{"id":"https://openalex.org/W1972424286","doi":"https://doi.org/10.4018/ijcwt.2013100105","title":"Monkey See - Monkey Take Photo","display_name":"Monkey See - Monkey Take Photo","publication_year":2013,"publication_date":"2013-10-01","ids":{"openalex":"https://openalex.org/W1972424286","doi":"https://doi.org/10.4018/ijcwt.2013100105","mag":"1972424286"},"language":"en","primary_location":{"id":"doi:10.4018/ijcwt.2013100105","is_oa":false,"landing_page_url":"https://doi.org/10.4018/ijcwt.2013100105","pdf_url":null,"source":{"id":"https://openalex.org/S4210168647","display_name":"International Journal of Cyber Warfare and Terrorism","issn_l":"1947-3435","issn":["1947-3435","1947-3443"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320424","host_organization_name":"IGI Global","host_organization_lineage":["https://openalex.org/P4310320424"],"host_organization_lineage_names":["IGI Global"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Cyber Warfare and Terrorism","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5035796880","display_name":"Karen Renaud","orcid":"https://orcid.org/0000-0002-7187-6531"},"institutions":[{"id":"https://openalex.org/I7882870","display_name":"University of Glasgow","ror":"https://ror.org/00vtgdb53","country_code":"GB","type":"education","lineage":["https://openalex.org/I7882870"]}],"countries":["GB"],"is_corresponding":true,"raw_author_name":"Karen Renaud","raw_affiliation_strings":["School of Computing Science, University of Glasgow, Glasgow, UK"],"affiliations":[{"raw_affiliation_string":"School of Computing Science, University of Glasgow, Glasgow, UK","institution_ids":["https://openalex.org/I7882870"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5024238466","display_name":"Wendy Goucher","orcid":null},"institutions":[{"id":"https://openalex.org/I7882870","display_name":"University of Glasgow","ror":"https://ror.org/00vtgdb53","country_code":"GB","type":"education","lineage":["https://openalex.org/I7882870"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Wendy Goucher","raw_affiliation_strings":["University of Glasgow, Glasgow, UK"],"affiliations":[{"raw_affiliation_string":"University of Glasgow, Glasgow, UK","institution_ids":["https://openalex.org/I7882870"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5035796880"],"corresponding_institution_ids":["https://openalex.org/I7882870"],"apc_list":null,"apc_paid":null,"fwci":0.775,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.81976918,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":94},"biblio":{"volume":"3","issue":"4","first_page":"40","last_page":"51"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12607","display_name":"Personal Information Management and User Behavior","score":0.9983999729156494,"subfield":{"id":"https://openalex.org/subfields/1802","display_name":"Information Systems and Management"},"field":{"id":"https://openalex.org/fields/18","display_name":"Decision Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},"topics":[{"id":"https://openalex.org/T12607","display_name":"Personal Information Management and User Behavior","score":0.9983999729156494,"subfield":{"id":"https://openalex.org/subfields/1802","display_name":"Information Systems and Management"},"field":{"id":"https://openalex.org/fields/18","display_name":"Decision Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T11045","display_name":"Privacy, Security, and Data Protection","score":0.9922000169754028,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T11896","display_name":"Opportunistic and Delay-Tolerant Networks","score":0.9921000003814697,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.5902944803237915},{"id":"https://openalex.org/keywords/mobile-device","display_name":"Mobile device","score":0.5406053066253662},{"id":"https://openalex.org/keywords/confidentiality","display_name":"Confidentiality","score":0.4875745177268982},{"id":"https://openalex.org/keywords/work","display_name":"Work (physics)","score":0.4692026972770691},{"id":"https://openalex.org/keywords/population","display_name":"Population","score":0.4425092339515686},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.40580466389656067},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.3625653386116028},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3153265118598938},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.29236024618148804},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.2536998987197876},{"id":"https://openalex.org/keywords/sociology","display_name":"Sociology","score":0.23914852738380432}],"concepts":[{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.5902944803237915},{"id":"https://openalex.org/C186967261","wikidata":"https://www.wikidata.org/wiki/Q5082128","display_name":"Mobile device","level":2,"score":0.5406053066253662},{"id":"https://openalex.org/C71745522","wikidata":"https://www.wikidata.org/wiki/Q2476929","display_name":"Confidentiality","level":2,"score":0.4875745177268982},{"id":"https://openalex.org/C18762648","wikidata":"https://www.wikidata.org/wiki/Q42213","display_name":"Work (physics)","level":2,"score":0.4692026972770691},{"id":"https://openalex.org/C2908647359","wikidata":"https://www.wikidata.org/wiki/Q2625603","display_name":"Population","level":2,"score":0.4425092339515686},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.40580466389656067},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.3625653386116028},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3153265118598938},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.29236024618148804},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.2536998987197876},{"id":"https://openalex.org/C144024400","wikidata":"https://www.wikidata.org/wiki/Q21201","display_name":"Sociology","level":0,"score":0.23914852738380432},{"id":"https://openalex.org/C149923435","wikidata":"https://www.wikidata.org/wiki/Q37732","display_name":"Demography","level":1,"score":0.0},{"id":"https://openalex.org/C78519656","wikidata":"https://www.wikidata.org/wiki/Q101333","display_name":"Mechanical engineering","level":1,"score":0.0}],"mesh":[],"locations_count":3,"locations":[{"id":"doi:10.4018/ijcwt.2013100105","is_oa":false,"landing_page_url":"https://doi.org/10.4018/ijcwt.2013100105","pdf_url":null,"source":{"id":"https://openalex.org/S4210168647","display_name":"International Journal of Cyber Warfare and Terrorism","issn_l":"1947-3435","issn":["1947-3435","1947-3443"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320424","host_organization_name":"IGI Global","host_organization_lineage":["https://openalex.org/P4310320424"],"host_organization_lineage_names":["IGI Global"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Cyber Warfare and Terrorism","raw_type":"journal-article"},{"id":"pmh:oai:RePEc:igg:jcwt00:v:3:y:2013:i:4:p:40-51","is_oa":false,"landing_page_url":"http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/ijcwt.2013100105","pdf_url":null,"source":{"id":"https://openalex.org/S4306401271","display_name":"RePEc: Research Papers in Economics","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I77793887","host_organization_name":"Federal Reserve Bank of St. Louis","host_organization_lineage":["https://openalex.org/I77793887"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"article"},{"id":"pmh:oai:eprints.gla.ac.uk:172932","is_oa":false,"landing_page_url":"http://eprints.gla.ac.uk/172932/","pdf_url":null,"source":{"id":"https://openalex.org/S4210235606","display_name":"ENLIGHTEN (Jurnal Bimbingan dan Konseling Islam)","issn_l":"2622-8912","issn":["2622-8912","2622-8920"],"is_oa":false,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"PeerReviewed"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":25,"referenced_works":["https://openalex.org/W71510009","https://openalex.org/W1601503232","https://openalex.org/W1964596829","https://openalex.org/W1971951448","https://openalex.org/W1977534427","https://openalex.org/W1984009639","https://openalex.org/W2008123513","https://openalex.org/W2013745554","https://openalex.org/W2017060242","https://openalex.org/W2019940363","https://openalex.org/W2027791623","https://openalex.org/W2046761155","https://openalex.org/W2054979928","https://openalex.org/W2083611559","https://openalex.org/W2089224599","https://openalex.org/W2114206706","https://openalex.org/W2200187069","https://openalex.org/W2321401729","https://openalex.org/W2486637477","https://openalex.org/W2771020952","https://openalex.org/W2772521545","https://openalex.org/W2912097882","https://openalex.org/W4233475021","https://openalex.org/W4250102124","https://openalex.org/W4255407107"],"related_works":["https://openalex.org/W4387497383","https://openalex.org/W3183948672","https://openalex.org/W3173606202","https://openalex.org/W3110381201","https://openalex.org/W2948807893","https://openalex.org/W2935909890","https://openalex.org/W2778153218","https://openalex.org/W2758277628","https://openalex.org/W1531601525","https://openalex.org/W2112141997"],"abstract_inverted_index":{"Mobile":[0,303],"devices":[1,278],"have":[2,130],"diffused":[3],"through":[4],"the":[5,18,23,44,47,51,53,59,66,98,102,127,145,153,162,168,193,196,220,225,235,244,250,260,270,299,302,321],"global":[6],"population":[7],"with":[8],"unprecedented":[9],"rapidity.":[10],"This":[11,137,227],"diffusion":[12],"has":[13,57],"delivered":[14],"great":[15],"benefits":[16],"to":[17,34,61,71,89,210,215,218,230,233,238,279,315],"populace":[19],"at":[20],"large.":[21],"In":[22],"third":[24],"world":[25],"people":[26],"living":[27],"in":[28,40,121,126,202,207,256,310],"rural":[29],"areas":[30],"are":[31],"now":[32,107,180],"able":[33,217],"contact":[35],"family":[36],"members":[37],"who":[38],"live":[39],"other":[41],"parts":[42],"of":[43,101,141,195,224,272,291,301,319],"country":[45],"for":[46,147],"first":[48,205],"time.":[49],"For":[50],"city-dweller":[52],"mobile":[54,115,159,239,245],"device":[55],"revolution":[56],"brought":[58],"ability":[60],"communicate":[62],"and":[63,72,93,120,123,139,190,222,258,276,288],"work":[64],"on":[65,114,117,199,265,274],"move,":[67],"while":[68],"they":[69],"travel":[70],"from":[73,170],"work,":[74],"or":[75,185],"between":[76],"meetings,":[77],"thus":[78],"making":[79],"ertswhile":[80],"\u201cdead\u201d":[81],"time":[82],"more":[83],"productive.":[84],"It":[85],"is":[86,112,179,214],"trivial,":[87],"nowadays,":[88],"utilise":[90],"workplace":[91],"functionality,":[92],"access":[94],"confidential":[95],"information,":[96],"outside":[97],"four":[99],"walls":[100],"organisation's":[103],"traditional":[104],"boundaries.":[105],"Data":[106],"moves":[108],"across":[109],"organisational":[110],"boundaries,":[111],"stored":[113,125],"devices,":[116],"USB":[118],"sticks,":[119],"emails,":[122],"also":[124],"cloud.":[128],"Organisations":[129],"somehow":[131],"lost":[132],"control":[133,142],"over":[134],"their":[135],"data.":[136],"mobility":[138],"lack":[140],"undeniably":[143],"creates":[144],"potential":[146],"information":[148,246,281],"leakage":[149,247],"that":[150,252,268],"could":[151],"hurt":[152],"organisation.":[154],"The":[155,204,283,294,307],"almost":[156],"ubiquitous":[157],"camera-equipped":[158],"phones":[160,166],"exacerbate":[161],"problem.":[163],"These":[164],"feature-rich":[165],"change":[167],"threat":[169],"mere":[171],"Shoulder":[172],"Surfing":[173],"into":[174,298],"Visual":[175],"Information":[176,178,304],"Capture.":[177],"no":[181],"longer":[182],"merely":[183],"observed":[184],"overheard":[186],"but":[187],"potentially":[188],"captured":[189],"retained":[191],"without":[192],"knowledge":[194],"person":[197],"working":[198],"said":[200],"documents":[201],"public.":[203],"step":[206],"deciding":[208],"how":[209],"manage":[211],"any":[212],"risk":[213,236],"be":[216,314],"estimate":[219],"extent":[221],"nature":[223],"risk.":[226,306,322],"paper":[228],"seeks":[229],"help":[231],"organisations":[232],"understand":[234],"related":[237],"working.":[240],"We":[241,262],"will":[242,313],"model":[243],"risk,":[248],"depicting":[249],"factors":[251],"play":[253],"a":[254],"role":[255],"exacerbating":[257],"encouraging":[259],"threat.":[261],"then":[263],"report":[264],"two":[266],"experiments":[267],"investigated":[269],"vulnerability":[271],"data":[273],"laptops":[275],"tablet":[277],"visual":[280],"capture.":[282],"authors":[284],"address":[285],"both":[286],"capability":[287],"likelihood":[289],"(probability)":[290],"such":[292],"leakage.":[293],"results":[295],"deliver":[296],"insight":[297],"size":[300],"Leakage":[305],"following":[308],"stage":[309],"this":[311],"research":[312],"find":[316],"feasible":[317],"ways":[318],"mitigating":[320]},"counts_by_year":[{"year":2015,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2016-06-24T00:00:00"}
