{"id":"https://openalex.org/W1858205575","doi":"https://doi.org/10.1080/15567280903140946","title":"An Introduction to How Criminal Profiling Could Be Used as a Support for Computer Hacking Investigations","display_name":"An Introduction to How Criminal Profiling Could Be Used as a Support for Computer Hacking Investigations","publication_year":2009,"publication_date":"2009-09-09","ids":{"openalex":"https://openalex.org/W1858205575","doi":"https://doi.org/10.1080/15567280903140946","mag":"1858205575"},"language":"en","primary_location":{"id":"doi:10.1080/15567280903140946","is_oa":false,"landing_page_url":"https://doi.org/10.1080/15567280903140946","pdf_url":null,"source":{"id":"https://openalex.org/S127916260","display_name":"Journal of Digital Forensic Practice","issn_l":"1556-7281","issn":["1556-7281","1556-7346"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320547","host_organization_name":"Taylor & Francis","host_organization_lineage":["https://openalex.org/P4310320547"],"host_organization_lineage_names":["Taylor & Francis"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Digital Forensic Practice","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5003912952","display_name":"Lucas Edel Donato","orcid":"https://orcid.org/0000-0001-5600-7891"},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Lucas Donato","raw_affiliation_strings":["Santana St. 170, Apt. 304, Porto Alegre, Brazil"],"affiliations":[{"raw_affiliation_string":"Santana St. 170, Apt. 304, Porto Alegre, Brazil","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":1,"corresponding_author_ids":["https://openalex.org/A5003912952"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.7403,"has_fulltext":false,"cited_by_count":4,"citation_normalized_percentile":{"value":0.81515882,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":"2","issue":"4","first_page":"183","last_page":"195"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12519","display_name":"Cybercrime and Law Enforcement Studies","score":0.9966999888420105,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12519","display_name":"Cybercrime and Law Enforcement Studies","score":0.9966999888420105,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12034","display_name":"Digital and Cyber Forensics","score":0.9937999844551086,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T13582","display_name":"Stalking, Cyberstalking, and Harassment","score":0.9657999873161316,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/offender-profiling","display_name":"Offender profiling","score":0.874312162399292},{"id":"https://openalex.org/keywords/hacker","display_name":"Hacker","score":0.8310564756393433},{"id":"https://openalex.org/keywords/commit","display_name":"Commit","score":0.8058068752288818},{"id":"https://openalex.org/keywords/profiling","display_name":"Profiling (computer programming)","score":0.7662676572799683},{"id":"https://openalex.org/keywords/cybercrime","display_name":"Cybercrime","score":0.7413438558578491},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6433852910995483},{"id":"https://openalex.org/keywords/sort","display_name":"sort","score":0.5599718689918518},{"id":"https://openalex.org/keywords/premise","display_name":"Premise","score":0.5116487145423889},{"id":"https://openalex.org/keywords/digital-forensics","display_name":"Digital forensics","score":0.48954734206199646},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.486436128616333},{"id":"https://openalex.org/keywords/computer-forensics","display_name":"Computer forensics","score":0.4756952226161957},{"id":"https://openalex.org/keywords/criminal-investigation","display_name":"Criminal investigation","score":0.42307764291763306},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.41759780049324036},{"id":"https://openalex.org/keywords/criminology","display_name":"Criminology","score":0.38969576358795166},{"id":"https://openalex.org/keywords/data-science","display_name":"Data science","score":0.3589797914028168},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.25574082136154175},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.2105610966682434},{"id":"https://openalex.org/keywords/psychology","display_name":"Psychology","score":0.1835784912109375},{"id":"https://openalex.org/keywords/epistemology","display_name":"Epistemology","score":0.08391347527503967},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.08295860886573792}],"concepts":[{"id":"https://openalex.org/C552425265","wikidata":"https://www.wikidata.org/wiki/Q1191309","display_name":"Offender profiling","level":3,"score":0.874312162399292},{"id":"https://openalex.org/C86844869","wikidata":"https://www.wikidata.org/wiki/Q2798820","display_name":"Hacker","level":2,"score":0.8310564756393433},{"id":"https://openalex.org/C153180980","wikidata":"https://www.wikidata.org/wiki/Q19776675","display_name":"Commit","level":2,"score":0.8058068752288818},{"id":"https://openalex.org/C187191949","wikidata":"https://www.wikidata.org/wiki/Q1138496","display_name":"Profiling (computer programming)","level":2,"score":0.7662676572799683},{"id":"https://openalex.org/C2779390178","wikidata":"https://www.wikidata.org/wiki/Q29137","display_name":"Cybercrime","level":3,"score":0.7413438558578491},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6433852910995483},{"id":"https://openalex.org/C88548561","wikidata":"https://www.wikidata.org/wiki/Q347599","display_name":"sort","level":2,"score":0.5599718689918518},{"id":"https://openalex.org/C2778023277","wikidata":"https://www.wikidata.org/wiki/Q321703","display_name":"Premise","level":2,"score":0.5116487145423889},{"id":"https://openalex.org/C84418412","wikidata":"https://www.wikidata.org/wiki/Q3246940","display_name":"Digital forensics","level":2,"score":0.48954734206199646},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.486436128616333},{"id":"https://openalex.org/C556601545","wikidata":"https://www.wikidata.org/wiki/Q878553","display_name":"Computer forensics","level":3,"score":0.4756952226161957},{"id":"https://openalex.org/C117660856","wikidata":"https://www.wikidata.org/wiki/Q1964968","display_name":"Criminal investigation","level":2,"score":0.42307764291763306},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.41759780049324036},{"id":"https://openalex.org/C73484699","wikidata":"https://www.wikidata.org/wiki/Q161733","display_name":"Criminology","level":1,"score":0.38969576358795166},{"id":"https://openalex.org/C2522767166","wikidata":"https://www.wikidata.org/wiki/Q2374463","display_name":"Data science","level":1,"score":0.3589797914028168},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.25574082136154175},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.2105610966682434},{"id":"https://openalex.org/C15744967","wikidata":"https://www.wikidata.org/wiki/Q9418","display_name":"Psychology","level":0,"score":0.1835784912109375},{"id":"https://openalex.org/C111472728","wikidata":"https://www.wikidata.org/wiki/Q9471","display_name":"Epistemology","level":1,"score":0.08391347527503967},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.08295860886573792},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.0},{"id":"https://openalex.org/C23123220","wikidata":"https://www.wikidata.org/wiki/Q816826","display_name":"Information retrieval","level":1,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C36464697","wikidata":"https://www.wikidata.org/wiki/Q451553","display_name":"Visualization","level":2,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1080/15567280903140946","is_oa":false,"landing_page_url":"https://doi.org/10.1080/15567280903140946","pdf_url":null,"source":{"id":"https://openalex.org/S127916260","display_name":"Journal of Digital Forensic Practice","issn_l":"1556-7281","issn":["1556-7281","1556-7346"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320547","host_organization_name":"Taylor & Francis","host_organization_lineage":["https://openalex.org/P4310320547"],"host_organization_lineage_names":["Taylor & Francis"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Digital Forensic Practice","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.6499999761581421,"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":14,"referenced_works":["https://openalex.org/W33109335","https://openalex.org/W565981219","https://openalex.org/W1520539188","https://openalex.org/W1523819566","https://openalex.org/W1527421812","https://openalex.org/W1565302035","https://openalex.org/W1578590158","https://openalex.org/W1581799091","https://openalex.org/W1598706994","https://openalex.org/W1977712835","https://openalex.org/W1991718901","https://openalex.org/W2116985963","https://openalex.org/W2491902954","https://openalex.org/W2797565466"],"related_works":["https://openalex.org/W3005222456","https://openalex.org/W4283257138","https://openalex.org/W2932844847","https://openalex.org/W3081210650","https://openalex.org/W4288064638","https://openalex.org/W1958386273","https://openalex.org/W1858205575","https://openalex.org/W2099196057","https://openalex.org/W3112533573","https://openalex.org/W2187813989"],"abstract_inverted_index":{"ABSTRACT":[0],"This":[1,36],"article":[2,62,98],"presents":[3],"a":[4,7,21,67],"review":[5],"and":[6,13,29,57,79,113],"critical":[8],"analysis":[9],"of":[10,20,49,69,96,109],"the":[11,17,41,44,94],"literature":[12],"can":[14],"be":[15],"considered":[16],"initial":[18],"stage":[19],"study":[22],"that":[23,43,84],"attempts":[24],"to":[25,100,104,117],"improve":[26],"computer":[27,64,105],"forensics":[28],"cybercrime":[30],"investigation":[31],"when":[32,74],"using":[33],"criminal":[34,102],"profiling.":[35],"research":[37],"is":[38,52,99],"based":[39],"on":[40],"premise":[42],"motivations":[45],"behind":[46],"any":[47],"sort":[48],"crimes\u2014and":[50],"it":[51],"no":[53],"different":[54],"with":[55,63],"cybercrimes,":[56],"more":[58],"specifically":[59],"in":[60],"this":[61,97],"hacking":[65],"crimes\u2014are":[66],"product":[68],"human":[70,82,110],"society":[71],"and,":[72],"even":[73],"they":[75],"present":[76],"new":[77,115],"methods":[78],"tools,":[80],"its":[81],"nature":[83],"leads":[85],"criminals":[86],"to,":[87],"sooner":[88],"or":[89],"later,":[90],"commit":[91],"mistakes.":[92],"Therefore,":[93],"objective":[95],"link":[101],"profiling":[103],"hacking,":[106],"identifying":[107],"expressions":[108],"psychological":[111],"traits":[112],"adding":[114],"elements":[116],"digital":[118],"investigation.":[119]},"counts_by_year":[{"year":2023,"cited_by_count":1},{"year":2021,"cited_by_count":1},{"year":2014,"cited_by_count":1}],"updated_date":"2026-02-25T21:11:00.739837","created_date":"2025-10-10T00:00:00"}
