{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T10:07:39Z","timestamp":1729678059289,"version":"3.28.0"},"reference-count":9,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,6]]},"DOI":"10.1109\/isi.2013.6578798","type":"proceedings-article","created":{"date-parts":[[2013,8,28]],"date-time":"2013-08-28T21:11:25Z","timestamp":1377724285000},"page":"113-115","source":"Crossref","is-referenced-by-count":3,"title":["Building a better intelligence machine: A new approach to capability review and development"],"prefix":"10.1109","author":[{"given":"Duncan","family":"Hodges","sequence":"first","affiliation":[]},{"given":"Sadie","family":"Creese","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"3","first-page":"1124","article-title":"A datareachability model for elucidating privacy and security risks related to the use of online social networks","author":"creese","year":"2012","journal-title":"2012 International Workshop on Trust Security and Privacy in E-Government E-Systems and Social Networking (eGSSN-12) at 11th IEEE International Conference on Trust"},{"key":"2","article-title":"Superidentity: Fusion of identity across real and cyber domains","author":"black","year":"2012","journal-title":"ID360 The Global Forum on Identity"},{"year":"2012","key":"1"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1109\/EISIC.2012.43"},{"key":"6","article-title":"Identity attribution across cyberspace and naturalspace","author":"hodges","year":"2012","journal-title":"International Crime and Intelligence Analysis Conference"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.2307\/2539119"},{"key":"4","doi-asserted-by":"crossref","first-page":"40","DOI":"10.1007\/3-540-45394-6_5","article-title":"Business modelling is not process modelling","volume":"1921","author":"gordijn","year":"2000","journal-title":"Conceptual Modeling for E-Business and the Web Ser Lecture Notes in Computer Science"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1109\/ICMLA.2012.218"},{"key":"8","doi-asserted-by":"crossref","first-page":"1134","DOI":"10.1520\/JFS13129J","article-title":"Height estimation from foot and shoeprint length","volume":"36","author":"vallandigham","year":"1991","journal-title":"Journal of Forensic Sciences"}],"event":{"name":"2013 IEEE International Conference on Intelligence and Security Informatics (ISI)","start":{"date-parts":[[2013,6,4]]},"location":"Seattle, WA, USA","end":{"date-parts":[[2013,6,7]]}},"container-title":["2013 IEEE International Conference on Intelligence and Security Informatics"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6571725\/6578763\/06578798.pdf?arnumber=6578798","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,5,17]],"date-time":"2024-05-17T11:23:07Z","timestamp":1715944987000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6578798\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,6]]},"references-count":9,"URL":"https:\/\/doi.org\/10.1109\/isi.2013.6578798","relation":{},"subject":[],"published":{"date-parts":[[2013,6]]}}}