{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,19]],"date-time":"2026-03-19T11:56:16Z","timestamp":1773921376127,"version":"3.50.1"},"publisher-location":"Cham","reference-count":32,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783030465391","type":"print"},{"value":"9783030465407","type":"electronic"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-46540-7_10","type":"book-chapter","created":{"date-parts":[[2020,5,3]],"date-time":"2020-05-03T23:02:35Z","timestamp":1588546955000},"page":"97-106","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["Designing an Intelligent User Interface for Preventing Phishing Attacks"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-9544-8972","authenticated-orcid":false,"given":"Joseph","family":"Aneke","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8993-9855","authenticated-orcid":false,"given":"Carmelo","family":"Ardito","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9894-2116","authenticated-orcid":false,"given":"Giuseppe","family":"Desolda","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,5,4]]},"reference":[{"issue":"10","key":"10_CR1","doi-asserted-by":"crossref","first-page":"94","DOI":"10.1145\/1290958.1290968","volume":"50","author":"TN Jagatic","year":"2007","unstructured":"Jagatic, T.N., Johnson, N.A., Jakobsson, M., Menczer, F.: Social phishing. Commun. ACM 50(10), 94\u2013100 (2007)","journal-title":"Commun. ACM"},{"key":"10_CR2","doi-asserted-by":"crossref","unstructured":"APWG Anti Phishing Working Group: Phishing Attack Trends Report - 4Q 2018 (2018). http:\/\/docs.apwg.org\/reports\/apwg_trends_report_q4_2018.pdf","DOI":"10.1016\/S1361-3723(19)30025-9"},{"key":"10_CR3","unstructured":"Thales: Insider Threat Report. https:\/\/go.thalesesecurity.com\/ESG-Insider-Threat-WP.html"},{"key":"10_CR4","unstructured":"BakerHostetler: Is Your Organization Compromise Ready? 2016 Data Security Incident Response Report (2016). https:\/\/www.bakerlaw.com\/files\/uploads\/Documents\/Privacy\/2016-Data-Security-Incident-Response-Report.pdf"},{"issue":"12","key":"10_CR5","doi-asserted-by":"publisher","first-page":"3629","DOI":"10.1007\/s00521-016-2275-y","volume":"28","author":"BB Gupta","year":"2017","unstructured":"Gupta, B.B., Tewari, A., Jain, A.K., Agrawal, D.P.: Fighting against phishing attacks: state of the art and future challenges. Neural Comput. Appl. 28(12), 3629\u20133654 (2017). https:\/\/doi.org\/10.1007\/s00521-016-2275-y","journal-title":"Neural Comput. Appl."},{"key":"10_CR6","unstructured":"Emigh, A.: Online identity theft: Phishing technology, chokepoints and countermeasures. ITTC Report on Online Identity Theft Technology and Counter measures (2014). http:\/\/www.anti-phishing.org\/Phishingdhs-report.pdf"},{"issue":"18","key":"10_CR7","doi-asserted-by":"crossref","first-page":"6266","DOI":"10.1002\/sec.1674","volume":"9","author":"G Varshney","year":"2016","unstructured":"Varshney, G., Misra, M., Atrey, P.K.: A survey and classification of web phishing detection schemes. Secur. Commun. Netw. 9(18), 6266\u20136284 (2016)","journal-title":"Secur. Commun. Netw."},{"key":"10_CR8","doi-asserted-by":"crossref","unstructured":"Abu-Nimeh, S., Nappa, D., Wang, X., Nair, S.: A comparison of machine learning techniques for phishing detection. In: Anti-phishing Working Groups 2nd annual eCrime Researchers Summit (eCrime 2007), pp. 60\u201369. ACM, New York (2007)","DOI":"10.1145\/1299015.1299021"},{"issue":"4","key":"10_CR9","doi-asserted-by":"crossref","first-page":"2070","DOI":"10.1109\/SURV.2013.030713.00020","volume":"15","author":"A Almomani","year":"2013","unstructured":"Almomani, A., Gupta, B.B., Atawneh, S., Meulenberg, A., Almomani, E.: A survey of phishing email filtering techniques. IEEE Commun. Surv. Tutor. 15(4), 2070\u20132090 (2013)","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"10_CR10","unstructured":"Biran, O., Cotton, C.: Explanation and justification in machine learning: a survey. In: IJCAI-17 workshop on explainable AI (XAI 2017) (2017)"},{"key":"10_CR11","unstructured":"Wu, M.: Fighting Phishing at the User Interface. Massachusetts Institute of Technology (2006)"},{"key":"10_CR12","unstructured":"Department of Justice Federal Bureau of Investigation: FBI Says Web Spoofing Scams Are a Growing Problem (2003). http:\/\/www.fbi.gov\/pressrel\/pressrel03\/spoofing072103.htm"},{"key":"10_CR13","doi-asserted-by":"crossref","unstructured":"Wu, M., Miller, R.C., Garfinkel, S.L.: Do security toolbars actually prevent phishing attacks? In: ACM SIGCHI Conference on Human Factors in Computing Systems (CHI 2006), pp. 601\u2013610. ACM, New York (2006)","DOI":"10.1145\/1124772.1124863"},{"issue":"1\u20132","key":"10_CR14","doi-asserted-by":"crossref","first-page":"63","DOI":"10.1016\/j.cose.2008.09.007","volume":"28","author":"A Herzberg","year":"2009","unstructured":"Herzberg, A.: Why Johnny can\u2019t surf (safely)? Attacks and defenses for web users. Comput. Secur. 28(1\u20132), 63\u201371 (2009)","journal-title":"Comput. Secur."},{"key":"10_CR15","doi-asserted-by":"crossref","unstructured":"Dhamija, R., Tygar, J.D., Hearst, M.: Why phishing works. In: ACM SIGCHI Conference on Human Factors in Computing Systems (CHI 2006). pp. 581\u2013590. ACM, New York, NY, USA (2006)","DOI":"10.1145\/1124772.1124861"},{"key":"10_CR16","volume-title":"Phishing for Answers: Exploring the Factors that Influence a Participant\u2019s Ability to Correctly Identify Email","author":"TD Martin","year":"2008","unstructured":"Martin, T.D.: Phishing for Answers: Exploring the Factors that Influence a Participant\u2019s Ability to Correctly Identify Email. Capella University, Minneapolis (2008)"},{"issue":"2","key":"10_CR17","doi-asserted-by":"crossref","first-page":"275","DOI":"10.1080\/10811680801941292","volume":"13","author":"JE McNealy","year":"2008","unstructured":"McNealy, J.E.: Angling for phishers: legislative responses to deceptive e-mail. Commun. Law Policy 13(2), 275\u2013300 (2008)","journal-title":"Commun. Law Policy"},{"key":"10_CR18","doi-asserted-by":"crossref","unstructured":"Sheng, S., Holbrook, M., Kumaraguru, P., Cranor, L.F., Downs, J.: Who falls for phish? A demographic analysis of phishing susceptibility and effectiveness of interventions. In: ACM SIGCHI Conference on Human Factors in Computing Systems (CHI 2010), pp. 373\u2013382. ACM, New York (2010)","DOI":"10.1145\/1753326.1753383"},{"key":"10_CR19","doi-asserted-by":"crossref","unstructured":"Kumaraguru, P., et al.: School of phish: a real-world evaluation of anti-phishing training. In: Symposium on Usable Privacy and Security (SOUPS 2009), pp. 1\u201312. ACM, New York (2009)","DOI":"10.1145\/1572532.1572536"},{"issue":"2","key":"10_CR20","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/1754393.1754396","volume":"10","author":"P Kumaraguru","year":"2010","unstructured":"Kumaraguru, P., Sheng, S., Acquisti, A., Cranor, L.F., Hong, J.: Teaching Johnny not to fall for phish. ACM Trans. Internet Technol. 10(2), 1\u201331 (2010)","journal-title":"ACM Trans. Internet Technol."},{"key":"10_CR21","doi-asserted-by":"crossref","unstructured":"Reeder, R.W., Felt, A.P., Consolvo, S., Malkin, N., Thompson, C., Egelman, S.: An experience sampling study of user reactions to browser warnings in the field. In: ACM SIGCHI Conference on Human Factors in Computing Systems (CHI 2018), pp. 1\u201313. ACM, New York (2018)","DOI":"10.1145\/3173574.3174086"},{"key":"10_CR22","doi-asserted-by":"crossref","unstructured":"Afroz, S., Greenstadt, R.: PhishZoo: detecting phishing websites by looking at them. In: IEEE International Conference on Semantic Computing (ICSC 2011), pp. 368\u2013375 (2011)","DOI":"10.1109\/ICSC.2011.52"},{"key":"10_CR23","doi-asserted-by":"crossref","unstructured":"Egelman, S., Cranor, L.F., Hong, J.: You\u2019ve been warned: an empirical study of the effectiveness of web browser phishing warnings. In: ACM SIGCHI Conference on Human Factors in Computing Systems (CHI 2008), pp. 1065\u20131074. ACM, New York (2008)","DOI":"10.1145\/1357054.1357219"},{"key":"10_CR24","unstructured":"IBM: IBM X-Force Threat Intelligence Index 2018. https:\/\/microstrat.com\/sites\/default\/files\/security-ibm-security-solutions-wg-research-report-77014377usen-20180329.pdf"},{"key":"10_CR25","doi-asserted-by":"crossref","unstructured":"Felt, A.P., et al.: Improving SSL warnings: comprehension and adherence. In: ACM Conference on Human Factors in Computing Systems (CHI 2015), pp. 2893\u20132902. ACM, New York (2015)","DOI":"10.1145\/2702123.2702442"},{"key":"10_CR26","doi-asserted-by":"crossref","first-page":"52138","DOI":"10.1109\/ACCESS.2018.2870052","volume":"6","author":"A Adadi","year":"2018","unstructured":"Adadi, A., Berrada, M.: Peeking inside the black-box: a survey on Explainable Artificial Intelligence (XAI). IEEE Access 6, 52138\u201352160 (2018)","journal-title":"IEEE Access"},{"issue":"2","key":"10_CR27","doi-asserted-by":"crossref","first-page":"597","DOI":"10.1080\/07421222.2017.1334499","volume":"34","author":"ML Jensen","year":"2017","unstructured":"Jensen, M.L., Dinger, M., Wright, R.T., Thatcher, J.B.: Training to mitigate phishing attacks using mindfulness techniques. J. Manage. Inf. Syst. 34(2), 597\u2013626 (2017)","journal-title":"J. Manage. Inf. Syst."},{"key":"10_CR28","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"265","DOI":"10.1007\/978-3-030-19274-7_20","volume-title":"Web Engineering","author":"S Le Page","year":"2019","unstructured":"Le Page, S., Jourdan, G.-V., Bochmann, G.V., Onut, I.-V., Flood, J.: Domain classifier: compromised machines versus malicious registrations. In: Bakaev, M., Frasincar, F., Ko, I.-Y. (eds.) ICWE 2019. LNCS, vol. 11496, pp. 265\u2013279. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-19274-7_20"},{"key":"10_CR29","volume-title":"Programs for Machine Learning","author":"JR Quinlan","year":"1993","unstructured":"Quinlan, J.R.: Programs for Machine Learning. Morgan Kaufmann Publishers Inc., San Francisco (1993)"},{"issue":"3","key":"10_CR30","doi-asserted-by":"crossref","first-page":"219","DOI":"10.1016\/S0003-6870(02)00009-1","volume":"33","author":"MS Wogalter","year":"2002","unstructured":"Wogalter, M.S., Conzola, V.C., Smith-Jackson, T.L.: Research-based guidelines for warning design and evaluation. Appl. Ergon. 33(3), 219\u2013230 (2002)","journal-title":"Appl. Ergon."},{"issue":"7","key":"10_CR31","doi-asserted-by":"crossref","first-page":"716","DOI":"10.1177\/154193128603000723","volume":"30","author":"JA Strawbridge","year":"1986","unstructured":"Strawbridge, J.A.: The influence of position, highlighting, and imbedding on warning effectiveness. Proc. Hum. Factors Soc. Annu. Meet. 30(7), 716\u2013720 (1986)","journal-title":"Proc. Hum. Factors Soc. Annu. Meet."},{"issue":"6","key":"10_CR32","doi-asserted-by":"crossref","first-page":"451","DOI":"10.1518\/107118191786754996","volume":"35","author":"T Barlow","year":"1991","unstructured":"Barlow, T., Wogalter, M.S.: Alcohol beverage warnings in print advertisements. Proc. Hum. Factors Soc. Annu. Meet. 35(6), 451\u2013455 (1991)","journal-title":"Proc. Hum. Factors Soc. Annu. Meet."}],"container-title":["Lecture Notes in Computer Science","Beyond Interactions"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-46540-7_10","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,5,4]],"date-time":"2024-05-04T00:03:00Z","timestamp":1714780980000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-46540-7_10"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9783030465391","9783030465407"],"references-count":32,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-46540-7_10","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"4 May 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"INTERACT","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"IFIP Conference on Human-Computer Interaction","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Paphos","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Cyprus","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2 September 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"6 September 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"17","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"interact2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/interact2019.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"PCS","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"385","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"111","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"55","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"29% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3.2","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"4","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"48 other papers were accepted.","order":10,"name":"additional_info_on_review_process","label":"Additional Info on Review Process","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}