{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,9]],"date-time":"2026-04-09T14:43:01Z","timestamp":1775745781762,"version":"3.50.1"},"reference-count":16,"publisher":"IEEE","license":[{"start":{"date-parts":[[2020,11,9]],"date-time":"2020-11-09T00:00:00Z","timestamp":1604880000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2020,11,9]],"date-time":"2020-11-09T00:00:00Z","timestamp":1604880000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020,11,9]]},"DOI":"10.1109\/isi49825.2020.9280540","type":"proceedings-article","created":{"date-parts":[[2020,12,9]],"date-time":"2020-12-09T05:41:06Z","timestamp":1607492466000},"page":"1-6","source":"Crossref","is-referenced-by-count":29,"title":["Identifying, Collecting, and Monitoring Personally Identifiable Information: From the Dark Web to the Surface Web"],"prefix":"10.1109","author":[{"given":"Yizhi","family":"Liu","sequence":"first","affiliation":[{"name":"University of Arizona,Management Information Systems,Tucson,Arizona"}]},{"given":"Fang Yu","family":"Lin","sequence":"additional","affiliation":[{"name":"University of Arizona,Management Information Systems,Tucson,Arizona"}]},{"given":"Zara","family":"Ahmad-Post","sequence":"additional","affiliation":[{"name":"University of Arizona,Management Information Systems,Tucson,Arizona"}]},{"given":"Mohammadreza","family":"Ebrahimi","sequence":"additional","affiliation":[{"name":"University of Arizona,Management Information Systems,Tucson,Arizona"}]},{"given":"Ning","family":"Zhang","sequence":"additional","affiliation":[{"name":"University of Arizona,Management Information Systems,Tucson,Arizona"}]},{"given":"James Lee","family":"Hu","sequence":"additional","affiliation":[{"name":"University of Arizona,Management Information Systems,Tucson,Arizona"}]},{"given":"Jingyu","family":"Xin","sequence":"additional","affiliation":[{"name":"University of Arizona,Management Information Systems,Tucson,Arizona"}]},{"given":"Weifeng","family":"Li","sequence":"additional","affiliation":[{"name":"University of Georgia,Management Information Systems,Athens,Georgia"}]},{"given":"Hsinchun","family":"Chen","sequence":"additional","affiliation":[{"name":"University of Arizona,Management Information Systems,Tucson,Arizona"}]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/ISI.2018.8587404"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/ISI.2015.7165944"},{"key":"ref12","first-page":"737","article-title":"Risk and anxiety: A theory of data- breach harms","volume":"96","author":"solove","year":"2017","journal-title":"Tex Law Rev"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-39200-9_18"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2005.22"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/2009916.2009927"},{"key":"ref16","article-title":"1.4 Billion Clear Text Credentials Discovered in a Single Database","author":"casal","year":"2017"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/ISI.2016.7745441"},{"key":"ref3","first-page":"1","article-title":"Understanding Online Privacy Protection Behavior of the Older Adults: An Empirical Investigation","volume":"29","author":"gupta","year":"2018","journal-title":"Info Tech Mgmt"},{"key":"ref6","first-page":"1","article-title":"Under and over the surface: a comparison of the use of leaked account credentials in the Dark and Surface Web","volume":"7","author":"villalva","year":"2018","journal-title":"Crime Sci"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2018.00014"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1080\/07421222.2020.1790186"},{"key":"ref7","volume":"30","author":"chen","year":"2011","journal-title":"Dark Web-Exploring and Data Mining the Dark Side of the Web"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2018.3191268"},{"key":"ref1","article-title":"Data Breach QuickView Report 2019 Q3 Trends","year":"2019"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/ISI.2018.8587327"}],"event":{"name":"2020 IEEE International Conference on Intelligence and Security Informatics (ISI)","location":"Arlington, VA, USA","start":{"date-parts":[[2020,11,9]]},"end":{"date-parts":[[2020,11,10]]}},"container-title":["2020 IEEE International Conference on Intelligence and Security Informatics (ISI)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9280504\/9280475\/09280540.pdf?arnumber=9280540","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,6]],"date-time":"2024-03-06T18:52:39Z","timestamp":1709751159000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9280540\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,11,9]]},"references-count":16,"URL":"https:\/\/doi.org\/10.1109\/isi49825.2020.9280540","relation":{},"subject":[],"published":{"date-parts":[[2020,11,9]]}}}