{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T09:33:20Z","timestamp":1725701600387},"publisher-location":"Berlin, Heidelberg","reference-count":15,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642334474"},{"type":"electronic","value":"9783642334481"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-33448-1_29","type":"book-chapter","created":{"date-parts":[[2012,8,28]],"date-time":"2012-08-28T14:13:55Z","timestamp":1346163235000},"page":"212-219","source":"Crossref","is-referenced-by-count":5,"title":["Feeling Secure vs. Being Secure the Mobile Phone User Case"],"prefix":"10.1007","author":[{"given":"Iosif","family":"Androulidakis","sequence":"first","affiliation":[]},{"given":"Gorazd","family":"Kandus","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"29_CR1","unstructured":"Lenhart, A.: Cell phones and American adults. Pew Research Center (2010), http:\/\/www.pewinternet.org (accessed: February 10, 2011)"},{"key":"29_CR2","unstructured":"Synovate: Global mobile phone survey shows the mobile is a \u2019remote control\u2019 for life. Synovate survey (2009), http:\/\/www.synovate.com (accessed: October 09, 2010)"},{"key":"29_CR3","unstructured":"comScore M:Metrics: Smarter phones bring security risks: Study (2008), http:\/\/www.comscore.com (accessed October 09, 2010)"},{"key":"29_CR4","unstructured":"Trend Micro: Smartphone Users Oblivious to Security. Trend Micro survey (2009), http:\/\/www.esecurityplanet.com (accessed October 09, 2010)"},{"key":"29_CR5","doi-asserted-by":"crossref","unstructured":"Goode Intelligence: Mobile security the next battleground (2009), http:\/\/www.goode\/intelligence (accessed October 09, 2010)","DOI":"10.1016\/S1353-4858(10)70025-8"},{"key":"29_CR6","unstructured":"Vrechopoulos, A.P., Constantiou, I.D., Sideris, I.: Strategic Marketing Planning for Mobile Commerce Diffusion and Consumer Adoption. In: Proceedings of M-Business 2002, CD (2002)"},{"key":"29_CR7","unstructured":"Androulidakis, I., Papapetros, D.: Survey Findings towards Awareness of Mobile Phones\u2019 Security Issues, Recent Advances in Data Networks, Communications, Computers. In: Proceedings of 7th WSEAS International Conference on Data Networks, Communications, Computers (DNCOCO 2008), pp. 130\u2013135 (2008)"},{"key":"29_CR8","unstructured":"NCSA: 2010 NCSA\/Norton by Symantec Online Safety Study (2010), http:\/\/www.staysafeonline.org (accessed: February 10, 2011)"},{"key":"29_CR9","unstructured":"Androulidakis, I., Basios, C., Androulidakis, N.: Surveying Users\u2019 Opinions and Trends towards Mobile Payment Issues. In: Techniques and Applications for Mobile Commerce - Proceedings of TAMoCo 2008. Frontiers in Artificial Intelligence and Applications, vol.\u00a0169, pp. 9\u201319 (2008)"},{"key":"29_CR10","unstructured":"National Cyber Security Alliance (NCSA): Schools Lacking Cyber Security and Safety Education (2009), http:\/\/www.staysafeonline.org (accessed October 09, 2010)"},{"key":"29_CR11","unstructured":"McAfee: Most Mobile Users Don\u2019t Know if They Have Security, McAfee-sponsored research (2008), http:\/\/www.esecurityplanet.com (accessed October 09, 2010)"},{"key":"29_CR12","unstructured":"Dillman, D.A.: Mail and Internet Surveys: The Tailored Design Method, 2nd edn. John Wiley & Sons (1999)"},{"issue":"6","key":"29_CR13","doi-asserted-by":"publisher","first-page":"16","DOI":"10.1145\/505532.505535","volume":"26","author":"S.L. Pfleeger","year":"2001","unstructured":"Pfleeger, S.L., Kitchenham, B.A.: Principles of Survey Research Part 1: Turning Lemons into Lemonade. ACM SIGSOFT Software Engineering Notes\u00a026(6), 16\u201318 (2001)","journal-title":"ACM SIGSOFT Software Engineering Notes"},{"issue":"2","key":"29_CR14","first-page":"160","volume":"4","author":"I. Androulidakis","year":"2005","unstructured":"Androulidakis, I., Androulidakis, N.: On a versatile and costless OMR system. WSEAS Transactions on Computers\u00a04(2), 160\u2013165 (2005)","journal-title":"WSEAS Transactions on Computers"},{"key":"29_CR15","series-title":"CCIS","doi-asserted-by":"publisher","first-page":"281","DOI":"10.1007\/978-3-642-21771-5_30","volume-title":"Computer Networks","author":"I. Androulidakis","year":"2011","unstructured":"Androulidakis, I.: Intercepting Mobile Phone Calls and Short Messages Using a GSM Tester. In: Kwiecie\u0144, A., Gaj, P., Stera, P. (eds.) CN 2011. CCIS, vol.\u00a0160, pp. 281\u2013288. Springer, Heidelberg (2011)"}],"container-title":["Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","Global Security, Safety and Sustainability &amp; e-Democracy"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-33448-1_29.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,24]],"date-time":"2020-11-24T03:12:13Z","timestamp":1606187533000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-33448-1_29"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642334474","9783642334481"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-33448-1_29","relation":{},"ISSN":["1867-8211","1867-822X"],"issn-type":[{"type":"print","value":"1867-8211"},{"type":"electronic","value":"1867-822X"}],"subject":[],"published":{"date-parts":[[2012]]}}}