{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,17]],"date-time":"2025-09-17T15:56:16Z","timestamp":1758124576304,"version":"3.40.3"},"publisher-location":"Cham","reference-count":38,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031480560"},{"type":"electronic","value":"9783031480577"}],"license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023]]},"DOI":"10.1007\/978-3-031-48057-7_20","type":"book-chapter","created":{"date-parts":[[2023,11,25]],"date-time":"2023-11-25T06:01:30Z","timestamp":1700892090000},"page":"325-342","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Repeat Clicking: A Lack of Awareness is Not the Problem"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-7638-2023","authenticated-orcid":false,"given":"Matthew","family":"Canham","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,11,26]]},"reference":[{"key":"20_CR1","unstructured":"Butavicius, M., Parsons, K., Pattinson, M., McCormac, A.: Breaching the Human Firewall: Social engineering in Phishing and Spear-Phishing Emails (2016). [Cs] http:\/\/arxiv.org\/abs\/1606.00887"},{"issue":"1","key":"20_CR2","doi-asserted-by":"publisher","first-page":"116","DOI":"10.1037\/0022-3514.42.1.116","volume":"42","author":"JT Cacioppo","year":"1982","unstructured":"Cacioppo, J.T., Petty, R.E.: The need for cognition. J. Pers. Soc. Psychol. 42(1), 116\u2013131 (1982). https:\/\/doi.org\/10.1037\/0022-3514.42.1.116","journal-title":"J. Pers. Soc. Psychol."},{"key":"20_CR3","unstructured":"Canham, M., Fiore, S.M., Constantino, M., Caulkins, B., Reinerman-Jones, L.: The Enduring Mystery of the Repeat Clickers (2019)"},{"key":"20_CR4","doi-asserted-by":"publisher","unstructured":"Canham, M., Posey, C., Constantino, M.: Phish Derby: shoring the human shield through gamified phishing attacks. Front. Educ. 6 (2022). https:\/\/doi.org\/10.3389\/feduc.2021.807277","DOI":"10.3389\/feduc.2021.807277"},{"issue":"1","key":"20_CR5","doi-asserted-by":"publisher","first-page":"215824402199065","DOI":"10.1177\/2158244021990656","volume":"11","author":"M Canham","year":"2021","unstructured":"Canham, M., Posey, C., Strickland, D., Constantino, M.: Phishing for long tails: examining organizational repeat clickers and protective stewards. SAGE Open 11(1), 215824402199065 (2021). https:\/\/doi.org\/10.1177\/2158244021990656","journal-title":"SAGE Open"},{"issue":"1","key":"20_CR6","doi-asserted-by":"publisher","first-page":"28","DOI":"10.1109\/MSP.2013.106","volume":"12","author":"DD Caputo","year":"2013","unstructured":"Caputo, D.D., Pfleeger, S.L., Freeman, J.D., Johnson, M.E.: Going spear phishing: exploring embedded training and awareness. IEEE Secur. Privacy 12(1), 28\u201338 (2013). https:\/\/doi.org\/10.1109\/MSP.2013.106","journal-title":"IEEE Secur. Privacy"},{"key":"20_CR7","doi-asserted-by":"publisher","unstructured":"Carella, A., Kotsoev, M., Truta, T.M.: Impact of security awareness training on phishing click-through rates. In: 2017 IEEE International Conference on Big Data (Big Data), pp. 4458\u20134466 (2017). https:\/\/doi.org\/10.1109\/BigData.2017.8258485","DOI":"10.1109\/BigData.2017.8258485"},{"issue":"5","key":"20_CR8","doi-asserted-by":"publisher","first-page":"1127","DOI":"10.1016\/S0191-8869(03)00205-8","volume":"36","author":"RP Collins","year":"2004","unstructured":"Collins, R.P., Litman, J.A., Spielberger, C.D.: The measurement of perceptual curiosity. Personal. Individ. Differ. 36(5), 1127\u20131141 (2004). https:\/\/doi.org\/10.1016\/S0191-8869(03)00205-8","journal-title":"Personal. Individ. Differ."},{"key":"20_CR9","unstructured":"Conway, D., Taib, R., Harris, M., Yu, K., Berkovsky, S., Chen, F.: A Qualitative Investigation of Bank Employee Experiences of Information Security and Phishing, pp. 115\u2013129 (2017). https:\/\/www.usenix.org\/conference\/soups2017\/technical-sessions\/presentation\/conway"},{"key":"20_CR10","doi-asserted-by":"publisher","unstructured":"Correia, S.G.: Patterns of online repeat victimisation and implications for crime prevention. In: 2020 APWG Symposium on Electronic Crime Research (ECrime), pp. 1\u201311 (2020). https:\/\/doi.org\/10.1109\/eCrime51433.2020.9493258","DOI":"10.1109\/eCrime51433.2020.9493258"},{"key":"20_CR11","doi-asserted-by":"publisher","unstructured":"Greene, K., Steves, M., Theofanos, M., Kostick, J.: User context: an explanatory variable in phishing susceptibility. In: Proceedings 2018 Workshop on Usable Security. Workshop on Usable Security, San Diego, CA (2018). https:\/\/doi.org\/10.14722\/usec.2018.23016","DOI":"10.14722\/usec.2018.23016"},{"key":"20_CR12","doi-asserted-by":"publisher","unstructured":"Hadnagy, C.: Social Engineering: The Science of Human Hacking, 1st edn. Wiley (2018). https:\/\/doi.org\/10.1002\/9781119433729","DOI":"10.1002\/9781119433729"},{"key":"20_CR13","doi-asserted-by":"publisher","DOI":"10.2139\/ssrn.2544742","author":"T Halevi","year":"2015","unstructured":"Halevi, T., Memon, N., Nov, O.: Spear-phishing in the wild: a real-world study of personality, phishing self-efficacy and vulnerability to spear-phishing attacks (SSRN Scholarly Paper ID 2544742). Soc. Sci. Res. Netw. (2015). https:\/\/doi.org\/10.2139\/ssrn.2544742","journal-title":"Soc. Sci. Res. Netw."},{"key":"20_CR14","doi-asserted-by":"publisher","unstructured":"Harrison, B., Vishwanath, A., Rao, R.: A user-centered approach to phishing susceptibility: the role of a suspicious personality in protecting against phishing. In: 2016 49th Hawaii International Conference on System Sciences (HICSS), pp. 5628\u20135634 (2016). https:\/\/doi.org\/10.1109\/HICSS.2016.696","DOI":"10.1109\/HICSS.2016.696"},{"key":"20_CR15","unstructured":"Hassold, C.: Life After Phishing: What\u2019s Next? InfoSec World 2018. InfoSec World 2018, Orlando, FLl USA (2018)"},{"issue":"1","key":"20_CR16","doi-asserted-by":"publisher","first-page":"58","DOI":"10.1016\/j.ijintrel.2009.09.004","volume":"34","author":"JL Herman","year":"2010","unstructured":"Herman, J.L., Stevens, M.J., Bird, A., Mendenhall, M., Oddou, G.: The tolerance for ambiguity scale: towards a more refined measure for international management research. Int. J. Intercult. Relat. 34(1), 58\u201365 (2010). https:\/\/doi.org\/10.1016\/j.ijintrel.2009.09.004","journal-title":"Int. J. Intercult. Relat."},{"issue":"3","key":"20_CR17","doi-asserted-by":"publisher","first-page":"1408","DOI":"10.1016\/j.chb.2005.03.002","volume":"23","author":"R Joiner","year":"2007","unstructured":"Joiner, R., Brosnan, M., Duffield, J., Gavin, J., Maras, P.: The relationship between Internet identification, Internet anxiety and Internet use. Comput. Hum. Behav. 23(3), 1408\u20131420 (2007). https:\/\/doi.org\/10.1016\/j.chb.2005.03.002","journal-title":"Comput. Hum. Behav."},{"key":"20_CR18","unstructured":"Jones, D.: Protecting the overclaimers in cybersecurity w\/ Dr. Daniel N. Jones | CSI Talks #7 (2023). https:\/\/www.youtube.com\/watch?v=lsly2Q_74V4"},{"key":"20_CR19","doi-asserted-by":"publisher","unstructured":"Lain, D., Kostiainen, K., \u010capkun, S.: Phishing in organizations: findings from a large-scale and long-term study. In: 2022 IEEE Symposium on Security and Privacy (SP), pp. 842\u2013859 (2022). https:\/\/doi.org\/10.1109\/SP46214.2022.9833766","DOI":"10.1109\/SP46214.2022.9833766"},{"key":"20_CR20","doi-asserted-by":"publisher","unstructured":"Lawson, P., Zielinska, O., Pearson, C., Mayhorn, C.B.: Interaction of personality and persuasion tactics in email phishing attacks. In: Proceedings of the Human Factors and Ergonomics Society Annual Meeting, vol. 61, issue 1, pp. 1331\u20131333 (2017). https:\/\/doi.org\/10.1177\/1541931213601815","DOI":"10.1177\/1541931213601815"},{"key":"20_CR21","first-page":"1","volume-title":"Research with the Locus of Control Construct","author":"H Levenson","year":"1981","unstructured":"Levenson, H.: Differentiating among internality, powerful others, and chance. In: Lefcourt, H.M. (ed.) Research with the Locus of Control Construct, pp. 1\u201315. Academic Press (1981)"},{"key":"20_CR22","doi-asserted-by":"publisher","unstructured":"Li, W., Lee, J., Purl, J., Greitzer, F., Yousefi, B., Laskey, K.: Experimental Investigation of Demographic Factors Related to Phishing Susceptibility (2020). https:\/\/doi.org\/10.24251\/HICSS.2020.274","DOI":"10.24251\/HICSS.2020.274"},{"issue":"2","key":"20_CR23","doi-asserted-by":"publisher","first-page":"157","DOI":"10.1080\/1366987032000123856","volume":"8","author":"N Nicholson","year":"2005","unstructured":"Nicholson, N., Soane, E., Fenton-O\u2019Creevy, M., Willman, P.: Personality and domain-specific risk taking. J. Risk Res. 8(2), 157\u2013176 (2005). https:\/\/doi.org\/10.1080\/1366987032000123856","journal-title":"J. Risk Res."},{"issue":"1","key":"20_CR24","doi-asserted-by":"publisher","first-page":"18","DOI":"10.1108\/09685221211219173","volume":"20","author":"M Pattinson","year":"2012","unstructured":"Pattinson, M., Jerram, C., Parsons, K., McCormac, A., Butavicius, M.: Why do some people manage phishing e-mails better than others? Inf. Manag. Comput. Secur. 20(1), 18\u201328 (2012). https:\/\/doi.org\/10.1108\/09685221211219173","journal-title":"Inf. Manag. Comput. Secur."},{"key":"20_CR25","unstructured":"Posey, C., Canham, M.: A computational social science approach to examine the duality between productivity and cybersecurity policy compliance within organizations. In: 2018 International Conference on Social Computing, Behavioral-Cultural Modeling, and Prediction and Behavior Representation in Modeling and Simulation, BRiMS 2018 (2018). https:\/\/stars.library.ucf.edu\/scopus2015\/7904"},{"issue":"5","key":"20_CR26","doi-asserted-by":"publisher","first-page":"538","DOI":"10.1177\/1745691614543972","volume":"9","author":"PR Sackett","year":"2014","unstructured":"Sackett, P.R., Walmsley, P.T.: Which personality attributes are most important in the workplace? Perspect. Psychol. Sci. 9(5), 538\u2013551 (2014). https:\/\/doi.org\/10.1177\/1745691614543972","journal-title":"Perspect. Psychol. Sci."},{"key":"20_CR27","doi-asserted-by":"publisher","unstructured":"Steves, M.P., Greene, K.K., Theofanos, M.F.: A phish scale: rating human phishing message detection difficulty. In: Proceedings 2019 Workshop on Usable Security. Workshop on Usable Security. San Diego, CA (2019). https:\/\/doi.org\/10.14722\/usec.2019.23028","DOI":"10.14722\/usec.2019.23028"},{"key":"20_CR28","doi-asserted-by":"publisher","unstructured":"Sudzina, F., Pavlicek, A.: Propensity to Click on Suspicious Links: Impact of Gender, of Age, and of Personality Traits. Digital Transformation \u2013 From Connecting Things to Transforming Our Lives, pp. 593\u2013601 (2017). https:\/\/doi.org\/10.18690\/978-961-286-043-1.41","DOI":"10.18690\/978-961-286-043-1.41"},{"issue":"4","key":"20_CR29","doi-asserted-by":"publisher","first-page":"188","DOI":"10.3390\/info11040188","volume":"11","author":"F Sudzina","year":"2020","unstructured":"Sudzina, F., Pavlicek, A.: Virtual offenses: role of demographic factors and personality traits. Information 11(4), 188 (2020)","journal-title":"Information"},{"key":"20_CR30","unstructured":"Tellegen, A.: Multidimensional Personality Questionnaire-276 (MPQ-276) Test Booklet, 1st edn., vol. 1. University of Minnesota Press (1995)"},{"key":"20_CR31","doi-asserted-by":"publisher","unstructured":"Uebelacker and Quiel, 2014.Uebelacker, S., Quiel, S.: The social engineering personality framework. In: 2014 Workshop on Socio-Technical Aspects in Security and Trust, pp. 24\u201330 (2014). https:\/\/doi.org\/10.1109\/STAST.2014.12","DOI":"10.1109\/STAST.2014.12"},{"key":"20_CR32","unstructured":"Verizon. 2023 Data Breach Investigations Report (DBIR). Verizon Enterprise Solutions (2023). https:\/\/www.verizon.com\/business\/resources\/reports\/2023-data-breach-investigations-report-dbir.pdf"},{"key":"20_CR33","doi-asserted-by":"publisher","DOI":"10.7551\/mitpress\/14653.001.0001","volume-title":"The Weakest Link: How to Diagnose, Detect, and Defend Users From Phishing","author":"A Vishwanath","year":"2022","unstructured":"Vishwanath, A.: The Weakest Link: How to Diagnose, Detect, and Defend Users From Phishing. The MIT Press (2022)"},{"key":"20_CR34","doi-asserted-by":"publisher","unstructured":"Welk, A.K., Hong, K.W., Zielinska, O.A., Tembe, R., Murphy-Hill, E., Mayhorn, C.B.: Will the \u201cPhisher-Men\u201d reel you in?: assessing individual differences in a phishing detection task. Int. J. Cyber Behav. Psychol. Learn. 5(4), 1\u201317 (2015). https:\/\/doi.org\/10.4018\/IJCBPL.2015100101","DOI":"10.4018\/IJCBPL.2015100101"},{"issue":"1","key":"20_CR35","doi-asserted-by":"publisher","first-page":"277","DOI":"10.1108\/JFC-10-2017-0095","volume":"26","author":"MT Whitty","year":"2019","unstructured":"Whitty, M.T.: Predicting susceptibility to cyber-fraud victimhood. J. Finan. Crime 26(1), 277\u2013292 (2019). https:\/\/doi.org\/10.1108\/JFC-10-2017-0095","journal-title":"J. Finan. Crime"},{"key":"20_CR36","doi-asserted-by":"publisher","first-page":"412","DOI":"10.1016\/j.chb.2017.03.002","volume":"72","author":"EJ Williams","year":"2017","unstructured":"Williams, E.J., Beardmore, A., Joinson, A.N.: Individual differences in susceptibility to online influence: a theoretical review. Comput. Hum. Behav. 72, 412\u2013421 (2017). https:\/\/doi.org\/10.1016\/j.chb.2017.03.002","journal-title":"Comput. Hum. Behav."},{"issue":"4","key":"20_CR37","doi-asserted-by":"publisher","first-page":"662","DOI":"10.1002\/asi.20779","volume":"59","author":"M Workman","year":"2008","unstructured":"Workman, M.: Wisecrackers: a theory-grounded investigation of phishing and pretext social engineering threats to information security. J. Am. Soc. Inform. Sci. Technol. 59(4), 662\u2013674 (2008). https:\/\/doi.org\/10.1002\/asi.20779","journal-title":"J. Am. Soc. Inform. Sci. Technol."},{"issue":"3","key":"20_CR38","doi-asserted-by":"publisher","first-page":"277","DOI":"10.1177\/1088868314553709","volume":"19","author":"K Zhao","year":"2015","unstructured":"Zhao, K., Smillie, L.D.: The role of interpersonal traits in social decision making: exploring sources of behavioral heterogeneity in economic games. Pers. Soc. Psychol. Rev. 19(3), 277\u2013302 (2015). https:\/\/doi.org\/10.1177\/1088868314553709","journal-title":"Pers. Soc. Psychol. Rev."}],"container-title":["Lecture Notes in Computer Science","HCI International 2023 \u2013 Late Breaking Papers"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-48057-7_20","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,11,25]],"date-time":"2023-11-25T06:04:33Z","timestamp":1700892273000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-48057-7_20"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023]]},"ISBN":["9783031480560","9783031480577"],"references-count":38,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-48057-7_20","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2023]]},"assertion":[{"value":"26 November 2023","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"HCII","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Human-Computer Interaction","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Copenhagen","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Denmark","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2023","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"23 July 2023","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"28 July 2023","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"25","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"hcii2023","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/2023.hci.international\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"CMS","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"7472","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"1578","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"396","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"21% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}