{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,29]],"date-time":"2025-10-29T03:16:41Z","timestamp":1761707801783},"reference-count":12,"publisher":"Association for Computing Machinery (ACM)","issue":"6","content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["Commun. ACM"],"published-print":{"date-parts":[[2005,6]]},"abstract":"<jats:p>Providing hackers an environment---other than the Net---to test and exhibit theirmalware talents has its rewards.<\/jats:p>","DOI":"10.1145\/1064830.1064833","type":"journal-article","created":{"date-parts":[[2005,8,3]],"date-time":"2005-08-03T08:30:55Z","timestamp":1123057855000},"page":"94-99","update-policy":"http:\/\/dx.doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":7,"title":["An incentive system for reducing malware attacks"],"prefix":"10.1145","volume":"48","author":[{"given":"James A. M.","family":"McHugh","sequence":"first","affiliation":[{"name":"New Jersey Institute of Technology, Newark, NJ"}]},{"given":"Fadi P.","family":"Deek","sequence":"additional","affiliation":[{"name":"New Jersey Institute of Technology, Newark, NJ"}]}],"member":"320","published-online":{"date-parts":[[2005,6]]},"reference":[{"key":"e_1_2_1_1_1","unstructured":"Adamski A. Crimes related to the computer network. Threats and opportunities: A criminological perspective; www.infowar.com\/new 1999.  Adamski A. Crimes related to the computer network. Threats and opportunities: A criminological perspective; www.infowar.com\/new 1999."},{"key":"e_1_2_1_2_1","first-page":"2","article-title":"Experts call hacker motivation key to prevention","volume":"1","author":"Cohen R","year":"2000","journal-title":"Infosec Outlook"},{"key":"e_1_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/505248.505267"},{"key":"e_1_2_1_4_1","volume-title":"ACM Press","author":"Denning D.","year":"1998"},{"key":"e_1_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/636772.636774"},{"key":"e_1_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1111\/1467-954X.00139"},{"key":"e_1_2_1_7_1","volume-title":"John Wiley & Sons","author":"Parker D.","year":"1998"},{"key":"e_1_2_1_8_1","first-page":"1","article-title":"computer crime and security survey","volume":"8","author":"Power R.","year":"2002","journal-title":"Comput. Secur. Issues Trends"},{"key":"e_1_2_1_9_1","unstructured":"Rogers M. Psychology of hackers: Steps toward a new taxonomy; www.infowar.com 1999.  Rogers M. Psychology of hackers: Steps toward a new taxonomy; www.infowar.com 1999."},{"key":"e_1_2_1_10_1","volume-title":"University of Manitoba","author":"Rogers M.","year":"2001"},{"key":"e_1_2_1_11_1","first-page":"2","article-title":"A conceptual model of hacker development and motivation","volume":"1","author":"Van Beveren J","year":"2000","journal-title":"J. E-Business"},{"key":"e_1_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/859670.859675"}],"container-title":["Communications of the ACM"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1064830.1064833","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,12,28]],"date-time":"2022-12-28T12:22:55Z","timestamp":1672230175000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1064830.1064833"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005,6]]},"references-count":12,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2005,6]]}},"alternative-id":["10.1145\/1064830.1064833"],"URL":"https:\/\/doi.org\/10.1145\/1064830.1064833","relation":{},"ISSN":["0001-0782","1557-7317"],"issn-type":[{"value":"0001-0782","type":"print"},{"value":"1557-7317","type":"electronic"}],"subject":[],"published":{"date-parts":[[2005,6]]},"assertion":[{"value":"2005-06-01","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}