{"id":"https://openalex.org/W2975005063","doi":"https://doi.org/10.28945/3926","title":"Grandon.com Got Hacked!","display_name":"Grandon.com Got Hacked!","publication_year":2017,"publication_date":"2017-01-01","ids":{"openalex":"https://openalex.org/W2975005063","doi":"https://doi.org/10.28945/3926","mag":"2975005063"},"language":"en","primary_location":{"id":"doi:10.28945/3926","is_oa":true,"landing_page_url":"https://doi.org/10.28945/3926","pdf_url":"http://www.jite.org/documents/DCVol06/V06-10-GrandonCom.pdf","source":{"id":"https://openalex.org/S4210191365","display_name":"Journal of Information Technology Education Discussion Cases","issn_l":"2166-1316","issn":["2166-1316","2166-1324"],"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/P4310315806","host_organization_name":"Informing Science Institute","host_organization_lineage":["https://openalex.org/P4310315806"],"host_organization_lineage_names":["Informing Science Institute"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Information Technology Education: Discussion Cases","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"diamond","oa_url":"http://www.jite.org/documents/DCVol06/V06-10-GrandonCom.pdf","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5046336750","display_name":"Taufeeq Mohammed","orcid":null},"institutions":[{"id":"https://openalex.org/I2613432","display_name":"University of South Florida","ror":"https://ror.org/032db5x82","country_code":"US","type":"education","lineage":["https://openalex.org/I2613432"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Taufeeq Mohammed","raw_affiliation_strings":["University of South Florida"],"affiliations":[{"raw_affiliation_string":"University of South Florida","institution_ids":["https://openalex.org/I2613432"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5060116935","display_name":"Utkarsh Shrivastava","orcid":"https://orcid.org/0000-0003-1063-1642"},"institutions":[{"id":"https://openalex.org/I2613432","display_name":"University of South Florida","ror":"https://ror.org/032db5x82","country_code":"US","type":"education","lineage":["https://openalex.org/I2613432"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Utkarsh Shrivastava","raw_affiliation_strings":["University of South Florida"],"affiliations":[{"raw_affiliation_string":"University of South Florida","institution_ids":["https://openalex.org/I2613432"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5020510900","display_name":"Ashish Kumar Das","orcid":"https://orcid.org/0000-0003-2617-5987"},"institutions":[{"id":"https://openalex.org/I157358134","display_name":"RMIT Vietnam","ror":"https://ror.org/004axh929","country_code":"VN","type":"education","lineage":["https://openalex.org/I157358134","https://openalex.org/I82951845"]}],"countries":["VN"],"is_corresponding":false,"raw_author_name":"Ashish K Das","raw_affiliation_strings":["RMIT Vietnam"],"affiliations":[{"raw_affiliation_string":"RMIT Vietnam","institution_ids":["https://openalex.org/I157358134"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5101501770","display_name":"Quynh T. Nguyen","orcid":"https://orcid.org/0000-0002-3265-3386"},"institutions":[{"id":"https://openalex.org/I157358134","display_name":"RMIT Vietnam","ror":"https://ror.org/004axh929","country_code":"VN","type":"education","lineage":["https://openalex.org/I157358134","https://openalex.org/I82951845"]}],"countries":["VN"],"is_corresponding":false,"raw_author_name":"Quynh Thi Nguyen","raw_affiliation_strings":["RMIT University Vietnam"],"affiliations":[{"raw_affiliation_string":"RMIT University Vietnam","institution_ids":["https://openalex.org/I157358134"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5046336750"],"corresponding_institution_ids":["https://openalex.org/I2613432"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":true,"cited_by_count":0,"citation_normalized_percentile":{"value":0.45026032,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"6","issue":null,"first_page":"10","last_page":"10"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":0.23070000112056732,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":0.23070000112056732,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12479","display_name":"Web Application Security Vulnerabilities","score":0.050599999725818634,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.049300000071525574,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.47634342312812805},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.3923395872116089},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.36659306287765503}],"concepts":[{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.47634342312812805},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.3923395872116089},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.36659306287765503}],"mesh":[],"locations_count":3,"locations":[{"id":"doi:10.28945/3926","is_oa":true,"landing_page_url":"https://doi.org/10.28945/3926","pdf_url":"http://www.jite.org/documents/DCVol06/V06-10-GrandonCom.pdf","source":{"id":"https://openalex.org/S4210191365","display_name":"Journal of Information Technology Education Discussion Cases","issn_l":"2166-1316","issn":["2166-1316","2166-1324"],"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/P4310315806","host_organization_name":"Informing Science Institute","host_organization_lineage":["https://openalex.org/P4310315806"],"host_organization_lineage_names":["Informing Science Institute"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Information Technology Education: Discussion Cases","raw_type":"journal-article"},{"id":"pmh:oai:digitalcommons.usf.edu:qmb_facpub-1021","is_oa":false,"landing_page_url":"https://digitalcommons.usf.edu/qmb_facpub/10","pdf_url":null,"source":{"id":"https://openalex.org/S4377196272","display_name":"Digital Commons - University of South Florida (University of South Florida)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I2613432","host_organization_name":"University of South Florida","host_organization_lineage":["https://openalex.org/I2613432"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"School of Information Systems and Management Faculty Publications","raw_type":"article"},{"id":"mag:2975005063","is_oa":false,"landing_page_url":"https://www.jite.org/documents/DCVol06/V06-10-GrandonCom.pdf","pdf_url":null,"source":null,"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":null,"raw_source_name":null,"raw_type":null}],"best_oa_location":{"id":"doi:10.28945/3926","is_oa":true,"landing_page_url":"https://doi.org/10.28945/3926","pdf_url":"http://www.jite.org/documents/DCVol06/V06-10-GrandonCom.pdf","source":{"id":"https://openalex.org/S4210191365","display_name":"Journal of Information Technology Education Discussion Cases","issn_l":"2166-1316","issn":["2166-1316","2166-1324"],"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/P4310315806","host_organization_name":"Informing Science Institute","host_organization_lineage":["https://openalex.org/P4310315806"],"host_organization_lineage_names":["Informing Science Institute"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Information Technology Education: Discussion Cases","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G5584651678","display_name":"EDU: Developing Open Authentic Case Studies for a MS in Cybersecurity Capstone Course","funder_award_id":"1418711","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"},{"id":"https://openalex.org/G848032724","display_name":null,"funder_award_id":"Science","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"}],"funders":[{"id":"https://openalex.org/F4320306076","display_name":"National Science Foundation","ror":"https://ror.org/021nxhr62"}],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W2975005063.pdf","grobid_xml":"https://content.openalex.org/works/W2975005063.grobid-xml"},"referenced_works_count":7,"referenced_works":["https://openalex.org/W2081232361","https://openalex.org/W2144728197","https://openalex.org/W2746346001","https://openalex.org/W6637921030","https://openalex.org/W6650836018","https://openalex.org/W6652616469","https://openalex.org/W6663620428"],"related_works":[],"abstract_inverted_index":{"A":[0],"professor":[1],"in":[2,48,67,175,339],"information":[3],"systems":[4],"discovers":[5],"that":[6,91,187,285,309,337,400],"his":[7,15,19,65,94,113,155,159,364,386],"personal":[8,95],"website":[9,96,114,222],"has":[10,17,36],"been":[11,98,107,136,343],"hacked.":[12],"Even":[13],"worse,":[14],"ISP":[16],"suspended":[18,99],"site":[20,130,160,277,307,387],"because":[21],"the":[22,32,49,57,109,125,129,142,152,178,197,201,208,221,227,269,276,293,306,313,344,347,355,361],"defacement":[23],"included":[24,302],"a":[25,46,72,118,137,185,249,254,325,331,396],"PayPal":[26,165],"phishing":[27,166],"scheme.":[28],"This":[29,145,183],"is":[30],"not":[31,117,181,290],"first":[33],"time":[34,146],"this":[35],"happened.":[37],"How":[38],"should":[39,414],"he":[40,70,81,171,199,216,219,232,241,272,368,370,415],"recover?":[41],"Dr.":[42],"T.":[43],"Grandon":[44,122],"Gill,":[45],"Professor":[47],"Information":[50],"Systems":[51],"and":[52,133,154,380,407],"Decision":[53],"Sciences":[54],"Department":[55],"at":[56,223],"University":[58],"of":[59,86,210,346,363],"South":[60],"Florida,":[61],"was":[62,89,116,148,180,184,213,245,377],"traveling":[63],"with":[64,253],"family":[66],"England":[68],"when":[69],"received":[71],"strange":[73],"phone":[74],"message.":[75,391],"Not":[76],"being":[77],"able":[78],"to":[79,93,164,205,243,246,260,264,278,324,354,372,384,395],"respond,":[80],"ignored":[82],"it":[83,147,212,280,310],"until\u2014a":[84],"couple":[85],"days":[87],"later\u2014he":[88],"notified":[90],"access":[92],"had":[97,135,195,233,330],"(see":[100],"Exhibit":[101],"1).":[102],"Grandon.com":[103],"had,":[104],"once":[105],"again,":[106],"hacked\u2013for":[108],"7th":[110],"time.":[111],"Getting":[112],"hacked":[115],"new":[119],"experience":[120,408],"for":[121,235],"Gill.":[123],"In":[124],"past,":[126],"however,":[127],"getting":[128],"back":[131,394],"up":[132,248],"running":[134],"quick":[138],"fix":[139],"involving":[140],"replacing":[141],"corrupted":[143],"files.":[144],"different.":[149],"Based":[150],"on":[151,334],"email":[153],"service":[156],"provider\u2019s":[157],"response,":[158],"now":[161],"contained":[162,311],"links":[163],"sites.":[167],"Without":[168],"significant":[169],"changes,":[170],"could":[172,188,273,286],"become":[173],"complicit":[174],"fraud":[176],"if":[177,218,289],"situation":[179],"remedied.":[182],"problem":[186],"no":[189],"longer":[190],"be":[191],"ignored.":[192],"After":[193],"Gill":[194],"re-read":[196],"email,":[198],"pondered":[200],"various":[202],"options":[203],"available":[204],"him.":[206],"Given":[207],"amount":[209],"trouble":[211],"causing":[214],"him,":[215],"wondered":[217],"needed":[220,242,371],"all.":[224],"To":[225],"maintain":[226],"domain":[228],"name":[229],"grandon.com,":[230],"which":[231],"held":[234],"more":[236],"than":[237],"20":[238],"years,":[239],"all":[240],"do":[244,416],"put":[247],"simple":[250],"landing":[251],"page":[252],"message:":[255],"\u201cHi,":[256],"I":[257],"am":[258],"Grandon\u2014go":[259],"my":[261],"school":[262],"account":[263],"find":[265],"out":[266],"more.\u201d":[267],"At":[268],"other":[270,299],"extreme,":[271],"completely":[274],"re-engineer":[275],"make":[279],"much":[281],"less":[282],"vulnerable\u2014a":[283],"process":[284],"take":[287,373],"days,":[288],"weeks.":[291],"Between":[292],"two":[294],"extremes,":[295],"there":[296],"were":[297,350,358],"many":[298],"possibilities.":[300],"These":[301],"changing":[303],"hosts,":[304],"simplifying":[305],"so":[308],"only":[312],"most":[314],"critical":[315],"information,":[316],"dropping":[317],"its":[318],"WordPress":[319,327,340],"component,":[320],"or":[321,357],"even":[322],"going":[323],"pure":[326],"model.":[328],"He":[329,392],"suspicion,":[332],"based":[333],"previous":[335],"experience,":[336,406],"vulnerabilities":[338,352],"may":[341],"have":[342,385],"source":[345],"hack.":[348],"But":[349],"these":[351],"intrinsic":[353],"application,":[356],"they":[359],"simply":[360],"result":[362],"inattentive":[365],"management?":[366],"Whatever":[367],"decided,":[369],"action":[374],"soon.":[375],"It":[376],"very":[378],"embarrassing,":[379],"perhaps":[381],"professionally":[382],"damaging,":[383],"showing":[388],"an":[389],"unavailable":[390],"thought":[393],"popular":[397],"ironic":[398],"quote":[399],"said:":[401],"\u201cGood":[402],"decisions":[403],"come":[404],"from":[405,410],"comes":[409],"bad":[411],"decisions.\u201d":[412],"What":[413],"now?":[417]},"counts_by_year":[],"updated_date":"2026-03-20T23:20:44.827607","created_date":"2025-10-10T00:00:00"}
