{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,10]],"date-time":"2026-03-10T12:08:01Z","timestamp":1773144481581,"version":"3.50.1"},"publisher-location":"Cham","reference-count":35,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783030574031","type":"print"},{"value":"9783030574048","type":"electronic"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-57404-8_9","type":"book-chapter","created":{"date-parts":[[2020,8,20]],"date-time":"2020-08-20T23:20:00Z","timestamp":1597965600000},"page":"109-120","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":11,"title":["Quantifying Susceptibility to Spear Phishing in a High School Environment Using Signal Detection Theory"],"prefix":"10.1007","author":[{"given":"P.","family":"Unchit","sequence":"first","affiliation":[]},{"given":"S.","family":"Das","sequence":"additional","affiliation":[]},{"given":"A.","family":"Kim","sequence":"additional","affiliation":[]},{"given":"L. J.","family":"Camp","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,8,21]]},"reference":[{"key":"9_CR1","unstructured":"APWG: Phishing Activity Trends Report (2020). https:\/\/docs.apwg.org\/reports\/apwg_trends_report_q1_2020.pdf. Accessed 29 June 2020"},{"issue":"8","key":"9_CR2","doi-asserted-by":"publisher","first-page":"1158","DOI":"10.1177\/0018720816665025","volume":"58","author":"CI Canfield","year":"2016","unstructured":"Canfield, C.I., Fischhoff, B., Davis, A.: Quantifying phishing susceptibility for detection and behavior decisions. Hum. Factors 58(8), 1158\u20131172 (2016)","journal-title":"Hum. Factors"},{"key":"9_CR3","unstructured":"Das, S.: A risk-reduction-based incentivization model for human-centered multi-factor authentication. Ph.D. thesis, Indiana University (2020)"},{"key":"9_CR4","doi-asserted-by":"crossref","unstructured":"Das, S., Abbott, J., Gopavaram, S., Blythe, J., Camp, L.J.: User-centered risk communication for safer browsing. In: First Asia USEC-Workshop on Usable Security, in Conjunction with the Twenty-Fourth International Conference on Financial Cryptography and Data Security (2020)","DOI":"10.2139\/ssrn.3534856"},{"key":"9_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"160","DOI":"10.1007\/978-3-662-58387-6_9","volume-title":"Financial Cryptography and Data Security","author":"S Das","year":"2018","unstructured":"Das, S., Dingman, A., Camp, L.J.: Why Johnny doesn\u2019t use two factor a two-phase usability study of the FIDO U2F security key. In: Meiklejohn, S., Sako, K. (eds.) FC 2018. LNCS, vol. 10957, pp. 160\u2013179. Springer, Heidelberg (2018). https:\/\/doi.org\/10.1007\/978-3-662-58387-6_9"},{"key":"9_CR6","unstructured":"Das, S., Kim, A., Jelen, B., Streiff, J., Camp, L.J., Huber, L.: Towards implementing inclusive authentication technologies for older adults. Who Are You (2019)"},{"key":"9_CR7","unstructured":"Das, S., Kim, A., Jelen, B., Streiff, J., Camp, L.J., Huber, L.: Why don\u2019t older adults adopt two-factor authentication?, April 2020"},{"key":"9_CR8","unstructured":"Das, S., Kim, A., Tingle, Z., Nippert-Eng, C.: All about phishing exploring user research through a systematic literature review. In: 13th International Symposium on Human Aspects of Information Security & Assurance (2019)"},{"key":"9_CR9","doi-asserted-by":"crossref","unstructured":"Das, S., Russo, G., Dingman, A.C., Dev, J., Kenny, O., Camp, L.J.: A qualitative study on usability and acceptability of Yubico security key. In: 7th Workshop on Socio-Technical Aspects in Security and Trust, pp. 28\u201339 (2018)","DOI":"10.1145\/3167996.3167997"},{"key":"9_CR10","unstructured":"Das, S., Wang, B., Camp, L.J.: MFA is a waste of time! Understanding negative connotation towards MFA applications via user generated content. In: 13th International Symposium on Human Aspects of Information Security & Assurance (HAISA 2019) (2019)"},{"key":"9_CR11","doi-asserted-by":"crossref","unstructured":"Das, S., Wang, B., Kim, A., Camp, L.J.: MFA is a necessary chore!: exploring user mental models of multi-factor authentication technologies. In: 53rd Hawaii International Conference on System Sciences (2020)","DOI":"10.24251\/HICSS.2020.669"},{"key":"9_CR12","unstructured":"Das, S., Wang, B., Tingle, Z., Camp, L.J.: Evaluating user perception of multi-factor authentication: a systematic review. arXiv preprint arXiv:1908.05901 (2019)"},{"key":"9_CR13","doi-asserted-by":"crossref","unstructured":"Dhamija, R., Tygar, J.D., Hearst, M.: Why phishing works. In: SIGCHI Conference on Human Factors in Computing Systems, pp. 581\u2013590 (2006)","DOI":"10.1145\/1124772.1124861"},{"key":"9_CR14","doi-asserted-by":"crossref","unstructured":"Fette, I., Sadeh, N., Tomasic, A.: Learning to detect phishing emails. In: 16th International Conference on World Wide Web, pp. 649\u2013656 (2007)","DOI":"10.1145\/1242572.1242660"},{"key":"9_CR15","doi-asserted-by":"crossref","unstructured":"Friedrichs, O., Jakobsson, M., Soghoian, C.: The Threat of political phishing. In: 2nd International Symposium on Human Aspects of Information Security & Assurance (2008)","DOI":"10.2139\/ssrn.1459790"},{"key":"9_CR16","doi-asserted-by":"crossref","unstructured":"Garg, V., Lorenzen-Huber, L., Camp, L.J., Connelly, K.: Risk communication design for older adults. In: ISARC. Proceedings of the International Symposium on Automation and Robotics in Construction, vol. 29, p. 1. IAARC Publications (2012)","DOI":"10.22260\/ISARC2012\/0030"},{"key":"9_CR17","doi-asserted-by":"crossref","unstructured":"Girden, E.R.: ANOVA: Repeated Measures. Number 84. Sage Publications, Los Angeles (1992)","DOI":"10.4135\/9781412983419"},{"key":"9_CR18","volume-title":"Social Engineering: The Art of Human Hacking","author":"C Hadnagy","year":"2010","unstructured":"Hadnagy, C.: Social Engineering: The Art of Human Hacking. Wiley, Hoboken (2010)"},{"key":"9_CR19","doi-asserted-by":"crossref","unstructured":"Harbach, M., Hettig, M., Weber, S., Smith, M.: Using personal examples to improve risk communication for security & privacy decisions. In: SIGCHI Conference on Human Factors in Computing Systems, pp. 2647\u20132656 (2014)","DOI":"10.1145\/2556288.2556978"},{"key":"9_CR20","doi-asserted-by":"publisher","first-page":"102","DOI":"10.1016\/j.cose.2017.10.008","volume":"73","author":"JM Hatfield","year":"2018","unstructured":"Hatfield, J.M.: Social engineering in cybersecurity: the evolution of a concept. Comput. Secur. 73, 102\u2013113 (2018)","journal-title":"Comput. Secur."},{"key":"9_CR21","unstructured":"Karakasiliotis, A., Furnell, S., Papadaki, M.: Assessing end-user awareness of social engineering and phishing. In: 7th Australian Information Warfare and Security Conference, pp. 60\u201372. School of Computer and Information Science, Edith Cowan University, Perth (2006)"},{"key":"9_CR22","doi-asserted-by":"crossref","unstructured":"Kumaraguru, P., et al.: School of phish: a real-world evaluation of anti-phishing training. In: 5th Symposium on Usable Privacy and Security (SOUPS), pp. 1\u201312 (2009)","DOI":"10.1145\/1572532.1572536"},{"key":"9_CR23","unstructured":"Lastdrager, E., Gallardo, I.C., Hartel, P., Junger, M.: How effective is anti-phishing training for children? In: Thirteenth Symposium on Usable Privacy and Security (SOUPS 2017), pp. 229\u2013239 (2017)"},{"issue":"8","key":"9_CR24","doi-asserted-by":"publisher","first-page":"1179","DOI":"10.1177\/0018720818789818","volume":"60","author":"J Martin","year":"2018","unstructured":"Martin, J., Dub\u00e9, C., Coovert, M.D.: Signal detection theory (SDT) is effective for modeling user behavior toward phishing and spear-phishing attacks. Hum. Factors 60(8), 1179\u20131191 (2018)","journal-title":"Hum. Factors"},{"key":"9_CR25","doi-asserted-by":"crossref","unstructured":"Maurer, M.-E., De Luca, A., Kempe, S.: Using data type based security alert dialogs to raise online security awareness. In: 7th Symposium on Usable Privacy and Security (SOUPS), pp. 1\u201313 (2011)","DOI":"10.1145\/2078827.2078830"},{"key":"9_CR26","doi-asserted-by":"crossref","unstructured":"Nicholson, J., Javed, Y., Dixon, M., Coventry, L., Dele-Ajayi, O., Anderson, P.: Investigating teenagers\u2019 ability to detect phishing messages. In: EuroUSEC 2020: The 5th European Workshop on Usable Security. IEEE (2020)","DOI":"10.1109\/EuroSPW51379.2020.00027"},{"key":"9_CR27","unstructured":"Nikou, S., Br\u00e4nnback, M., Wid\u00e9n, G.: The impact of digitalization on literacy: digital immigrants vs. digital natives. In: 27th European Conference on Information Systems, pp. 1\u201315. ECIS (2019)"},{"issue":"1","key":"9_CR28","doi-asserted-by":"publisher","first-page":"1","DOI":"10.3390\/cryptography2010001","volume":"2","author":"A Ometov","year":"2018","unstructured":"Ometov, A., Bezzateev, S., M\u00e4kitalo, N., Andreev, S., Mikkonen, T., Koucheryavy, Y.: Multi-factor authentication: a survey. Cryptography 2(1), 1\u201331 (2018)","journal-title":"Cryptography"},{"issue":"1","key":"9_CR29","doi-asserted-by":"publisher","first-page":"18","DOI":"10.1108\/09685221211219173","volume":"20","author":"M Pattinson","year":"2012","unstructured":"Pattinson, M., Jerram, C., Parsons, K., McCormac, A., Butavicius, M.: Why do some people manage phishing e-mails better than others? Inf. Manag. Comput. Secur. 20(1), 18\u201328 (2012)","journal-title":"Inf. Manag. Comput. Secur."},{"key":"9_CR30","doi-asserted-by":"crossref","unstructured":"Prakash, P., Kumar, M., Kompella, R.R., Gupta, M.: PhishNet: predictive blacklisting to detect phishing attacks. In: 29th IEEE Conference on Computer Communications, pp. 1\u20135. IEEE (2010)","DOI":"10.1109\/INFCOM.2010.5462216"},{"key":"9_CR31","unstructured":"P.-P. A. E. Program: Phishing: don\u2019t be phooled! (2018). https:\/\/www.dhs.gov\/sites\/default\/files\/publications\/2018_AEP_Vulnerabilities_of_Healthcare_IT_Systems.pdf. Accessed 29 June 2020"},{"key":"9_CR32","doi-asserted-by":"crossref","unstructured":"Rajivan, P., Gonzalez, C.: Creative persuasion: a study on adversarial behaviors and strategies in phishing attacks. Front. Psychol. 9 (2018)","DOI":"10.3389\/fpsyg.2018.00135"},{"key":"9_CR33","doi-asserted-by":"crossref","unstructured":"Sheng, S., Holbrook, M., Kumaraguru, P., Cranor, L.F., Downs, J.: Who falls for phish? A demographic analysis of phishing susceptibility and effectiveness of interventions. In: SIGCHI Conference on Human Factors in Computing Systems, pp. 373\u2013382 (2010)","DOI":"10.1145\/1753326.1753383"},{"key":"9_CR34","doi-asserted-by":"crossref","unstructured":"Wu, M., Miller, R.C., Garfinkel, S.L.: Do security toolbars actually prevent phishing attacks? In: SIGCHI Conference on Human Factors in Computing Systems, pp. 601\u2013610 (2006)","DOI":"10.1145\/1124772.1124863"},{"issue":"2","key":"9_CR35","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/2019599.2019606","volume":"14","author":"G Xiang","year":"2011","unstructured":"Xiang, G., Hong, J., Rose, C.P., Cranor, L.: Cantina+ a feature-rich machine learning framework for detecting phishing web sites. ACM Trans. Inf. Syst. Secur. (TISSEC) 14(2), 1\u201328 (2011)","journal-title":"ACM Trans. Inf. Syst. Secur. (TISSEC)"}],"container-title":["IFIP Advances in Information and Communication Technology","Human Aspects of Information Security and Assurance"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-57404-8_9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,8,22]],"date-time":"2024-08-22T12:39:32Z","timestamp":1724330372000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-57404-8_9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9783030574031","9783030574048"],"references-count":35,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-57404-8_9","relation":{},"ISSN":["1868-4238","1868-422X"],"issn-type":[{"value":"1868-4238","type":"print"},{"value":"1868-422X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"21 August 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"HAISA","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Symposium on Human Aspects of Information Security and Assurance","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Mytilene, Lesbos","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Greece","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2020","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"8 July 2020","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"10 July 2020","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"14","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"haisa2020","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/www.haisa.org\/?page=home","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"43","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"27","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"63% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2.79","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"The symposium was held virtually due to the COVID-19 pandemic.","order":10,"name":"additional_info_on_review_process","label":"Additional Info on Review Process","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}