{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,23]],"date-time":"2025-08-23T05:14:45Z","timestamp":1755926085066,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":29,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783662549698"},{"type":"electronic","value":"9783662549704"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-662-54970-4_1","type":"book-chapter","created":{"date-parts":[[2017,5,16]],"date-time":"2017-05-16T02:02:55Z","timestamp":1494900175000},"page":"3-21","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["Understanding Craigslist Rental Scams"],"prefix":"10.1007","author":[{"given":"Youngsam","family":"Park","sequence":"first","affiliation":[]},{"given":"Damon","family":"McCoy","sequence":"additional","affiliation":[]},{"given":"Elaine","family":"Shi","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,5,17]]},"reference":[{"key":"1_CR1","unstructured":"800notes. http:\/\/800notes.com\/"},{"key":"1_CR2","unstructured":"DB-IP. http:\/\/db-ip.com\/"},{"key":"1_CR3","unstructured":"Report craigslist Scams. http:\/\/reportcraigslistscams.com\/"},{"key":"1_CR4","unstructured":"Ripoff Report. http:\/\/www.ripoffreport.com\/"},{"key":"1_CR5","unstructured":"United States Census Bureau. http:\/\/www.census.gov\/"},{"key":"1_CR6","unstructured":"National association of realtors - field guide to quick real estate statistics. http:\/\/www.realtor.org\/field-guides\/field-guide-to-quick-real-estate-statistics (2013)"},{"issue":"6","key":"1_CR7","first-page":"39","volume":"49","author":"J Buchanan","year":"2001","unstructured":"Buchanan, J., Grant, A.J.: Investigating and prosecuting Nigerian fraud. U. S. Attorneys\u2019 Bull. 49(6), 39\u201347 (2001)","journal-title":"U. S. Attorneys\u2019 Bull."},{"key":"1_CR8","unstructured":"Clayton, R., Moore, T., Christin, N.: Concentrating correctly on cybercrime concentration. In: Proceedings of the Fourteenth Workshop on the Economics of Information Security (WEIS), Delft, Netherlands, June 2015"},{"key":"1_CR9","unstructured":"Dyrud, M.A.: I brought you a good news: an analysis of Nigerian 419 letters. In: Proceedings of the 2005 Association for Business Communication Annual Convention (2005)"},{"key":"1_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"161","DOI":"10.1007\/11428817_15","volume-title":"Natural Language Processing and Information Systems","author":"Y Gao","year":"2005","unstructured":"Gao, Y., Zhao, G.: Knowledge-based information extraction: a case study of recognizing emails of Nigerian frauds. In: Montoyo, A., Mu\u0144oz, R., M\u00e9tais, E. (eds.) NLDB 2005. LNCS, vol. 3513, pp. 161\u2013172. Springer, Heidelberg (2005). doi:10.1007\/11428817_15"},{"key":"1_CR11","doi-asserted-by":"crossref","unstructured":"Garg, V., Nilizadeh, S.: Craigslist scams and community composition: investigating online fraud victimization. In: International Workshop on Cyber Crime, IEEE (2013)","DOI":"10.1109\/SPW.2013.21"},{"key":"1_CR12","unstructured":"Herley, C.: Why do Nigerian Scammers say they are from Nigeria? In: WEIS (2012)"},{"key":"1_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"216","DOI":"10.1007\/978-3-319-20550-2_12","volume-title":"Detection of Intrusions and Malware, and Vulnerability Assessment","author":"JM Huang","year":"2015","unstructured":"Huang, J.M., Stringhini, G., Yong, P.: Quit playing games with my heart: understanding online dating scams. In: Almgren, M., Gulisano, V., Maggi, F. (eds.) DIMVA 2015. LNCS, vol. 9148, pp. 216\u2013236. Springer, Cham (2015). doi:10.1007\/978-3-319-20550-2_12"},{"key":"1_CR14","doi-asserted-by":"crossref","unstructured":"Isacenkova, J., Thonnard, O., Costin, A., Balzarotti, D., Francillon, A.: Inside the scam jungle: a closer look at 419 scam email operations. In: Security and Privacy Workshops (SPW), 2013 IEEE, pp. 143\u2013150. IEEE (2013)","DOI":"10.1109\/SPW.2013.15"},{"issue":"4","key":"1_CR15","first-page":"853","volume":"40","author":"C Johnson","year":"2012","unstructured":"Johnson, C.: Fakers, breachers, slackers, and deceivers: Opportunistic actors during the foreclosure crisis deserve criminal sanctions. Cap. Univ. Law Rev. 40(4), 853 (2012)","journal-title":"Cap. Univ. Law Rev."},{"key":"1_CR16","doi-asserted-by":"crossref","unstructured":"Kanich, C., Kreibich, C., Levchenko, K., Enright, B., Voelker, G.M., Paxson, V., Savage, S.: Spamalytics: an empirical analysis of spam marketing conversion. In: Proceedings of the 15th ACM Conference on CCS. ACM (2008)","DOI":"10.1145\/1455770.1455774"},{"key":"1_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"219","DOI":"10.1007\/978-3-642-00975-4_22","volume-title":"Passive and Active Network Measurement","author":"M Konte","year":"2009","unstructured":"Konte, M., Feamster, N., Jung, J.: Dynamics of online scam hosting infrastructure. In: Moon, S.B., Teixeira, R., Uhlig, S. (eds.) PAM 2009. LNCS, vol. 5448, pp. 219\u2013228. Springer, Heidelberg (2009). doi:10.1007\/978-3-642-00975-4_22"},{"key":"1_CR18","doi-asserted-by":"crossref","unstructured":"Levchenko, K., Pitsillidis, A., Chachra, N., Enright, B., F\u00e9legyh\u00e1zi, M., Grier, C., Halvorson, T., Kanich, C., Kreibich, C., Liu, H., McCoy, D., Weaver, N., Paxson, V., Voelker, G.M., Savage, S.: Click trajectories: end-to-end analysis of the spam value chain. In: IEEE Symposium on Security and Privacy (2011)","DOI":"10.1109\/SP.2011.24"},{"key":"1_CR19","doi-asserted-by":"crossref","unstructured":"McCoy, D., Dharmdasani, H., Kreibich, C., Voelker, G.M., Savage, S.: Priceless: the role of payments in abuse-advertised goods. In: Proceedings of the 2012 ACM Conference on CCS, CCS 2012 (2012)","DOI":"10.1145\/2382196.2382285"},{"key":"1_CR20","unstructured":"McCoy, D., Pitsillidis, A., Jordan, G., Weaver, N., Kreibich, C., Krebs, B., Voelker, G.M., Savage, S., Levchenko, K.: Pharmaleaks: Understanding the business of online pharmaceutical affiliate programs. In: USENIX Security Symposium (2012)"},{"key":"1_CR21","doi-asserted-by":"crossref","unstructured":"Park, Y., Jones, J., McCoy, D., Shi, E., Jakobsson, M.: Scambaiter: understanding targeted nigerian scams on craigslist. In: NDSS (2014)","DOI":"10.14722\/ndss.2014.23284"},{"issue":"2","key":"1_CR22","first-page":"494","volume":"3","author":"A Rege","year":"2009","unstructured":"Rege, A.: What\u2019s love got to do with it? Exploring online dating scams and identity fraud. Int. J. Cyber Criminol. 3(2), 494\u2013512 (2009)","journal-title":"Int. J. Cyber Criminol."},{"issue":"1","key":"1_CR23","doi-asserted-by":"publisher","first-page":"27","DOI":"10.1080\/09502380802016162","volume":"23","author":"A Smith","year":"2009","unstructured":"Smith, A.: Nigerian scam e-mails and the charms of capital. Cult. Stud. 23(1), 27\u201347 (2009)","journal-title":"Cult. Stud."},{"key":"1_CR24","doi-asserted-by":"publisher","first-page":"70","DOI":"10.1145\/1897852.1897872","volume":"54","author":"F Stajano","year":"2011","unstructured":"Stajano, F., Wilson, P.: Understanding scam victims: seven principles for systems security. Commun. ACM 54, 70\u201375 (2011)","journal-title":"Commun. ACM"},{"key":"1_CR25","unstructured":"Stone-Gross, B., Holz, T., Stringhini, G., Vigna, G.: The underground economy of spam: a botmaster\u2019s perspective of coordinating large-scale spam campaigns. In: Proceedings of the 4th USENIX Conference on Large-Scale Exploits and Emergent Threats, LEET 2011, p. 4. USENIX Association, Berkeley (2011)"},{"key":"1_CR26","doi-asserted-by":"crossref","unstructured":"Stone-Gross, B., Moser, A., Kruegel, C., Kirda, E., Almeroth, K.: FIRE: FInding Rogue nEtworks. In: Proceedings of the Annual Computer Security Applications Conference (ACSAC), Honolulu, HI, December 2009","DOI":"10.1109\/ACSAC.2009.29"},{"key":"1_CR27","unstructured":"Thomas, K., Huang, D., Wang, D., Bursztein, E., Grier, C., Holt, T., Kruegel, C., McCoy, D., Savage, S., Vigna, G.: Framing dependencies introduced by underground commoditization. In: Proceedings of the Fourteenth Workshop on the Economics of Information Security (WEIS), Delft, Netherlands, June 2015"},{"key":"1_CR28","unstructured":"Tive, C.: 419 scam: Exploits of the Nigerian con man. iUniverse (2006)"},{"issue":"3","key":"1_CR29","doi-asserted-by":"publisher","first-page":"181","DOI":"10.1089\/cyber.2011.0352","volume":"15","author":"MT Whitty","year":"2012","unstructured":"Whitty, M.T., Buchanan, T.: The online romance scam: a serious cybercrime. CyberPsychol. Behav. Soc. Netw. 15(3), 181\u2013183 (2012)","journal-title":"CyberPsychol. Behav. Soc. Netw."}],"container-title":["Lecture Notes in Computer Science","Financial Cryptography and Data Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-662-54970-4_1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,4,2]],"date-time":"2024-04-02T16:47:16Z","timestamp":1712076436000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-662-54970-4_1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783662549698","9783662549704"],"references-count":29,"URL":"https:\/\/doi.org\/10.1007\/978-3-662-54970-4_1","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2017]]},"assertion":[{"value":"17 May 2017","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"FC","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Financial Cryptography and Data Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Christ Church","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Barbados","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2016","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"22 February 2016","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"26 February 2016","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"20","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"fc2016","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/fc16.ifca.ai\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}