{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,28]],"date-time":"2025-05-28T04:14:30Z","timestamp":1748405670237},"reference-count":34,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2017,6,17]],"date-time":"2017-06-17T00:00:00Z","timestamp":1497657600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Inf Syst E-Bus Manage"],"published-print":{"date-parts":[[2018,11]]},"DOI":"10.1007\/s10257-017-0347-x","type":"journal-article","created":{"date-parts":[[2017,6,17]],"date-time":"2017-06-17T11:52:55Z","timestamp":1497700375000},"page":"775-789","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["What\u2019s your real age? an empirical analysis of identity fraud in online game"],"prefix":"10.1007","volume":"16","author":[{"given":"Daehwan","family":"Ahn","sequence":"first","affiliation":[]},{"given":"Seongmin","family":"Jeon","sequence":"additional","affiliation":[]},{"given":"Byungjoon","family":"Yoo","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,6,17]]},"reference":[{"issue":"4","key":"347_CR1","doi-asserted-by":"crossref","first-page":"433","DOI":"10.1007\/s10257-011-0177-1","volume":"10","author":"AB Aissa","year":"2012","unstructured":"Aissa AB, Abercrombie RK, Sheldon FT, Mili A (2012) Defining and computing a value based cyber-security measure. IseB 10(4):433\u2013453","journal-title":"IseB"},{"issue":"2","key":"347_CR2","first-page":"1","volume":"11","author":"F Alemi","year":"2007","unstructured":"Alemi F (2007) An avatar\u2019s day in court: a proposal for obtaining relief and resolving disputes in virtual world games. UCLA J Law Technol 11(2):1\u201354","journal-title":"UCLA J Law Technol"},{"key":"347_CR3","unstructured":"Assmann JJ, Drescher MA, Gallenkamp JV, Picot A, Welpe IM, Wigand RT (2010) MMOGs as emerging opportunities for research on virtual organizations and teams. In: Americas conference on information systems (AMCIS), p 335"},{"issue":"3","key":"347_CR4","first-page":"649","volume":"39","author":"W Barfield","year":"2006","unstructured":"Barfield W (2006) Intellectual property rights in virtual environments: considering the rights of owners, programmers and virtual avatars. Akron Law Rev 39(3):649\u2013700","journal-title":"Akron Law Rev"},{"key":"347_CR5","doi-asserted-by":"crossref","unstructured":"Bell MW (2008) Toward a definition of \"virtual worlds\". J Virtual Worlds Res 1(1)","DOI":"10.4101\/jvwr.v1i1.283"},{"key":"347_CR6","unstructured":"Bureau of Justice Statistics (2013) National Crime Victimization Survey (NCVS)"},{"issue":"4","key":"347_CR7","doi-asserted-by":"crossref","first-page":"491","DOI":"10.1007\/s10257-011-0171-7","volume":"10","author":"A Caglayan","year":"2012","unstructured":"Caglayan A, Toothaker M, Drapeau D, Burke D, Eaton G (2012) Behavioral analysis of botnets for threat intelligence. IseB 10(4):491\u2013519","journal-title":"IseB"},{"key":"347_CR8","volume-title":"Exodus to the virtual world: how online fun is changing reality","author":"E Castronova","year":"2007","unstructured":"Castronova E (2007) Exodus to the virtual world: how online fun is changing reality. Palgrave Macmillan, New York"},{"key":"347_CR9","unstructured":"ChinaHearSay (2011) China\u2019s online game real id system, take two http:\/\/www.chinahearsay.com\/chinas-online-game-real-id-system-take-two\/"},{"key":"347_CR10","unstructured":"Device (2012) timed online gaming restriction possibly coming to South Korea. http:\/\/www.devicemag.com\/2012\/02\/17\/timed-online-gaming-restriction-possibly-coming-to-south-korea\/"},{"key":"347_CR11","unstructured":"Digi-Capital (2011) Global games investment review"},{"key":"347_CR12","unstructured":"Empowering Parents (2014) Kids stealing from parents: what you need to know now. http:\/\/www.empoweringparents.com\/is-your-child-stealing.php"},{"key":"347_CR13","unstructured":"ESRB (2014) http:\/\/www.esrb.org"},{"issue":"1","key":"347_CR14","doi-asserted-by":"crossref","first-page":"70","DOI":"10.2307\/2555589","volume":"16","author":"J Farrell","year":"1985","unstructured":"Farrell J, Saloner G (1985) Standardization, compatibility, and innovation. RAND J Econ 16(1):70\u201383","journal-title":"RAND J Econ"},{"key":"347_CR15","unstructured":"Federal Trade Commission (2010) Talking about identity theft: a how-to guide"},{"key":"347_CR16","unstructured":"Forbes (2012) South Korea may limit young online gamers to 2 hours a day to prevent bullying. http:\/\/www.forbes.com\/sites\/carolpinchefsky\/2012\/02\/16\/south-korea-may-limit-young-online-gamers-to-2-hours-a-day-to-prevent-bullying\/"},{"key":"347_CR17","first-page":"1","volume-title":"Culture d\u2019univers: jeux en r\u00e9seau, mondes virtuels, le nouvel \u00e2ge de la soci\u00e9t\u00e9 num\u00e9rique","author":"M Gensollen","year":"2007","unstructured":"Gensollen M (2007) L\u2019Economie R\u00e9elle des Univers Peristants: Vers une Propri\u00e9t\u00e9 Virtuelle? In: Beau F (ed) Culture d\u2019univers: jeux en r\u00e9seau, mondes virtuels, le nouvel \u00e2ge de la soci\u00e9t\u00e9 num\u00e9rique. FYP \u00e9ditions, Paris, pp 1\u201313"},{"key":"347_CR18","doi-asserted-by":"crossref","unstructured":"Itsuki H, Takeuchi A, Fujita A, Matsubara H (2010) Exploiting MMORPG log data toward efficient RMT player detection. In: Proceedings of the 7th international conference on advances in computer entertainment technology, ACM, pp 118\u2013119","DOI":"10.1145\/1971630.1971670"},{"key":"347_CR19","first-page":"424","volume":"75","author":"ML Katz","year":"1985","unstructured":"Katz ML, Shapiro C (1985) Network externalities, competition, and compatibility. Am Econ Rev 75:424\u2013440","journal-title":"Am Econ Rev"},{"issue":"9","key":"347_CR20","doi-asserted-by":"crossref","first-page":"553","DOI":"10.1007\/s11623-006-0141-2","volume":"30","author":"BJ Koops","year":"2006","unstructured":"Koops BJ, Leenes R (2006) Identity theft, identity fraud and\/or identity-related crime. Datenschutz und Datensicherheit-DuD 30(9):553\u2013556","journal-title":"Datenschutz und Datensicherheit-DuD"},{"key":"347_CR21","volume-title":"Netnography. Doing ethnographic research online","author":"RV Kozinets","year":"2010","unstructured":"Kozinets RV (2010) Netnography. Doing ethnographic research online. Sage Publications Ltd, London"},{"key":"347_CR22","doi-asserted-by":"crossref","first-page":"353","DOI":"10.1016\/j.dss.2011.09.002","volume":"52","author":"F Lai","year":"2012","unstructured":"Lai F, Li D, Hsieh CT (2012) Fighting identity theft: the coping perspective. Decis Support Syst 52:353\u2013363","journal-title":"Decis Support Syst"},{"issue":"3","key":"347_CR23","doi-asserted-by":"crossref","first-page":"234","DOI":"10.1097\/00006842-199305000-00002","volume":"55","author":"RS Lazarus","year":"1993","unstructured":"Lazarus RS (1993) Coping theory and research: past present, and future. Psychosom Med 55(3):234\u2013247","journal-title":"Psychosom Med"},{"key":"347_CR24","unstructured":"McKenna B, Gardner L, Myers M (2011a) Issues in the study of virtual world social movements. PACIS 2011 Proceedings. Paper 129. http:\/\/aisel.aisnet.org\/pacis2011\/129"},{"key":"347_CR25","unstructured":"McKenna B, Gardner L, Myers M (2011b) Social Movements in World of Warcraft. AMCIS 2011 Proceedings\u2013All Submissions. Paper 83. http:\/\/aisel.aisnet.org\/amcis2011_submissions\/83"},{"issue":"4","key":"347_CR26","doi-asserted-by":"crossref","first-page":"521","DOI":"10.1007\/s10257-011-0176-2","volume":"10","author":"R Parthasarathy","year":"2012","unstructured":"Parthasarathy R, Shirazi BA, Peterson N, Song WZ, Hurson A (2012) Management and security of remote sensor networks in hazardous environments using over the air programming. IseB 10(4):521\u2013548","journal-title":"IseB"},{"key":"347_CR27","unstructured":"Ponemon Institute (2013) 2013 Cost of data breach study: global analysis. Benchmark research sponsored by Symantec Independently Conducted by Ponemon Institute LLC May 2013. https:\/\/www.ponemon.org\/local\/upload\/file\/2013%20Report%20GLOBAL%20CODB%20FINAL%205-2.pdf"},{"issue":"10","key":"347_CR28","first-page":"66","volume":"76","author":"VM Ramaswamy","year":"2006","unstructured":"Ramaswamy VM (2006) Identity-theft toolkit. CPA J 76(10):66\u201370","journal-title":"CPA J"},{"key":"347_CR29","doi-asserted-by":"crossref","DOI":"10.7551\/mitpress\/7105.001.0001","volume-title":"The virtual community: homesteading on the electronic frontier","author":"H Rheingold","year":"2000","unstructured":"Rheingold H (2000) The virtual community: homesteading on the electronic frontier. MIT Press, London"},{"issue":"3","key":"347_CR30","doi-asserted-by":"crossref","first-page":"653","DOI":"10.2307\/23042802","volume":"35","author":"C Roquilly","year":"2011","unstructured":"Roquilly C (2011) Control over virtual worlds by game companies: issues and recommendations. MIS Q 35(3):653\u2013671","journal-title":"MIS Q"},{"issue":"4","key":"347_CR31","doi-asserted-by":"crossref","first-page":"275","DOI":"10.1002\/smj.296","volume":"24","author":"V Shankar","year":"2003","unstructured":"Shankar V, Bayus BL (2003) Network effects and competition: an empirical analysis of the home video game industry. Strateg Manag J 24(4):275\u2013384","journal-title":"Strateg Manag J"},{"key":"347_CR32","doi-asserted-by":"crossref","DOI":"10.1017\/CBO9780511754401","volume-title":"The economics of network industries","author":"O Shy","year":"2001","unstructured":"Shy O (2001) The economics of network industries. Cambridge University Press, Cambridge"},{"key":"347_CR33","unstructured":"Wall Street Journal. (2011). Gaming\u2019s new frontier after zynga. http:\/\/online.wsj.com\/article\/SB10001424052970204443404577051992472392070.html"},{"issue":"4","key":"347_CR34","doi-asserted-by":"crossref","first-page":"455","DOI":"10.1007\/s10257-011-0173-5","volume":"10","author":"JA Wang","year":"2012","unstructured":"Wang JA, Guo M, Wang H, Zhou L (2012) Measuring and ranking attacks based on vulnerability analysis. IseB 10(4):455\u2013490","journal-title":"IseB"}],"container-title":["Information Systems and e-Business Management"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10257-017-0347-x\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10257-017-0347-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10257-017-0347-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,26]],"date-time":"2019-09-26T03:17:21Z","timestamp":1569467841000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10257-017-0347-x"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,6,17]]},"references-count":34,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2018,11]]}},"alternative-id":["347"],"URL":"https:\/\/doi.org\/10.1007\/s10257-017-0347-x","relation":{},"ISSN":["1617-9846","1617-9854"],"issn-type":[{"value":"1617-9846","type":"print"},{"value":"1617-9854","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017,6,17]]}}}