{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,6]],"date-time":"2025-07-06T22:22:28Z","timestamp":1751840548745,"version":"3.40.3"},"publisher-location":"Cham","reference-count":39,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030576714"},{"type":"electronic","value":"9783030576721"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-57672-1_23","type":"book-chapter","created":{"date-parts":[[2020,8,11]],"date-time":"2020-08-11T09:31:47Z","timestamp":1597138307000},"page":"311-324","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Impact of Information Security Training on Recognition of Phishing Attacks: A Case Study of Vilnius Gediminas Technical University"],"prefix":"10.1007","author":[{"given":"Justinas","family":"Rastenis","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3195-4280","authenticated-orcid":false,"given":"Simona","family":"Ramanauskait\u0117","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Justinas","family":"Janulevi\u010dius","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Antanas","family":"\u010cenys","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2020,8,12]]},"reference":[{"key":"23_CR1","doi-asserted-by":"crossref","unstructured":"Phishing Activity Trends Report\u20144th Quarter 2018. http:\/\/docs.apwg.org\/reports\/apwg_trends_report_q4_2018.pdf. Accessed 12 Nov 2019","DOI":"10.1016\/S1361-3723(19)30025-9"},{"key":"23_CR2","unstructured":"Internet Security Threat Report, vol. 23. https:\/\/www.symantec.com\/content\/dam\/symantec\/docs\/reports\/istr-23-2018-en.pdf. Accessed 12 Nov 2019"},{"key":"23_CR3","unstructured":"Chandrasekaran, M., Narayanan, K., Upadhyaya, S.: Phishing email detection based on structural properties. In: NYS Cyber Security Conference, vol. 3 (2006)"},{"key":"23_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"449","DOI":"10.1007\/978-3-642-00958-7_40","volume-title":"Advances in Information Retrieval","author":"WN Gansterer","year":"2009","unstructured":"Gansterer, W.N., P\u00f6lz, D.: E-mail classification for phishing defense. In: Boughanem, M., Berrut, C., Mothe, J., Soule-Dupuy, C. (eds.) ECIR 2009. LNCS, vol. 5478, pp. 449\u2013460. Springer, Heidelberg (2009). https:\/\/doi.org\/10.1007\/978-3-642-00958-7_40"},{"key":"23_CR5","unstructured":"Mbah, K.F., Lashkari, A.H., Ghorbani, A.A.: A phishing email detection approach using machine learning techniques. Master\u2019s Thesis, University of New Brunswick, Fredericton and Saint John, NB, Canada (2017)"},{"key":"23_CR6","series-title":"IFIP Advances in Information and Communication Technology","doi-asserted-by":"publisher","first-page":"135","DOI":"10.1007\/978-3-319-33630-5_10","volume-title":"ICT Systems Security and Privacy Protection","author":"S Stockhardt","year":"2016","unstructured":"Stockhardt, S., et al.: Teaching phishing-security: which way is best? In: Hoepman, J., Katzenbeisser, S. (eds.) SEC 2016. IAICT, vol. 471, pp. 135\u2013149. Springer, Cham (2016). https:\/\/doi.org\/10.1007\/978-3-319-33630-5_10"},{"key":"23_CR7","unstructured":"Oxford Dictionaries. http:\/\/www.oxforddictionaries.com\/definition\/english\/phishing. Accessed14 Nov 2019"},{"key":"23_CR8","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.cosrev.2015.04.001","volume":"17","author":"RM Mohammad","year":"2015","unstructured":"Mohammad, R.M., Thabtah, F., McCluskey, L.: Tutorial and critical analysis of phishing websites methods. Comput. Sci. Rev. 17, 1\u201324 (2015)","journal-title":"Comput. Sci. Rev."},{"key":"23_CR9","unstructured":"James, L.: Secure Science Corporation \u201cPhishing Exposed-Uncover secrets from the Dark side\u201d. Syngress Publishing (2005)"},{"issue":"1","key":"23_CR10","first-page":"22","volume":"18","author":"S Goel","year":"2017","unstructured":"Goel, S., Williams, K., Dincelli, E.: Got phished? Internet security and human vulnerability. J. Assoc. Inf. Syst. 18(1), 22\u201344 (2017)","journal-title":"J. Assoc. Inf. Syst."},{"issue":"6","key":"23_CR11","doi-asserted-by":"publisher","first-page":"835","DOI":"10.1108\/OIR-03-2012-0037","volume":"37","author":"D Kim","year":"2013","unstructured":"Kim, D., Kim, J.H.: Understanding persuasive elements in phishing e-mails: a categorical content and semantic network analysis. Online Inf. Rev. 37(6), 835\u2013850 (2013)","journal-title":"Online Inf. Rev."},{"key":"23_CR12","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.eswa.2018.03.050","volume":"106","author":"KL Chiew","year":"2018","unstructured":"Chiew, K.L., Yong, K.S.C., Tan, C.L.: A survey of phishing attacks: their types vectors and technical approaches. Expert Syst. Appl. 106, 1\u201320 (2018)","journal-title":"Expert Syst. Appl."},{"key":"23_CR13","doi-asserted-by":"publisher","first-page":"160","DOI":"10.1016\/j.cose.2017.04.006","volume":"68","author":"A Aleroud","year":"2017","unstructured":"Aleroud, A., Zhou, L.: Phishing environments, techniques, and countermeasures: a survey. Comput. Secur. 68, 160\u2013196 (2017)","journal-title":"Comput. Secur."},{"key":"23_CR14","first-page":"1","volume":"8","author":"M Cova","year":"2008","unstructured":"Cova, M., Kruegel, C., Vigna, G.: There is no free phish: an analysis of\u201d free\u201d and live phishing kits. Proc. USENIX Workshop Offensive Technol. 8, 1\u20138 (2008)","journal-title":"Proc. USENIX Workshop Offensive Technol."},{"key":"23_CR15","doi-asserted-by":"crossref","unstructured":"Thomas, K., et al.: Data breaches, phishing, or malware? Understanding the risks of stolen credentials. In: Proceedings of the 2017 ACM SIGSAC conference on computer and communications security, pp. 1421\u20131434 (2017)","DOI":"10.1145\/3133956.3134067"},{"issue":"1","key":"23_CR16","first-page":"247","volume":"10","author":"JA Chaudhry","year":"2016","unstructured":"Chaudhry, J.A., Chaudhry, S.A., Rittenhouse, R.G.: Phishing attacks and defenses. Int. J. Secur. Appl. 10(1), 247\u2013256 (2016)","journal-title":"Int. J. Secur. Appl."},{"key":"23_CR17","doi-asserted-by":"crossref","unstructured":"Gupta, S., Singhal, A., Kapoor, A.: A literature survey on social engineering attacks: phishing attack. In: 2016 International Conference on Computing, Communication and Automation (ICCCA), pp. 537\u2013540. IEEE (2016)","DOI":"10.1109\/CCAA.2016.7813778"},{"key":"23_CR18","unstructured":"Mohammad, R.M., Thabtah, F., McCluskey, L.: Phishing websites features. In: School of Computing and Engineering. University of Huddersfield (2015)"},{"key":"23_CR19","doi-asserted-by":"crossref","unstructured":"Cui, Q., Jourdan, G.V., Bochmann, G.V., Couturier, R., Onut, I.V.: Tracking phishing attacks over time. In: Proceedings of the 26th International Conference on World Wide Web, pp. 667\u2013676 (2017)","DOI":"10.1145\/3038912.3052654"},{"key":"23_CR20","doi-asserted-by":"crossref","unstructured":"Aonzo, S., Merlo, A., Tavella, G., Fratantonio, Y.: Phishing attacks on modern android. In: Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, pp. 1788\u20131801 (2018)","DOI":"10.1145\/3243734.3243778"},{"issue":"1","key":"23_CR21","doi-asserted-by":"publisher","first-page":"29","DOI":"10.1016\/j.aci.2014.07.002","volume":"11","author":"N Abdelhamid","year":"2015","unstructured":"Abdelhamid, N.: Multi-label rules for phishing classification. Appl. Comput. Inform. 11(1), 29\u201346 (2015)","journal-title":"Appl. Comput. Inform."},{"key":"23_CR22","doi-asserted-by":"publisher","first-page":"185","DOI":"10.1016\/j.chb.2016.02.065","volume":"60","author":"NAG Arachchilage","year":"2016","unstructured":"Arachchilage, N.A.G., Love, S., Beznosov, K.: Phishing threat avoidance behaviour: an empirical investigation. Comput. Hum. Behav. 60, 185\u2013197 (2016)","journal-title":"Comput. Hum. Behav."},{"key":"23_CR23","doi-asserted-by":"crossref","unstructured":"Oliveira, D., et al.: Dissecting spear phishing emails for older vs young adults: on the interplay of weapons of influence and life domains in predicting susceptibility to phishing. In: Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems, pp. 6412\u20136424 (2017)","DOI":"10.1145\/3025453.3025831"},{"issue":"1","key":"23_CR24","doi-asserted-by":"publisher","first-page":"71","DOI":"10.1016\/S0747-5632(02)00014-6","volume":"19","author":"YA Hambyrger","year":"2003","unstructured":"Hambyrger, Y.A., Ben-Artzi, E.: Loneliness and internet use. Comput. Hum. Behav. 19(1), 71\u201380 (2003)","journal-title":"Comput. Hum. Behav."},{"issue":"4","key":"23_CR25","doi-asserted-by":"publisher","first-page":"441","DOI":"10.1016\/S0747-5632(00)00017-0","volume":"16","author":"YA Hamburger","year":"2000","unstructured":"Hamburger, Y.A., Ben-Artzi, E.: The relationship between extraversion and neuroticism and the different uses of the Internet. Comput. Hum. Behav. 16(4), 441\u2013449 (2000)","journal-title":"Comput. Hum. Behav."},{"key":"23_CR26","doi-asserted-by":"publisher","first-page":"249","DOI":"10.1016\/j.chb.2016.02.004","volume":"59","author":"JCY Sun","year":"2016","unstructured":"Sun, J.C.Y., Yu, S.J., Lin, S.S., Tseng, S.S.: The mediating effect of anti-phishing self-efficacy between college students\u2019 internet self-efficacy and anti-phishing behavior and gender difference. Comput. Hum. Behav. 59, 249\u2013257 (2016)","journal-title":"Comput. Hum. Behav."},{"key":"23_CR27","doi-asserted-by":"crossref","unstructured":"Halevi, T., Memon, N., Nov, O.: Spear-phishing in the wild: A real-world study of personality, phishing self-efficacy and vulnerability to spear-phishing attacks. Phishing Self-Efficacy and Vulnerability to Spear-Phishing Attacks (January 2, 2015) (2015)","DOI":"10.2139\/ssrn.2544742"},{"key":"23_CR28","doi-asserted-by":"publisher","first-page":"69","DOI":"10.1016\/j.ijhcs.2015.05.005","volume":"82","author":"M Alsharnouby","year":"2015","unstructured":"Alsharnouby, M., Alaca, F., Chiasson, S.: Why phishing still works: User strategies for combating phishing attacks. Int. J. Hum Comput Stud. 82, 69\u201382 (2015)","journal-title":"Int. J. Hum Comput Stud."},{"issue":"2","key":"23_CR29","doi-asserted-by":"publisher","first-page":"265","DOI":"10.1108\/OIR-04-2015-0106","volume":"40","author":"B Harrison","year":"2016","unstructured":"Harrison, B., Svetieva, E., Vishwanath, A.: Individual processing of phishing emails: how attention and elaboration protect against phishing. Online Inf. Rev. 40(2), 265\u2013281 (2016)","journal-title":"Online Inf. Rev."},{"key":"23_CR30","unstructured":"Emina\u011fao\u011flu, M., U\u00e7ar, E. and Eren, \u015e.: The positive outcomes of information security awareness training in companies\u2013a case study. Inf. Secur. Techn. Rep. 14(4), 223\u2013229 (2009)"},{"issue":"50","key":"23_CR31","first-page":"1","volume":"800","author":"M Wilson","year":"2003","unstructured":"Wilson, M., Hash, J.: Building an information technology security awareness and training program. NIST Spec. Publ. 800(50), 1\u201339 (2003)","journal-title":"NIST Spec. Publ."},{"issue":"1","key":"23_CR32","doi-asserted-by":"publisher","first-page":"92","DOI":"10.1016\/j.compedu.2008.06.011","volume":"52","author":"RS Shaw","year":"2009","unstructured":"Shaw, R.S., Chen, C.C., Harris, A.L., Huang, H.J.: The impact of information richness on information security awareness training effectiveness. Comput. Educ. 52(1), 92\u2013100 (2009)","journal-title":"Comput. Educ."},{"issue":"3","key":"23_CR33","doi-asserted-by":"publisher","first-page":"237","DOI":"10.1080\/0144929X.2012.708787","volume":"33","author":"J Abawajy","year":"2014","unstructured":"Abawajy, J.: User preference of cyber security awareness delivery methods. Behav. Inf. Technol. 33(3), 237\u2013248 (2014)","journal-title":"Behav. Inf. Technol."},{"key":"23_CR34","first-page":"1","volume":"22","author":"EB Kim","year":"2014","unstructured":"Kim, E.B.: Recommendations for information security awareness training for college students. Inf. Manage. Comput. Secur. 22, 1 (2014)","journal-title":"Inf. Manage. Comput. Secur."},{"issue":"2","key":"23_CR35","doi-asserted-by":"publisher","first-page":"597","DOI":"10.1080\/07421222.2017.1334499","volume":"34","author":"ML Jensen","year":"2017","unstructured":"Jensen, M.L., Dinger, M., Wright, R.T., Thatcher, J.B.: Training to mitigate phishing attacks using mindfulness techniques. J. Manage. Inf. Syst. 34(2), 597\u2013626 (2017)","journal-title":"J. Manage. Inf. Syst."},{"key":"23_CR36","unstructured":"Dodge, R.C., Carver, C., Ferguson, A.J.: Phishing for user security awareness. Comput. Secur. 26(1), 73\u201380 (2007)"},{"issue":"1","key":"23_CR37","doi-asserted-by":"publisher","first-page":"28","DOI":"10.1109\/MSP.2013.106","volume":"12","author":"DD Caputo","year":"2013","unstructured":"Caputo, D.D., Pfleeger, S.L., Freeman, J.D., Johnson, M.E.: Going spear phishing: exploring embedded training and awareness. IEEE Secur. Priv. 12(1), 28\u201338 (2013)","journal-title":"IEEE Secur. Priv."},{"issue":"4","key":"23_CR38","doi-asserted-by":"publisher","first-page":"1241","DOI":"10.1007\/s11948-017-9952-9","volume":"24","author":"David B Resnik","year":"2017","unstructured":"Resnik, David B., Finn, Peter R.: Ethics and phishing experiments. Sci. Eng. Ethics 24(4), 1241\u20131252 (2017). https:\/\/doi.org\/10.1007\/s11948-017-9952-9","journal-title":"Sci. Eng. Ethics"},{"key":"23_CR39","doi-asserted-by":"publisher","first-page":"194","DOI":"10.1016\/j.cose.2015.02.008","volume":"52","author":"K Parsons","year":"2015","unstructured":"Parsons, K., McCormac, A., Pattinson, M., Butavicius, M., Jerram, C.: The design of phishing studies: challenges for researchers. Comput. Secur. 52, 194\u2013206 (2015)","journal-title":"Comput. Secur."}],"container-title":["Communications in Computer and Information Science","Databases and Information Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-57672-1_23","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,24]],"date-time":"2021-04-24T08:06:27Z","timestamp":1619251587000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-57672-1_23"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9783030576714","9783030576721"],"references-count":39,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-57672-1_23","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"12 August 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"DB&IS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Baltic Conference on Databases and Information Systems","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Tallinn","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Estonia","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2020","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"16 June 2020","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19 June 2020","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"14","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"dbis2020","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/dbis.ttu.ee\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"52","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"21","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"1","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"40% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3.05","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2.2","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"The conference was held virtually due to the COVID-19 pandemic.","order":10,"name":"additional_info_on_review_process","label":"Additional Info on Review Process","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}