{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,11,1]],"date-time":"2022-11-01T18:09:38Z","timestamp":1667326178428},"reference-count":49,"publisher":"Elsevier BV","issue":"2","license":[{"start":{"date-parts":[[2012,4,1]],"date-time":"2012-04-01T00:00:00Z","timestamp":1333238400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Computer Law & Security Review"],"published-print":{"date-parts":[[2012,4]]},"DOI":"10.1016\/j.clsr.2012.01.007","type":"journal-article","created":{"date-parts":[[2012,3,24]],"date-time":"2012-03-24T16:02:54Z","timestamp":1332604974000},"page":"201-207","source":"Crossref","is-referenced-by-count":15,"title":["Data attack of the cybercriminal: Investigating the digital currency of cybercrime"],"prefix":"10.1016","volume":"28","author":[{"given":"Paul","family":"Hunton","sequence":"first","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/j.clsr.2012.01.007_bib1","series-title":"The Association of Chief Police Officers of England, Wales and Northern Ireland, e-crime strategy","author":"ACPO","year":"2009"},{"issue":"2","key":"10.1016\/j.clsr.2012.01.007_bib2","article-title":"Private\u2013public sector cooperation in combating cybercrime: in search of a model","volume":"2","author":"Brenner","year":"2007","journal-title":"Journal of International Law and Technology"},{"key":"10.1016\/j.clsr.2012.01.007_bib3","series-title":"Investigating digital crime","author":"Bryant","year":"2008"},{"key":"10.1016\/j.clsr.2012.01.007_bib4","series-title":"Cyber security strategy of the United Kingdom","author":"Cabinet Office","year":"2009"},{"key":"10.1016\/j.clsr.2012.01.007_bib5","series-title":"The cost of cyber crime","author":"Cabinet Office","year":"2011"},{"issue":"3","key":"10.1016\/j.clsr.2012.01.007_bib6","doi-asserted-by":"crossref","first-page":"216","DOI":"10.1080\/10439460902871322","article-title":"Detecting, developing and disseminating detectives\u2019 \u2018creative\u2019 skills","volume":"19","author":"Carson","year":"2009","journal-title":"Policing and Society"},{"key":"10.1016\/j.clsr.2012.01.007_bib7","doi-asserted-by":"crossref","first-page":"37","DOI":"10.1007\/s11417-007-9035-y","article-title":"Criminal exploitation of online systems by organised crime groups","volume":"3","author":"Choo","year":"2008","journal-title":"Asian Criminology"},{"key":"10.1016\/j.clsr.2012.01.007_bib8","series-title":"Cisco 2010 annual security report","author":"Cisco","year":"2010"},{"key":"10.1016\/j.clsr.2012.01.007_bib9","series-title":"Hackers, fraudsters and botnets: tackling the problem of cyber crime","author":"Commonwealth of Australia","year":"2010"},{"key":"10.1016\/j.clsr.2012.01.007_bib10","series-title":"Assuring a trusted and resilient information and communications infrastructure","author":"Cyberspace Policy Review","year":"2009"},{"key":"10.1016\/j.clsr.2012.01.007_bib11","series-title":"State of the Internet 2010: a report on the ever-changing threat landscape","author":"DeBolt","year":"2010"},{"key":"10.1016\/j.clsr.2012.01.007_bib12","series-title":"e-crime survey 2009","author":"e-Crime Congress","year":"2009"},{"key":"10.1016\/j.clsr.2012.01.007_bib13","series-title":"Internet facilitated organised crime threat assessment","author":"Europol","year":"2011"},{"issue":"6","key":"10.1016\/j.clsr.2012.01.007_bib14","doi-asserted-by":"crossref","first-page":"708","DOI":"10.1504\/IJMED.2008.021191","article-title":"Characteristics of effective SIOs: a content analysis for management in police investigations","volume":"5","author":"Fahsing","year":"2008","journal-title":"International Journal of Management and Enterprise Development"},{"key":"10.1016\/j.clsr.2012.01.007_bib15","series-title":"Organised crime in the United States: trends and issues for Congress","author":"Finklea","year":"2009"},{"issue":"2","key":"10.1016\/j.clsr.2012.01.007_bib16","doi-asserted-by":"crossref","DOI":"10.1108\/13590790710742672","article-title":"Challenges for regulating financial fraud in cyberspace","volume":"14","author":"Fletcher","year":"2007","journal-title":"Journal of Financial Crime"},{"key":"10.1016\/j.clsr.2012.01.007_bib17","article-title":"The future of fighting crime","author":"Gallagher","year":"2009","journal-title":"Police Professional"},{"key":"10.1016\/j.clsr.2012.01.007_bib18","series-title":"UK cybercrime report 2009","author":"Garlik","year":"2009"},{"key":"10.1016\/j.clsr.2012.01.007_bib19","doi-asserted-by":"crossref","first-page":"94","DOI":"10.1016\/j.ijlcj.2010.09.001","article-title":"Stages of knowledge management systems in policing financial crime","volume":"38","author":"Gottschalk","year":"2010","journal-title":"International Journal of Law, Crime and Justice"},{"key":"10.1016\/j.clsr.2012.01.007_bib20","article-title":"Combating e-Crime","author":"Hibbert","year":"2009","journal-title":"Police Professional"},{"key":"10.1016\/j.clsr.2012.01.007_bib21","series-title":"A strong Britain in an age of uncertainty: the National Security Strategy","author":"HM Government","year":"2010"},{"key":"10.1016\/j.clsr.2012.01.007_bib22","article-title":"SOCA emphasises value of collaboration in fight against cyber crime","author":"Hoare","year":"2010","journal-title":"Police Professional"},{"issue":"6","key":"10.1016\/j.clsr.2012.01.007_bib23","doi-asserted-by":"crossref","first-page":"528","DOI":"10.1016\/j.clsr.2009.09.005","article-title":"The growing phenomenon of crime and the Internet: a cybercrime execution and analysis model","volume":"25","author":"Hunton","year":"2009","journal-title":"Computer Law & Security Review"},{"issue":"4","key":"10.1016\/j.clsr.2012.01.007_bib24","doi-asserted-by":"crossref","first-page":"385","DOI":"10.1093\/police\/paq038","article-title":"Cyber crime and security: a new model of law enforcement investigation","volume":"4","author":"Hunton","year":"2010","journal-title":"Policing: A Journal of Policy and Practice"},{"issue":"3\u20134","key":"10.1016\/j.clsr.2012.01.007_bib25","doi-asserted-by":"crossref","first-page":"105","DOI":"10.1016\/j.diin.2011.01.002","article-title":"A rigorous approach to formalising the technical investigation stages of cyber crime and criminality within a UK law enforcement environment","volume":"7","author":"Hunton","year":"2011","journal-title":"Digital Investigation"},{"key":"10.1016\/j.clsr.2012.01.007_bib26","series-title":"Home Secretary, Extending our reach: a comprehensive approach to tackling serious organised crime","author":"Johnson","year":"2009"},{"key":"10.1016\/j.clsr.2012.01.007_bib27","article-title":"Cybercrime and the risk of proliferation finance, centre for the study of threat convergence","author":"Kapitanskaya","year":"2010","journal-title":"Occasional Research Series"},{"key":"10.1016\/j.clsr.2012.01.007_bib28","series-title":"UK infrastructure faces cyber threat, says GCHQ chief","author":"Lobban","year":"2010"},{"key":"10.1016\/j.clsr.2012.01.007_bib29","series-title":"UK security breach investigations report, an analysis of data cases","author":"Maple","year":"2010"},{"issue":"1","key":"10.1016\/j.clsr.2012.01.007_bib30","doi-asserted-by":"crossref","first-page":"46","DOI":"10.1093\/police\/pam001","article-title":"The engineering of social control: policing and technology","volume":"1","author":"Marx","year":"2007","journal-title":"Policing: a Journal of Policy and Practice"},{"key":"10.1016\/j.clsr.2012.01.007_bib31","series-title":"2010 threat predictions","author":"McAfee","year":"2010"},{"key":"10.1016\/j.clsr.2012.01.007_bib32","series-title":"Cyber skills a top challenge, says police cyber crime unit","author":"McMurdie","year":"2010"},{"issue":"1","key":"10.1016\/j.clsr.2012.01.007_bib33","doi-asserted-by":"crossref","first-page":"8","DOI":"10.1080\/09627250708553272","article-title":"Policing operation ore","volume":"68","author":"Metcalfe","year":"2007","journal-title":"Criminal Justice Matters"},{"key":"10.1016\/j.clsr.2012.01.007_bib34","series-title":"Battling botnets for control of computers","author":"Microsoft","year":"2010"},{"key":"10.1016\/j.clsr.2012.01.007_bib35","doi-asserted-by":"crossref","first-page":"183","DOI":"10.1016\/j.jadohealth.2010.01.007","article-title":"Use of social networking sites in online sex crime against minors: an examination of national incidence and means of utilization","volume":"47","author":"Mitchell","year":"2010","journal-title":"Journal of Adolescent Health"},{"key":"10.1016\/j.clsr.2012.01.007_bib36","series-title":"Electronic crime strategy, to 2010 policing with confidence","author":"New Zealand Police","year":"2009"},{"key":"10.1016\/j.clsr.2012.01.007_bib37","series-title":"Norton cybercrime report: the human impact","author":"Norton","year":"2010"},{"key":"10.1016\/j.clsr.2012.01.007_bib38","series-title":"Police left behind by cyber criminals","author":"Orde","year":"2011"},{"key":"10.1016\/j.clsr.2012.01.007_bib39","doi-asserted-by":"crossref","first-page":"71","DOI":"10.1016\/j.ijhcs.2006.08.012","article-title":"Analyzing terror campaigns on the Internet: technical sophistication, content richness, and Web interactivity","volume":"65","author":"Qin","year":"2007","journal-title":"International Journal of Human-Computer Studies"},{"key":"10.1016\/j.clsr.2012.01.007_bib40","series-title":"Crimes of the Internet","author":"Schmalleger","year":"2009"},{"key":"10.1016\/j.clsr.2012.01.007_bib41","series-title":"Security Labs report January\u2013June 2010 recap","author":"Security Labs","year":"2010"},{"key":"10.1016\/j.clsr.2012.01.007_bib42","series-title":"Reducing systemic cybersecurity risk","author":"Sommer","year":"2011"},{"key":"10.1016\/j.clsr.2012.01.007_bib43","series-title":"Symantec report on the underground economy July 07\u2013June 08","author":"Symantec","year":"2008"},{"key":"10.1016\/j.clsr.2012.01.007_bib44","volume":"vol. XIV","author":"Symantec","year":"2009"},{"key":"10.1016\/j.clsr.2012.01.007_bib45","volume":"vol. XV","author":"Symantec","year":"2010"},{"key":"10.1016\/j.clsr.2012.01.007_bib46","series-title":"State of enterprise security 2010","author":"Symantec","year":"2010"},{"issue":"9","key":"10.1016\/j.clsr.2012.01.007_bib47","doi-asserted-by":"crossref","first-page":"12","DOI":"10.1016\/S1353-4858(10)70115-X","article-title":"Forensic investigation of peer-to-peer networks","volume":"2010","author":"Taylor","year":"2010","journal-title":"Journal of Network Security"},{"key":"10.1016\/j.clsr.2012.01.007_bib48","series-title":"Cybercrime: the transformation of crime in the information age","author":"Wall","year":"2007"},{"key":"10.1016\/j.clsr.2012.01.007_bib49","series-title":"Cybercrime and society","author":"Yar","year":"2006"}],"container-title":["Computer Law & Security Review"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0267364912000258?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0267364912000258?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2018,11,25]],"date-time":"2018-11-25T00:22:15Z","timestamp":1543105335000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0267364912000258"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,4]]},"references-count":49,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2012,4]]}},"alternative-id":["S0267364912000258"],"URL":"https:\/\/doi.org\/10.1016\/j.clsr.2012.01.007","relation":{},"ISSN":["0267-3649"],"issn-type":[{"value":"0267-3649","type":"print"}],"subject":[],"published":{"date-parts":[[2012,4]]}}}