{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,12]],"date-time":"2025-11-12T03:26:15Z","timestamp":1762917975861,"version":"3.40.3"},"publisher-location":"Cham","reference-count":12,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030118891"},{"type":"electronic","value":"9783030118907"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-3-030-11890-7_64","type":"book-chapter","created":{"date-parts":[[2019,1,28]],"date-time":"2019-01-28T10:39:57Z","timestamp":1548671997000},"page":"683-690","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":6,"title":["The Art of Phishing"],"prefix":"10.1007","author":[{"given":"Teresa","family":"Guarda","sequence":"first","affiliation":[]},{"given":"Maria Fernanda","family":"Augusto","sequence":"additional","affiliation":[]},{"given":"Isabel","family":"Lopes","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,1,29]]},"reference":[{"key":"64_CR1","unstructured":"Symantec Internet Security Threat Report. Symantec, vol. 23 (2018)"},{"key":"64_CR2","doi-asserted-by":"publisher","first-page":"69","DOI":"10.1016\/j.ijhcs.2015.05.005","volume":"82","author":"M Alsharnouby","year":"2015","unstructured":"Alsharnouby, M., Alaca, F., Chiasson, S.: Why phishing still works: user strategies for combating phishing attacks. Int. J. Hum.-Comput. Stud. 82, 69\u201382 (2015)","journal-title":"Int. J. Hum.-Comput. Stud."},{"key":"64_CR3","unstructured":"Brill, J.A., McGeehan, R., Muriello, D.G.: U.S. Patent No. 9,578,499, Washington, DC (2017)"},{"issue":"8","key":"64_CR4","doi-asserted-by":"publisher","first-page":"2481","DOI":"10.1007\/s11276-014-0761-7","volume":"20","author":"Q Jing","year":"2014","unstructured":"Jing, Q., Vasilakos, A.V., Wan, J., Lu, J., Qiu, D.: Wirel. Netw. 20(8), 2481\u20132501 (2014)","journal-title":"Wirel. Netw."},{"key":"64_CR5","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.cosrev.2015.04.001","volume":"17","author":"RM Mohammad","year":"2015","unstructured":"Mohammad, R.M., Thabtah, F., McCluskey, L.: Tutorial and critical analysis of phishing websites methods. Comput. Sci. Rev. 17, 1\u201324 (2015)","journal-title":"Comput. Sci. Rev."},{"key":"64_CR6","doi-asserted-by":"crossref","unstructured":"Ariu, D., Frumento, E., Fumera, G.: Social engineering 2.0: a foundational work. In: Proceedings of the Computing Frontiers Conference (2017)","DOI":"10.1145\/3075564.3076260"},{"key":"64_CR7","doi-asserted-by":"crossref","unstructured":"Gascon, H., Ullrich, S., Stritter, B., Rieck, K.: Reading between the lines: content-agnostic detection of spear-phishing emails. In: International Symposium on Research in Attacks, Intrusions, and Defenses (2018)","DOI":"10.1007\/978-3-030-00470-5_4"},{"key":"64_CR8","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.eswa.2018.03.050","volume":"106","author":"KL Chiew","year":"2018","unstructured":"Chiew, K.L., Yong, K.S.C., Tan, C.L.: A survey of phishing attacks: their types, vectors and technical approaches. Expert Syst. Appl. 106, 1\u201320 (2018)","journal-title":"Expert Syst. Appl."},{"key":"64_CR9","doi-asserted-by":"crossref","unstructured":"Rzeszut, E., Bachrach, D.: 10 don\u2019ts on your digital devices: the non-techie\u2019s survival guide to cyber security and privacy. Apress (2014)","DOI":"10.1007\/978-1-4842-0367-5"},{"issue":"6","key":"64_CR10","first-page":"543","volume":"2","author":"P Dhiman","year":"2017","unstructured":"Dhiman, P., Wajid, S.A., Quraishi, F.F.: A comprehensive study of social engineering - the art of mind hacking. Int. J. Sci. Res. Comput. Sci. Eng. Inf. Technol. 2(6), 543\u2013548 (2017)","journal-title":"Int. J. Sci. Res. Comput. Sci. Eng. Inf. Technol."},{"key":"64_CR11","doi-asserted-by":"crossref","unstructured":"Oliveira, D., Rocha, H., Yang, H., Ellis, D., Dommaraju, S., Muradoglu, M., Weir, D., Soliman, A., Lin, T., Ebner, N.: Dissecting spear phishing emails for older vs young adults: on the interplay of weapons of influence and life domains in predicting susceptibility to phishing. In: Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems (2017)","DOI":"10.1145\/3025453.3025831"},{"key":"64_CR12","unstructured":"Falkner, S., Kieseberg, P., Simos, D.E., Traxler, C., Weippl, E.: Usable cryptographic QR codes. In: IEEE International Conference on Industrial Technology (ICIT) (2018)"}],"container-title":["Advances in Intelligent Systems and Computing","Information Technology and Systems"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-11890-7_64","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,5,28]],"date-time":"2020-05-28T17:20:16Z","timestamp":1590686416000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-11890-7_64"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9783030118891","9783030118907"],"references-count":12,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-11890-7_64","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"29 January 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICITS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Information Technology & Systems","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Quito","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Ecuador","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"6 February 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"8 February 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"icits2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.icits.me\/index.php?lang=en","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}