{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,20]],"date-time":"2025-11-20T18:17:29Z","timestamp":1763662649202,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":9,"publisher":"ACM","license":[{"start":{"date-parts":[[2006,9,22]],"date-time":"2006-09-22T00:00:00Z","timestamp":1158883200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2006,9,22]]},"DOI":"10.1145\/1231047.1231083","type":"proceedings-article","created":{"date-parts":[[2007,4,5]],"date-time":"2007-04-05T19:41:00Z","timestamp":1175802060000},"page":"159-161","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":7,"title":["Managing phishing threats in an organization"],"prefix":"10.1145","author":[{"given":"Charles","family":"Ohaya","sequence":"first","affiliation":[{"name":"Kennesaw State University, Kennesaw, GA"}]}],"member":"320","published-online":{"date-parts":[[2006,9,22]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"419earter (2003). What is the 419 scam? Retrieved July 6 2006 from 419earter Web site: http:\/\/www.419eater.com\/html\/419faq.htm  419earter (2003). What is the 419 scam? Retrieved July 6 2006 from 419earter Web site: http:\/\/www.419eater.com\/html\/419faq.htm"},{"key":"e_1_3_2_1_2_1","unstructured":"Anti-Phishing Work Group Archive (2005). Retrieved July 3 2006 from Anti-phishing archive Web site: http:\/\/anti-phishing.org\/phishing_archive\/03-30-05_Huntington\/03-30-05_Huntington.html  Anti-Phishing Work Group Archive (2005). Retrieved July 3 2006 from Anti-phishing archive Web site: http:\/\/anti-phishing.org\/phishing_archive\/03-30-05_Huntington\/03-30-05_Huntington.html"},{"key":"e_1_3_2_1_3_1","unstructured":"Anti-Phishing Work Group (2006). Retrieved July 3 2006 from Anti-phishing Web site: http:\/\/anti-phishing.org  Anti-Phishing Work Group (2006). Retrieved July 3 2006 from Anti-phishing Web site: http:\/\/anti-phishing.org"},{"key":"e_1_3_2_1_4_1","unstructured":"Dhamija R. (2006). Why phishing works. Retrieved July 3 2006 from Web site: http:\/\/people.deas.harvard.edu\/~rachna\/papers\/why_phishing_works.pdf#search=%22Why%20Phishing%20Works%20and%20Dhamija%22  Dhamija R. (2006). Why phishing works. Retrieved July 3 2006 from Web site: http:\/\/people.deas.harvard.edu\/~rachna\/papers\/why_phishing_works.pdf#search=%22Why%20Phishing%20Works%20and%20Dhamija%22"},{"key":"e_1_3_2_1_5_1","first-page":"1","article-title":"Are You A Big Corporate Phish?","volume":"7","author":"Leadford J. L.","year":"2004","journal-title":"Intelligent Enterprise."},{"volume-title":"Retrieved","year":"2004","author":"Litan A","key":"e_1_3_2_1_6_1"},{"volume-title":"Retrieved","year":"2004","author":"Loftesness S.","key":"e_1_3_2_1_7_1"},{"key":"e_1_3_2_1_8_1","unstructured":"Pipline M. (2005). 'WiPhishing' said to threaten wi-fi users. Retrieved July 6 2006 from Informationweek Web site: http:\/\/www.informationweek.com\/story\/showArticle.jhtml?a rticleID=59301241  Pipline M. (2005). 'WiPhishing' said to threaten wi-fi users. Retrieved July 6 2006 from Informationweek Web site: http:\/\/www.informationweek.com\/story\/showArticle.jhtml?a rticleID=59301241"},{"key":"e_1_3_2_1_9_1","unstructured":"US Department of Justice (2006). Special report on \"PHISHING\". Retrieved July 3 2006 from US Department of Justice Web Site: http:\/\/www.usdoj.gov\/criminal\/fraud\/Phishing.pdf  US Department of Justice (2006). Special report on \"PHISHING\". Retrieved July 3 2006 from US Department of Justice Web Site: http:\/\/www.usdoj.gov\/criminal\/fraud\/Phishing.pdf"}],"event":{"name":"InfoSecCD06: 2006 Information Security Curriculum Development Conference","acronym":"InfoSecCD06","location":"Kennesaw Georgia"},"container-title":["Proceedings of the 3rd annual conference on Information security curriculum development"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1231047.1231083","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1231047.1231083","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T14:51:53Z","timestamp":1750258313000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1231047.1231083"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006,9,22]]},"references-count":9,"alternative-id":["10.1145\/1231047.1231083","10.1145\/1231047"],"URL":"https:\/\/doi.org\/10.1145\/1231047.1231083","relation":{},"subject":[],"published":{"date-parts":[[2006,9,22]]},"assertion":[{"value":"2006-09-22","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}