{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T16:43:00Z","timestamp":1725900180414},"publisher-location":"Berlin, Heidelberg","reference-count":23,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642169847"},{"type":"electronic","value":"9783642169854"}],"license":[{"start":{"date-parts":[[2010,1,1]],"date-time":"2010-01-01T00:00:00Z","timestamp":1262304000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-16985-4_7","type":"book-chapter","created":{"date-parts":[[2010,10,26]],"date-time":"2010-10-26T16:32:30Z","timestamp":1288110750000},"page":"73-84","source":"Crossref","is-referenced-by-count":0,"title":["Developing Security Assessment Models in Web2 Mobile Environments"],"prefix":"10.1007","author":[{"given":"Bong Gyou","family":"Lee","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Hyunsik","family":"Seo","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Giseob","family":"Byun","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Keon Chul","family":"Park","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Soo Kyung","family":"Park","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Taisiya","family":"Kim","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","reference":[{"key":"7_CR1","unstructured":"Ji, S.J., Jung, S.Y., Lee, J.H.: Opportunities and Threats of Smart-phone. In: Internet & Security Issues, Korea Information Security Agency, Seoul, Korea (2010)"},{"key":"7_CR2","first-page":"64","volume":"17","author":"S.K. Jang","year":"2010","unstructured":"Jang, S.K.: Security Threats in Smart-phone environment. Korea Information Processing Society Review\u00a017, 64\u201369 (2010)","journal-title":"Korea Information Processing Society Review"},{"key":"7_CR3","unstructured":"Park, J.H.: Web 2.0 Technical Trend and Web Security Threat Analysis. In: Korea Information Security Agency (2006)"},{"key":"7_CR4","first-page":"21","volume":"117","author":"H.Y. Youm","year":"2008","unstructured":"Youm, H.Y., Lee, J.S.: Web 2.0 Security Technology Trends and Promoting Standardization. Journal of Telecommunications Technology Association\u00a0117, 21\u201329 (2008)","journal-title":"Journal of Telecommunications Technology Association"},{"key":"7_CR5","first-page":"25","volume":"18","author":"C.Y. Lee","year":"2008","unstructured":"Lee, C.Y., Kim, C.H., Lee, J.H.: Security Problems and Effective Measures of Inspecting Web in Web 2.0. Korea Institute of Information Security and Cryptology\u00a018, 25\u201333 (2008)","journal-title":"Korea Institute of Information Security and Cryptology"},{"key":"7_CR6","volume-title":"Web Squared: Web 2.0 Five Years on","author":"T. O\u2019Reilly","year":"2009","unstructured":"O\u2019Reilly, T., Battelle, J.: Web Squared: Web 2.0 Five Years on. O\u2019Reilly Media, Inc., Sebastopol (2009)"},{"key":"7_CR7","unstructured":"Kim, S.H., Kim, H.D.: A Study of Web 2.0 Trend & Service View. Research on Digital Policy 5 (2007)"},{"key":"7_CR8","doi-asserted-by":"crossref","unstructured":"Salomon, M.: Would you consider using online virtual worlds for meetings. Telecommunications Journal of Australia\u00a059 (2009)","DOI":"10.2104\/tja09049"},{"key":"7_CR9","unstructured":"Graham, M.: Transparency and Development: Ethical Consumption and Economic Development through Web 2.0 and the Internet of Things (2010)"},{"key":"7_CR10","doi-asserted-by":"crossref","unstructured":"Wagner, D., Schmalstieg, D.: First Steps Towards Handheld Augmented Reality. In: Proceedings of the 7th IEEE International Symposium on Wearable Computers (2003)","DOI":"10.1109\/ISWC.2003.1241402"},{"key":"7_CR11","unstructured":"Jung, D.Y.: The changes of future that the augmented reality will bring, Samsung Economic Research Institute, Seoul, Korea (2010)"},{"key":"7_CR12","unstructured":"Geser, H.: Augmenting things, establishments and human beings (2010)"},{"key":"7_CR13","unstructured":"Hong, K.Y., Hong, K.W., Park, J.W., Lee, K.H.: Web Service Security Technology Standardization Trends. Korea Institute of Information Security and Cryptology 14 (2004)"},{"key":"7_CR14","unstructured":"Lim, C.G., Ahn, D.S., Kim, K.H., Lee, K.Y.: A Study on the Web Service-Hacking Pattern Recognition System. Webcasting Internet and Telecommunication Review 9 (2009)"},{"key":"7_CR15","unstructured":"Lee, W.T., Lee, J.E., Yang, S.C., Hwang, Y.S.: The Changes of Citizens\u2019 E-participation and Political Implication in the Age of Convergence between Broadcasting and Telecommunication. Korea Information Society Development Institute (2008)"},{"key":"7_CR16","doi-asserted-by":"publisher","first-page":"4","DOI":"10.1016\/S1353-4858(07)70025-9","volume":"200","author":"P. Ritchie","year":"2007","unstructured":"Ritchie, P.: The Security Risks of AJAX\/Web 2.0 Application. Network Security\u00a0200, 4\u20138 (2007)","journal-title":"Network Security"},{"key":"7_CR17","unstructured":"Kim, W.J., Moon, Y.J., Lee, S.J.: A Study on the Security Vulnerability and Countermeasure in the Mobile Web 2.0 Environments. Journal of Electrical Engineering and Information Science 34 (2007)"},{"key":"7_CR18","unstructured":"Lee, H.D., Park, N.J., Choi, D.H., Chung, K.I.: A Case Study on Mobile USN Technology and Weakness. Korea Institute of Information Security and Cryptology 18 (2008)"},{"key":"7_CR19","unstructured":"Korea Information Security Agency, Threats and Countermeasures on Social Network Environment. Information Security Issue Report, Korea Information Security Agency, Seoul, Korea (2007)"},{"key":"7_CR20","unstructured":"Lee, H.H., Choi, H.C., Kim, J.H., Cho, S.R., Jin, S.H.: A Study of Sharing Identity and Protect on SNS Environments. Korea Institute of Information Security and Cryptology 19 (2009)"},{"key":"7_CR21","unstructured":"Ahn Lab, http:\/\/kr.ahnlab.com\/info\/securityinfo"},{"key":"7_CR22","first-page":"21","volume":"19","author":"K.Y. Kim","year":"2009","unstructured":"Kim, K.Y., Kang, D.H.: Smart-phone Security Solutions in Open-mobile Environment. KIISC Review\u00a019, 21\u201328 (2009)","journal-title":"KIISC Review"},{"key":"7_CR23","unstructured":"Guo, C., Wang, H.J., Zhu, W.: Smart-phone Attacks and Defenses. In: Third Workshop on Hot Topics in Networks HotNets-III, San Diego, CA, USA (2004)"}],"container-title":["Lecture Notes in Computer Science","Current Trends in Web Engineering"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-16985-4_7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,5]],"date-time":"2019-06-05T22:17:52Z","timestamp":1559773072000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-16985-4_7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642169847","9783642169854"],"references-count":23,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-16985-4_7","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2010]]}}}