{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,24]],"date-time":"2025-10-24T17:20:27Z","timestamp":1761326427086,"version":"build-2065373602"},"reference-count":9,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,10,19]],"date-time":"2023-10-19T00:00:00Z","timestamp":1697673600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,10,19]],"date-time":"2023-10-19T00:00:00Z","timestamp":1697673600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,10,19]]},"DOI":"10.1109\/csit61576.2023.10324030","type":"proceedings-article","created":{"date-parts":[[2023,11,27]],"date-time":"2023-11-27T14:36:06Z","timestamp":1701095766000},"page":"1-4","source":"Crossref","is-referenced-by-count":2,"title":["Ontological Analysis of the Digital Crime Conceptual Model"],"prefix":"10.1109","author":[{"given":"Lidiia","family":"Vlasenko","sequence":"first","affiliation":[{"name":"State University of Trade and Economics,dept. of Software Engineering and Cyber Security,Kyiv,Ukraine"}]},{"given":"Nataliia","family":"Lutska","sequence":"additional","affiliation":[{"name":"National University of Food Technologies,dept. of Automation and Computer Technologies of Control Systems,Kyiv,Ukraine"}]},{"given":"Nataliia","family":"Zaiets","sequence":"additional","affiliation":[{"name":"National University of Life and Environmental Sciences of Ukraine,dept. of Automation and Robotic Systems,Kyiv,Ukraine"}]},{"given":"Vitaliy","family":"Lysenko","sequence":"additional","affiliation":[{"name":"National University of Life and Environmental Sciences of Ukraine,dept. of Automation and Robotic Systems,Kyiv,Ukraine"}]}],"member":"263","reference":[{"volume-title":"Report 2022. From the Office of the Prosecutor General","key":"ref1"},{"issue":"321","key":"ref2","first-page":"1","article-title":"On the philosophical foundations of conceptual models","volume":"31","author":"Guarino","year":"2020","journal-title":"Information Modelling and Knowledge Bases"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.3390\/asi5050098"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.3390\/forensicsci2020028"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1177\/08944393211011584"},{"issue":"71","key":"ref6","article-title":"Exploring the global geography of cybercrime and its driving forces","volume":"10","author":"Chen","year":"2023","journal-title":"Humanit Soc Sci Commun"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1163\/15718174-02603006"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1177\/09722629221074760"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2018.01.139"}],"event":{"name":"2023 IEEE 18th International Conference on Computer Science and Information Technologies (CSIT)","start":{"date-parts":[[2023,10,19]]},"location":"Lviv, Ukraine","end":{"date-parts":[[2023,10,21]]}},"container-title":["2023 IEEE 18th International Conference on Computer Science and Information Technologies (CSIT)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10323600\/10323603\/10324030.pdf?arnumber=10324030","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,24]],"date-time":"2025-10-24T17:14:13Z","timestamp":1761326053000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10324030\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,10,19]]},"references-count":9,"URL":"https:\/\/doi.org\/10.1109\/csit61576.2023.10324030","relation":{},"subject":[],"published":{"date-parts":[[2023,10,19]]}}}