{"has_more":false,"total_items":4,"itemsCrossref":[{"VG_ID":0,"published_date":2018,"page_from":47,"title":"Cyber Criminology","authors":[{"author_name":"John M. Hyland"},{"author_name":"Pauline K. Hyland"},{"author_name":"Lucie Corcoran"}],"doi":"https://doi.org/10.1007/978-3-319-97181-0_3"}],"info_icon_message":"<div><b>Definition of Citations:</b><br><div align=left>This link gives the references of papers that cite this paper that have been resolved by SSRNs automated systems, with hot links to online versions of each paper where we have been able to locate them.","itemsSSRN":[{"reference_info":"Cato Policy Analysis Series, No. 652","posted_date":"30 Jan 2010","authors":[{"author_name":"Jason Kuznicki","author_url":"https://papers.ssrn.com/sol3/cf_dev/AbsByAuth.cfm?per_id=1421769"}],"fullTextUrl":"https://papers.ssrn.com/sol3/Delivery.cfm/SSRN_ID1543941_code365570.pdf?abstractid=1543941","ssrn_abstract_id":1543941,"VG_ID":544312,"abstract_url":"https://papers.ssrn.com/sol3/papers.cfm?abstract_id=1543941","title":"Attack of the Utility Monsters: The New Threats to Free Speech","in_myLibrary":0,"downloads":" 103","pdf_pages":20,"is_fee":false,"doi":"https://doi.org/10.2139/ssrn.1543941"},{"reference_info":"","posted_date":"16 Mar 2016","authors":[{"author_name":"Anika Ostermaier-Grabow","author_url":"https://papers.ssrn.com/sol3/cf_dev/AbsByAuth.cfm?per_id=2509065"}],"fullTextUrl":"https://papers.ssrn.com/sol3/Delivery.cfm/SSRN_ID2733669_code2509065.pdf?abstractid=2733669","ssrn_abstract_id":2733669,"VG_ID":921081,"abstract_url":"https://papers.ssrn.com/sol3/papers.cfm?abstract_id=2733669","title":"Netiquette in wissenschaftlichen Netzwerken. Eine explorative Studie: Fallbeispiel ResearchGate (Netiquette in Academic Networks: An Explorative Case Study of ResearchGate)","in_myLibrary":0,"downloads":" 75","pdf_pages":127,"is_fee":false,"doi":"https://doi.org/10.2139/ssrn.2733669"}]}