"10.1016\/S0167-4048(97)90153-X_BIB42","series-title":"Computers & Security","first-page":"405","article-title":"Hackers Know the Adversary","author":"Menkus","year":"1991"},{"key":"10.1016\/S0167-4048(97)90153-X_BIB43","article-title":"Survey of IT Security Failures or Breaches","author":"National Computing Centre","year":"1991-1992"},{"key":"10.1016\/S0167-4048(97)90153-X_BIB44","series-title":"The Information Security Breaches Survey 1996","author":"National Computing Centre","year":"1996"},{"key":"10.1016\/S0167-4048(97)90153-X_BIB45","series-title":"The Lawman Cometh","year":"1994"},{"key":"10.1016\/S0167-4048(97)90153-X_BIB46","series-title":"PC Week","first-page":"6","article-title":"BSA Steps Up Fight Against Pirates","author":"Pettitt","year":"1996"},{"key":"10.1016\/S0167-4048(97)90153-X_BIB47","first-page":"6","article-title":"Special Units Must Target Computer Pornography","year":"1995","journal-title":"Police Review"},{"key":"10.1016\/S0167-4048(97)90153-X_BIB48","first-page":"31","article-title":"Hard Drive Against Chip Crime","author":"Prue","year":"1996"},{"key":"10.1016\/S0167-4048(97)90153-X_BIB49","series-title":"Network Security","first-page":"17","article-title":"What Motivates a Hacker?","author":"Schifreen","year":"1994"},{"key":"10.1016\/S0167-4048(97)90153-X_BIB50","series-title":"Telecomeuropa Security and Fraud Newsletter","first-page":"1","article-title":"Scotland Yard Victim of Phreakers","author":"Security and Fraud Newsletter","year":"1996"},{"key":"10.1016\/S0167-4048(97)90153-X_BIB51","series-title":"Hacked off at the Hackers","first-page":"32","year":"1996"},{"key":"10.1016\/S0167-4048(97)90153-X_BIB52","series-title":"An Investigation Into Telephone Fraud in the UK","author":"Siemens Business Communications","year":"1996"},{"key":"10.1016\/S0167-4048(97)90153-X_BIB53","series-title":"Viruses, Bugs, and Starwars","author":"Simons","year":"1989"},{"key":"10.1016\/S0167-4048(97)90153-X_BIB54","series-title":"The Observer","first-page":"7","article-title":"New Era Hackers Put Lives at Risk","author":"Smart","year":"1989"},{"key":"10.1016\/S0167-4048(97)90153-X_BIB55","series-title":"Commonsense Computer Security","author":"Smith","year":"1993"},{"key":"10.1016\/S0167-4048(97)90153-X_BIB56","series-title":"1993 Research on the Vulnerabilities of the PSN","author":"Stanford Research Institute (International)","year":"1994"},{"key":"10.1016\/S0167-4048(97)90153-X_BIB57","series-title":"comment downloaded from the Internet","author":"Stallman","year":"1996"},{"key":"10.1016\/S0167-4048(97)90153-X_BIB58","series-title":"Computers & Security","first-page":"309","article-title":"Computer Crime Investigation and investigators","author":"Stanley","year":"1986"},{"key":"10.1016\/S0167-4048(97)90153-X_BIB59","series-title":"The Hacker Crackdown, law and disorder on the electronic frontier","author":"Sterling","year":"1993"},{"key":"10.1016\/S0167-4048(97)90153-X_BIB60","series-title":"Computing","first-page":"26","article-title":"Can you Hack it","author":"Stockdyk","year":"1993"},{"key":"10.1016\/S0167-4048(97)90153-X_BIB61","series-title":"Communications of the ACM","first-page":"484","article-title":"Stalking the Wily Hacker","author":"Stoll","year":"1988"},{"key":"10.1016\/S0167-4048(97)90153-X_BIB62","series-title":"Twilight World of Computer Chaos Kid","first-page":"11","year":"1993"},{"key":"10.1016\/S0167-4048(97)90153-X_BIB63","series-title":"Computer Abuse Investigator","author":"Tantum","year":"1991"}],"container-title":["Computers &amp; Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S016740489790153X?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S016740489790153X?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2019,3,17]],"date-time":"2019-03-17T13:52:52Z","timestamp":1552830772000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S016740489790153X"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1997,1]]},"references-count":65,"journal-issue":{"issue":"4","published-print":{"date-parts":[[1997,1]]}},"alternative-id":["S016740489790153X"],"URL":"https:\/\/doi.org\/10.1016\/s0167-4048(97)90153-x","relation":{},"ISSN":["0167-4048"],"issn-type":[{"value":"0167-4048","type":"print"}],"subject":[],"published":{"date-parts":[[1997,1]]}}}