{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:39:46Z","timestamp":1750307986962,"version":"3.41.0"},"reference-count":0,"publisher":"Association for Computing Machinery (ACM)","issue":"4","license":[{"start":{"date-parts":[[2006,5,1]],"date-time":"2006-05-01T00:00:00Z","timestamp":1146441600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["Queue"],"published-print":{"date-parts":[[2006,5]]},"abstract":"<jats:p>Dear KV, I noticed you covered cross-site scripting a few issues back, and I\u2019m wondering if you have any advice on another Web problem, phishing. I work at a large financial institution and every time we roll out a new service, the security team comes down on us because either the login page looks different or they claim that it\u2019s easy to phish information from our users using one of our forms. It\u2019s not like we want our users to be phished, but I don\u2019t think it\u2019s a technical problem. Our users are just stupid and give away their information to anyone who seems willing to put up a reasonable fake of one of our pages. I mean, come on, doesn\u2019t the URL give away enough information?<\/jats:p>","DOI":"10.1145\/1142055.1142063","type":"journal-article","created":{"date-parts":[[2006,7,25]],"date-time":"2006-07-25T14:14:26Z","timestamp":1153836866000},"page":"12-13","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Phishing for Solutions"],"prefix":"10.1145","volume":"4","author":[{"given":"George","family":"Neville-Neil","sequence":"first","affiliation":[{"name":"ACM Queue"}]}],"member":"320","published-online":{"date-parts":[[2006,5]]},"container-title":["Queue"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1142055.1142063","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1142055.1142063","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T15:06:11Z","timestamp":1750259171000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1142055.1142063"}},"subtitle":["Re: phishing, doesn\u2019t the URL already give away enough information?"],"short-title":[],"issued":{"date-parts":[[2006,5]]},"references-count":0,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2006,5]]}},"alternative-id":["10.1145\/1142055.1142063"],"URL":"https:\/\/doi.org\/10.1145\/1142055.1142063","relation":{},"ISSN":["1542-7730","1542-7749"],"issn-type":[{"type":"print","value":"1542-7730"},{"type":"electronic","value":"1542-7749"}],"subject":[],"published":{"date-parts":[[2006,5]]},"assertion":[{"value":"2006-05-01","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}