{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,12]],"date-time":"2026-04-12T15:31:05Z","timestamp":1776007865805,"version":"3.50.1"},"publisher-location":"Cham","reference-count":11,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783031474507","type":"print"},{"value":"9783031474514","type":"electronic"}],"license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023]]},"DOI":"10.1007\/978-3-031-47451-4_44","type":"book-chapter","created":{"date-parts":[[2023,10,31]],"date-time":"2023-10-31T20:02:04Z","timestamp":1698782524000},"page":"611-617","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Scan Me: QR Codes as Emerging Malware Delivery Mechanism"],"prefix":"10.1007","author":[{"given":"Keegan","family":"Cargrill","sequence":"first","affiliation":[]},{"given":"Tamirat","family":"Abegaz","sequence":"additional","affiliation":[]},{"given":"Luis Cueva","family":"Parra","sequence":"additional","affiliation":[]},{"given":"Richelle","family":"DaSouza","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,11,1]]},"reference":[{"key":"44_CR1","unstructured":"Soon, T J.: QR code. Synth. J. 2008, 59\u201378 (2008)"},{"issue":"2","key":"44_CR2","first-page":"61","volume":"3","author":"X Dou","year":"2008","unstructured":"Dou, X., Li, H.: Creative use of QR codes in consumer communication. Int. J. Mob. Mark 3(2), 61\u201367 (2008)","journal-title":"Int. J. Mob. Mark"},{"key":"44_CR3","doi-asserted-by":"crossref","unstructured":"Kharraz, A., et al.: Optical delusions: a study of malicious QR codes in the wild. In: 2014 44th Annual IEEE\/IFIP International Conference on Dependable Systems and Networks. IEEE (2014)","DOI":"10.1109\/DSN.2014.103"},{"key":"44_CR4","unstructured":"https:\/\/owasp.org\/www-community\/attacks\/Qrljacking. Accesed 9 Aug 2022"},{"key":"44_CR5","doi-asserted-by":"publisher","unstructured":"Vidas, T., Owusu, E., Wang, S., Zeng, C., Cranor, L.F., Christin, N:. QRishing: the Susceptibility of Smartphone Users to QR Code Phishing Attacks. In: Adams, A.A., Brenner, M., Smith, M. (eds.) Financial Cryptography and Data Security. FC 2013. Lecture Notes in Computer Science, vol. 7862, pp. 52\u201369, Springer, Heidelberg (2013). https:\/\/doi.org\/10.1007\/978-3-642-41320-9","DOI":"10.1007\/978-3-642-41320-9"},{"issue":"2019","key":"44_CR6","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2019.102369","volume":"48","author":"R Focardi","year":"2019","unstructured":"Focardi, R., Luccio, F.L., Wahsheh, H.A.M.: Usable security for QR code. J. Inf. Secur. Appl. 48(2019), 102369 (2019). https:\/\/doi.org\/10.1016\/j.jisa.2019.102369","journal-title":"J. Inf. Secur. Appl."},{"issue":"10","key":"44_CR7","doi-asserted-by":"publisher","first-page":"1014","DOI":"10.1080\/0144929X.2013.763860","volume":"32","author":"P Tetri","year":"2013","unstructured":"Tetri, P., Vuorinen, J.: Dissecting social engineering. Behav. Inf. Technol. 32(10), 1014\u20131023 (2013). https:\/\/doi.org\/10.1080\/0144929X.2013.763860","journal-title":"Behav. Inf. Technol."},{"issue":"9","key":"44_CR8","first-page":"17","volume":"164","author":"A Mishra","year":"2017","unstructured":"Mishra, A., Mathuria, M.: A review on QR code. Int. J. Comput. Appl.Comput. Appl. 164(9), 17\u201319 (2017)","journal-title":"Int. J. Comput. Appl.Comput. Appl."},{"key":"44_CR9","unstructured":"OWASP. Cross-Site Scripting (XSS) | OWASP. Foundation. Retrieved 13 Feb 2020 https:\/\/owasp.org\/www-community\/attacks\/xss\/"},{"issue":"3","key":"44_CR10","first-page":"157","volume":"11","author":"P Musuva","year":"2019","unstructured":"Musuva, P., Chepken, C., Getao, K.: A naturalistic methodology for assessing susceptibility to social engineering through phishing. Afr. J. Inf. Syst. 11(3), 157\u2013182 (2019)","journal-title":"Afr. J. Inf. Syst."},{"key":"44_CR11","unstructured":"https:\/\/www.ibm.com\/analytics\/spss-statistics-software. Accessed Aug 2022"}],"container-title":["Lecture Notes in Networks and Systems","Proceedings of the Future Technologies Conference (FTC) 2023, Volume 2"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-47451-4_44","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,4,13]],"date-time":"2024-04-13T18:08:25Z","timestamp":1713031705000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-47451-4_44"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023]]},"ISBN":["9783031474507","9783031474514"],"references-count":11,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-47451-4_44","relation":{},"ISSN":["2367-3370","2367-3389"],"issn-type":[{"value":"2367-3370","type":"print"},{"value":"2367-3389","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023]]},"assertion":[{"value":"1 November 2023","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"FTC","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Proceedings of the Future Technologies Conference","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Vancouver, BC","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Canada","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2023","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19 October 2023","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"20 October 2023","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"ftc2023","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/saiconference.com\/FTC","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}