{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T12:05:29Z","timestamp":1725883529094},"publisher-location":"Cham","reference-count":15,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319565378"},{"type":"electronic","value":"9783319565385"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-56538-5_78","type":"book-chapter","created":{"date-parts":[[2017,3,27]],"date-time":"2017-03-27T22:10:58Z","timestamp":1490652658000},"page":"774-782","source":"Crossref","is-referenced-by-count":1,"title":["Information Security in Virtual Social Networks: A Survey in Higher Education"],"prefix":"10.1007","author":[{"given":"Isabel Maria","family":"Lopes","sequence":"first","affiliation":[]},{"given":"Jo\u00e3o Paulo","family":"Pereira","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,3,29]]},"reference":[{"key":"78_CR1","unstructured":"Ver\u00edssimo, J., Macias, M., Rodrigues, S.: Implica\u00e7\u00f5es Jur\u00eddicas das Redes Sociais na Internet: Um novo conceito de privacidade? Direito da Comunica\u00e7\u00e3o, Universidade de Direito da Universidade Nova de Lisboa (2012)"},{"issue":"7","key":"78_CR2","doi-asserted-by":"crossref","first-page":"125","DOI":"10.1145\/341852.341877","volume":"43","author":"G Dhillon","year":"2000","unstructured":"Dhillon, G., Backhouse, J.: Information system security management in the New Millennium. Commun. ACM 43(7), 125\u2013128 (2000)","journal-title":"Commun. ACM"},{"key":"78_CR3","doi-asserted-by":"crossref","first-page":"594","DOI":"10.1145\/359168.359172","volume":"22","author":"R Morris","year":"1979","unstructured":"Morris, R., Thompson, K.: Password security: a case history. Commun. ACM 22, 594\u2013597 (1979)","journal-title":"Commun. ACM"},{"key":"78_CR4","series-title":"Advances in Intelligent Systems and Computing","doi-asserted-by":"publisher","first-page":"459","DOI":"10.1007\/978-3-319-16486-1_45","volume-title":"New Contributions in Information Systems and Technologies","author":"I Lopes","year":"2015","unstructured":"Lopes, I., Oliveira, P.: Implementation of information systems security policies: a survey in small and medium sized enterprises. In: Rocha, A., Correia, A.M., Costanzo, S., Reis, L.P. (eds.) New Contributions in Information Systems and Technologies. AISC, vol. 353, pp. 459\u2013468. Springer, Cham (2015). doi: 10.1007\/978-3-319-16486-1_45"},{"key":"78_CR5","unstructured":"Peltier, T.R., Peltier, J., Blackley, J.: Information Security fundamentals. Auerbach Publications \u2013 A CRC Press Company, Boca Raton (2005)"},{"issue":"6","key":"78_CR6","doi-asserted-by":"crossref","first-page":"703","DOI":"10.1080\/13562517.2010.507307","volume":"15","author":"H Hung","year":"2010","unstructured":"Hung, H., Yuen, S.C.: Educational use of social networking technology in higher education. Teach. Higher Educ. 15(6), 703\u2013714 (2010)","journal-title":"Teach. Higher Educ."},{"key":"78_CR7","unstructured":"Palo Alto Networks: Top 10 Social Networking Threats, NetworkWorld, 12 July 2010"},{"key":"78_CR8","doi-asserted-by":"crossref","first-page":"215","DOI":"10.1016\/j.is.2009.08.003","volume":"35","author":"K Won","year":"2010","unstructured":"Won, K., Ok-Ran, J., Sang-Won, L.: On social websites. Inf. Syst. 35, 215\u2013236 (2010)","journal-title":"Inf. Syst."},{"key":"78_CR9","unstructured":"ESET: Guia de Seguran\u00e7a em Redes Sociais. www.eset.com.br"},{"issue":"1","key":"78_CR10","doi-asserted-by":"crossref","first-page":"119","DOI":"10.5121\/ijdps.2012.3109","volume":"3","author":"W Graribi","year":"2012","unstructured":"Graribi, W., Shaabi, M.: Cyber threats in social networking websites. Int. J. Distrib. Parallel Syst. 3(1), 119\u2013126 (2012)","journal-title":"Int. J. Distrib. Parallel Syst."},{"key":"78_CR11","unstructured":"Cisco, What Is the Difference: Viruses, Worms, Trojans and Bots? http:\/\/www.cisco.com\/c\/en\/us\/about\/security-center\/virus-differences.html"},{"key":"78_CR12","unstructured":"Myers, M.D.: Qualitative research in information systems. ACM Comput. Surv. (CSUR) (1997). MISQ Discovery"},{"key":"78_CR13","unstructured":"Obercom: A Internet em Portugal \u2013 Sociedade em Rede 2014, Publica\u00e7\u00f5es OberCom (2014)"},{"key":"78_CR14","unstructured":"Study UM\u2019s WAVE, Research into the phenomenal growth of social media is the most robust data set in the world. www.universalmccann.bitecp.com\/wave4\/Wave4.pdf"},{"key":"78_CR15","unstructured":"Lopes, I.M., Pereira, J.P.: De que forma as Redes Sociais podem ser utilizadas na cria\u00e7\u00e3o de conhecimento, Atas do Congresso Mundial de Estilos de Aprendizagem (2016)"}],"container-title":["Advances in Intelligent Systems and Computing","Recent Advances in Information Systems and Technologies"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-56538-5_78","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,25]],"date-time":"2017-06-25T09:35:49Z","timestamp":1498383349000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-56538-5_78"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319565378","9783319565385"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-56538-5_78","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2017]]}}}