{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,14]],"date-time":"2026-01-14T17:31:58Z","timestamp":1768411918040,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":8,"publisher":"ACM","license":[{"start":{"date-parts":[[2006,5,23]],"date-time":"2006-05-23T00:00:00Z","timestamp":1148342400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2006,5,23]]},"DOI":"10.1145\/1135777.1135853","type":"proceedings-article","created":{"date-parts":[[2006,7,24]],"date-time":"2006-07-24T16:53:01Z","timestamp":1153759981000},"page":"513-522","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":76,"title":["Designing ethical phishing experiments"],"prefix":"10.1145","author":[{"given":"Markus","family":"Jakobsson","sequence":"first","affiliation":[{"name":"Indiana University, Bloomington, IN"}]},{"given":"Jacob","family":"Ratkiewicz","sequence":"additional","affiliation":[{"name":"Indiana University, Bloomington, IN"}]}],"member":"320","published-online":{"date-parts":[[2006,5,23]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Mailfrontier phishing IQ test. http:\/\/survey.mailfrontier.com\/survey\/quiztest.html.  Mailfrontier phishing IQ test. http:\/\/survey.mailfrontier.com\/survey\/quiztest.html."},{"key":"e_1_3_2_1_2_1","unstructured":"Know your enemy : Phishing. behind the scenes of phishing attacks. http:\/\/www.honeynet.org\/papers\/phishing\/ 2005.  Know your enemy : Phishing. behind the scenes of phishing attacks. http:\/\/www.honeynet.org\/papers\/phishing\/ 2005."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/1073001.1073003"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1007\/11507840_9"},{"key":"e_1_3_2_1_5_1","volume-title":"http:\/\/search.cpan.org\/ petdance\/WWW-Mechanize-1.16\/lib\/WWW\/Mechanize.p%m","author":"Lester A.","year":"2005","unstructured":"Lester , A. WWW:: Mechanize - handy web browsing in a perl object. http:\/\/search.cpan.org\/ petdance\/WWW-Mechanize-1.16\/lib\/WWW\/Mechanize.p%m , 2005 . Lester, A. WWW::Mechanize - handy web browsing in a perl object. http:\/\/search.cpan.org\/ petdance\/WWW-Mechanize-1.16\/lib\/WWW\/Mechanize.p%m, 2005."},{"key":"e_1_3_2_1_6_1","volume-title":"Gartner Research","author":"Litan A.","year":"2004","unstructured":"Litan , A. Phishing attack victims likely targets for identity theft. FT-22-8873 , Gartner Research ( 2004 ). Litan, A. Phishing attack victims likely targets for identity theft. FT-22-8873, Gartner Research (2004)."},{"key":"e_1_3_2_1_7_1","unstructured":"M. Jakobsson T. Jagatic S. S. Phishing for clues. www.browser-recon.info.  M. Jakobsson T. Jagatic S. S. Phishing for clues. www.browser-recon.info."},{"key":"e_1_3_2_1_8_1","volume-title":"Social phishing","author":"Jagatic N.","year":"2006","unstructured":"T. Jagatic , N. Johnson , M. J. , and Menczer , F . Social phishing . 2006 . T. Jagatic, N. Johnson, M. J., and Menczer, F. Social phishing. 2006."}],"event":{"name":"WWW06: The 15th International World Wide Web Conference 2006","location":"Edinburgh Scotland","acronym":"WWW06","sponsor":["SIGWEB ACM Special Interest Group on Hypertext, Hypermedia, and Web","ACM Association for Computing Machinery"]},"container-title":["Proceedings of the 15th international conference on World Wide Web"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1135777.1135853","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1135777.1135853","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T15:06:33Z","timestamp":1750259193000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1135777.1135853"}},"subtitle":["a study of (ROT13) rOnl query features"],"short-title":[],"issued":{"date-parts":[[2006,5,23]]},"references-count":8,"alternative-id":["10.1145\/1135777.1135853","10.1145\/1135777"],"URL":"https:\/\/doi.org\/10.1145\/1135777.1135853","relation":{},"subject":[],"published":{"date-parts":[[2006,5,23]]},"assertion":[{"value":"2006-05-23","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}