{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,7]],"date-time":"2026-02-07T22:48:16Z","timestamp":1770504496630,"version":"3.49.0"},"publisher-location":"Boston, MA","reference-count":9,"publisher":"Springer US","isbn-type":[{"value":"9780387723662","type":"print"},{"value":"9780387723679","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2007]]},"DOI":"10.1007\/978-0-387-72367-9_17","type":"book-chapter","created":{"date-parts":[[2007,11,9]],"date-time":"2007-11-09T18:12:08Z","timestamp":1194631928000},"page":"193-203","source":"Crossref","is-referenced-by-count":8,"title":["Identity Theft \u2014 Empirical evidence from a Phishing Exercise"],"prefix":"10.1007","author":[{"given":"T","family":"Steyn","sequence":"first","affiliation":[]},{"given":"H A","family":"Kruger","sequence":"additional","affiliation":[]},{"given":"L","family":"Drevin","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"17_CR1","unstructured":"G. Oilman, The Phishing guide: Understanding & Preventing Phishing attacks, (October 25, 2006); \n                    http:\/\/www.ngssoftware.com\/research\/papers\n                    \n                  ."},{"key":"17_CR2","doi-asserted-by":"crossref","unstructured":"A. Granova and J.H.P. Eloff, A legal overview of phishing, Computer Fraud and Security, 6\u201311, (July 2005).","DOI":"10.1016\/S1361-3723(05)70231-1"},{"key":"17_CR3","unstructured":"Identity Theft Resource Center. (October 24, 2006); \n                    http:\/\/www.idtheftcenter.org\/cresources.shtml\n                    \n                  ."},{"key":"17_CR4","unstructured":"A. Litan, Phishing attack victims likely targets for Identity Theft, (October 24, 2006); \n                    http:\/\/www.gartner.com\n                    \n                   4 May 2004."},{"key":"17_CR5","first-page":"448","volume-title":"IFIP International Federation for Information Processing, Volume 201, Security and Privacy in Dynamic Environments","author":"L. Drevin","year":"2006","unstructured":"L. Drevin, H.A. Kruger and T. Steyn, Value-focused assessment of ICT security awareness in an academic environment, In: IFIP International Federation for Information Processing, Volume 201, Security and Privacy in Dynamic Environments, eds. Fischer-Hubner, S., Ranneberg, K., Yngstrom, L, Lindskog, S. (Boston: Springer, 2006), pp. 448\u2013453."},{"key":"17_CR6","first-page":"454","volume-title":"IFIP International Federation for Information Processing, Volume 201, Security and Privacy in Dynamic Environments","author":"R.C. Dodge","year":"2006","unstructured":"R.C. Dodge and A.J. Ferguson, Using Phishing for User Email Security Awareness, In: IFIP International Federation for Information Processing, Volume 201, Security and Privacy in Dynamic Environments, eds. Fischer-Hubner, S., Ranneberg, K., Yngstrom, L, Lindskog, S. (Boston: Springer, 2006), pp. 454\u2013459."},{"key":"17_CR7","unstructured":"H.A. Kruger, L. Drevin, and T. Steyn, A framework for evaluating ICT security awareness, In: Proceedings of the 2006 ISSA Conference, Johannesburg, South Africa, (5-7 July 2006, on CD)."},{"key":"17_CR8","unstructured":"A.G.W. Steyn, CF. Smit, S.H.C. Du Toit and C. Strasheim, Moderne Statistiek vir die Praktyk, (Sesde uitgawe. JL van Schaik. Pretoria, 1998)."},{"key":"17_CR9","unstructured":"T. Wegner, Applied Business Statistics, (Juta& Co, Ltd. Kenwyn, 1993)."}],"container-title":["IFIP International Federation for Information Processing","New Approaches for Security, Privacy and Trust in Complex Environments"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-0-387-72367-9_17","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,2,24]],"date-time":"2019-02-24T22:58:50Z","timestamp":1551049130000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-0-387-72367-9_17"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2007]]},"ISBN":["9780387723662","9780387723679"],"references-count":9,"URL":"https:\/\/doi.org\/10.1007\/978-0-387-72367-9_17","relation":{},"ISSN":["1571-5736"],"issn-type":[{"value":"1571-5736","type":"print"}],"subject":[],"published":{"date-parts":[[2007]]}}}