{"id":"https://openalex.org/W4377101230","doi":"https://doi.org/10.1017/s1351324923000141","title":"Emerging trends: Risks 3.0 and proliferation of spyware to 50,000 cell phones","display_name":"Emerging trends: Risks 3.0 and proliferation of spyware to 50,000 cell phones","publication_year":2023,"publication_date":"2023-05-01","ids":{"openalex":"https://openalex.org/W4377101230","doi":"https://doi.org/10.1017/s1351324923000141"},"language":"en","primary_location":{"id":"doi:10.1017/s1351324923000141","is_oa":true,"landing_page_url":"http://dx.doi.org/10.1017/s1351324923000141","pdf_url":"https://www.cambridge.org/core/services/aop-cambridge-core/content/view/E493E2949551DB0D1CCB3C873E30C143/S1351324923000141a.pdf/div-class-title-emerging-trends-risks-3-0-and-proliferation-of-spyware-to-50-000-cell-phones-div.pdf","source":{"id":"https://openalex.org/S18088403","display_name":"Natural Language Engineering","issn_l":"1351-3249","issn":["1351-3249","1469-8110"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310311721","host_organization_name":"Cambridge University Press","host_organization_lineage":["https://openalex.org/P4310311721","https://openalex.org/P4310311702"],"host_organization_lineage_names":["Cambridge University Press","University of Cambridge"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Natural Language Engineering","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"hybrid","oa_url":"https://www.cambridge.org/core/services/aop-cambridge-core/content/view/E493E2949551DB0D1CCB3C873E30C143/S1351324923000141a.pdf/div-class-title-emerging-trends-risks-3-0-and-proliferation-of-spyware-to-50-000-cell-phones-div.pdf","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5016543371","display_name":"Kenneth Church","orcid":"https://orcid.org/0000-0001-8378-6069"},"institutions":[{"id":"https://openalex.org/I12912129","display_name":"Northeastern University","ror":"https://ror.org/04t5xt781","country_code":"US","type":"education","lineage":["https://openalex.org/I12912129"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Kenneth Ward Church","raw_affiliation_strings":["Institute for Experiential AI, Northeastern University, San Jose, CA, USA"],"raw_orcid":"https://orcid.org/0000-0001-8378-6069","affiliations":[{"raw_affiliation_string":"Institute for Experiential AI, Northeastern University, San Jose, CA, USA","institution_ids":["https://openalex.org/I12912129"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5058403100","display_name":"Raman Chandrasekar","orcid":"https://orcid.org/0000-0002-2755-0745"},"institutions":[{"id":"https://openalex.org/I12912129","display_name":"Northeastern University","ror":"https://ror.org/04t5xt781","country_code":"US","type":"education","lineage":["https://openalex.org/I12912129"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Raman Chandrasekar","raw_affiliation_strings":["Institute for Experiential AI, Northeastern University, Seattle, WA, USA"],"raw_orcid":"https://orcid.org/0000-0002-2755-0745","affiliations":[{"raw_affiliation_string":"Institute for Experiential AI, Northeastern University, Seattle, WA, USA","institution_ids":["https://openalex.org/I12912129"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5016543371"],"corresponding_institution_ids":["https://openalex.org/I12912129"],"apc_list":null,"apc_paid":null,"fwci":1.7937,"has_fulltext":true,"cited_by_count":4,"citation_normalized_percentile":{"value":0.87610794,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":96},"biblio":{"volume":"29","issue":"3","first_page":"824","last_page":"841"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.8565999865531921,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.8565999865531921,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12221","display_name":"Cybersecurity and Cyber Warfare Studies","score":0.7993000149726868,"subfield":{"id":"https://openalex.org/subfields/3320","display_name":"Political Science and International Relations"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.7385068535804749},{"id":"https://openalex.org/keywords/hacker","display_name":"Hacker","score":0.6877184510231018},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.5678918957710266},{"id":"https://openalex.org/keywords/phone","display_name":"Phone","score":0.5671742558479309},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.5606583952903748},{"id":"https://openalex.org/keywords/exploit","display_name":"Exploit","score":0.5131507515907288},{"id":"https://openalex.org/keywords/identity-theft","display_name":"Identity theft","score":0.5005698204040527},{"id":"https://openalex.org/keywords/password","display_name":"Password","score":0.44465309381484985}],"concepts":[{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.7385068535804749},{"id":"https://openalex.org/C86844869","wikidata":"https://www.wikidata.org/wiki/Q2798820","display_name":"Hacker","level":2,"score":0.6877184510231018},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.5678918957710266},{"id":"https://openalex.org/C2778707766","wikidata":"https://www.wikidata.org/wiki/Q202064","display_name":"Phone","level":2,"score":0.5671742558479309},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5606583952903748},{"id":"https://openalex.org/C165696696","wikidata":"https://www.wikidata.org/wiki/Q11287","display_name":"Exploit","level":2,"score":0.5131507515907288},{"id":"https://openalex.org/C522325796","wikidata":"https://www.wikidata.org/wiki/Q471880","display_name":"Identity theft","level":2,"score":0.5005698204040527},{"id":"https://openalex.org/C109297577","wikidata":"https://www.wikidata.org/wiki/Q161157","display_name":"Password","level":2,"score":0.44465309381484985},{"id":"https://openalex.org/C41895202","wikidata":"https://www.wikidata.org/wiki/Q8162","display_name":"Linguistics","level":1,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1017/s1351324923000141","is_oa":true,"landing_page_url":"http://dx.doi.org/10.1017/s1351324923000141","pdf_url":"https://www.cambridge.org/core/services/aop-cambridge-core/content/view/E493E2949551DB0D1CCB3C873E30C143/S1351324923000141a.pdf/div-class-title-emerging-trends-risks-3-0-and-proliferation-of-spyware-to-50-000-cell-phones-div.pdf","source":{"id":"https://openalex.org/S18088403","display_name":"Natural Language Engineering","issn_l":"1351-3249","issn":["1351-3249","1469-8110"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310311721","host_organization_name":"Cambridge University Press","host_organization_lineage":["https://openalex.org/P4310311721","https://openalex.org/P4310311702"],"host_organization_lineage_names":["Cambridge University Press","University of Cambridge"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Natural Language Engineering","raw_type":"journal-article"}],"best_oa_location":{"id":"doi:10.1017/s1351324923000141","is_oa":true,"landing_page_url":"http://dx.doi.org/10.1017/s1351324923000141","pdf_url":"https://www.cambridge.org/core/services/aop-cambridge-core/content/view/E493E2949551DB0D1CCB3C873E30C143/S1351324923000141a.pdf/div-class-title-emerging-trends-risks-3-0-and-proliferation-of-spyware-to-50-000-cell-phones-div.pdf","source":{"id":"https://openalex.org/S18088403","display_name":"Natural Language Engineering","issn_l":"1351-3249","issn":["1351-3249","1469-8110"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310311721","host_organization_name":"Cambridge University Press","host_organization_lineage":["https://openalex.org/P4310311721","https://openalex.org/P4310311702"],"host_organization_lineage_names":["Cambridge University Press","University of Cambridge"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Natural Language Engineering","raw_type":"journal-article"},"sustainable_development_goals":[{"score":0.800000011920929,"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4377101230.pdf"},"referenced_works_count":10,"referenced_works":["https://openalex.org/W1996360405","https://openalex.org/W2170267084","https://openalex.org/W2573660794","https://openalex.org/W2764072425","https://openalex.org/W3011288915","https://openalex.org/W3034713808","https://openalex.org/W3141821872","https://openalex.org/W4232836212","https://openalex.org/W4313396214","https://openalex.org/W4377101230"],"related_works":["https://openalex.org/W3115072666","https://openalex.org/W3113358185","https://openalex.org/W2808249021","https://openalex.org/W3040987670","https://openalex.org/W3006507989","https://openalex.org/W3042652091","https://openalex.org/W2109029025","https://openalex.org/W4256654297","https://openalex.org/W197818113","https://openalex.org/W2513387150"],"abstract_inverted_index":{"Abstract":[0],"Our":[1],"last":[2],"emerging":[3],"trend":[4],"article":[5,22],"introduced":[6],"Risks":[7,13,24,30,262],"1.0":[8],"(fairness":[9],"and":[10,12,18,27,57,59,120,127,236,246],"bias)":[11],"2.0":[14],"(addictive,":[15],"dangerous,":[16],"deadly,":[17],"insanely":[19],"profitable).":[20],"This":[21,60,290],"introduces":[23],"3.0":[25,31],"(spyware":[26],"cyber":[28,143,185],"weapons).":[29],"are":[32,248,265],"less":[33,166],"profitable,":[34],"but":[35,173],"more":[36],"destructive.":[37],"We":[38,281],"will":[39,206],"summarize":[40],"two":[41],"recent":[42],"books,":[43],"Pegasus:":[44],"How":[45,62],"a":[46,79,92,197,240,293],"Spy":[47],"in":[48,187,275,296],"Your":[49],"Pocket":[50],"Threatens":[51],"the":[52,66,105,140,153,156,168,183,188,225,253,258,267,276],"End":[53],"of":[54,81,104,114,130,142,170,243,269,278],"Privacy,":[55],"Dignity,":[56],"Democracy":[58],"is":[61,149,292],"They":[63],"Tell":[64],"Me":[65],"World":[67],"Ends:":[68],"The":[69,74,112,136],"Cyberweapons":[70],"Arms":[71],"Race":[72],".":[73],"first":[75],"book":[76,138],"starts":[77],"with":[78],"leak":[80],"50,000":[82,115],"phone":[83],"numbers,":[84],"targeted":[85],"by":[86],"spyware":[87,191],"named":[88],"Pegasus.":[89],"Pegasus":[90],"uses":[91],"zero-click":[93],"exploit":[94],"to":[95,99,181,193,272,287],"obtain":[96],"root":[97],"access":[98],"your":[100,212,215,218,221],"phone,":[101],"taking":[102],"control":[103],"microphone,":[106],"camera,":[107],"GPS,":[108],"text":[109],"messages,":[110],"etc.":[111],"list":[113],"numbers":[116],"includes":[117],"journalists,":[118],"politicians,":[119],"academics,":[121],"as":[122,124,146,151,233,249,251],"well":[123],"their":[125,270],"friends":[126],"family.":[128],"Some":[129],"these":[131],"people":[132],"have":[133,228],"been":[134,229],"murdered.":[135],"second":[137],"describes":[139],"history":[141],"weapons":[144],"such":[145,232],"Stuxnet,":[147],"which":[148],"described":[150],"crossing":[152],"Rubicon.":[154],"In":[155],"short":[157],"term,":[158],"it":[159,174],"sets":[160],"back":[161],"Iran\u2019s":[162],"nuclear":[163],"program":[164],"for":[165,179],"than":[167],"cost":[169],"conventional":[171],"weapons,":[172],"did":[175],"not":[176,211],"take":[177],"long":[178],"Iran":[180],"build":[182],"fourth-biggest":[184],"army":[186],"world.":[189],"As":[190],"continues":[192],"proliferate,":[194],"we":[195,285],"envision":[196],"future":[198],"dystopia":[199],"where":[200],"everyone":[201],"spies":[202],"on":[203],"everyone.":[204],"Nothing":[205],"be":[207],"safe":[208],"from":[209],"hacking:":[210],"identity,":[213],"or":[214,217,220],"secrets,":[216],"passwords,":[219],"bank":[222],"accounts.":[223],"When":[224],"endpoints":[226],"(phones)":[227],"compromised,":[230],"technologies":[231],"end-to-end":[234],"encryption":[235,245],"multi-factor":[237],"authentication":[238,247],"offer":[239],"false":[241],"sense":[242],"security;":[244],"pointless":[250],"closing":[252],"proverbial":[254],"barn":[255],"door":[256],"after":[257],"fact.":[259],"To":[260],"address":[261],"3.0,":[263],"journalists":[264],"using":[266],"tools":[268],"trade":[271],"raise":[273],"awareness":[274],"court":[277],"public":[279],"opinion.":[280],"should":[282],"do":[283],"what":[284],"can":[286],"support":[288],"them.":[289],"paper":[291],"small":[294],"step":[295],"that":[297],"direction.":[298]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":2}],"updated_date":"2025-12-21T23:12:01.093139","created_date":"2025-10-10T00:00:00"}
