{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:38:49Z","timestamp":1750307929090,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":31,"publisher":"ACM","license":[{"start":{"date-parts":[[2006,9,22]],"date-time":"2006-09-22T00:00:00Z","timestamp":1158883200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2006,9,22]]},"DOI":"10.1145\/1231047.1231077","type":"proceedings-article","created":{"date-parts":[[2007,4,5]],"date-time":"2007-04-05T19:41:00Z","timestamp":1175802060000},"page":"136-141","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":10,"title":["A review of spyware campaigns and strategies to combat them"],"prefix":"10.1145","author":[{"given":"Anne M.","family":"Payton","sequence":"first","affiliation":[{"name":"Kennesaw State University, Kennesaw, GA"}]}],"member":"320","published-online":{"date-parts":[[2006,9,22]]},"reference":[{"volume-title":"Retrieved","year":"2006","author":"Anti-Spyware Coalition","key":"e_1_3_2_1_1_1"},{"volume-title":"Retrieved","year":"2006","author":"Anti-Spyware Coalition","key":"e_1_3_2_1_2_1"},{"volume-title":"Retrieved","year":"2006","author":"Boyd C.","key":"e_1_3_2_1_3_1"},{"volume-title":"Retrieved","year":"1998","author":"Children's Online Privacy Protection","key":"e_1_3_2_1_4_1"},{"volume-title":"Retrieved","year":"1986","author":"Computer Fraud","key":"e_1_3_2_1_5_1"},{"key":"e_1_3_2_1_6_1","unstructured":"Computer Software Privacy Act of 2004 H.R. 4255 108th Cong. (2004).  Computer Software Privacy Act of 2004 H.R. 4255 108th Cong. (2004)."},{"volume-title":"Retrieved","year":"2005","author":"Edelman B.","key":"e_1_3_2_1_7_1"},{"volume-title":"Retrieved","year":"2006","author":"Edelman B.","key":"e_1_3_2_1_8_1"},{"volume-title":"Retrieved","year":"2006","author":"Edelman B.","key":"e_1_3_2_1_9_1"},{"volume-title":"Retrieved","year":"2006","author":"Edelman B.","key":"e_1_3_2_1_10_1"},{"volume-title":"Retrieved","year":"1987","author":"Electronic Communications Privacy Act","key":"e_1_3_2_1_11_1"},{"key":"e_1_3_2_1_12_1","unstructured":"Enhanced Consumer Protection Against Spyware Act of 2005 S. 1004 109th Cong. (2005)  Enhanced Consumer Protection Against Spyware Act of 2005 S. 1004 109th Cong. (2005)"},{"volume-title":"Retrieved","year":"1914","author":"Federal Trade Commission Act of","key":"e_1_3_2_1_13_1"},{"volume-title":"NH.","year":"2006","author":"Federal Trade Commission v.","key":"e_1_3_2_1_14_1"},{"volume-title":"Retrieved","year":"2005","author":"Federal Trade Commission","key":"e_1_3_2_1_15_1"},{"volume-title":"Spyware workshop: monitoring software on your personal computer: spyware, adware, and other software: report of the federal trade commission staff. Retrieved","year":"2005","author":"Federal Trade Commission","key":"e_1_3_2_1_16_1"},{"volume-title":"Retrieved","year":"2006","author":"Federal Trade Commission","key":"e_1_3_2_1_17_1"},{"volume-title":"Retrieved","year":"1999","author":"Financial Services Modernization Act","key":"e_1_3_2_1_18_1"},{"key":"e_1_3_2_1_19_1","unstructured":"Hackworth A. (2005). Spyware. Retrieved July 9 2006 from http:\/\/www.us-cert.gov\/reading_room\/spywarehome_0905.pdf  Hackworth A. (2005). Spyware. Retrieved July 9 2006 from http:\/\/www.us-cert.gov\/reading_room\/spywarehome_0905.pdf"},{"key":"e_1_3_2_1_20_1","first-page":"104","author":"Health Insurance Portability","year":"1996","journal-title":"Pub."},{"key":"e_1_3_2_1_21_1","unstructured":"Internet Spyware (I-SPY) Prevention Act of 2005 H.R. 744 109th Cong. (2005).  Internet Spyware (I-SPY) Prevention Act of 2005 H.R. 744 109th Cong. (2005)."},{"key":"e_1_3_2_1_22_1","article-title":"August 23). 8 out of 10 Enterprise PCs Spyware Infected","author":"Keizer G.","year":"2005","journal-title":"TechWeb Technology News. Retrieved"},{"volume-title":"Retrieved","year":"2006","author":"Krebs B.","key":"e_1_3_2_1_23_1"},{"key":"e_1_3_2_1_24_1","unstructured":"Krebs B. (2006 February 19) Invasion of the computer snatchers. Washingtonpost.com. Retrieved July 7 2006 from http:\/\/www.washingtonpost.com\/wp-dyn\/content\/article\/2006\/02\/14\/AR2006021401342.html?sub=AR  Krebs B. (2006 February 19) Invasion of the computer snatchers. Washingtonpost.com . Retrieved July 7 2006 from http:\/\/www.washingtonpost.com\/wp-dyn\/content\/article\/2006\/02\/14\/AR2006021401342.html?sub=AR"},{"volume-title":"The Register. Retrieved","year":"2005","author":"Leyden J.","key":"e_1_3_2_1_25_1"},{"volume-title":"Retrieved","year":"2005","author":"Liston T.","key":"e_1_3_2_1_26_1"},{"volume-title":"The Industry Standard. Retrieved","year":"2001","author":"Rabinovitz J.","key":"e_1_3_2_1_27_1"},{"key":"e_1_3_2_1_28_1","unstructured":"Securely Protect Yourself Against Cyber Trespass Act (SPY Act) of 2005 H.R. 29 109th Cong. (2005).  Securely Protect Yourself Against Cyber Trespass Act (SPY Act) of 2005 H.R. 29 109th Cong. (2005)."},{"key":"e_1_3_2_1_29_1","unstructured":"Software Principles Yielding Better Levels of Consumer Knowledge Act (SPY BLOCK Act) of 2005 S. 687 109th Cong. (2005).  Software Principles Yielding Better Levels of Consumer Knowledge Act (SPY BLOCK Act) of 2005 S. 687 109th Cong. (2005)."},{"key":"e_1_3_2_1_30_1","unstructured":"Undertaking Spam Spyware And Fraud Enforcement With Enforcers Beyond Borders Act (U.S. SAFE WEB Act) of 2005 S. 1608 109th Cong. (2005)  Undertaking Spam Spyware And Fraud Enforcement With Enforcers Beyond Borders Act (U.S. SAFE WEB Act) of 2005 S. 1608 109th Cong. (2005)"},{"key":"e_1_3_2_1_31_1","article-title":"July 6). Zango accused of deceiving myspace users","author":"Utter D.","year":"2006","journal-title":"Security Pro News. Retrieved"}],"event":{"name":"InfoSecCD06: 2006 Information Security Curriculum Development Conference","acronym":"InfoSecCD06","location":"Kennesaw Georgia"},"container-title":["Proceedings of the 3rd annual conference on Information security curriculum development"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1231047.1231077","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1231047.1231077","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T14:51:53Z","timestamp":1750258313000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1231047.1231077"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006,9,22]]},"references-count":31,"alternative-id":["10.1145\/1231047.1231077","10.1145\/1231047"],"URL":"https:\/\/doi.org\/10.1145\/1231047.1231077","relation":{},"subject":[],"published":{"date-parts":[[2006,9,22]]},"assertion":[{"value":"2006-09-22","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}