{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T18:28:56Z","timestamp":1742927336291,"version":"3.40.3"},"publisher-location":"Cham","reference-count":63,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031830716"},{"type":"electronic","value":"9783031830723"}],"license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2025,3,13]],"date-time":"2025-03-13T00:00:00Z","timestamp":1741824000000},"content-version":"vor","delay-in-days":71,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"abstract":"<jats:title>Abstract<\/jats:title>\n          <jats:p>\n            <jats:bold>Background:<\/jats:bold> Many security interventions\u00a0to support users in detecting phishing emails exist including providing the URL in a tooltip or the statusbar.<\/jats:p>\n          <jats:p>\n            <jats:bold>Aim:<\/jats:bold> Designing and evaluating an anti-phishing artifact based on the Useful Transparency theory.<\/jats:p>\n          <jats:p>\n            <jats:bold>Method:<\/jats:bold> We used the design science research approach for the entire process. As evaluation we ran a between-subjects study with 109 participants from the UK to determine\u00a0the anti-phishing artifact effectiveness to support users distinguishing between phishing and legitimate emails.<\/jats:p>\n          <jats:p>\n            <jats:bold>Results:<\/jats:bold>\u00a0Our results show that, when compared against the state of the\u00a0art security interventions (displaying the URL in the statusbar),\u00a0our anti-phishing artifact increase the detection significantly, i.e. phishing detection increased from 50% to 72%.<\/jats:p>\n          <jats:p>\n            <jats:bold>Conclusion:<\/jats:bold> Albeit further studies are required,\u00a0the evaluation demonstrate that the Useful Transparency theory\u00a0can result in promising security interventions. Thus, it might be\u00a0worth considering it for other security interventions, too.<\/jats:p>","DOI":"10.1007\/978-3-031-83072-3_7","type":"book-chapter","created":{"date-parts":[[2025,3,12]],"date-time":"2025-03-12T18:59:47Z","timestamp":1741805987000},"page":"113-133","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Design and\u00a0Evaluation of\u00a0an\u00a0Anti-phishing Artifact Based on\u00a0Useful Transparency"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-3932-2181","authenticated-orcid":false,"given":"Christopher","family":"Beckmann","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9284-7924","authenticated-orcid":false,"given":"Benjamin","family":"Berens","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6750-0876","authenticated-orcid":false,"given":"Niklas","family":"K\u00fchl","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6267-4874","authenticated-orcid":false,"given":"Peter","family":"Mayer","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9997-3432","authenticated-orcid":false,"given":"Mattia","family":"Mossano","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2674-4043","authenticated-orcid":false,"given":"Melanie","family":"Volkamer","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,3,13]]},"reference":[{"key":"7_CR1","doi-asserted-by":"publisher","unstructured":"Albakry, S., Vaniea, K., Wolters, M.K.: What is This URL\u2019s Destination? Empirical Evaluation of Users\u2019 URL Reading, pp. 1\u201312. ACM, NY, USA (2020). https:\/\/doi.org\/10.1145\/3313831.3376168","DOI":"10.1145\/3313831.3376168"},{"key":"7_CR2","doi-asserted-by":"publisher","first-page":"69","DOI":"10.1016\/j.ijhcs.2015.05.005","volume":"82","author":"M Alsharnouby","year":"2015","unstructured":"Alsharnouby, M., Alaca, F., Chiasson, S.: Why phishing still works: user strategies for combating phishing attacks. Int. J. Hum. Comput. Stud. 82, 69\u201382 (2015). https:\/\/doi.org\/10.1016\/j.ijhcs.2015.05.005","journal-title":"Int. J. Hum. Comput. Stud."},{"key":"7_CR3","unstructured":"APWG: Phishing Activity Trends Report (2021). https:\/\/docs.apwg.org\/reports\/apwg_trends_report_q2_2020.pdf"},{"key":"7_CR4","unstructured":"Arachchilage, N.A., Flechais, I., Beznosov, K.: A game storyboard design for avoiding phishing attacks. In: SOUPS \u201814, p.\u00a02 (2014)"},{"issue":"6","key":"7_CR5","doi-asserted-by":"publisher","first-page":"574","DOI":"10.1080\/10447310802205776","volume":"24","author":"A Bangor","year":"2008","unstructured":"Bangor, A., Kortum, P., Miller, J.: An empirical evaluation of the system usability scale. Int. J. Hum.-Comput. Int. 24(6), 574\u2013594 (2008). https:\/\/doi.org\/10.1080\/10447310802205776","journal-title":"Int. J. Hum.-Comput. Int."},{"issue":"3","key":"7_CR6","first-page":"114","volume":"4","author":"A Bangor","year":"2009","unstructured":"Bangor, A., Kortum, P., Miller, J.: Determining what individual sus scores mean: adding an adjective rating scale. JUX 4(3), 114\u2013123 (2009)","journal-title":"JUX"},{"key":"7_CR7","doi-asserted-by":"publisher","unstructured":"Benenson, Z., Gassmann, F., Landwirth, R.: Unpacking spear phishing susceptibility. In: FC \u201817 (2017). https:\/\/doi.org\/10.1007\/978-3-319-70278-0_39","DOI":"10.1007\/978-3-319-70278-0_39"},{"issue":"3","key":"7_CR8","first-page":"189","volume":"189","author":"J Brooke","year":"1996","unstructured":"Brooke, J.: SUS: a \u201cquick and dirty\u2019\u2019 usability. Usability Eval. Ind. 189(3), 189\u2013194 (1996)","journal-title":"Usability Eval. Ind."},{"key":"7_CR9","unstructured":"Butavicius, M.A., Parsons, K., Pattinson, M.R., McCormac, A., Calic, D., Lillie, M.: Understanding susceptibility to phishing emails: assessing the impact of individual differences and culture. In: HAISA\u201917, pp. 12\u201323 (2017). http:\/\/www.cscan.org\/openaccess\/?paperid=354"},{"key":"7_CR10","unstructured":"Canfield, C., Fischhoff, B., Davis, A.: Using signal detection theory to measure phishing detection ability and behavior. In: SOUPS \u201915 (2015)"},{"issue":"1","key":"7_CR11","doi-asserted-by":"publisher","first-page":"28","DOI":"10.1109\/MSP.2013.106","volume":"12","author":"DD Caputo","year":"2014","unstructured":"Caputo, D.D., Pfleeger, S.L., Freeman, J.D., Johnson, M.E.: Going spear phishing: exploring embedded training and awareness. IEEE Secur. Priv. 12(1), 28\u201338 (2014). https:\/\/doi.org\/10.1109\/MSP.2013.106","journal-title":"IEEE Secur. Priv."},{"key":"7_CR12","doi-asserted-by":"publisher","first-page":"16","DOI":"10.1016\/j.cose.2015.07.006","volume":"54","author":"KL Chiew","year":"2015","unstructured":"Chiew, K.L., Chang, E.H., Sze, S.N., Tiong, W.K.: Utilisation of website logo for phishing detection. Comput. Secur. 54, 16\u201326 (2015). https:\/\/doi.org\/10.1016\/j.cose.2015.07.006","journal-title":"Comput. Secur."},{"key":"7_CR13","doi-asserted-by":"publisher","DOI":"10.4324\/9780203771587","volume-title":"Statistical Power Analysis for the Behavioral Sciences","author":"J Cohen","year":"2013","unstructured":"Cohen, J.: Statistical Power Analysis for the Behavioral Sciences. Routledge, NY, USA (2013)"},{"key":"7_CR14","doi-asserted-by":"crossref","unstructured":"FBI: 2020 Internet Crime Report (2021). https:\/\/www.ic3.gov\/Media\/PDF\/AnnualReport\/2020_IC3Report.pdf","DOI":"10.1016\/S1361-3723(21)00038-5"},{"key":"7_CR15","doi-asserted-by":"publisher","unstructured":"Filipczuk, D., Mason, C., Snow, S.: Using a game to explore notions of responsibility for cyber security in organisations. In: CHI \u201919, pp.\u00a01\u20136 (2019). https:\/\/doi.org\/10.1145\/3290607.3312846","DOI":"10.1145\/3290607.3312846"},{"key":"7_CR16","doi-asserted-by":"publisher","unstructured":"Garera, S., Provos, N., Chew, M., Rubin, A.D.: A framework for detection and measurement of phishing attacks. In: WORM \u201907, p.\u00a01 (2007). https:\/\/doi.org\/10.1145\/1314389.1314391","DOI":"10.1145\/1314389.1314391"},{"key":"7_CR17","unstructured":"Google: Report domain name abuse - Google Domains Help (2021). https:\/\/support.google.com\/domains\/answer\/10093434?hl=en"},{"key":"7_CR18","unstructured":"GOV.UK: National Minimum Wage and National Living Wage rates (2020). https:\/\/www.gov.uk\/national-minimum-wage-rates"},{"key":"7_CR19","doi-asserted-by":"publisher","unstructured":"Gregor, S., Hevner, A.R.: Positioning and presenting design science research for maximum impact. MIS Q. 37(2), 337\u2013356 (2013). https:\/\/doi.org\/10.25300\/MISQ\/2013\/37.2.01","DOI":"10.25300\/MISQ\/2013\/37.2.01"},{"key":"7_CR20","doi-asserted-by":"publisher","unstructured":"Hevner, A., Chatterjee, S.: Design science research in information systems. In: DESRIST \u201912, pp. 9\u201322 (2010). https:\/\/doi.org\/10.1007\/978-1-4419-5653-8_2","DOI":"10.1007\/978-1-4419-5653-8_2"},{"issue":"2","key":"7_CR21","doi-asserted-by":"publisher","first-page":"251","DOI":"10.1007\/s00766-017-0265-y","volume":"23","author":"M Hosseini","year":"2018","unstructured":"Hosseini, M., Shahri, A., Phalp, K., Ali, R.: Four reference models for transparency requirements in information systems. Requir. Eng. 23(2), 251\u2013275 (2018). https:\/\/doi.org\/10.1007\/s00766-017-0265-y","journal-title":"Requir. Eng."},{"key":"7_CR22","doi-asserted-by":"crossref","unstructured":"IBM: Cost of a Data Breach Report 2021 (2021). https:\/\/www.ibm.com\/security\/data-breach","DOI":"10.1016\/S1361-3723(21)00082-8"},{"key":"7_CR23","unstructured":"Keren, G.: Between or within Subjects Design: A Methodological Dilemma, pp. 257\u2013273. Lawrence Erlbaum, New Jersey (1993)"},{"issue":"2","key":"7_CR24","doi-asserted-by":"publisher","first-page":"24","DOI":"10.1109\/MSP.2011.179","volume":"10","author":"I Kirlappos","year":"2012","unstructured":"Kirlappos, I., Sasse, M.A.: Security education against phishing: a modest proposal for a major rethink. IEEE Secur. Priv. 10(2), 24\u201332 (2012)","journal-title":"IEEE Secur. Priv."},{"key":"7_CR25","doi-asserted-by":"publisher","unstructured":"Kuechler, W., Vaishnavi, V.: A framework for theory development in design science research: multiple perspectives. JAIS 13(6), 395 (2012). https:\/\/doi.org\/10.17705\/1jais.00300","DOI":"10.17705\/1jais.00300"},{"issue":"2","key":"7_CR26","doi-asserted-by":"publisher","first-page":"351","DOI":"10.1007\/s12525-019-00351-0","volume":"30","author":"N K\u00fchl","year":"2020","unstructured":"K\u00fchl, N., M\u00fchlthaler, M., Goutier, M.: Supporting customer-oriented marketing with artificial intelligence: automatically quantifying customer needs from social media. Electron. Mark. 30(2), 351\u2013367 (2020). https:\/\/doi.org\/10.1007\/s12525-019-00351-0","journal-title":"Electron. Mark."},{"key":"7_CR27","doi-asserted-by":"publisher","unstructured":"Kumaraguru, P., Rhee, Y., Acquisti, A., Cranor, L.F., Hong, J., Nunge, E.: Protecting people from phishing: the design and evaluation of an embedded training email system. In: CHI \u201907, pp. 905\u2013914 (2007). https:\/\/doi.org\/10.1145\/1240624.1240760","DOI":"10.1145\/1240624.1240760"},{"issue":"7","key":"7_CR28","doi-asserted-by":"publisher","first-page":"577","DOI":"10.1080\/10447318.2018.1455307","volume":"34","author":"JR Lewis","year":"2018","unstructured":"Lewis, J.R.: The system usability scale: Past, present, and future. Int. J. Hum.-Comp. Int. 34(7), 577\u2013590 (2018). https:\/\/doi.org\/10.1080\/10447318.2018.1455307","journal-title":"Int. J. Hum.-Comp. Int."},{"key":"7_CR29","doi-asserted-by":"publisher","unstructured":"Lin, E., Greenberg, S., Trotter, E., Ma, D., Aycock, J.: Does domain highlighting help people identify phishing sites? In: CHI \u201811, pp. 2075\u20132084 (2011). https:\/\/doi.org\/10.1145\/1978942.1979244","DOI":"10.1145\/1978942.1979244"},{"key":"7_CR30","doi-asserted-by":"publisher","unstructured":"Ma, J., Saul, L.K., Savage, S., Voelker, G.M.: Beyond blacklists: learning to detect malicious web sites from suspicious urls. In: KDD \u201809, pp. 1245\u20131254 (2009). https:\/\/doi.org\/10.1145\/1557019.1557153","DOI":"10.1145\/1557019.1557153"},{"issue":"4","key":"7_CR31","doi-asserted-by":"publisher","first-page":"251","DOI":"10.1016\/0167-9236(94)00041-2","volume":"15","author":"ST March","year":"1995","unstructured":"March, S.T., Smith, G.F.: Design and natural science research on information technology. Decis. Support Syst. 15(4), 251\u2013266 (1995). https:\/\/doi.org\/10.1016\/0167-9236(94)00041-2","journal-title":"Decis. Support Syst."},{"issue":"8","key":"7_CR32","doi-asserted-by":"publisher","first-page":"1179","DOI":"10.1177\/0018720818789818","volume":"60","author":"J Martin","year":"2018","unstructured":"Martin, J., Dub\u00e9, C., Coovert, M.D.: Signal detection theory (SDT) is effective for modeling user behavior toward phishing and spear-phishing attacks. Hum. Factors 60(8), 1179\u20131191 (2018). https:\/\/doi.org\/10.1177\/0018720818789818","journal-title":"Hum. Factors"},{"issue":"Suppl 1","key":"7_CR33","doi-asserted-by":"publisher","first-page":"3549","DOI":"10.3233\/wor-2012-1054-3549","volume":"41","author":"CB Mayhorn","year":"2012","unstructured":"Mayhorn, C.B., Nyeste, P.G.: Training users to counteract phishing. Work 41(Suppl 1), 3549\u201352 (2012). https:\/\/doi.org\/10.3233\/wor-2012-1054-3549","journal-title":"Work"},{"key":"7_CR34","unstructured":"Meta: Protecting People from Domain Name Fraud (2020). https:\/\/about.fb.com\/news\/2020\/03\/domain-name-lawsuit\/"},{"key":"7_CR35","unstructured":"Meta: Protecting People From Imposter Domain Names (2020). https:\/\/about.fb.com\/news\/2020\/06\/imposter-domain-names\/"},{"key":"7_CR36","doi-asserted-by":"publisher","unstructured":"Moreno-Fernndez, M.M., Blanco, F., Garaizar, P., Matute, H.: Fishing for phishers. improving internet users\u2019 sensitivity to visual deception cues to prevent electronic fraud. Comput. Hum. Behav. 69(C), 421\u2013436 (2017). https:\/\/doi.org\/10.1016\/j.chb.2016.12.044","DOI":"10.1016\/j.chb.2016.12.044"},{"key":"7_CR37","doi-asserted-by":"publisher","unstructured":"Mossano, M., et al.: SMILE - smart email link domain extractor. In: SPOSE \u201821, pp. 403\u2013412 (2022). https:\/\/doi.org\/10.1007\/978-3-030-95484-0_23","DOI":"10.1007\/978-3-030-95484-0_23"},{"key":"7_CR38","unstructured":"Mozilla Foundation: Public Suffix List (2020). https:\/\/publicsuffix.org\/"},{"key":"7_CR39","unstructured":"Oest, A., et al.: Sunrise to sunset: analyzing the end-to-end life cycle and effectiveness of phishing attacks at scale. In: CSS \u201820, pp. 361\u2013377 (2020)"},{"key":"7_CR40","doi-asserted-by":"publisher","unstructured":"Petelka, J., Zou, Y., Schaub, F.: Put your warning where your link is: improving and evaluating email phishing warnings. In: CHI \u201819, pp. 1\u201315 (2019). https:\/\/doi.org\/10.1145\/3290605.3300748","DOI":"10.1145\/3290605.3300748"},{"key":"7_CR41","doi-asserted-by":"publisher","unstructured":"Pirocca, S., Allodi, L., Zannone, N.: A toolkit for security awareness training against targeted phishing. In: ICISS \u201820, pp. 137\u2013159 (2020). https:\/\/doi.org\/10.1007\/978-3-030-65610-2_9","DOI":"10.1007\/978-3-030-65610-2_9"},{"key":"7_CR42","unstructured":"Reinheimer, B., et al.: An investigation of phishing awareness and education over time: when and how to best remind users. In: SOUPS \u201820, pp. 259\u2013284 (2020)"},{"key":"7_CR43","doi-asserted-by":"publisher","unstructured":"Reynolds, J., et al.: Measuring identity confusion with uniform resource locators. In: CHI \u201820, pp. 1\u201312 (2020). https:\/\/doi.org\/10.1145\/3313831.3376298","DOI":"10.1145\/3313831.3376298"},{"key":"7_CR44","doi-asserted-by":"crossref","unstructured":"Sheng, S., et al.: Anti-phishing phil: the design and evaluation of a game that teaches people not to fall for phish. In: SOUPS \u201807, pp. 88\u201399 (2007)","DOI":"10.1145\/1280680.1280692"},{"key":"7_CR45","unstructured":"Statcounter: Desktop Browser Market Share United Kingdom (2020). https:\/\/gs.statcounter.com\/browser-market-share\/desktop\/united-kingdom"},{"key":"7_CR46","unstructured":"Statcounter: Desktop Operating System Market Share United Kingdom (2020). https:\/\/gs.statcounter.com\/os-market-share\/desktop\/united-kingdom"},{"issue":"5","key":"7_CR47","doi-asserted-by":"publisher","first-page":"577","DOI":"10.1108\/JOSM-05-2019-0131","volume":"30","author":"JG Teixeira","year":"2019","unstructured":"Teixeira, J.G., Patr\u00edcio, L., Tuunanen, T.: Advancing service design research with design science research. J. Serv. Manag. 30(5), 577\u2013592 (2019). https:\/\/doi.org\/10.1108\/JOSM-05-2019-0131","journal-title":"J. Serv. Manag."},{"key":"7_CR48","doi-asserted-by":"publisher","DOI":"10.1016\/j.heliyon.2019.e02010","volume":"5","author":"KF Tschakert","year":"2019","unstructured":"Tschakert, K.F., Ngamsuriyaroj, S.: Effectiveness of and user preferences for security awareness training methodologies. Heliyon 5, e02010 (2019). https:\/\/doi.org\/10.1016\/j.heliyon.2019.e02010","journal-title":"Heliyon"},{"key":"7_CR49","volume-title":"Understanding Statistics","author":"G Upton","year":"1996","unstructured":"Upton, G., Cook, I.: Understanding Statistics. Oxford University Press, Oxford, UK (1996)"},{"key":"7_CR50","doi-asserted-by":"publisher","unstructured":"Vance, A., Jenkins, J.L., Anderson, B.B., Bjornn, D.K., Kirwan, C.B.: Tuning out security warnings: a longitudinal examination of habituation through fMRI, eye tracking, and field experiments. MIS Q. 42(2), 355\u2013380 (2018). https:\/\/doi.org\/10.25300\/MISQ\/2018\/14124","DOI":"10.25300\/MISQ\/2018\/14124"},{"issue":"1","key":"7_CR51","doi-asserted-by":"publisher","first-page":"77","DOI":"10.1057\/ejis.2014.36","volume":"25","author":"J Venable","year":"2016","unstructured":"Venable, J., Pries-Heje, J., Baskerville, R.: Feds: a framework for evaluation in design science research. Eur. J. Inf. Syst. 25(1), 77\u201389 (2016). https:\/\/doi.org\/10.1057\/ejis.2014.36","journal-title":"Eur. J. Inf. Syst."},{"key":"7_CR52","doi-asserted-by":"crossref","unstructured":"Verizon: Data Breach Investigations Report (2021). https:\/\/enterprise.verizon.com\/resources\/reports\/2021-data-breach-investigations-report.pdf","DOI":"10.1016\/S1361-3723(21)00061-0"},{"key":"7_CR53","doi-asserted-by":"publisher","first-page":"113","DOI":"10.1016\/j.dss.2019.113160","volume":"128","author":"A Vishwanath","year":"2020","unstructured":"Vishwanath, A., et al.: Cyber hygiene: the concept, its measure, and its initial tests. Decis. Support Sys. 128, 113\u2013160 (2020). https:\/\/doi.org\/10.1016\/j.dss.2019.113160","journal-title":"Decis. Support Sys."},{"key":"7_CR54","doi-asserted-by":"publisher","unstructured":"Volkamer, M., Renaud, K., Canova, G., Reinheimer, B., Braun, K.: Design and field evaluation of passsec: raising and sustaining web surfer risk awareness. In: TRUST \u201815, pp. 104\u2013122 (2015). https:\/\/doi.org\/10.1007\/978-3-319-22846-4_7","DOI":"10.1007\/978-3-319-22846-4_7"},{"issue":"4","key":"7_CR55","doi-asserted-by":"publisher","first-page":"372","DOI":"10.1108\/ICS-07-2015-0032","volume":"24","author":"M Volkamer","year":"2016","unstructured":"Volkamer, M., Renaud, K., Gerber, P.: Spot the phish by checking the pruned url. Inf. Comput. Secur. 24(4), 372\u2013385 (2016). https:\/\/doi.org\/10.1108\/ICS-07-2015-0032","journal-title":"Inf. Comput. Secur."},{"key":"7_CR56","doi-asserted-by":"publisher","first-page":"100","DOI":"10.1016\/j.cose.2017.02.004","volume":"71","author":"M Volkamer","year":"2017","unstructured":"Volkamer, M., Renaud, K., Reinheimer, B., Kunz, A.: User experiences of torpedo: tooltip-powered phishing email detection. Comput. Secur. 71, 100\u2013113 (2017). https:\/\/doi.org\/10.1016\/j.cose.2017.02.004","journal-title":"Comput. Secur."},{"key":"7_CR57","doi-asserted-by":"publisher","unstructured":"Volkamer, M., Sasse, M.A., Boehm, F.: Analysing simulated phishing campaigns for staff. Comput. Secur. 312\u2013328 (2020). https:\/\/doi.org\/10.1007\/978-3-030-66504-3_19","DOI":"10.1007\/978-3-030-66504-3_19"},{"key":"7_CR58","doi-asserted-by":"publisher","unstructured":"V\u00f6ssing, M., K\u00fchl, N., Lind, M., Satzger, G.: Designing transparency for effective human-ai collaboration. Inf. Syst. Front. 1\u201319 (2022). https:\/\/doi.org\/10.1007\/s10796-022-10284-3","DOI":"10.1007\/s10796-022-10284-3"},{"key":"7_CR59","doi-asserted-by":"publisher","unstructured":"Wang, J., Li, Y., Rao, H.R.: Overconfidence in phishing email detection. JAIS 17(11), 1 (2016). https:\/\/doi.org\/10.17705\/1jais.00442","DOI":"10.17705\/1jais.00442"},{"key":"7_CR60","doi-asserted-by":"publisher","unstructured":"Wash, R.: How experts detect phishing scam emails. Proc. ACM Hum.-Comput. Interact. 4(CSCW2), 160:1\u201328 (2020). https:\/\/doi.org\/10.1145\/3415231","DOI":"10.1145\/3415231"},{"key":"7_CR61","doi-asserted-by":"publisher","unstructured":"Wash, R., Cooper, M.: Who provides phishing training? In: CHI \u201818 (2018). https:\/\/doi.org\/10.1145\/3173574.3174066","DOI":"10.1145\/3173574.3174066"},{"issue":"2","key":"7_CR62","doi-asserted-by":"publisher","first-page":"385","DOI":"10.1287\/isre.2014.0522","volume":"25","author":"RT Wright","year":"2014","unstructured":"Wright, R.T., Jensen, M.L., Thatcher, J.B., Dinger, M., Marett, K.: Influence techniques in phishing attacks: an examination of vulnerability and resistance. Inf. Syst. Res. 25(2), 385\u2013400 (2014). https:\/\/doi.org\/10.1287\/isre.2014.0522","journal-title":"Inf. Syst. Res."},{"key":"7_CR63","doi-asserted-by":"publisher","first-page":"73271","DOI":"10.1109\/ACCESS.2019.2920655","volume":"7","author":"E Zhu","year":"2019","unstructured":"Zhu, E., Chen, Y., Ye, C., Li, X., Liu, F.: OFS-NN: an effective phishing websites detection model based on optimal feature selection and neural network. IEEE Access 7, 73271\u201373284 (2019). https:\/\/doi.org\/10.1109\/ACCESS.2019.2920655","journal-title":"IEEE Access"}],"container-title":["Lecture Notes in Computer Science","Socio-Technical Aspects in Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-83072-3_7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,12]],"date-time":"2025-03-12T18:59:53Z","timestamp":1741805993000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-83072-3_7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"ISBN":["9783031830716","9783031830723"],"references-count":63,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-83072-3_7","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2025]]},"assertion":[{"value":"13 March 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"STAST","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Workshop on Socio-Technical Aspects in Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Copenhagen","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Denmark","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2022","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"26 September 2022","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"26 September 2022","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"12","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"stast2022","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/stast.uni.lu\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Easychair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"20","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"6","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"30% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"1 external reviewers involved (outside the PC)","order":10,"name":"additional_info_on_review_process","label":"Additional Info on Review Process","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}