{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,10]],"date-time":"2026-04-10T08:22:49Z","timestamp":1775809369636,"version":"3.50.1"},"reference-count":17,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,2]]},"DOI":"10.1109\/cogsima.2013.6523820","type":"proceedings-article","created":{"date-parts":[[2013,6,13]],"date-time":"2013-06-13T20:53:39Z","timestamp":1371156819000},"page":"30-37","source":"Crossref","is-referenced-by-count":54,"title":["Trusting smartphone Apps? To install or not to install, that is the question"],"prefix":"10.1109","author":[{"given":"M.","family":"Kuehnhausen","sequence":"first","affiliation":[]},{"given":"V. S.","family":"Frost","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"17","first-page":"241","article-title":"Distribution de la flore alpine dans le bassin des Dranses et dans quelques re?gions voisines","author":"jaccard","year":"1901","journal-title":"Bulletin de la Socie?te? Vaudoise des Sciences Naturelles"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1145\/2046707.2046779"},{"key":"16","first-page":"7","article-title":"The effectiveness of application permissions","author":"felt","year":"0","journal-title":"WebApps'11 Proceedings of the 2nd USENIX Conference on Web Application Development Jun 2011"},{"key":"13","year":"0","journal-title":"Jazzy The Java Open Source Spell Checker"},{"key":"14","first-page":"93","article-title":"A new ANEW: Evaluation of a word list for sentiment analysis in microblogs","author":"nielsen","year":"0","journal-title":"Proceedings of the ESWC2011 Workshop on 'Making Sense of Microposts' Big Things Come in Small Packages 2011"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1145\/2187836.2187863"},{"key":"12","year":"2012","journal-title":"Pseudonyms Drive Communities"},{"key":"3","author":"geambasu","year":"2011","journal-title":"Regaining Control over Cloud and Mobile Data"},{"key":"2","year":"2012","journal-title":"Duo Security"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1145\/2043556.2043574"},{"key":"10","first-page":"309","article-title":"Finding deceptive opinion spam by any stretch of the imagination","author":"ott","year":"0","journal-title":"HLT '11 Proceedings of the 49th Annual Meeting of the Association for Computational Linguistics Human Language Technologies Jun 2011"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382224"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1109\/CogSIMA.2012.6188367"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1145\/2046614.2046618"},{"key":"4","year":"2011","journal-title":"Google Wallet"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1002\/j.1538-7305.1948.tb01338.x"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9781139176200"}],"event":{"name":"2013 IEEE International Multi-Cognitive Methods in SituationDisciplinary Conference on Cognitive Methods in Situation Awareness and Decision Support (CogSIMA 2013)","location":"San Diego, CA","start":{"date-parts":[[2013,2,25]]},"end":{"date-parts":[[2013,2,28]]}},"container-title":["2013 IEEE International Multi-Disciplinary Conference on Cognitive Methods in Situation Awareness and Decision Support (CogSIMA)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6520997\/6523810\/06523820.pdf?arnumber=6523820","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,23]],"date-time":"2017-03-23T03:36:05Z","timestamp":1490240165000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6523820\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,2]]},"references-count":17,"URL":"https:\/\/doi.org\/10.1109\/cogsima.2013.6523820","relation":{},"subject":[],"published":{"date-parts":[[2013,2]]}}}