The attention economy and the Net, First Monday, vol.2, issue.4, 1997. ,
DOI : 10.5210/fm.v2i4.519
Social Crowd Integration in New Product Development: Crowdsourcing Communities Nourish the Open Innovation Paradigm, Global Journal of Flexible Systems Management, vol.78, issue.4, pp.77-86, 2014. ,
DOI : 10.1007/s40171-013-0053-6
Towards cloud-centric service environments, Journal of Service Science Research, vol.43, issue.2/3, pp.213-234, 2012. ,
DOI : 10.1007/s12927-012-0009-y
An Empirical Analysis of Search Engine Advertising: Sponsored Search in Electronic Markets, Management Science, vol.55, issue.10, pp.1605-1622, 2009. ,
DOI : 10.1287/mnsc.1090.1054
Search Engine Advertising: Channel Substitution When Pricing Ads to Context, Management Science, vol.57, issue.3, pp.458-470, 2011. ,
DOI : 10.1287/mnsc.1100.1287
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.468.8017
Google's PageRank and beyond: the science of search engine rankings, 2011. ,
DOI : 10.1515/9781400830329
Travel queries on cities in the United States: Implications for search engine marketing for tourist destinations, Tourism Management, vol.32, issue.1, pp.88-97, 2011. ,
DOI : 10.1016/j.tourman.2009.12.004
Click Fraud Detection: Adversarial Pattern Recognition over 5??Years at Microsoft, Real World Data Mining Applications, pp.181-201, 2015. ,
DOI : 10.1007/978-3-319-07812-0_10
Click Fraud Resistant Methods for Learning Click-Through Rates, Internet and Network Economics, pp.34-35, 2005. ,
DOI : 10.1007/11600930_5
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.155.3488
Click Fraud, Marketing Science, vol.28, issue.2, pp.293-308, 2009. ,
DOI : 10.1287/mksc.1080.0397
Fighting online click-fraud using bluff ads, ACM SIGCOMM Computer Communication Review, vol.40, issue.2, pp.21-25, 2010. ,
DOI : 10.1145/1764873.1764877
URL : http://arxiv.org/abs/1002.2353
DECAF: detecting and characterizing ad fraud in mobile apps, Proc. of NSDI, 2014. ,
statista.com/statistics/248059/biggest-challenages-in- search-marketing-worldwide, 2015. ,
Informatik-Sicherheitsmanagement: eine Herausforderung für die Unternehmensführung, 1991. ,
DOI : 10.1007/978-3-322-94696-6
MULTIOBJECTIVE DECISION SUPPORT IN IT-RISK MANAGEMENT, International Journal of Information Technology & Decision Making, vol.01, issue.02, pp.251-268, 2002. ,
DOI : 10.1142/S0219622002000154
Multi-objective evolutionary optimization of computation-intensive simulations: The case of security control selection, Proceedings of the 11th Metaheuristics International Conference, p.forthcoming, 2015. ,
AdWords Hackers ? What a Nightmare, https://moz.com/ugc/adwords-hackers-what-a-nightmare, 2015. ,
abestweb.com/forums/showthread.php?113490- Google-AdAWords-account-hijacked, 2015. ,
Google AdWords Account Hacked: False Ads & False Charges, https://www.seroundtable.com/archives/017946, 2015. ,