{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,30]],"date-time":"2025-12-30T17:54:04Z","timestamp":1767117244428,"version":"3.40.3"},"publisher-location":"Cham","reference-count":16,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030507312"},{"type":"electronic","value":"9783030507329"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-50732-9_67","type":"book-chapter","created":{"date-parts":[[2020,7,11]],"date-time":"2020-07-11T07:02:59Z","timestamp":1594450979000},"page":"520-525","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Effects of Recipient Information and Urgency Cues on Phishing Detection"],"prefix":"10.1007","author":[{"given":"Xinyue","family":"Cui","sequence":"first","affiliation":[]},{"given":"Yan","family":"Ge","sequence":"additional","affiliation":[]},{"given":"Weina","family":"Qu","sequence":"additional","affiliation":[]},{"given":"Kan","family":"Zhang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,7,10]]},"reference":[{"key":"67_CR1","unstructured":"Anti-Phishing Working Group. https:\/\/apwg.org\/trendsreports\/. Accessed 4 Nov 2019"},{"issue":"8","key":"67_CR2","doi-asserted-by":"publisher","first-page":"1081","DOI":"10.1016\/j.im.2004.12.002","volume":"42","author":"VKG Lim","year":"2005","unstructured":"Lim, V.K.G., Teo, T.S.H.: Prevalence, perceived seriousness, justification and regulation of cyberloafing in Singapore: an exploratory study. Inf. Manag. 42(8), 1081\u20131093 (2005)","journal-title":"Inf. Manag."},{"key":"67_CR3","unstructured":"Nicholson, J., Coventry, L., Briggs, P.: Can we fight social engineering attacks by social means? Assessing social salience as a means to improve phish detection. In: 13th Symposium on Usable Privacy and Security, pp. 285\u2013298. USENIX, Santa Clara (2017)"},{"issue":"1","key":"67_CR4","first-page":"54","volume":"28","author":"AJ Ferguson","year":"2005","unstructured":"Ferguson, A.J.: Fostering e-mail security awareness: the west point carronade. Educause Q. 28(1), 54\u201357 (2005)","journal-title":"Educause Q."},{"issue":"8","key":"67_CR5","doi-asserted-by":"publisher","first-page":"1146","DOI":"10.1177\/0093650215627483","volume":"45","author":"A Vishwanath","year":"2018","unstructured":"Vishwanath, A., Harrison, B., Ng, Y.J.: Suspicion, cognition, and automaticity model of phishing susceptibility. Commun. Res. 45(8), 1146\u20131166 (2018)","journal-title":"Commun. Res."},{"issue":"1","key":"67_CR6","doi-asserted-by":"publisher","first-page":"74","DOI":"10.1145\/2063176.2063197","volume":"55","author":"J Hong","year":"2012","unstructured":"Hong, J.: The state of phishing attacks. Commun. ACM 55(1), 74\u201381 (2012)","journal-title":"Commun. ACM"},{"issue":"10","key":"67_CR7","doi-asserted-by":"publisher","first-page":"94","DOI":"10.1145\/1290958.1290968","volume":"50","author":"TN Jagatic","year":"2007","unstructured":"Jagatic, T.N., Johnson, N.A., Jakobsson, M., Menczer, F.: Social phishing. Commun. ACM 50(10), 94\u2013100 (2007)","journal-title":"Commun. ACM"},{"key":"67_CR8","doi-asserted-by":"crossref","unstructured":"Holm, H., Flores, W.R., Nohlberg, M., Ekstedt, M.: An empirical investigation of the effect of recipient information in phishing attacks. In: 18th International Enterprise Distributed Object Computing Conference Workshops and Demonstrations, Ulm, Germany, pp. 357\u2013363. IEEE (2014)","DOI":"10.1109\/EDOCW.2014.59"},{"issue":"5","key":"67_CR9","doi-asserted-by":"publisher","first-page":"593","DOI":"10.1108\/ICS-03-2017-0009","volume":"25","author":"J Bullee","year":"2017","unstructured":"Bullee, J., Montoya, L., Junger, M., Hartel, P.: Spear phishing in organisations explained. Inf. Comput. Secur. 25(5), 593\u2013613 (2017)","journal-title":"Inf. Comput. Secur."},{"key":"67_CR10","unstructured":"Wright, R.T., Marett, K., Thatcher, J.B.: Extending ecommerce deception to phishing. In: 35th International Conference on Information Systems, pp. 1\u201316. AIS eLibrary, Auckland (2014)"},{"issue":"3","key":"67_CR11","doi-asserted-by":"publisher","first-page":"576","DOI":"10.1016\/j.dss.2011.03.002","volume":"51","author":"A Vishwanath","year":"2011","unstructured":"Vishwanath, A., Herath, T., Chen, R., Wang, J., Rao, H.R.: Why do people get phished? Testing individual differences in phishing vulnerability within an integrated, information processing model. Decis. Support Syst. 51(3), 576\u2013586 (2011)","journal-title":"Decis. Support Syst."},{"issue":"2","key":"67_CR12","doi-asserted-by":"publisher","first-page":"121","DOI":"10.1006\/obhd.1997.2717","volume":"71","author":"L Ordonez","year":"1997","unstructured":"Ordonez, L., Benson III, L.: Decisions under time pressure: how time constraint affects risky decision making. Organ. Behav. Hum. Decis. Process. 71(2), 121\u2013140 (1997)","journal-title":"Organ. Behav. Hum. Decis. Process."},{"issue":"1","key":"67_CR13","doi-asserted-by":"publisher","first-page":"83","DOI":"10.1016\/0749-5978(86)90045-2","volume":"37","author":"HG Rothstein","year":"1986","unstructured":"Rothstein, H.G.: The effects of time pressure on judgement in multiple cue probability learning. Organ. Behav. Hum. Decis. Process. 37(1), 83\u201392 (1986)","journal-title":"Organ. Behav. Hum. Decis. Process."},{"issue":"4","key":"67_CR14","doi-asserted-by":"publisher","first-page":"345","DOI":"10.1109\/TPC.2012.2208392","volume":"55","author":"J Wang","year":"2012","unstructured":"Wang, J., Herath, T., Chen, R., Vishwanath, A., Rao, H.R.: Research article phishing susceptibility: an investigation into the processing of a targeted spear phishing email. IEEE Trans. Prof. Commun. 55(4), 345\u2013362 (2012)","journal-title":"IEEE Trans. Prof. Commun."},{"key":"67_CR15","doi-asserted-by":"crossref","unstructured":"Sheng, S., Holbrook, M., Kumaraguru, P., Cranor, L.F., Downs, J.: Who falls for phish?: a demographic analysis of phishing susceptibility and effectiveness of interventions. In: The SIGCHI Conference on Human Factors in Computing Systems, Georgia, USA, pp. 373\u2013382. ACM (2010)","DOI":"10.1145\/1753326.1753383"},{"issue":"1","key":"67_CR16","doi-asserted-by":"publisher","first-page":"102","DOI":"10.1111\/j.1468-2958.2004.tb00726.x","volume":"30","author":"DV Shah","year":"2004","unstructured":"Shah, D.V., Kwak, N., Schmierbach, M., Zubric, J.: The interplay of news frames on cognitive complexity. Hum. Commun. Res. 30(1), 102\u2013120 (2004)","journal-title":"Hum. Commun. Res."}],"container-title":["Communications in Computer and Information Science","HCI International 2020 - Posters"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-50732-9_67","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,7,11]],"date-time":"2024-07-11T00:08:58Z","timestamp":1720656538000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-50732-9_67"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9783030507312","9783030507329"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-50732-9_67","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"10 July 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"HCII","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Human-Computer Interaction","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Copenhagen","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Denmark","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2020","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19 July 2020","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"24 July 2020","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"22","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"hcii2020","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/2020.hci.international\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}