{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,24]],"date-time":"2025-10-24T16:33:07Z","timestamp":1761323587738,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":21,"publisher":"ACM","license":[{"start":{"date-parts":[[2008,11,8]],"date-time":"2008-11-08T00:00:00Z","timestamp":1226102400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2008,11,8]]},"DOI":"10.1145\/1460563.1460628","type":"proceedings-article","created":{"date-parts":[[2008,11,18]],"date-time":"2008-11-18T13:27:27Z","timestamp":1227014847000},"page":"403-412","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":78,"title":["Social networks and context-aware spam"],"prefix":"10.1145","author":[{"given":"Garrett","family":"Brown","sequence":"first","affiliation":[{"name":"University of Michigan, Ann Arbor, MI, USA"}]},{"given":"Travis","family":"Howe","sequence":"additional","affiliation":[{"name":"University of Michigan, Ann Arbor, MI, USA"}]},{"given":"Micheal","family":"Ihbe","sequence":"additional","affiliation":[{"name":"University of Michigan, Ann Arbor, MI, USA"}]},{"given":"Atul","family":"Prakash","sequence":"additional","affiliation":[{"name":"University of Michigan, Ann Arbor, MI, USA"}]},{"given":"Kevin","family":"Borders","sequence":"additional","affiliation":[{"name":"University of Michigan, Ann Arbor, MI, USA"}]}],"member":"320","published-online":{"date-parts":[[2008,11,8]]},"reference":[{"unstructured":"Arrington M. 85% of College Students use Facebook Sept. 2005. (http:\/\/www.techcrunch.com\/2005\/09\/07\/85-of-college-students-use-facebook\/)  Arrington M. 85% of College Students use Facebook Sept. 2005. (http:\/\/www.techcrunch.com\/2005\/09\/07\/85-of-college-students-use-facebook\/)","key":"e_1_3_2_1_1_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_2_1","DOI":"10.1016\/S0378-4371(00)00018-2"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_3_1","DOI":"10.1145\/985921.986043"},{"key":"e_1_3_2_1_4_1","first-page":"31","volume":"24","author":"Brodkin J.","year":"2007","unstructured":"Brodkin , J. Phishing researcher 'targets' the unsuspecting , Network World , 24 , 31 ( Aug. 2007 ), 26. Brodkin, J. Phishing researcher 'targets' the unsuspecting, Network World, 24, 31 (Aug. 2007), 26.","journal-title":"Network World"},{"key":"e_1_3_2_1_5_1","volume-title":"April","author":"News","year":"2007","unstructured":"CBC News , Facebook 'ideal' for phishing attacks: researcher , April 2007 . http:\/\/www.cbc.ca\/technology\/story\/2007\/04\/13\/tech-facebookphishing-20070413.html CBC News, Facebook 'ideal' for phishing attacks: researcher, April 2007. http:\/\/www.cbc.ca\/technology\/story\/2007\/04\/13\/tech-facebookphishing-20070413.html"},{"key":"e_1_3_2_1_6_1","volume-title":"Proc. 13th Americas Conf. Information Systems, Association for Information Systems","author":"Dwyer C.","year":"2007","unstructured":"Dwyer , C. , Hiltz , S. , and Passerini , K . Trust and privacy concern within social networking sites: A comparison of Facebook and MySpace , Proc. 13th Americas Conf. Information Systems, Association for Information Systems , 2007 . Dwyer, C., Hiltz, S., and Passerini, K.Trust and privacy concern within social networking sites: A comparison of Facebook and MySpace, Proc. 13th Americas Conf. Information Systems, Association for Information Systems, 2007."},{"key":"e_1_3_2_1_7_1","volume-title":"December","author":"Ipsos","year":"2006","unstructured":"ESPC\/ Ipsos , Email Survey Summary , December 2006 . http:\/\/www.espcoalition.org\/ESPC_Ipsos_Survey_Executive_Summary.pdf ESPC\/Ipsos, Email Survey Summary, December 2006. http:\/\/www.espcoalition.org\/ESPC_Ipsos_Survey_Executive_Summary.pdf"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_8_1","DOI":"10.1016\/S1353-4858(04)00144-8"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_9_1","DOI":"10.1145\/1102199.1102214"},{"key":"e_1_3_2_1_10_1","volume-title":"The Fourth Amendment and Privacy Issues on the \"New\" Internet: Facebook.com and Myspace.com","author":"Hodge M.","year":"2006","unstructured":"Hodge , M. The Fourth Amendment and Privacy Issues on the \"New\" Internet: Facebook.com and Myspace.com , Southern Illinois University Law Journal , Fall 2006 . Hodge, M. The Fourth Amendment and Privacy Issues on the \"New\" Internet: Facebook.com and Myspace.com, Southern Illinois University Law Journal, Fall 2006."},{"key":"e_1_3_2_1_11_1","volume-title":"Group Formation in Economics","author":"Jackson M. O.","year":"2004","unstructured":"Jackson , M. O. A Survey of Models of Network Formation: Stability and Efficiency , in Group Formation in Economics ; Networks, Clubs and Coalitions, edited by Gabrielle Demange and Myrna Wooders, Cambridge University Press : Cambridge U.K., 2004 . Jackson, M. O. A Survey of Models of Network Formation: Stability and Efficiency, in Group Formation in Economics; Networks, Clubs and Coalitions, edited by Gabrielle Demange and Myrna Wooders, Cambridge University Press: Cambridge U.K., 2004."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_12_1","DOI":"10.1257\/aer.97.3.890"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_13_1","DOI":"10.1145\/1290958.1290968"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_14_1","DOI":"10.1145\/1135777.1135853"},{"key":"e_1_3_2_1_15_1","volume-title":"MIT manuscript","author":"Jones H.","year":"2005","unstructured":"Jones , H. and Soltren , J. H . Facebook: Threats to Privacy , MIT manuscript , December 2005 . Available at http:\/\/www.swiss.ai.mit.edu\/6095\/student-papers\/fall05-papers\/facebook.pdf. Jones, H. and Soltren, J. H. Facebook: Threats to Privacy, MIT manuscript, December 2005. Available at http:\/\/www.swiss.ai.mit.edu\/6095\/student-papers\/fall05-papers\/facebook.pdf."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_16_1","DOI":"10.1145\/1180875.1180901"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_17_1","DOI":"10.1145\/1240624.1240695"},{"key":"e_1_3_2_1_18_1","volume-title":"May","author":"Liam Tung","year":"2007","unstructured":"Liam Tung , Social networking 'addiction' aids phishing , May 2007 . http:\/\/www.zdnetasia.com\/news\/security\/0,39044215,62027706,00.htm. Liam Tung, Social networking 'addiction' aids phishing, May 2007. http:\/\/www.zdnetasia.com\/news\/security\/0,39044215,62027706,00.htm."},{"key":"e_1_3_2_1_19_1","first-page":"1","volume":"66","author":"Newman M. E. J.","unstructured":"Newman , M. E. J. , Forrest , S. , and Balthrop , J. Email networks and spread of computer viruses , Physical Review E 66 , 035101(R) (2002), 1 -- 4 . Newman, M. E. J., Forrest, S., and Balthrop, J. Email networks and spread of computer viruses, Physical Review E 66, 035101(R) (2002), 1--4.","journal-title":"Physical Review E"},{"key":"e_1_3_2_1_20_1","volume-title":"September","author":"Symantec","year":"2006","unstructured":"Symantec , Report : Hackers Turning to Social-Networking Sites , September 2006 . Symantec, Report: Hackers Turning to Social-Networking Sites, September 2006."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_22_1","DOI":"10.1145\/985692.985733"}],"event":{"sponsor":["ACM Association for Computing Machinery","SIGCHI ACM Special Interest Group on Computer-Human Interaction"],"acronym":"CSCW08","name":"CSCW08: Computer Supported Cooperative Work","location":"San Diego CA USA"},"container-title":["Proceedings of the 2008 ACM conference on Computer supported cooperative work"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1460563.1460628","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1460563.1460628","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T13:29:44Z","timestamp":1750253384000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1460563.1460628"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008,11,8]]},"references-count":21,"alternative-id":["10.1145\/1460563.1460628","10.1145\/1460563"],"URL":"https:\/\/doi.org\/10.1145\/1460563.1460628","relation":{},"subject":[],"published":{"date-parts":[[2008,11,8]]},"assertion":[{"value":"2008-11-08","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}