{"id":"https://openalex.org/W2055597027","doi":"https://doi.org/10.1145/2030376.2030387","title":"Phi.sh/$oCiaL","display_name":"Phi.sh/$oCiaL","publication_year":2011,"publication_date":"2011-09-01","ids":{"openalex":"https://openalex.org/W2055597027","doi":"https://doi.org/10.1145/2030376.2030387","mag":"2055597027"},"language":"en","primary_location":{"id":"doi:10.1145/2030376.2030387","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2030376.2030387","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 8th Annual Collaboration, Electronic messaging, Anti-Abuse and Spam Conference","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5110348727","display_name":"Sidharth Chhabra","orcid":null},"institutions":[{"id":"https://openalex.org/I863896202","display_name":"Delhi Technological University","ror":"https://ror.org/01ztcvt22","country_code":"IN","type":"education","lineage":["https://openalex.org/I863896202"]}],"countries":["IN"],"is_corresponding":true,"raw_author_name":"Sidharth Chhabra","raw_affiliation_strings":["Delhi College of Engineering"],"affiliations":[{"raw_affiliation_string":"Delhi College of Engineering","institution_ids":["https://openalex.org/I863896202"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5072633707","display_name":"Anupama Aggarwal","orcid":null},"institutions":[{"id":"https://openalex.org/I119939252","display_name":"Indraprastha Institute of Information Technology Delhi","ror":"https://ror.org/03vfp4g33","country_code":"IN","type":"education","lineage":["https://openalex.org/I119939252"]},{"id":"https://openalex.org/I68891433","display_name":"Indian Institute of Technology Delhi","ror":"https://ror.org/049tgcd06","country_code":"IN","type":"education","lineage":["https://openalex.org/I68891433"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Anupama Aggarwal","raw_affiliation_strings":["IIIT-Delhi","[IIIT Delhi]"],"affiliations":[{"raw_affiliation_string":"IIIT-Delhi","institution_ids":["https://openalex.org/I119939252","https://openalex.org/I68891433"]},{"raw_affiliation_string":"[IIIT Delhi]","institution_ids":["https://openalex.org/I119939252"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5085054435","display_name":"Fabr\u00ed\u00adcio Benevenuto","orcid":"https://orcid.org/0000-0001-6875-6259"},"institutions":[{"id":"https://openalex.org/I10824318","display_name":"Universidade Federal de Ouro Preto","ror":"https://ror.org/056s65p46","country_code":"BR","type":"education","lineage":["https://openalex.org/I10824318"]}],"countries":["BR"],"is_corresponding":false,"raw_author_name":"Fabricio Benevenuto","raw_affiliation_strings":["Federal University of Ouro Preto","Federal University of Ouro Preto;"],"affiliations":[{"raw_affiliation_string":"Federal University of Ouro Preto","institution_ids":["https://openalex.org/I10824318"]},{"raw_affiliation_string":"Federal University of Ouro Preto;","institution_ids":["https://openalex.org/I10824318"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5077509916","display_name":"Ponnurangam Kumaraguru","orcid":"https://orcid.org/0000-0001-5082-2078"},"institutions":[{"id":"https://openalex.org/I68891433","display_name":"Indian Institute of Technology Delhi","ror":"https://ror.org/049tgcd06","country_code":"IN","type":"education","lineage":["https://openalex.org/I68891433"]},{"id":"https://openalex.org/I119939252","display_name":"Indraprastha Institute of Information Technology Delhi","ror":"https://ror.org/03vfp4g33","country_code":"IN","type":"education","lineage":["https://openalex.org/I119939252"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Ponnurangam Kumaraguru","raw_affiliation_strings":["IIIT-Delhi","[IIIT Delhi]"],"affiliations":[{"raw_affiliation_string":"IIIT-Delhi","institution_ids":["https://openalex.org/I119939252","https://openalex.org/I68891433"]},{"raw_affiliation_string":"[IIIT Delhi]","institution_ids":["https://openalex.org/I119939252"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5110348727"],"corresponding_institution_ids":["https://openalex.org/I863896202"],"apc_list":null,"apc_paid":null,"fwci":31.5713,"has_fulltext":false,"cited_by_count":120,"citation_normalized_percentile":{"value":0.99555534,"is_in_top_1_percent":true,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":100},"biblio":{"volume":null,"issue":null,"first_page":"92","last_page":"101"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9955000281333923,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9919000267982483,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/phishing","display_name":"Phishing","score":0.9760514497756958},{"id":"https://openalex.org/keywords/social-media","display_name":"Social media","score":0.7031503319740295},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6730571985244751},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.6148168444633484},{"id":"https://openalex.org/keywords/identity-theft","display_name":"Identity theft","score":0.5975030660629272},{"id":"https://openalex.org/keywords/space","display_name":"Space (punctuation)","score":0.550804853439331},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.5285153388977051},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.38263651728630066},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.2671439051628113}],"concepts":[{"id":"https://openalex.org/C83860907","wikidata":"https://www.wikidata.org/wiki/Q135005","display_name":"Phishing","level":3,"score":0.9760514497756958},{"id":"https://openalex.org/C518677369","wikidata":"https://www.wikidata.org/wiki/Q202833","display_name":"Social media","level":2,"score":0.7031503319740295},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6730571985244751},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.6148168444633484},{"id":"https://openalex.org/C522325796","wikidata":"https://www.wikidata.org/wiki/Q471880","display_name":"Identity theft","level":2,"score":0.5975030660629272},{"id":"https://openalex.org/C2778572836","wikidata":"https://www.wikidata.org/wiki/Q380933","display_name":"Space (punctuation)","level":2,"score":0.550804853439331},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.5285153388977051},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.38263651728630066},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.2671439051628113},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/2030376.2030387","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2030376.2030387","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 8th Annual Collaboration, Electronic messaging, Anti-Abuse and Spam Conference","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","score":0.44999998807907104,"id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[{"id":"https://openalex.org/F4320322025","display_name":"Conselho Nacional de Desenvolvimento Cient\u00edfico e Tecnol\u00f3gico","ror":"https://ror.org/03swz6y49"},{"id":"https://openalex.org/F4320330597","display_name":"Indraprastha Institute of Information Technology, Delhi","ror":"https://ror.org/03vfp4g33"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":35,"referenced_works":["https://openalex.org/W9223698","https://openalex.org/W36335746","https://openalex.org/W103897157","https://openalex.org/W176212337","https://openalex.org/W185907677","https://openalex.org/W1498527206","https://openalex.org/W1498728415","https://openalex.org/W1536367539","https://openalex.org/W1672660286","https://openalex.org/W1814023381","https://openalex.org/W1965586806","https://openalex.org/W1969568357","https://openalex.org/W1985920648","https://openalex.org/W1993081839","https://openalex.org/W1996802155","https://openalex.org/W2003798735","https://openalex.org/W2005269342","https://openalex.org/W2010608681","https://openalex.org/W2070242009","https://openalex.org/W2071869991","https://openalex.org/W2084591134","https://openalex.org/W2097436041","https://openalex.org/W2101196063","https://openalex.org/W2131906261","https://openalex.org/W2134750673","https://openalex.org/W2139565456","https://openalex.org/W2160353917","https://openalex.org/W2163764145","https://openalex.org/W2165701072","https://openalex.org/W2335888457","https://openalex.org/W2482756632","https://openalex.org/W2613540436","https://openalex.org/W2639421075","https://openalex.org/W6684212199","https://openalex.org/W6722581543"],"related_works":["https://openalex.org/W2595760708","https://openalex.org/W182956790","https://openalex.org/W2186893595","https://openalex.org/W1981963489","https://openalex.org/W2121587354","https://openalex.org/W4250020282","https://openalex.org/W2080177354","https://openalex.org/W2137279730","https://openalex.org/W253390588","https://openalex.org/W2139969188"],"abstract_inverted_index":{"Size,":[0],"accessibility,":[1],"and":[2,53,65,165,171,217,234,263],"rate":[3],"of":[4,6,19,80,89,113,121,163,167,197,215,223,231,240,271],"growth":[5],"Online":[7],"Social":[8],"Media":[9],"(OSM)":[10],"has":[11,23,55],"attracted":[12],"cyber":[13,20],"crimes":[14],"through":[15,63],"them.":[16],"One":[17,120],"form":[18],"crime":[21],"that":[22,75,126,145,221],"been":[24,56],"increasing":[25],"steadily":[26],"is":[27,35,70,125,244],"phishing,":[28],"where":[29],"the":[30,33,50,175,184,190,224,238,245,250,269],"goal":[31],"(for":[32],"phishers)":[34],"to":[36,59,87,101,139,188,248,267],"steal":[37],"personal":[38],"information":[39],"from":[40,186,199,257,261,265],"users":[41],"which":[42,205],"can":[43],"be":[44],"used":[45],"for":[46,116,134],"fraudulent":[47],"purposes.":[48],"Although":[49],"research":[51,73],"community":[52],"industry":[54],"developing":[57],"techniques":[58],"identify":[60],"phishing":[61,81,114,192,225,251,255,272],"attacks":[62,115],"emails":[64],"instant":[66],"messaging":[67],"(IM),":[68],"there":[69],"very":[71],"little":[72],"done,":[74],"provides":[76],"a":[77],"deeper":[78],"understanding":[79],"in":[82,93,161,273],"online":[83,274],"social":[84,94,146,275],"media.":[85,276],"Due":[86],"constraints":[88],"limited":[90],"text":[91],"space":[92,136],"systems":[95],"like":[96,149,158],"Twitter,":[97],"phishers":[98,127],"have":[99,212],"begun":[100],"use":[102,230],"URL":[103,130,259],"shortener":[104],"services.":[105],"In":[106],"this":[107,117,243],"study,":[108],"we":[109],"provide":[110],"an":[111],"overview":[112],"new":[118],"scenario.":[119],"our":[122,241],"main":[123],"conclusions":[124],"are":[128,153,173,202,206],"using":[129,253],"shorteners":[131],"not":[132],"only":[133],"reducing":[135],"but":[137,211],"also":[138],"hide":[140],"their":[141],"identity.":[142],"We":[143,182,219],"observe":[144,220],"media":[147],"websites":[148],"Facebook,":[150],"Habbo,":[151,170],"Orkut":[152],"competing":[154],"with":[155],"e-commerce":[156],"services":[157],"PayPal,":[159],"eBay":[160],"terms":[162],"traffic":[164],"focus":[166],"phishers.":[168,181],"Orkut,":[169],"Facebook":[172],"amongst":[174,209],"top":[176],"5":[177],"brands":[178],"targeted":[179],"by":[180,228],"study":[183,247],"referrals":[185],"Twitter":[187,200,266],"understand":[189],"evolving":[191],"strategy.":[193],"A":[194],"staggering":[195],"89%":[196],"references":[198],"(users)":[201],"inorganic":[203],"accounts":[204],"sparsely":[207],"connected":[208],"themselves,":[210],"large":[213],"number":[214],"followers":[216],"followees.":[218],"most":[222],"tweets":[226],"spread":[227],"extensive":[229],"attractive":[232],"words":[233],"multiple":[235],"hashtags.":[236],"To":[237],"best":[239],"knowledge,":[242],"first":[246],"connect":[249],"landscape":[252],"blacklisted":[254],"URLs":[256],"PhishTank,":[258],"statistics":[260],"bit.ly":[262],"cues":[264],"track":[268],"impact":[270]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":5},{"year":2024,"cited_by_count":4},{"year":2023,"cited_by_count":1},{"year":2022,"cited_by_count":2},{"year":2021,"cited_by_count":7},{"year":2020,"cited_by_count":10},{"year":2019,"cited_by_count":10},{"year":2018,"cited_by_count":9},{"year":2017,"cited_by_count":8},{"year":2016,"cited_by_count":10},{"year":2015,"cited_by_count":12},{"year":2014,"cited_by_count":20},{"year":2013,"cited_by_count":10},{"year":2012,"cited_by_count":7}],"updated_date":"2026-03-12T08:34:05.389933","created_date":"2016-06-24T00:00:00"}
