{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,17]],"date-time":"2026-04-17T07:40:30Z","timestamp":1776411630456,"version":"3.51.2"},"publisher-location":"New York, NY","reference-count":34,"publisher":"Springer New York","isbn-type":[{"value":"9781461419808","type":"print"},{"value":"9781461419815","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-1-4614-1981-5_3","type":"book-chapter","created":{"date-parts":[[2012,9,24]],"date-time":"2012-09-24T18:57:39Z","timestamp":1348513059000},"page":"35-53","source":"Crossref","is-referenced-by-count":45,"title":["Sex, Lies and Cyber-Crime Surveys"],"prefix":"10.1007","author":[{"given":"Dinei","family":"Flor\u00eancio","sequence":"first","affiliation":[]},{"given":"Cormac","family":"Herley","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2012,7,27]]},"reference":[{"key":"3_CR1","unstructured":"Anderson R, Boehme R, Clayton R, Moore T (2007) Security economics and the internal market. Report for European network and information security agency, 2007"},{"key":"3_CR2","volume-title":"Sex, drugs, and body counts: the politics of numbers in global crime and conflict","author":"P Andreas","year":"2010","unstructured":"Andreas P, Greenhill K (2010) Sex, drugs, and body counts: the politics of numbers in global crime and conflict. Cornell University Press, New York"},{"key":"3_CR3","doi-asserted-by":"crossref","unstructured":"Assael H, Keon J (1982) Nonsampling vs. sampling errors in survey research","DOI":"10.2307\/3203346"},{"issue":"4","key":"3_CR4","doi-asserted-by":"publisher","first-page":"339","DOI":"10.1111\/j.1475-4991.1988.tb00575.x","volume":"34","author":"R Avery","year":"1988","unstructured":"Avery R, Elliehausen G, Kennickell A (1988) Measuring wealth with survey data: an evaluation of the 1983 survey of consumer finances. Rev Income Wealth 34(4):339\u2013369","journal-title":"Rev Income Wealth"},{"key":"3_CR5","unstructured":"Bureau of Justice Statistics. Victims of Identity Theft. \n                http:\/\/bjs.ojp.usdoj.gov\/content\/pub\/pdf\/vit08.pdf"},{"key":"3_CR6","unstructured":"Federal Trade Commission (2003) Identity theft survey report. \n                http:\/\/www.ftc.gov\/os\/2003\/09\/synovatereport.pdf"},{"key":"3_CR7","unstructured":"Federal Trade Commission (2007) Identity theft survey report. \n                www.ftc.gov\/os\/2007\/11\/SynovateFinalReportIDTheft2006.pdf"},{"key":"3_CR8","unstructured":"Federal Reserve Board. Survey of Consumer Finances. \n                http:\/\/www.federalreserve.gov\/pubs\/oss\/oss2\/scfindex.html"},{"key":"3_CR9","doi-asserted-by":"crossref","unstructured":"Flor\u00eancio D, Herley C (2010) Where do security policies come from? In: SOUPS 2010, Redmond","DOI":"10.1145\/1837110.1837124"},{"key":"3_CR10","unstructured":"Gartner (2007) Phishing survey. \n                http:\/\/www.gartner.com\/it\/page.jsp?id=565125"},{"key":"3_CR11","doi-asserted-by":"crossref","unstructured":"Herley C, Flor\u00eancio D (2008) A profitless endeavor: phishing as tragedy of the commons. In:\u00a0NSPW 2008, Lake Tahoe, CA","DOI":"10.1145\/1595676.1595686"},{"key":"3_CR12","doi-asserted-by":"crossref","unstructured":"Herley C, Flor\u00eancio D (2009) Nobody sells gold for the price of silver: dishonesty, uncertainty and the underground economy. In: WEIS 2009, London","DOI":"10.1007\/978-1-4419-6967-5_3"},{"key":"3_CR13","unstructured":"Howard M, LeBlanc D, and Books I (2003) 24x7. Writing secure code, vol\u00a02. Microsoft press, Washington"},{"key":"3_CR14","unstructured":"Internet Crime Complaint Center Annual Crime Report. \n                http:\/\/www.ic3.gov\/media\/annualreports.aspx"},{"key":"3_CR15","unstructured":"Javelin (2003) Identity theft survey report. \n                http:\/\/www.javelinstrategy.com\/uploads\/505.RF_Phishing.pdf"},{"key":"3_CR16","unstructured":"Javelin (2009) Identity theft survey report. \n                http:\/\/www.javelinstrategy.com\/uploads\/505.RF_Phishing.pdf"},{"key":"3_CR17","unstructured":"Kennickell A (1998) Multiple imputation in the Survey of Consumer Finances. In: Proceedings of the section on business and economic statistics, 1998 annual meetings of the American statistical association, Dallas, Texas. Citeseer, 1998"},{"key":"3_CR18","volume-title":"(2009) Getting to the top: reaching wealthy respondents in the SCF","author":"A Kennickell","year":"2009","unstructured":"Kennickell A (2009) Getting to the top: reaching wealthy respondents in the SCF. Washington, DC: Federal reserve board of governors, 2009"},{"issue":"27","key":"3_CR19","doi-asserted-by":"publisher","first-page":"1893","DOI":"10.1056\/NEJM199212313272701","volume":"327","author":"S Lichtman","year":"1992","unstructured":"Lichtman S, Pisarska K, Berman E, Pestone M, Dowling H, Offenbacher E, Weisel H, Heshka S, Matthews D, Heymsfield S (1992) Discrepancy between self-reported and actual caloric intake and exercise in obese subjects. New Engl J Med 327(27):1893\u20131898","journal-title":"New Engl J Med"},{"issue":"22","key":"3_CR20","doi-asserted-by":"publisher","first-page":"9020","DOI":"10.1073\/pnas.1008636108","volume":"108","author":"J Lorenz","year":"2011","unstructured":"Lorenz J, Rauhut H, Schweitzer F, Helbing D (2011) How social influence can undermine the wisdom of crowd effect. Proc Natl Acad Sci 108(22):9020","journal-title":"Proc Natl Acad Sci"},{"key":"3_CR21","unstructured":"Measuring the Effectiveness of In-the-Wild Phishing Attacks. (2009) \n                http:\/\/www.trusteer.com\/sites\/default\/files\/Phishing-Statistics-Dec-2009-FIN.pdf"},{"key":"3_CR22","unstructured":"Moitra SD. Cyber security violations against businesses: a re-assessment of survey data. \n                http:\/\/www.iimcal.ac.in\/res\/upd\\%5CWPS\\%20571.pdf"},{"key":"3_CR23","volume-title":"(2007) Examining the impact of website take-down on phishing","author":"T Moore","year":"2007","unstructured":"Moore T, Clayton R (2007) Examining the impact of website take-down on phishing. In:\u00a0Proceedings of APWG eCrime summit, 2007"},{"key":"3_CR24","doi-asserted-by":"crossref","unstructured":"Morris M (1993) Telling tails explain the discrepancy in sexual partner reports. Nature","DOI":"10.1038\/365437a0"},{"key":"3_CR25","unstructured":"National Strategy for Trusted Identities in Cyberspace. Why we need it. \n                http:\/\/www.nist.gov\/nstic\/NSTIC-Why-We-Need-It.pdf"},{"key":"3_CR26","unstructured":"New Scientist (2008) Cybercrime toll threatens new financial crisis. Nov. 20, 2008. \n                http:\/\/www.newscientist.com\/article\/dn16092-cybercrime-toll-threatens-new-financial-crisis.html"},{"issue":"5","key":"3_CR27","doi-asserted-by":"publisher","first-page":"323","DOI":"10.1080\/00107510500052444","volume":"46","author":"M Newman","year":"2005","unstructured":"Newman M (2005) Power laws, Pareto distributions and Zipf\u2019s law. Contemp Phys 46(5):323\u2013351","journal-title":"Contemp Phys"},{"key":"3_CR28","unstructured":"Paterson P (2010) The Morphing IT Security Landscape. Nov. 18, 2010 \n                https:\/\/vishnu.fhcrc.org\/security-seminar\/IT-Security-Landscape-Morphs.pdf"},{"key":"3_CR29","unstructured":"Ryan J, Jefferson TI (2003) The use, misuse, and abuse of statistics in information security research. In: Proceedings 23rd ASEM national conference, 2003"},{"key":"3_CR30","unstructured":"Shostack A, Stewart A (2008) The new school of information security research"},{"key":"3_CR31","unstructured":"Systems Solutions Group: Cyber Crime \n                http:\/\/www.ssg-inc.net\/cyber_crime\/cyber_crime.html"},{"key":"3_CR32","unstructured":"TaoSecurity Blog: Brief Thoughts on WEIS (2010) \n                http:\/\/taosecurity.blogspot.com\/2010\/07\/brief-thoughts-on-weis-2010.html\n                \n              . July 14, 2010"},{"key":"3_CR33","unstructured":"Tukey J (1960) A survey of sampling from contaminated distributions. I. Olkin, 1960"},{"issue":"4","key":"3_CR34","doi-asserted-by":"publisher","first-page":"375","DOI":"10.1080\/00224499709551905","volume":"34","author":"M Wiederman","year":"1997","unstructured":"Wiederman M (1997) The truth must be in here somewhere: examining the gender discrepancy in self-reported lifetime number of sex partners. J Sex Res 34(4):375\u2013386","journal-title":"J Sex Res"}],"container-title":["Economics of Information Security and Privacy III"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-1-4614-1981-5_3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,7]],"date-time":"2019-05-07T12:15:35Z","timestamp":1557231335000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-1-4614-1981-5_3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,7,27]]},"ISBN":["9781461419808","9781461419815"],"references-count":34,"URL":"https:\/\/doi.org\/10.1007\/978-1-4614-1981-5_3","relation":{},"subject":[],"published":{"date-parts":[[2012,7,27]]}}}