{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,6]],"date-time":"2026-03-06T07:37:04Z","timestamp":1772782624394,"version":"3.50.1"},"publisher-location":"Cham","reference-count":31,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783031385292","type":"print"},{"value":"9783031385308","type":"electronic"}],"license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023]]},"DOI":"10.1007\/978-3-031-38530-8_25","type":"book-chapter","created":{"date-parts":[[2023,7,25]],"date-time":"2023-07-25T20:38:17Z","timestamp":1690317497000},"page":"310-323","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Are People with Cyber Security Training Worse at Checking Phishing Email Addresses? Testing the Automaticity of Verifying the Sender\u2019s Address"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0009-0007-9963-9611","authenticated-orcid":false,"given":"Daniel","family":"Conway","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0722-3912","authenticated-orcid":false,"given":"Marcus","family":"Butavicius","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5138-6749","authenticated-orcid":false,"given":"Kun","family":"Yu","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4971-8729","authenticated-orcid":false,"given":"Fang","family":"Chen","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,7,26]]},"reference":[{"key":"25_CR1","unstructured":"Akbar, N.: Analysing persuasion principles in phishing emails (2014). http:\/\/essay.utwente.nl\/66177\/. Accessed 29 May (2021)"},{"issue":"4","key":"25_CR2","doi-asserted-by":"publisher","first-page":"553","DOI":"10.1037\/0033-2909.130.4.553","volume":"130","author":"LF Barrett","year":"2004","unstructured":"Barrett, L.F., Tugade, M.M., Engle, R.W.: Individual differences in working memory capacity and dual-process theories of the mind. Psychol. Bull. 130(4), 553\u2013573 (2004). https:\/\/doi.org\/10.1037\/0033-2909.130.4.553","journal-title":"Psychol. Bull."},{"key":"25_CR3","doi-asserted-by":"publisher","unstructured":"Burita, L., Klaban, I., Racil, T.: Education and training against threat of phishing emails. Int. Conf. Cyber Warfare Secur. 17(1), 7\u201318 (2022). https:\/\/doi.org\/10.34190\/iccws.17.1.28","DOI":"10.34190\/iccws.17.1.28"},{"key":"25_CR4","doi-asserted-by":"publisher","first-page":"102937","DOI":"10.1016\/j.cose.2022.102937","volume":"123","author":"M Butavicius","year":"2022","unstructured":"Butavicius, M., Taib, R., Han, S.J.: Why people keep falling for phishing scams: The effects of time pressure and deception cues on the detection of phishing emails. Comput. Secur. 123, 102937 (2022). https:\/\/doi.org\/10.1016\/j.cose.2022.102937","journal-title":"Comput. Secur."},{"key":"25_CR5","unstructured":"Cialdini, R.B.: The Psychology of Persuasion. New York (1993)"},{"key":"25_CR6","unstructured":"Conway, D., Taib, R., Harris, M., Yu, K., Berkovsky, S., Chen, F.: A qualitative investigation of bank employee experiences of information security and phishing, pp. 115\u2013129 (2017). https:\/\/www.usenix.org\/conference\/soups2017\/technical-sessions\/presentation\/conway. Accessed 8 Mar 2021"},{"key":"25_CR7","unstructured":"Conway, D., Yu, K., Butavicius, M., Chen, F.: Are phishing emails conflict problems? Dual process theory applied to an email identification task (2022)"},{"issue":"6","key":"25_CR8","doi-asserted-by":"publisher","first-page":"1070","DOI":"10.1080\/02724980543000123","volume":"59","author":"W De Neys","year":"2006","unstructured":"De Neys, W.: Automatic-heuristic and executive-analytic processing during reasoning: chronometric and dual-task considerations. Q. J. Exp. Psychol. 59(6), 1070\u20131100 (2006). https:\/\/doi.org\/10.1080\/02724980543000123","journal-title":"Q. J. Exp. Psychol."},{"key":"25_CR9","series-title":"IFIP Advances in Information and Communication Technology","doi-asserted-by":"publisher","first-page":"457","DOI":"10.1007\/978-3-642-30436-1_37","volume-title":"Information Security and Privacy Research","author":"R Dodge","year":"2012","unstructured":"Dodge, R., Coronges, K., Rovira, E.: Empirical benefits of training to phishing susceptibility. In: Gritzalis, D., Furnell, S., Theoharidou, M. (eds.) SEC 2012. IAICT, vol. 376, pp. 457\u2013464. Springer, Heidelberg (2012). https:\/\/doi.org\/10.1007\/978-3-642-30436-1_37"},{"key":"25_CR10","doi-asserted-by":"publisher","unstructured":"Downs, J.S., Holbrook, M.B., Cranor, L.F.: Decision strategies and susceptibility to phishing. In: Proceedings of the Second Symposium on Usable Privacy and Security (SOUPS 2006), pp. 79\u201390 (2006). https:\/\/doi.org\/10.1145\/1143120.1143131","DOI":"10.1145\/1143120.1143131"},{"issue":"3","key":"25_CR11","doi-asserted-by":"publisher","first-page":"223","DOI":"10.1177\/1745691612460685","volume":"8","author":"JSBT Evans","year":"2013","unstructured":"Evans, J.S.B.T., Stanovich, K.E.: Dual-process theories of higher cognition: advancing the debate. Perspect. Psychol. Sci. 8(3), 223\u2013241 (2013). https:\/\/doi.org\/10.1177\/1745691612460685","journal-title":"Perspect. Psychol. Sci."},{"key":"25_CR12","unstructured":"FBI. Internet Crime Complaint Center(IC3)\u2014Annual Report 2018. Federal Bureau of Investigations. https:\/\/www.ic3.gov\/Home\/AnnualReports. Accessed 14 Jan 2023"},{"issue":"1","key":"25_CR13","doi-asserted-by":"publisher","first-page":"100","DOI":"10.1017\/S1930297500002126","volume":"6","author":"G Gigerenzer","year":"2011","unstructured":"Gigerenzer, G., Goldstein, D.G.: The recognition heuristic: a decade of research. Judgm. Decis. Mak. 6(1), 100\u2013121 (2011)","journal-title":"Judgm. Decis. Mak."},{"issue":"5","key":"25_CR14","doi-asserted-by":"publisher","first-page":"637","DOI":"10.1007\/s10796-010-9242-4","volume":"13","author":"A Gupta","year":"2011","unstructured":"Gupta, A., Sharda, R., Greve, R.A.: You\u2019ve got email! Does it really matter to process emails now or later? Inf. Syst. Front. 13(5), 637\u2013653 (2011). https:\/\/doi.org\/10.1007\/s10796-010-9242-4","journal-title":"Inf. Syst. Front."},{"key":"25_CR15","doi-asserted-by":"publisher","unstructured":"Halevi, T., Memon N., Nov, O.: Spear-phishing in the wild: a real-world study of personality, phishing self-efficacy and vulnerability to spear-phishing attacks. Social Science Research Network, Rochester, NY (2015). https:\/\/doi.org\/10.2139\/ssrn.2544742","DOI":"10.2139\/ssrn.2544742"},{"issue":"1","key":"25_CR16","doi-asserted-by":"publisher","first-page":"83","DOI":"10.1016\/j.cose.2011.10.007","volume":"31","author":"P Ifinedo","year":"2012","unstructured":"Ifinedo, P.: Understanding information systems security policy compliance: an integration of the theory of planned behavior and the protection motivation theory. Comput. Secur. 31(1), 83\u201395 (2012). https:\/\/doi.org\/10.1016\/j.cose.2011.10.007","journal-title":"Comput. Secur."},{"key":"25_CR17","first-page":"1","volume":"7","author":"M Jakobsson","year":"2007","unstructured":"Jakobsson, M.: The human factor in phishing. Priv. Secur. Consum. Inf. 7, 1\u201319 (2007)","journal-title":"Priv. Secur. Consum. Inf."},{"key":"25_CR18","volume-title":"Thinking, Fast and Slow","author":"D Kahneman","year":"2011","unstructured":"Kahneman, D.: Thinking, Fast and Slow. Farrar, New York (2011)"},{"key":"25_CR19","doi-asserted-by":"publisher","unstructured":"Kumaraguru, P., Rhee, Y., Acquisti, A., Cranor, L.F., Hong, J., Nunge, E.: Protecting people from phishing: the design and evaluation of an embedded training email system. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI 2007), pp. 905\u2013914 (2007). https:\/\/doi.org\/10.1145\/1240624.1240760","DOI":"10.1145\/1240624.1240760"},{"key":"25_CR20","doi-asserted-by":"publisher","first-page":"154","DOI":"10.1016\/j.chb.2018.12.036","volume":"94","author":"PMW Musuva","year":"2019","unstructured":"Musuva, P.M.W., Getao, K.W., Chepken, C.K.: A new approach to modelling the effects of cognitive processing and threat detection on phishing susceptibility. Comput. Hum. Behav. 94, 154\u2013175 (2019). https:\/\/doi.org\/10.1016\/j.chb.2018.12.036","journal-title":"Comput. Hum. Behav."},{"issue":"4","key":"25_CR21","doi-asserted-by":"publisher","first-page":"815","DOI":"10.1016\/j.dss.2008.11.010","volume":"46","author":"BY Ng","year":"2009","unstructured":"Ng, B.Y., Kankanhalli, A., Xu, Y.C.: Studying users\u2019 computer security behavior: a health belief perspective. Decis. Support Syst. 46(4), 815\u2013825 (2009). https:\/\/doi.org\/10.1016\/j.dss.2008.11.010","journal-title":"Decis. Support Syst."},{"issue":"3","key":"25_CR22","doi-asserted-by":"publisher","first-page":"231","DOI":"10.1007\/s11896-019-09334-5","volume":"34","author":"G Norris","year":"2019","unstructured":"Norris, G., Brookes, A., Dowell, D.: The psychology of internet fraud victimisation: a systematic review. J. Police Crim. Psychol. 34(3), 231\u2013245 (2019). https:\/\/doi.org\/10.1007\/s11896-019-09334-5","journal-title":"J. Police Crim. Psychol."},{"issue":"1","key":"25_CR23","doi-asserted-by":"publisher","first-page":"195","DOI":"10.3758\/s13428-018-01193-y","volume":"51","author":"J Peirce","year":"2019","unstructured":"Peirce, J., et al.: PsychoPy2: experiments in behavior made easy. Behav. Res. Methods 51(1), 195\u2013203 (2019). https:\/\/doi.org\/10.3758\/s13428-018-01193-y","journal-title":"Behav. Res. Methods"},{"issue":"2","key":"25_CR24","doi-asserted-by":"publisher","first-page":"239","DOI":"10.1080\/13546783.2020.1793813","volume":"27","author":"ZA Purcell","year":"2021","unstructured":"Purcell, Z.A., Wastell, C.A., Sweller, N.: Domain-specific experience and dual-process thinking. Think. Reason. 27(2), 239\u2013267 (2021). https:\/\/doi.org\/10.1080\/13546783.2020.1793813","journal-title":"Think. Reason."},{"issue":"4","key":"25_CR25","doi-asserted-by":"publisher","first-page":"333","DOI":"10.1016\/j.cogpsych.2004.04.001","volume":"49","author":"KA Rawson","year":"2004","unstructured":"Rawson, K.A.: Exploring automaticity in text processing: syntactic ambiguity as a test case. Cogn. Psychol. 49(4), 333\u2013369 (2004). https:\/\/doi.org\/10.1016\/j.cogpsych.2004.04.001","journal-title":"Cogn. Psychol."},{"key":"25_CR26","doi-asserted-by":"publisher","unstructured":"Siu, N., Iverson, L., Tang, A.: Going with the flow: email awareness and task management. In: Proceedings of the 2006 20th Anniversary Conference on Computer Supported Cooperative Work (CSCW 2006), pp. 441\u2013450 (2006). https:\/\/doi.org\/10.1145\/1180875.1180942","DOI":"10.1145\/1180875.1180942"},{"issue":"6","key":"25_CR27","doi-asserted-by":"publisher","first-page":"643","DOI":"10.1037\/h0054651","volume":"18","author":"J Stroop","year":"1935","unstructured":"Stroop, J.: Studies of interference in serial verbal reactions. J. Exp. Psychol. Gen. 18(6), 643\u2013662 (1935)","journal-title":"J. Exp. Psychol. Gen."},{"issue":"2","key":"25_CR28","doi-asserted-by":"publisher","first-page":"237","DOI":"10.1016\/j.cognition.2012.09.012","volume":"128","author":"VA Thompson","year":"2013","unstructured":"Thompson, V.A., et al.: The role of answer fluency and perceptual fluency as metacognitive cues for initiating analytic thinking. Cognition 128(2), 237\u2013251 (2013). https:\/\/doi.org\/10.1016\/j.cognition.2012.09.012","journal-title":"Cognition"},{"issue":"3","key":"25_CR29","doi-asserted-by":"publisher","first-page":"576","DOI":"10.1016\/j.dss.2011.03.002","volume":"51","author":"A Vishwanath","year":"2011","unstructured":"Vishwanath, A., Herath, T., Chen, R., Wang, J., Raghav Rao, H.: Why do people get phished? Testing individual differences in phishing vulnerability within an integrated, information processing model. Decis. Support Syst. 51(3), 576\u2013586 (2011). https:\/\/doi.org\/10.1016\/j.dss.2011.03.002","journal-title":"Decis. Support Syst."},{"issue":"4","key":"25_CR30","doi-asserted-by":"publisher","first-page":"662","DOI":"10.1002\/asi.20779","volume":"59","author":"M Workman","year":"2008","unstructured":"Workman, M.: Wisecrackers: a theory-grounded investigation of phishing and pretext social engineering threats to information security. J. Am. Soc. Inform. Sci. Technol. 59(4), 662\u2013674 (2008). https:\/\/doi.org\/10.1002\/asi.20779","journal-title":"J. Am. Soc. Inform. Sci. Technol."},{"issue":"1","key":"25_CR31","doi-asserted-by":"publisher","first-page":"1","DOI":"10.4018\/ijcbpl.2012010101","volume":"2","author":"Z Yan","year":"2012","unstructured":"Yan, Z., Gozu, H.Y.: Online decision-making in receiving spam emails among college students. Int. J. Cyber Behav. Psychol. Learn. (IJCBPL) 2(1), 1\u201312 (2012). https:\/\/doi.org\/10.4018\/ijcbpl.2012010101","journal-title":"Int. J. Cyber Behav. Psychol. Learn. (IJCBPL)"}],"container-title":["IFIP Advances in Information and Communication Technology","Human Aspects of Information Security and Assurance"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-38530-8_25","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,7,25]],"date-time":"2023-07-25T20:42:26Z","timestamp":1690317746000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-38530-8_25"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023]]},"ISBN":["9783031385292","9783031385308"],"references-count":31,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-38530-8_25","relation":{},"ISSN":["1868-4238","1868-422X"],"issn-type":[{"value":"1868-4238","type":"print"},{"value":"1868-422X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023]]},"assertion":[{"value":"26 July 2023","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"HAISA","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Symposium on Human Aspects of Information Security and Assurance","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Kent","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"United Kingdom","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2023","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"4 July 2023","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"6 July 2023","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"17","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"haisa2023","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/www.haisa.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Easychair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"54","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"37","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"69% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2.93","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}