{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T21:08:15Z","timestamp":1725484095410},"publisher-location":"Berlin, Heidelberg","reference-count":19,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540005650"},{"type":"electronic","value":"9783540364672"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2003]]},"DOI":"10.1007\/3-540-36467-6_2","type":"book-chapter","created":{"date-parts":[[2007,5,21]],"date-time":"2007-05-21T06:32:46Z","timestamp":1179729166000},"page":"13-26","source":"Crossref","is-referenced-by-count":6,"title":["Detecting Web Bugs with Bugnosis: Privacy Advocacy through Education"],"prefix":"10.1007","author":[{"given":"Adil","family":"Alsaid","sequence":"first","affiliation":[]},{"given":"David","family":"Martin","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2003,6,24]]},"reference":[{"key":"2_CR1","unstructured":"Alsaid, A., Martin, D.: Bugnosis Web bug detector software (2001) http:\/\/www.bugnosis.org\/ ."},{"key":"2_CR2","unstructured":"Smith, R.M.: Web bug search page (1999) http:\/\/www.computerbytesman.com\/privacy\/wbfind.htm ."},{"key":"2_CR3","unstructured":"Martin, D., Wu, H., Alsaid, A.: Hidden surveillance by Web sites: Web bugs in contemporary use (2001) http:\/\/www.cs.bu.edu\/fac\/dm\/pubs\/draft-pt.pdf ."},{"key":"2_CR4","unstructured":"WebWasher: Webwasher filtering software (2001) http:\/\/www.webwasher.com\/ ."},{"key":"2_CR5","unstructured":"AdExtinguisher: Adextinguisher filtering software (2001) http:\/\/adext.magenet.net\/ ."},{"key":"2_CR6","unstructured":"Murray, B.H., Cowart, J.J.: Web bugs: A study of the presence and growth rate of Web bugs on the internet. Technical report, Cyveillance, Inc. (2001) http:\/\/www.cyveillance.com\/ ."},{"key":"2_CR7","unstructured":"IDCide Inc.: Privacywall site analyzer software (2001) http:\/\/www.idcide.com\/ ."},{"key":"2_CR8","unstructured":"Reinke, T.: Web bug report. Technical report, E-Soft Inc. and SecuritySpace (2001) http:\/\/www.securityspace.com\/ssurvey\/data\/man.200110\/webbug.html ."},{"key":"2_CR9","doi-asserted-by":"crossref","unstructured":"Kristol, D., Montulli, L.: HTTP state management mechanism. RFC 2965 (2000)","DOI":"10.17487\/rfc2965"},{"key":"2_CR10","unstructured":"Martin, D., Rubin, A., Rajagopalan, S.: Blocking Java applets at the firewall. In: Proceedings of the 1997 Symposium on Network and Distributed System Security, IEEE (1997) 16\u201326 See also http:\/\/www.cs.bu.edu\/techreports ."},{"key":"2_CR11","unstructured":"Swiderski, F.: WebProxy auditing and editing tool (2002) http:\/\/www.atst ake.com\/research\/tools\/index.html#WebProxy ."},{"key":"2_CR12","unstructured":"World Wide Web Consortium: Document object model (2001) http:\/\/www.w3c.org\/DOM\/ ."},{"key":"2_CR13","unstructured":"Microsoft Corp.: Microsoft developer network (2001) http:\/\/msdn.microsoft.com\/ ."},{"key":"2_CR14","unstructured":"Network Advertising Initiative: Web bug standards to be developed (2001) http:\/\/www.networkadvertising.org\/ ."},{"key":"2_CR15","unstructured":"Roberts, S.: Programming Microsoft Internet Explorer 5. Microsoft Press (1999)"},{"key":"2_CR16","unstructured":"Postel Services Inc.: Confirm.to e-mail tracking service (2001) http:\/\/www.confirm.to\/ ."},{"key":"2_CR17","unstructured":"ITraceYou.com: Itraceyou e-mail tracking service (2001) http:\/\/www.itraceyou.com\/ ."},{"key":"2_CR18","unstructured":"Smith, R.M., Martin, D.M.: E-mail wiretapping (2001) http:\/\/www.privacyfoundation.org\/privacywatch\/report.asp?id=54&action=0 ."},{"key":"2_CR19","unstructured":"World Wide Web Consortium: Platform for privacy preferences project (2000) http:\/\/www.w3c.org\/P3P\/ ."}],"container-title":["Lecture Notes in Computer Science","Privacy Enhancing Technologies"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-36467-6_2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,4,28]],"date-time":"2019-04-28T02:22:50Z","timestamp":1556418170000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-36467-6_2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2003]]},"ISBN":["9783540005650","9783540364672"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/3-540-36467-6_2","relation":{},"ISSN":["0302-9743"],"issn-type":[{"type":"print","value":"0302-9743"}],"subject":[],"published":{"date-parts":[[2003]]}}}