{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T17:25:32Z","timestamp":1729617932248,"version":"3.28.0"},"reference-count":16,"publisher":"IEEE","license":[{"start":{"date-parts":[[2021,9,15]],"date-time":"2021-09-15T00:00:00Z","timestamp":1631664000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2021,9,15]],"date-time":"2021-09-15T00:00:00Z","timestamp":1631664000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,9,15]],"date-time":"2021-09-15T00:00:00Z","timestamp":1631664000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,9,15]]},"DOI":"10.1109\/acit52158.2021.9548459","type":"proceedings-article","created":{"date-parts":[[2021,10,1]],"date-time":"2021-10-01T23:29:27Z","timestamp":1633130967000},"page":"520-525","source":"Crossref","is-referenced-by-count":0,"title":["Researching of Cybercrimes: Modern Trends, Special Knowledge and Peculiarities of Engaging a Specialist"],"prefix":"10.1109","author":[{"given":"Olga","family":"Karapetian","sequence":"first","affiliation":[]},{"given":"Liudmyla","family":"Budnyk","sequence":"additional","affiliation":[]},{"given":"Iryna","family":"Blazhei","sequence":"additional","affiliation":[]},{"given":"Yuri","family":"Pilyukov","sequence":"additional","affiliation":[]},{"given":"Vitalii","family":"Pysanets","sequence":"additional","affiliation":[]},{"given":"Nataliia","family":"Mazuryk","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"Convention on Cybercrime Ratification on the basis - 2824-IV","year":"2005","key":"ref10"},{"journal-title":"Single report on criminal offenses","year":"0","key":"ref11"},{"journal-title":"Report on the national risk assessment in 2019","year":"0","key":"ref12"},{"year":"0","key":"ref13"},{"journal-title":"Detection and investigation of cybercrime","year":"2020","author":"samoilenko","key":"ref14"},{"key":"ref15","doi-asserted-by":"crossref","first-page":"94","DOI":"10.37750\/2616-6798.2018.3(26).270641","article-title":"Global culture of cybersecurity in the system of cybercrime prevention in Ukraine","volume":"26","author":"dovgan","year":"2018","journal-title":"J Law and Information"},{"key":"ref16","first-page":"84","article-title":"The Role of Special Knowledge in Information Support of Crime Detection and Investigation","author":"lantukh","year":"2018","journal-title":"International Scientific and Practical Conference Activities of Law Enforcement Agencies in Modern Conditions"},{"article-title":"The future of cyber terrorism: where the physical and virtual worlds converge","year":"0","author":"collin","key":"ref4"},{"key":"ref3","first-page":"1","article-title":"Assessing the risks of cyber terrorism, cyber war and other cyber threats","author":"lewis","year":"2002","journal-title":"Center for Strategic and International Studies Washington DC"},{"journal-title":"Scene of the cybercrime Computer forensics handbook","year":"2002","author":"shinder","key":"ref6"},{"key":"ref5","first-page":"55","article-title":"Investigating and prosecuting cyber crime: forensic dependencies and barriers to justice","volume":"9","author":"brown","year":"2015","journal-title":"International Journal of Cyber Criminology"},{"key":"ref8","article-title":"The Hidden Costs of Cybercrime","author":"malecos smith","year":"2020","journal-title":"Center for Strategic and International Studies (CSIS)"},{"key":"ref7","article-title":"Definition of &#x201D;Cybercrime","author":"dennis","year":"2019","journal-title":"Encyclop&#x00E6;dia Britannica"},{"key":"ref2","article-title":"Organized crime and cybercrime: synergies, trends, and responses","volume":"10","author":"williams","year":"2021","journal-title":"Crime Research accessed Marc"},{"key":"ref1","article-title":"The emerging consensus on criminal conduct in cyberspace","volume":"10","author":"goodman","year":"2021","journal-title":"Archive org accessed Marc"},{"journal-title":"Criminal Code of Ukraine","article-title":"Law of Ukraine ? 2341-III","year":"2001","key":"ref9"}],"event":{"name":"2021 11th International Conference on Advanced Computer Information Technologies (ACIT)","start":{"date-parts":[[2021,9,15]]},"location":"Deggendorf, Germany","end":{"date-parts":[[2021,9,17]]}},"container-title":["2021 11th International Conference on Advanced Computer Information Technologies (ACIT)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9548321\/9548113\/09548459.pdf?arnumber=9548459","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,10]],"date-time":"2023-01-10T19:06:00Z","timestamp":1673377560000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9548459\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,9,15]]},"references-count":16,"URL":"https:\/\/doi.org\/10.1109\/acit52158.2021.9548459","relation":{},"subject":[],"published":{"date-parts":[[2021,9,15]]}}}