{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,6]],"date-time":"2024-09-06T00:44:31Z","timestamp":1725583471693},"publisher-location":"Boston, MA","reference-count":12,"publisher":"Springer US","isbn-type":[{"type":"print","value":"9781461355687"},{"type":"electronic","value":"9781461514671"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2001]]},"DOI":"10.1007\/978-1-4615-1467-1_4","type":"book-chapter","created":{"date-parts":[[2011,5,11]],"date-time":"2011-05-11T02:12:51Z","timestamp":1305079971000},"page":"47-63","source":"Crossref","is-referenced-by-count":0,"title":["Problems in Policing E-Commerce Crime"],"prefix":"10.1007","author":[{"given":"Marc D.","family":"Goodman","sequence":"first","affiliation":[]}],"member":"297","reference":[{"key":"4_CR1","volume-title":"Computer Related Crime: Recommendation No. R(89) 9 on \u201cComputer-Related Crime and Final Report of the European Committee on Crime Problems\u201d, Strasbourg, (341)","author":"Council of Europe","year":"1990","unstructured":"Council of Europe (1990)Computer Related Crime: Recommendation No. R(89) 9on \u201cComputer-Related Crime and Final Report of the European Committee on Crime Problems\u201d, Strasbourg, (341)."},{"key":"4_CR2","volume-title":"Release 2.1: A Design for Living in the Digital Age","author":"Dyson, Esther","year":"1997","unstructured":"Dyson, Esther. (1997).Release 2.1: A Design for Living in the Digital Age.Broadway Books, New York."},{"key":"4_CR3","volume-title":"Dimensions of Crime in Cyberspace\u201c, Fordham International Law Journal, 22","author":"D Goldstone","year":"1994","unstructured":"Goldstone, D. and Shave, B., \u201cInternational Dimensions of Crime in Cyberspace\u201dFordham International Law Journal22(June)1994."},{"key":"4_CR4","first-page":"267","volume":"34","author":"M Joutsen","year":"1999","unstructured":"Joutsen, M. (1999), \u201cFive Issues in European Criminal Justice: Corruption, Women in the Criminal Justice System, Criminal Policy Indicators, Community Crime Prevention and Computer Crime\u201dProceedings of the European Colloquium on Crime and Criminal PolicyHelsinki, HEUNI Publication Series, 34(267).","journal-title":"Helsinki, HEUNI Publication Series"},{"key":"4_CR5","volume-title":"\u201cProject Trawler: Crime on the Information Highways,\u201d National Criminal Intelligence Service, October 23, 1999, Report Issued on the World Wide Web","author":"National Criminal Intelligence Service of the United Kingdom","year":"1999","unstructured":"National Criminal Intelligence Service of the United Kingdom (1999) \u201cProject Trawler: Crime on the Information Highways,\u201d National Criminal Intelligence Service, October 23, 1999, Report Issued on the World Wide Webhttp:\/\/www.ncis.co.uk\/newpagel.htm."},{"key":"4_CR6","volume-title":"Computer-Related Crime: Analysis of Legal Policy","author":"Organization for Economic Cooperation and Development (OECD)","year":"1986","unstructured":"Organization for Economic Cooperation and Development (OECD)Computer-Related Crime: Analysis of Legal PolicyParis, August 1986, ISBN 92\u201364\u201312852\u20132."},{"key":"4_CR7","first-page":"467","volume":"10","author":"R Pallock","year":"1996","unstructured":"Pallock, R. (1996) \u201cCreating the Standards of a Global Community: Regulating Pornography on the Internet-an International Concern,\u201dTemple International and Comparative Law Journal10(Fall)467.","journal-title":"Temple International and Comparative Law Journal"},{"key":"4_CR8","first-page":"153","volume":"7","author":"B Persico","year":"1999","unstructured":"Persico, B. (1999), \u201cUnder Siege: The Jurisdictional and Interagency Problems of Protecting the National Information Infrastructure,\u201dCommLaw ConspectusThe Catholic University of America, 7(winter)153.","journal-title":"CommLaw Conspectus, The Catholic University of America"},{"key":"4_CR9","first-page":"365","volume":"32","author":"S Selin","year":"1997","unstructured":"Selin, S. (1997), \u201cGoverning Cyberspace: The Need for an International Solution\u201dGonzaga Law Review32(365).","journal-title":"Gonzaga Law Review"},{"key":"4_CR10","volume-title":"The International Handbook on Computer Crime: Computer Related Economic Crime and the Infringements of Privacy","author":"U Sieber","year":"1986","unstructured":"Sieber, U (1986).The International Handbook on Computer Crime: Computer Related Economic Crime and the Infringements of PrivacyWiley Press, Chichester."},{"key":"4_CR11","first-page":"317.","volume":"34","author":"J Soma","year":"1997","unstructured":"Soma, J., Thomas, T, and Brisette, H. (1997) \u201cTransnational Extradition For Computer Crimes: Are New Treaties and Laws Needed?\u201dHarvard Journal on Legislation34 (Summer), 317.","journal-title":"Harvard Journal on Legislation"},{"key":"4_CR12","volume-title":"United Nations Manual on the Prevention and Control of Computer-Related Crime, International Review of Criminal Policy, Numbers 43-44, U.N. Doc. ST\/ESA\/SER.M\/43-44, U.N. Sales No. E.94.IV.5","author":"United Nations Centre for Social Development and Humanitarian Affairs","year":"1994","unstructured":"United Nations Centre for Social Development and Humanitarian Affairs (1994)United Nations Manual on the Prevention and Control of Computer-Related CrimeInternational Review of Criminal Policy, Numbers 43\u201344, U.N. Doc. ST\/ESA\/SER.M\/43\u201344, U.N. Sales No. E.94.IV.5."}],"container-title":["Advances in Information Security","E-Commerce Security and Privacy"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-1-4615-1467-1_4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,23]],"date-time":"2019-05-23T03:54:37Z","timestamp":1558583677000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-1-4615-1467-1_4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2001]]},"ISBN":["9781461355687","9781461514671"],"references-count":12,"URL":"https:\/\/doi.org\/10.1007\/978-1-4615-1467-1_4","relation":{},"ISSN":["1568-2633"],"issn-type":[{"type":"print","value":"1568-2633"}],"subject":[],"published":{"date-parts":[[2001]]}}}