{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,8]],"date-time":"2025-10-08T15:45:33Z","timestamp":1759938333825},"reference-count":19,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,3]]},"DOI":"10.1109\/percomw.2014.6815275","type":"proceedings-article","created":{"date-parts":[[2014,5,16]],"date-time":"2014-05-16T19:05:08Z","timestamp":1400267108000},"page":"604-609","source":"Crossref","is-referenced-by-count":6,"title":["Susceptibility to URL-based Internet attacks: Facebook vs. email"],"prefix":"10.1109","author":[{"given":"Zinaida","family":"Benenson","sequence":"first","affiliation":[]},{"given":"Anna","family":"Girard","sequence":"additional","affiliation":[]},{"given":"Nadina","family":"Hintz","sequence":"additional","affiliation":[]},{"given":"Andreas","family":"Luder","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"Soziale Netzwerke Vergreisen","year":"2013","key":"19"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1145\/2068816.2068823"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1109\/PerComW.2012.6197507"},{"key":"15","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-642-12770-0","author":"bortz","year":"2010","journal-title":"Statistikfiir Human-und Sozialwissenschaftler"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-01841-1"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1145\/1135777.1135853"},{"journal-title":"Why and How to Perform Fraud Experiments","year":"2008","author":"jakobsson","key":"14"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2008.08.006"},{"key":"12","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-642-22424-9_4","article-title":"Reverse social engineering attacks in online social networks","author":"irani","year":"2011","journal-title":"Detection of Intrusions and Malware and Vulnerability Assessment (DIMVA)"},{"journal-title":"Malicious Software Poses As Video from A Facebook Friend NY Times","year":"2013","author":"goel","key":"3"},{"journal-title":"Malware That Drains Your Bank Account Thriving on Facebook","year":"0","author":"perlroth","key":"2"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1109\/MIC.2011.50"},{"key":"10","article-title":"Trust and privacy concern within social networking sites: A comparison of facebook and MySpace","author":"dwyer","year":"2007","journal-title":"Americas Conference on Information Systems"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1145\/1290958.1290968"},{"key":"6","article-title":"Insights into user behavior in dealing with internet attacks","author":"onarlioglu","year":"2012","journal-title":"NDSS 19th Annual Network and Distributed System Security Symposium"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1145\/2063176.2063197"},{"journal-title":"Kasperski Kaspersky Lab Detects New Worms Attacking MySpace and Facebook","year":"2008","key":"4"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1145\/1920261.1920263"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1145\/1526709.1526784"}],"event":{"name":"2014 IEEE International Conference on Pervasive Computing and Communication Workshops (PERCOM WORKSHOPS)","start":{"date-parts":[[2014,3,24]]},"location":"Budapest, Hungary","end":{"date-parts":[[2014,3,28]]}},"container-title":["2014 IEEE International Conference on Pervasive Computing and Communication Workshops (PERCOM WORKSHOPS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6805350\/6815123\/06815275.pdf?arnumber=6815275","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,22]],"date-time":"2017-06-22T09:22:08Z","timestamp":1498123328000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6815275\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,3]]},"references-count":19,"URL":"https:\/\/doi.org\/10.1109\/percomw.2014.6815275","relation":{},"subject":[],"published":{"date-parts":[[2014,3]]}}}