{"id":"https://openalex.org/W2061924402","doi":"https://doi.org/10.1080/15567280601142053","title":"The Phlorida Autopsy Report","display_name":"The Phlorida Autopsy Report","publication_year":2006,"publication_date":"2006-09-01","ids":{"openalex":"https://openalex.org/W2061924402","doi":"https://doi.org/10.1080/15567280601142053","mag":"2061924402"},"language":"en","primary_location":{"id":"doi:10.1080/15567280601142053","is_oa":false,"landing_page_url":"https://doi.org/10.1080/15567280601142053","pdf_url":null,"source":{"id":"https://openalex.org/S127916260","display_name":"Journal of Digital Forensic Practice","issn_l":"1556-7281","issn":["1556-7281","1556-7346"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320547","host_organization_name":"Taylor & Francis","host_organization_lineage":["https://openalex.org/P4310320547"],"host_organization_lineage_names":["Taylor & Francis"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Digital Forensic Practice","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5049616538","display_name":"Bob Breeden","orcid":null},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Bob Breeden","raw_affiliation_strings":["Florida Computer Crime Center (FC3), Florida Department of Law Enforcement"],"affiliations":[{"raw_affiliation_string":"Florida Computer Crime Center (FC3), Florida Department of Law Enforcement","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5042123775","display_name":"Mike Cantey","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Mike Cantey","raw_affiliation_strings":["Florida Computer Crime Center (FC3), Florida Department of Law Enforcement"],"affiliations":[{"raw_affiliation_string":"Florida Computer Crime Center (FC3), Florida Department of Law Enforcement","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5021445720","display_name":"Brett Cureton","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Brett Cureton","raw_affiliation_strings":["Florida Computer Crime Center (FC3), Florida Department of Law Enforcement"],"affiliations":[{"raw_affiliation_string":"Florida Computer Crime Center (FC3), Florida Department of Law Enforcement","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5009530345","display_name":"Clifford Stokes","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Clifford Stokes","raw_affiliation_strings":["Florida Computer Crime Center (FC3), Florida Department of Law Enforcement"],"affiliations":[{"raw_affiliation_string":"Florida Computer Crime Center (FC3), Florida Department of Law Enforcement","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5046096429","display_name":"Peter Henry","orcid":null},"institutions":[{"id":"https://openalex.org/I103163165","display_name":"Florida State University","ror":"https://ror.org/05g3dte14","country_code":"US","type":"education","lineage":["https://openalex.org/I103163165"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Peter Henry","raw_affiliation_strings":["Florida Cybersecurity Institute (FCI), Computer Science Department, Florida State University"],"affiliations":[{"raw_affiliation_string":"Florida Cybersecurity Institute (FCI), Computer Science Department, Florida State University","institution_ids":["https://openalex.org/I103163165"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5077998835","display_name":"Judie Mulholland","orcid":null},"institutions":[{"id":"https://openalex.org/I103163165","display_name":"Florida State University","ror":"https://ror.org/05g3dte14","country_code":"US","type":"education","lineage":["https://openalex.org/I103163165"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Judie Mulholland","raw_affiliation_strings":["Florida Cybersecurity Institute (FCI), Computer Science Department, Florida State University"],"affiliations":[{"raw_affiliation_string":"Florida Cybersecurity Institute (FCI), Computer Science Department, Florida State University","institution_ids":["https://openalex.org/I103163165"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5058722944","display_name":"Wayne E. Sprague","orcid":null},"institutions":[{"id":"https://openalex.org/I103163165","display_name":"Florida State University","ror":"https://ror.org/05g3dte14","country_code":"US","type":"education","lineage":["https://openalex.org/I103163165"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Wayne Sprague","raw_affiliation_strings":["Florida Cybersecurity Institute (FCI), Computer Science Department, Florida State University"],"affiliations":[{"raw_affiliation_string":"Florida Cybersecurity Institute (FCI), Computer Science Department, Florida State University","institution_ids":["https://openalex.org/I103163165"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5010687729","display_name":"Jim Watson","orcid":"https://orcid.org/0000-0001-8464-1718"},"institutions":[{"id":"https://openalex.org/I1327714866","display_name":"Federal Bureau of Investigation","ror":"https://ror.org/00ta5r839","country_code":"US","type":"government","lineage":["https://openalex.org/I1314586196","https://openalex.org/I1327714866"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Jim Watson","raw_affiliation_strings":["Fairview Heights Resident Agency, Springfield Division , Federal Bureau of Investigation (FBI) , St. Louis, MO, USA"],"affiliations":[{"raw_affiliation_string":"Fairview Heights Resident Agency, Springfield Division , Federal Bureau of Investigation (FBI) , St. Louis, MO, USA","institution_ids":["https://openalex.org/I1327714866"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":8,"corresponding_author_ids":["https://openalex.org/A5049616538"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":1.6417,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.88405595,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"1","issue":"3","first_page":"203","last_page":"222"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12519","display_name":"Cybercrime and Law Enforcement Studies","score":0.9976000189781189,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9955999851226807,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/phishing","display_name":"Phishing","score":0.9066216945648193},{"id":"https://openalex.org/keywords/law-enforcement","display_name":"Law enforcement","score":0.553621232509613},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.5117373466491699},{"id":"https://openalex.org/keywords/digital-forensics","display_name":"Digital forensics","score":0.5069830417633057},{"id":"https://openalex.org/keywords/enforcement","display_name":"Enforcement","score":0.49712756276130676},{"id":"https://openalex.org/keywords/protocol","display_name":"Protocol (science)","score":0.4447166621685028},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.42538750171661377},{"id":"https://openalex.org/keywords/criminology","display_name":"Criminology","score":0.3680722713470459},{"id":"https://openalex.org/keywords/political-science","display_name":"Political science","score":0.367500364780426},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.33647072315216064},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.33432814478874207},{"id":"https://openalex.org/keywords/law","display_name":"Law","score":0.26591864228248596},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.215696781873703},{"id":"https://openalex.org/keywords/psychology","display_name":"Psychology","score":0.2137071192264557},{"id":"https://openalex.org/keywords/medicine","display_name":"Medicine","score":0.21106597781181335},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.1883232593536377},{"id":"https://openalex.org/keywords/pathology","display_name":"Pathology","score":0.09546467661857605},{"id":"https://openalex.org/keywords/alternative-medicine","display_name":"Alternative medicine","score":0.06589579582214355}],"concepts":[{"id":"https://openalex.org/C83860907","wikidata":"https://www.wikidata.org/wiki/Q135005","display_name":"Phishing","level":3,"score":0.9066216945648193},{"id":"https://openalex.org/C2780262971","wikidata":"https://www.wikidata.org/wiki/Q44554","display_name":"Law enforcement","level":2,"score":0.553621232509613},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.5117373466491699},{"id":"https://openalex.org/C84418412","wikidata":"https://www.wikidata.org/wiki/Q3246940","display_name":"Digital forensics","level":2,"score":0.5069830417633057},{"id":"https://openalex.org/C2779777834","wikidata":"https://www.wikidata.org/wiki/Q4202277","display_name":"Enforcement","level":2,"score":0.49712756276130676},{"id":"https://openalex.org/C2780385302","wikidata":"https://www.wikidata.org/wiki/Q367158","display_name":"Protocol (science)","level":3,"score":0.4447166621685028},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.42538750171661377},{"id":"https://openalex.org/C73484699","wikidata":"https://www.wikidata.org/wiki/Q161733","display_name":"Criminology","level":1,"score":0.3680722713470459},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.367500364780426},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.33647072315216064},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.33432814478874207},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.26591864228248596},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.215696781873703},{"id":"https://openalex.org/C15744967","wikidata":"https://www.wikidata.org/wiki/Q9418","display_name":"Psychology","level":0,"score":0.2137071192264557},{"id":"https://openalex.org/C71924100","wikidata":"https://www.wikidata.org/wiki/Q11190","display_name":"Medicine","level":0,"score":0.21106597781181335},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.1883232593536377},{"id":"https://openalex.org/C142724271","wikidata":"https://www.wikidata.org/wiki/Q7208","display_name":"Pathology","level":1,"score":0.09546467661857605},{"id":"https://openalex.org/C204787440","wikidata":"https://www.wikidata.org/wiki/Q188504","display_name":"Alternative medicine","level":2,"score":0.06589579582214355}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1080/15567280601142053","is_oa":false,"landing_page_url":"https://doi.org/10.1080/15567280601142053","pdf_url":null,"source":{"id":"https://openalex.org/S127916260","display_name":"Journal of Digital Forensic Practice","issn_l":"1556-7281","issn":["1556-7281","1556-7346"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320547","host_organization_name":"Taylor & Francis","host_organization_lineage":["https://openalex.org/P4310320547"],"host_organization_lineage_names":["Taylor & Francis"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Digital Forensic Practice","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.6100000143051147,"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":4,"referenced_works":["https://openalex.org/W1491018131","https://openalex.org/W2044480279","https://openalex.org/W2081108139","https://openalex.org/W2118123121"],"related_works":["https://openalex.org/W2149202530","https://openalex.org/W2807822918","https://openalex.org/W2159614226","https://openalex.org/W2620272321","https://openalex.org/W2185441218","https://openalex.org/W1531316950","https://openalex.org/W3015503851","https://openalex.org/W1576621636","https://openalex.org/W54587564","https://openalex.org/W2552093437"],"abstract_inverted_index":{"ABSTRACT":[0],"Three":[1],"\u201cpostmortem\u201d":[2],"case":[3],"studies":[4],"in":[5],"Florida":[6],"provide":[7],"insight":[8],"into":[9],"the":[10,32,44,67,72,79],"emerging":[11],"nature":[12],"of":[13,31,34,46,71,74],"online":[14,69],"fraud":[15],"on":[16],"small":[17],"financial":[18],"institutions.":[19],"Discourse":[20],"between":[21],"researchers,":[22],"first":[23],"responders,":[24],"and":[25,38,49,86],"law":[26],"enforcement":[27],"investigators":[28],"reveal":[29],"some":[30],"inadequacies":[33,48],"current":[35],"policies,":[36],"protocols,":[37],"coordinated":[39],"responses.":[40],"This":[41],"study":[42],"seeks":[43],"causes":[45],"these":[47],"recommends":[50],"practical":[51],"anti-phishing":[52],"measures":[53],"for":[54,62,78],"puddle":[55],"phishing":[56],"targets.":[57],"[Supplementary":[58],"materials":[59],"are":[60],"available":[61],"this":[63],"article.":[64],"Go":[65],"to":[66],"publisher's":[68],"edition":[70],"Journal":[73],"Digital":[75],"Forensic":[76],"Practice":[77],"following":[80],"free":[81],"supplemental":[82],"resources:":[83],"Postmortem":[84],"Protocol":[85],"Phishing":[87],"Incident":[88],"Response":[89],"Form.]":[90]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
