{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,25]],"date-time":"2025-09-25T16:58:08Z","timestamp":1758819488635,"version":"3.40.3"},"publisher-location":"Cham","reference-count":30,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319243146"},{"type":"electronic","value":"9783319243153"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-24315-3_11","type":"book-chapter","created":{"date-parts":[[2015,10,5]],"date-time":"2015-10-05T16:20:13Z","timestamp":1444062013000},"page":"109-118","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":15,"title":["Online Ad-fraud in Search Engine Advertising Campaigns"],"prefix":"10.1007","author":[{"given":"Andreas","family":"Mladenow","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Niina Maarit","family":"Novak","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Christine","family":"Strauss","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2015,11,19]]},"reference":[{"issue":"4","key":"11_CR1","doi-asserted-by":"publisher","first-page":"66","DOI":"10.5210\/fm.v2i4.519","volume":"2","author":"MH Goldhaber","year":"1997","unstructured":"Goldhaber, M.H.: The attention economy and the net. First Monday\n2\n(4), 66\u201378 (1997)","journal-title":"First Monday"},{"key":"11_CR2","volume-title":"Kooperative Forschung","author":"A Mladenow","year":"2011","unstructured":"Mladenow, A., Fr\u00f6schl, K.A.: Kooperative Forschung. Lang, Frankfurt am Main (2011)"},{"issue":"1","key":"11_CR3","doi-asserted-by":"publisher","first-page":"77","DOI":"10.1007\/s40171-013-0053-6","volume":"15","author":"A Mladenow","year":"2014","unstructured":"Mladenow, A., Bauer, C., Strauss, C.: Social crowd integration in new product development: crowdsourcing communities nourish the open innovation paradigm. Global J. Flex. Syst. Manage.\n15\n(1), 77\u201386 (2014)","journal-title":"Global J. Flex. Syst. Manage."},{"issue":"2","key":"11_CR4","doi-asserted-by":"publisher","first-page":"213","DOI":"10.1007\/s12927-012-0009-y","volume":"4","author":"A Mladenow","year":"2012","unstructured":"Mladenow, A., Kryvinska, N., Strauss, C.: Towards cloud-centric service environments. J. Serv. Sci. Res.\n4\n(2), 213\u2013234 (2012)","journal-title":"J. Serv. Sci. Res."},{"issue":"10","key":"11_CR5","doi-asserted-by":"publisher","first-page":"1605","DOI":"10.1287\/mnsc.1090.1054","volume":"55","author":"A Ghose","year":"2009","unstructured":"Ghose, A., Yang, S.: An empirical analysis of search engine advertising: Sponsored search in electronic markets. Manage. Sci.\n55\n(10), 1605\u20131622 (2009)","journal-title":"Manage. Sci."},{"key":"11_CR6","unstructured":"Statista.\n\n                      http:\/\/de.statista.com\/statistik\/daten\/studie\/75188\/umfrage\/werbeumsatz-von-google-seit-2001\/\n                      \n                    \n. Accessed 22 May 2015"},{"issue":"3","key":"11_CR7","doi-asserted-by":"publisher","first-page":"458","DOI":"10.1287\/mnsc.1100.1287","volume":"57","author":"A Goldfarb","year":"2011","unstructured":"Goldfarb, A., Tucker, C.: Search engine advertising: channel substitution when pricing ads to context. Manage. Sci.\n57\n(3), 458\u2013470 (2011)","journal-title":"Manage. Sci."},{"key":"11_CR8","volume-title":"Google\u2019s PageRank and beyond: the science of search engine rankings","author":"AN Langville","year":"2011","unstructured":"Langville, A.N., Meyer, C.D.: Google\u2019s PageRank and beyond: the science of search engine rankings. Princeton University Press, Princeton (2011)"},{"issue":"1","key":"11_CR9","doi-asserted-by":"publisher","first-page":"88","DOI":"10.1016\/j.tourman.2009.12.004","volume":"32","author":"Z Xiang","year":"2011","unstructured":"Xiang, Z., Pan, B.: Travel queries on cities in the United States: implications for search engine marketing for tourist destinations. Tour. Manage.\n32\n(1), 88\u201397 (2011)","journal-title":"Tour. Manage."},{"key":"11_CR10","unstructured":"AdWords.\n\n                      https:\/\/www.google.at\/adwords\/\n                      \n                    \n. Accessed 22 May 2015"},{"key":"11_CR11","unstructured":"Bing Ads.\n\n                      https:\/\/secure.bingads.microsoft.com\/\n                      \n                    \n. Accessed 22 May 2015"},{"key":"11_CR12","doi-asserted-by":"crossref","first-page":"181","DOI":"10.1007\/978-3-319-07812-0_10","volume-title":"Real World Data Mining Applications","author":"B Kitts","year":"2015","unstructured":"Kitts, B., et al.: Click fraud detection: adversarial pattern recognition over 5\u00a0years at microsoft. In: Abou-Nasr, M., Lessmann, S., Stahlbock, R., Weiss, G.M. (eds.) Real World Data Mining Applications, vol. 17, pp. 181\u2013201. Springer, Heidelberg (2015)"},{"key":"11_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"34","DOI":"10.1007\/11600930_5","volume-title":"Internet and Network Economics","author":"N Immorlica","year":"2005","unstructured":"Immorlica, N., Jain, K., Mahdian, M., Talwar, K.: Click fraud resistant methods for learning click-through rates. In: Deng, X., Ye, Y. (eds.) WINE 2005. LNCS, vol. 3828, pp. 34\u201345. Springer, Heidelberg (2005)"},{"issue":"2","key":"11_CR14","doi-asserted-by":"publisher","first-page":"293","DOI":"10.1287\/mksc.1080.0397","volume":"28","author":"KC Wilbur","year":"2009","unstructured":"Wilbur, K.C., Zhu, Y.: Click fraud. Mark. Sci.\n28\n(2), 293\u2013308 (2009)","journal-title":"Mark. Sci."},{"issue":"2","key":"11_CR15","doi-asserted-by":"publisher","first-page":"21","DOI":"10.1145\/1764873.1764877","volume":"40","author":"H Haddadi","year":"2010","unstructured":"Haddadi, H.: Fighting online click-fraud using bluff ads. ACM SIGCOMM Comput. Commun. Rev.\n40\n(2), 21\u201325 (2010)","journal-title":"ACM SIGCOMM Comput. Commun. Rev."},{"key":"11_CR16","unstructured":"Liu, B., Nath, S., Govindan, R., Liu, J.: DECAF: detecting and characterizing ad fraud in mobile apps. In: Proceedings of NSDI (2014)"},{"key":"11_CR17","unstructured":"Statista.\n\n                      http:\/\/www.statista.com\/statistics\/248059\/biggest-challenages-in-search-marketing-worldwide\/\n                      \n                    \n. Accessed 22 May 2015"},{"key":"11_CR18","unstructured":"GOMC.\n\n                      https:\/\/www.google.com\/onlinechallenge\/\n                      \n                    \n. Accessed 22 May 2015"},{"key":"11_CR19","doi-asserted-by":"crossref","unstructured":"Strauss C.: Informatik-Sicherheitsmanagement: eine Herausforderung f\u00fcr die Unternehmensf\u00fchrung, Vieweg+Teubner Verlag (1991)","DOI":"10.1007\/978-3-322-94696-6"},{"issue":"2","key":"11_CR20","doi-asserted-by":"publisher","first-page":"251","DOI":"10.1142\/S0219622002000154","volume":"1","author":"C Strauss","year":"2002","unstructured":"Strauss, C., Stummer, C.: Multiobjective decision support in IT-risk management. Int. J. Inf. Technol. Decis. Making\n1\n(2), 251\u2013268 (2002)","journal-title":"Int. J. Inf. Technol. Decis. Making"},{"key":"11_CR21","unstructured":"Kiesling E., Ekelhart A., Grill B., Stummer C., Strauss C.: Multi-objective evolutionary optimization of computation-intensive simulations: the case of security control selection. In: Proceedings of the 11th Metaheuristics International Conference (MIC 2015), forthcoming (2015)"},{"key":"11_CR22","unstructured":"GOOGLE Company \u2013 Our history in depth.\n\n                      http:\/\/www.google.com\/about\/company\/history\/#2000\n                      \n                    \n. Accessed 22 May 2015"},{"key":"11_CR23","unstructured":"LEFTY G BALOGH \u2013 Digital Marketing Testing Ground.\n\n                      http:\/\/www.leftygbalogh.com\/2011\/story-hacked-google-adwords-account\/\n                      \n                    \n. Accessed 22 May 2015"},{"key":"11_CR24","unstructured":"MOZ \u2013 Blogs: AdWords Hackers \u2013 What a Nightmare.\n\n                      https:\/\/moz.com\/ugc\/adwords-hackers-what-a-nightmare\/\n                      \n                    \n. Accessed 22 May 2015"},{"key":"11_CR25","unstructured":"GOOGLE \u2013 Official AdWords Community.\n\n                      https:\/\/www.de.adwords-community.com\/t5\/Grundlagen\/Hilfe-Mein-Account-wurde-gehackt\/td-p\/44399\/\n                      \n                    \n. Accessed 22 May 2015"},{"key":"11_CR26","unstructured":"ABEST WEB.\n\n                      http:\/\/www.abestweb.com\/forums\/showthread.php?113490-Google-AdAWords-account-hijacked\/\n                      \n                    \n. Accessed 22 May 2015"},{"key":"11_CR27","unstructured":"GOOGLE \u2013 Official Blog \u2013 Insights from Googlers into our products, and technology.\n\n                      http:\/\/googleblog.blogspot.co.at\/2008\/04\/how-to-avoid-getting-hooked.html\/\n                      \n                    \n. Accessed 22 May 2015"},{"key":"11_CR28","unstructured":"GOOGLE Product Forums.\n\n                      https:\/\/productforums.google.com\/forum\/#!topic\/gmail\/A0wZmlrC0f8\/\n                      \n                    \n. Accessed 22 May 2015"},{"key":"11_CR29","unstructured":"PPCDISCUSSIONS.\n\n                      http:\/\/www.ppcdiscussions.com\/2008\/09\/my-personal-adwords-account-hacked.html\/\n                      \n                    \n. Accessed 22 May 2015"},{"key":"11_CR30","unstructured":"SEARCH ENGINE Roundtable: Google AdWords Account Hacked: False Ads & False Charges.\n\n                      https:\/\/www.seroundtable.com\/archives\/017946.html\/\n                      \n                    \n. Accessed 22 May (2015)"}],"container-title":["Lecture Notes in Computer Science","Information and Communication Technology"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-24315-3_11","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,25]],"date-time":"2019-09-25T03:51:29Z","timestamp":1569383489000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-24315-3_11"}},"subtitle":["Prevention, Detection and Damage Limitation"],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319243146","9783319243153"],"references-count":30,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-24315-3_11","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2015]]},"assertion":[{"value":"19 November 2015","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}