{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T23:27:26Z","timestamp":1725751646606},"publisher-location":"Berlin, Heidelberg","reference-count":14,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642411472"},{"type":"electronic","value":"9783642411489"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-642-41148-9_18","type":"book-chapter","created":{"date-parts":[[2013,10,9]],"date-time":"2013-10-09T18:47:31Z","timestamp":1381344451000},"page":"257-272","source":"Crossref","is-referenced-by-count":1,"title":["An Empirical Study Profiling Internet Pirates"],"prefix":"10.1007","author":[{"given":"Pierre","family":"Lai","sequence":"first","affiliation":[]},{"given":"Kam-Pui","family":"Chow","sequence":"additional","affiliation":[]},{"given":"Xiao-Xi","family":"Fan","sequence":"additional","affiliation":[]},{"given":"Vivien","family":"Chan","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"18_CR1","unstructured":"Alexa Internet, Top sites by countries: Hong Kong, San Francisco, California ( www.alexa.com\/topsites\/countries\/HK ), 2012."},{"key":"18_CR2","volume-title":"Modern Multidimensional Scaling: Theory and Applications","author":"I. Borg","year":"2005","unstructured":"I. Borg and P. Groenen, Modern Multidimensional Scaling: Theory and Applications, Springer, New York, 2005."},{"key":"18_CR3","doi-asserted-by":"publisher","first-page":"453","DOI":"10.1146\/annurev.psych.55.090902.141913","volume":"56","author":"A. Caspi","year":"2005","unstructured":"A. Caspi, B. Roberts and R. Shiner, Personality development: Stability and change, Annual Review of Psychology, vol. 56, pp. 453\u2013484, 2005.","journal-title":"Annual Review of Psychology"},{"key":"18_CR4","volume-title":"Proceedings of the Second International Conference on Internet Monitoring and Protection","author":"K. Chow","year":"2007","unstructured":"K. Chow, K. Cheng, L. Man, P. Lai, L. Hui, C. Chong, K. Pun, W. Tsang, H. Chan and S. Yiu, BTM: An automated rule-based BT monitoring system for piracy detection, Proceedings of the Second International Conference on Internet Monitoring and Protection, 2007."},{"key":"18_CR5","unstructured":"Court of Final Appeal of the Hong Kong Special Administrative Region, Final Appeal No. 3 of 2007 (Criminal), between Chan Nai Ming and HKSAR, Hong Kong, China ( legalref.judiciary.gov.hk\/lrs\/common\/ju\/ju_frame.jsp?DIS=57111 ), 2007."},{"key":"18_CR6","unstructured":"Envisional, An Estimate of Infringing Use of the Internet, Technical Report, Cambridge, United Kingdom ( documents.envisional.com\/docs\/Envisional-Internet_Usage-Jan2011.pdf ), 2011."},{"key":"18_CR7","doi-asserted-by":"crossref","DOI":"10.5040\/9798216029663","volume-title":"Understanding Online Piracy: The Truth About Illegal File Sharing","author":"N. Fisk","year":"2009","unstructured":"N. Fisk, Understanding Online Piracy: The Truth About Illegal File Sharing, ABC-CLIO, Santa Barbara, California, 2009."},{"key":"18_CR8","volume-title":"Pirates of the Digital Millennium: How the Intellectual Property Wars Damage Our Personal Freedoms, Our Jobs and the World Economy","author":"J. Gantz","year":"2005","unstructured":"J. Gantz and J. Rochester, Pirates of the Digital Millennium: How the Intellectual Property Wars Damage Our Personal Freedoms, Our Jobs and the World Economy, FT Prentice Hall, Upper Saddle River, New Jersey, 2005."},{"key":"18_CR9","volume-title":"Serial Murderers and Their Victims","author":"E. Hickey","year":"2006","unstructured":"E. Hickey, Serial Murderers and Their Victims, Wadsworth, Belmont, California, 2006."},{"key":"18_CR10","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-59745-109-3","volume-title":"Criminal Profiling: Principles and Practice","author":"R. Kocsis","year":"2006","unstructured":"R. Kocsis, Criminal Profiling: Principles and Practice, Humana Press, Totowa, New Jersey, 2006."},{"key":"18_CR11","volume-title":"SPSS Programming and Data Management: A Guide for SPSS and SAS Users","author":"R. Levesque","year":"2007","unstructured":"R. Levesque, SPSS Programming and Data Management: A Guide for SPSS and SAS Users, SPSS, Chicago, Illinois, 2007."},{"issue":"3","key":"18_CR12","first-page":"421","volume":"33","author":"G. Palermo","year":"2005","unstructured":"G. Palermo and R. Kocsis, Offender profiling: An introduction to the sociopsychological analysis of violent crime, Journal of the American Academy of Psychiatry and the Law, vol. 33(3), pp. 421\u2013423, 2005.","journal-title":"Journal of the American Academy of Psychiatry and the Law"},{"issue":"4","key":"18_CR13","doi-asserted-by":"publisher","first-page":"292","DOI":"10.1016\/S0167-4048(03)00405-X","volume":"22","author":"M. Rogers","year":"2003","unstructured":"M. Rogers, The role of criminal profiling in the computer forensics process, Computers and Security, vol. 22(4), pp. 292\u2013298, 2003.","journal-title":"Computers and Security"},{"volume-title":"Criminal Profiling: An Introduction to Behavioral Evidence Analysis","year":"2012","key":"18_CR14","unstructured":"B. Turvey (Ed.), Criminal Profiling: An Introduction to Behavioral Evidence Analysis, Academic Press, Oxford, United Kingdom, 2012."}],"container-title":["IFIP Advances in Information and Communication Technology","Advances in Digital Forensics IX"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-41148-9_18","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,5,18]],"date-time":"2024-05-18T15:20:03Z","timestamp":1716045603000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-41148-9_18"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783642411472","9783642411489"],"references-count":14,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-41148-9_18","relation":{},"ISSN":["1868-4238","1868-422X"],"issn-type":[{"type":"print","value":"1868-4238"},{"type":"electronic","value":"1868-422X"}],"subject":[],"published":{"date-parts":[[2013]]}}}