{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T16:55:51Z","timestamp":1743008151198,"version":"3.40.3"},"publisher-location":"Cham","reference-count":38,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030192730"},{"type":"electronic","value":"9783030192747"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-3-030-19274-7_21","type":"book-chapter","created":{"date-parts":[[2019,4,25]],"date-time":"2019-04-25T18:09:50Z","timestamp":1556215790000},"page":"280-295","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["The \u201cGame Hack\u201d Scam"],"prefix":"10.1007","author":[{"given":"Emad","family":"Badawi","sequence":"first","affiliation":[]},{"given":"Guy-Vincent","family":"Jourdan","sequence":"additional","affiliation":[]},{"given":"Gregor","family":"Bochmann","sequence":"additional","affiliation":[]},{"given":"Iosif-Viorel","family":"Onut","sequence":"additional","affiliation":[]},{"given":"Jason","family":"Flood","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,4,26]]},"reference":[{"key":"21_CR1","unstructured":"List: the two-letter country code\/country abbreviation (2018). bit.ly\/2ROvg8N"},{"key":"21_CR2","unstructured":"Supervised learning: scikit-learn 0.20.0 documentation (2018). bit.ly\/2RjUEi4"},{"key":"21_CR3","doi-asserted-by":"crossref","unstructured":"Bidgoli, M., Grossklags, J.: \u201cHello. this is the irs calling.\u201d: a case study on scams, extortion, impersonation, and phone spoofing. In: 2017 APWG Symposium on Electronic Crime Research (eCrime), pp. 57\u201369. IEEE (2017)","DOI":"10.1109\/ECRIME.2017.7945055"},{"issue":"3","key":"21_CR4","doi-asserted-by":"publisher","first-page":"261","DOI":"10.1080\/1068316X.2013.772180","volume":"20","author":"T Buchanan","year":"2014","unstructured":"Buchanan, T., Whitty, M.T.: The online dating romance scam: causes and consequences of victimhood. Psychol. Crime Law 20(3), 261\u2013283 (2014)","journal-title":"Psychol. Crime Law"},{"key":"21_CR5","unstructured":"Clark, J.W., McCoy, D.: There are no free ipads: an analysis of survey scams as a business. In: Presented as part of the 6th USENIX Workshop on Large-Scale Exploits and Emergent Threats. USENIX, Washington, D.C. (2013). bit.ly\/2My6C6J"},{"key":"21_CR6","first-page":"1","volume":"518","author":"C Cross","year":"2016","unstructured":"Cross, C., Richards, K., Smith, R.G.: The reporting experiences and support needs of victims of online fraud. Trends Issues Crim. Crim. Justice 518, 1\u201314 (2016)","journal-title":"Trends Issues Crim. Crim. Justice"},{"key":"21_CR7","unstructured":"Doshi, N.: Survey scammers moving to pinterest (2012). symc.ly\/2SwIfbZ"},{"key":"21_CR8","unstructured":"Jurafsky, D., Martin, J.H.: Markov assumption (2014). stanford.io\/29zsjAy"},{"key":"21_CR9","unstructured":"Kaszor, D.: How free-to-play games make money (2012). bit.ly\/2QgHpPc"},{"key":"21_CR10","unstructured":"Kershner, K.: How do free-to-play games make money? (2018). bit.ly\/2yN3huU"},{"key":"21_CR11","doi-asserted-by":"crossref","unstructured":"Kharraz, A., Robertson, W., Kirda, E.: Surveylance: automatically detecting online survey scams. In: 2018 IEEE Symposium on Security and Privacy (SP), pp. 70\u201386. IEEE (2018)","DOI":"10.1109\/SP.2018.00044"},{"key":"21_CR12","unstructured":"Laanela, M.: Canada\u2019s top 10 scams earned crooks \\$1.2b last year, say bbb (2016). bit.ly\/2P6r2IC"},{"key":"21_CR13","doi-asserted-by":"crossref","unstructured":"Le Page, S., Jourdan, G.V., Bochmann, G.V., Flood, J., Onut, I.V.: Using url shorteners to compare phishing and malware attacks. In: APWG Symposium on Electronic Crime Research (eCrime), pp. 1\u201313. IEEE (2018)","DOI":"10.1109\/ECRIME.2018.8376215"},{"key":"21_CR14","doi-asserted-by":"crossref","unstructured":"Miramirkhani, N., Starov, O., Nikiforakis, N.: Dial one for scam: A large-scale analysis of technical support scams. arXiv preprint arXiv:1607.06891 (2016)","DOI":"10.14722\/ndss.2017.23163"},{"key":"21_CR15","unstructured":"DNS-BH malware domains (2017). http:\/\/www.malwaredomains.com\/"},{"key":"21_CR16","unstructured":"hpHosts online, simple, searchable & free (2017). https:\/\/hosts-file.net\/"},{"key":"21_CR17","unstructured":"Malcode database (2017). http:\/\/malc0de.com\/database\/"},{"key":"21_CR18","unstructured":"MDL: malware domain list (2017). https:\/\/www.malwaredomainlist.com\/"},{"key":"21_CR19","unstructured":"Sans: suspicious domains (2017). bit.ly\/2FNCzHv"},{"key":"21_CR20","unstructured":"The swiss security blog (2017). bit.ly\/2EE7HK1"},{"key":"21_CR21","unstructured":"Beautifulsoup (2018). https:\/\/pypi.org\/project\/beautifulsoup4\/"},{"key":"21_CR22","unstructured":"Cheat engine (2018). bit.ly\/2yn5gpn"},{"key":"21_CR23","unstructured":"Chromedriver - webdriver for chrome (2018). bit.ly\/2CMwVBG"},{"key":"21_CR24","unstructured":"Google safe browsing API (2018). https:\/\/goo.gl\/4yAFyQ"},{"key":"21_CR25","unstructured":"Number of the video gamers worldwide (2018). bit.ly\/2HE4m9Y"},{"key":"21_CR26","unstructured":"PhantomJS - scriptable headless browser (2018). http:\/\/phantomjs.org\/"},{"key":"21_CR27","unstructured":"Selenium with python, selenium python bindings (2018). bit.ly\/2LNldJn"},{"key":"21_CR28","unstructured":"Value of the global video game market (2018). bit.ly\/2kmSvEU"},{"key":"21_CR29","unstructured":"Virustotal (2018). https:\/\/www.virustotal.com\/"},{"key":"21_CR30","unstructured":"Orla: technical support phone scam (2010). symc.ly\/2OdDyR3"},{"key":"21_CR31","doi-asserted-by":"crossref","unstructured":"Rauti, S., Lepp\u00e4nen, V.: \u201cyou have a potential hacker\u2019s infection\u201d: a study on technical support scams. In: 2017 IEEE International Conference on Computer and Information Technology (CIT), pp. 197\u2013203. IEEE (2017)","DOI":"10.1109\/CIT.2017.32"},{"key":"21_CR32","unstructured":"Sahin, M., Relieu, M., Francillon, A.: Using chatbots against voice spam: analyzing lenny\u2019s effectiveness. In: Thirteenth Symposium on Usable Privacy and Security (SOUPS 2017), pp. 319\u2013337. USENIX Association, Santa Clara (2017)"},{"key":"21_CR33","doi-asserted-by":"crossref","unstructured":"Srinivasan, B., et al.: Exposing search and advertisement abuse tactics and infrastructure of technical support scammers. In: In Proceedings of the 2018 World Wide Web Conference on World Wide Web, pp. 319\u2013328. International World Wide Web Conferences Steering Committee (2018)","DOI":"10.1145\/3178876.3186098"},{"key":"21_CR34","unstructured":"Vanessa: detailed information about 888.980.9787 or 888.980.9787 phone number in free number 888 free 8xx us (2018). bit.ly\/2RMmbxv"},{"issue":"4","key":"21_CR35","doi-asserted-by":"publisher","first-page":"443","DOI":"10.1057\/sj.2012.57","volume":"28","author":"MT Whitty","year":"2015","unstructured":"Whitty, M.T.: Anatomy of the online dating romance scam. Secur. J. 28(4), 443\u2013455 (2015)","journal-title":"Secur. J."},{"issue":"3","key":"21_CR36","doi-asserted-by":"publisher","first-page":"181","DOI":"10.1089\/cyber.2011.0352","volume":"15","author":"MT Whitty","year":"2012","unstructured":"Whitty, M.T., Buchanan, T.: The online romance scam: a serious cybercrime. CyberPsychology Behav. Soc. Netw. 15(3), 181\u2013183 (2012)","journal-title":"CyberPsychology Behav. Soc. Netw."},{"key":"21_CR37","unstructured":"Wueest, C.: Fast-flux facebook application scams (2011). symc.ly\/2ADviGF"},{"key":"21_CR38","unstructured":"Zeltser, L.: Conversation with a tech support scammer (2015). bit.ly\/1PXKDlN"}],"container-title":["Lecture Notes in Computer Science","Web Engineering"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-19274-7_21","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,4,25]],"date-time":"2024-04-25T00:04:17Z","timestamp":1714003457000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-19274-7_21"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9783030192730","9783030192747"],"references-count":38,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-19274-7_21","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"26 April 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICWE","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Web Engineering","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Daejeon","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Korea (Republic of)","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"11 June 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"14 June 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"icwe2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/icwe2019.webengineering.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"106","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"26","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"9","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"25% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"4","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}