[1] M. Sutherland and A. K. Sylvester, Advertising and the mind of the consumer: what works, what doesn’t and why. Kogan Page Publishers, 2000.##
[2] U. Dombrowski and C. Engel, “Impact of electric mobility on the after sales service in the automotive industry,” Procedia CIRP, vol. 16, pp. 152–157, 2014.##
[3] S. Z. Asif, Next generation mobile communications ecosystem: Technology management for mobile communications. John Wiley & Sons, 2011.##
[4] F. Gillani, E. Al-Shaer, and B. AsSadhan, “Economic metric to improve spam detectors,” J. Netw. Comput. Appl., vol. 65, pp. 131–143, 2016.##
[5] P. P. K. Chan, C. Yang, D. S. Yeung, and W. W. Y. Ng, “Spam filtering for short messages in adversarial environment,” Neurocomputing, vol. 155, pp. 167–176, 2015.##
[6] A. Heydari, M. ali Tavakoli, N. Salim, and Z. Heydari, “Detection of review spam: A survey,” Expert Syst. Appl., vol. 42, no. 7, pp. 3634–3642, 2015.##
[8] The Technology & Humanity website, “The Evolution of our Sense of Community,” 2106. Available:
http://www.ferris.com/##
[9] L. Li, B. Qin, W. Ren, and T. Liu, “Document representation and feature combination for deceptive spam review detection,” Neurocomputing, vol. 254, pp. 33–41, 2017.##
[10] M. Chakraborty, S. Pal, R. Pramanik, and C. R. Chowdary, “Recent developments in social spam detection and combating techniques: A survey,” Inf. Process. Manag., vol. 52, no. 6, pp. 1053–1073, 2016.##
[11] C. Laorden, X. Ugarte-Pedrero, I. Santos, B. Sanz, J. Nieves, and P. G. Bringas, “Study on the effectiveness of anomaly detection for spam filtering,” Inf. Sci. (Ny)., vol. 277, pp. 421–444, 2014.##
[12] I. Yevseyeva, V. Basto-Fernandes, D. Ruano-OrdáS, and J. R. MéNdez, “Optimising anti-spam filters with evolutionary algorithms,” Expert Syst. Appl., vol. 40, no. 10, pp. 4010–4021, 2013.##
[13] N. J. King, “When Mobile Phones are RFID-Equipped-Finding Eu-US solutions to protect consumer privacy and facilitate mobile commerce,” Mich. Telecomm. Tech. L. Rev., vol. 15, p. 107, 2008.##
[14] H. A. Al-Ofeishat and M. A. A. Al Rababah, “Near field communication (NFC),” Int. J. Comput. Sci. Netw. Secur., vol. 12, no. 2, p. 93, 2012.##
[15] H. Du, “NFC technology: Today and tomorrow,” Int. J. Futur. Comput. Commun., vol. 2, no. 4, p. 351, 2013.##
[18] M. A. Shareef, Y. K. Dwivedi, V. Kumar, and U. Kumar, “Content design of advertisement for consumer exposure: Mobile marketing through short messaging service,” Int. J. Inf. Manage, vol. 37, no. 4, pp. 257–268, 2017.##
[19] V. Basto-Fernandes, I. Yevseyeva, J. R. Méndez, J. Zhao, F. Fdez-Riverola, and M. T. M. Emmerich, “A spam filtering multi-objective optimization study covering parsimony maximization and three-way classification,” Appl. Soft Comput., vol. 48, pp. 111–123, 2016.##
[20] A. Wilson, V. A. Zeithaml, M. J. Bitner, and D. D. Gremler, “Services marketing: Integrating customer focus across the firm,” no. 2nd Eu. McGraw Hill, 2012.##
[22] S. M. Pournaghi, M. Barmshori, and M. Gardeshi, “An Improved Authentication Scheme with Conditional Privacy Preserving in VANETs,” Journal of Electronical & Cyber Defence, vol. 3, no. 2, pp. 1-12, 2015. (In Persian)##
[23] L. Carrara, G. Orsi, and L. Tanca, “Semantic pervasive advertising,” in International Conference on Web Reasoning and Rule Systems, 2013, pp. 216–222.##
[24] L. Carrara and G. Orsi, “A new perspective in pervasive advertising,” Tech. Report, Dep. Comput. Sci., 2011.##
[25] L. Carrara, “PervADs: pervasive, semantic and context aware advertising,” 2011.##
[26] S. Ghesmati, A. Yazdan varjani, “Manage spam on social networks using content tagging,” Journal of Electronical & Cyber Defence, vol. 2, no. 2, pp. 52-62, 2014. (in Persian)##
[27] M. Shadkam, “Consumer’s attitude to receive and response to SMS advertising,” Int. J. Bus. Inf. Syst., vol. 24, no. 1, pp. 69–90, 2017.##
[28] C. F. Foozy, R. Ahmad, M.F. Abdollah, and C. C. Wen, “A Comparative Study with RapidMiner and WEKA Tools over some Classification Techniques for SMS Spam,” Materials Science and Engineering Conference Series., vol. 226, no 1, 2017.##