{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,11]],"date-time":"2025-09-11T19:47:43Z","timestamp":1757620063613,"version":"3.44.0"},"publisher-location":"Cham","reference-count":50,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783032050045"},{"type":"electronic","value":"9783032050052"}],"license":[{"start":{"date-parts":[[2025,9,9]],"date-time":"2025-09-09T00:00:00Z","timestamp":1757376000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,9,9]],"date-time":"2025-09-09T00:00:00Z","timestamp":1757376000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2026]]},"DOI":"10.1007\/978-3-032-05005-2_33","type":"book-chapter","created":{"date-parts":[[2025,9,8]],"date-time":"2025-09-08T04:41:46Z","timestamp":1757306506000},"page":"645-669","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Experiences of Online Threats: A Diary Study with Young British People"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-9126-1630","authenticated-orcid":false,"given":"Najla","family":"Aldaraani","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0100-9846","authenticated-orcid":false,"given":"Helen","family":"Petrie","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,9,9]]},"reference":[{"key":"33_CR1","doi-asserted-by":"publisher","unstructured":"Aldaraani, N., Petrie, H., Shahandashti, S.F:. Online security attack experience and worries of young adults in the United Kingdom. In: Clarke, N., Furnell, S. (eds.) HAISA 2022. IFIPAICT, vol. 658, pp. 300\u2013309. Springer, Cham (2022). https:\/\/doi.org\/10.1007\/978-3-031-12172-2_24","DOI":"10.1007\/978-3-031-12172-2_24"},{"key":"33_CR2","doi-asserted-by":"publisher","unstructured":"Aldaraani, N., Petrie, H., Shahandashti, S.F.: Online security attack experience and worries of young adults in the Kingdom of Saudi Arabia. In: Furnell, S., Clarke, N. (eds.) HAISA 2023.IFIPAICT, vol. 674, pp. 364\u2013376. Springer, Cham (2023). https:\/\/doi.org\/10.1007\/978-3-031-38530-8_29","DOI":"10.1007\/978-3-031-38530-8_29"},{"key":"33_CR3","doi-asserted-by":"publisher","unstructured":"Aldaraani, N., Petrie, H., Shahandashti, S.F.: A diary study to understand young Saudi adult users\u2019 experiences of online security threats. In: Clarke, N., Furnell, S. (eds.) HAISA 2024. IFIPAICT, vol. 721, pp. 47\u201360. Springer, Cham (2025). https:\/\/doi.org\/10.1007\/978-3-031-72559-3_4","DOI":"10.1007\/978-3-031-72559-3_4"},{"key":"33_CR4","volume":"55","author":"A Aleroud","year":"2020","unstructured":"Aleroud, A., Abu-Shanab, E., Al-Aiad, A., Alshboul, Y.: An examination of susceptibility to spear phishing cyber attacks in non-English speaking communities. J. Inf. Secur. Appl. 55, 102614 (2020)","journal-title":"J. Inf. Secur. Appl."},{"issue":"6","key":"33_CR5","doi-asserted-by":"publisher","first-page":"661","DOI":"10.1057\/s41303-017-0057-y","volume":"26","author":"A Algarni","year":"2017","unstructured":"Algarni, A., Xu, Y., Chan, T.: An empirical study on the susceptibility to social engineering in social networking sites: the case of Facebook. Eur. J. Inf. Syst. 26(6), 661\u2013687 (2017)","journal-title":"Eur. J. Inf. Syst."},{"issue":"10","key":"33_CR6","first-page":"240","volume":"21","author":"IM Alseadoon","year":"2021","unstructured":"Alseadoon, I.M., Othman, M.F.I.: Cultural comparison towards users\u2019 susceptible to phishing emails. IJCSNS Int. J. Comput. Sci. Netw. Secur. 21(10), 240\u2013244 (2021)","journal-title":"IJCSNS Int. J. Comput. Sci. Netw. Secur."},{"key":"33_CR7","doi-asserted-by":"publisher","first-page":"437","DOI":"10.1016\/j.chb.2016.12.040","volume":"69","author":"M Anwar","year":"2017","unstructured":"Anwar, M., He, W., Ash, I., et al.: Gender difference and employees\u2019 cybersecurity behaviors. Comput. Hum. Behav. 69, 437\u2013443 (2017)","journal-title":"Comput. Hum. Behav."},{"key":"33_CR8","doi-asserted-by":"crossref","unstructured":"Benenson, Z., Gassmann, F., Landwirth, R.: Unpacking spear phishing susceptibility. In: Financial Cryptography and Data Security: FC 2017 International Workshops, Revised Selected Papers 21 (2017)","DOI":"10.1007\/978-3-319-70278-0_39"},{"key":"33_CR9","doi-asserted-by":"crossref","unstructured":"Blythe, M., Petrie, H. Clark, J.: F for fake: four studies on how we fall for phish. In: ACM Conference on Human Factors in Computing (CHI 2011). ACM Press (2011)","DOI":"10.1145\/1978942.1979459"},{"key":"33_CR10","unstructured":"Butavicius, M.A., Parsons, K., Pattinson, M.R., et al.: Understanding susceptibility to phishing emails: assessing the impact of individual differences and culture. In: International Symposium on Human Aspects of Information Security and Assurance (HAISA 2017). Springer, Cham (2017)"},{"key":"33_CR11","first-page":"36","volume":"42","author":"AA Cain","year":"2018","unstructured":"Cain, A.A., Edwards, M.E., Still, J.D.: An exploratory study of cyber hygiene behaviors and knowledge. J. Inf. Secur. Appl. 42, 36\u201345 (2018)","journal-title":"J. Inf. Secur. Appl."},{"key":"33_CR12","doi-asserted-by":"publisher","first-page":"291","DOI":"10.1016\/j.chb.2017.01.003","volume":"70","author":"H Chen","year":"2017","unstructured":"Chen, H., Beaudoin, C.E., Hong, T.: Securing online privacy: an empirical test on Internet scam victimization, online privacy concerns, and privacy protection behaviors. Comput. Hum. Behav. 70, 291\u2013302 (2017)","journal-title":"Comput. Hum. Behav."},{"key":"33_CR13","doi-asserted-by":"crossref","unstructured":"Dhamija, R., Tygar, J.D., Hearst, M.: Why phishing works. In: ACM Conference on Human Factors in Computing (CHI 2006). ACM Press (2006)","DOI":"10.1145\/1124772.1124861"},{"issue":"1","key":"33_CR14","doi-asserted-by":"publisher","first-page":"53","DOI":"10.1080\/01611194.2019.1623343","volume":"44","author":"A Diaz","year":"2020","unstructured":"Diaz, A., Sherman, A.T., Joshi, A.: Phishing in an academic community: a study of user susceptibility and behavior. Cryptologia 44(1), 53\u201367 (2020)","journal-title":"Cryptologia"},{"key":"33_CR15","doi-asserted-by":"crossref","unstructured":"Distler, V.: The influence of context on response to spear-phishing attacks: an in-situ deception study. In: ACM Conference on Human Factors in Computing (CHI 2023). ACM Press (2023)","DOI":"10.1145\/3544548.3581170"},{"key":"33_CR16","doi-asserted-by":"crossref","unstructured":"Downs, J.S., Holbrook, M.B., Cranor, L.F.: Decision strategies international publishing and susceptibility to phishing. In: Symposium on Usable Privacy and Security (SOUPS) (2006)","DOI":"10.1145\/1143120.1143131"},{"key":"33_CR17","unstructured":"Federal Bureau of Investigation (FBI). Internet Crime Report 2023. Federal Bureau of Investigation. https:\/\/www.ic3.gov\/AnnualReport\/Reports\/2023_IC3Report.pdf"},{"issue":"1","key":"33_CR18","doi-asserted-by":"publisher","first-page":"46","DOI":"10.1109\/MTAS.2007.335565","volume":"26","author":"P Finn","year":"2007","unstructured":"Finn, P., Jakobsson, M.: Designing ethical phishing experiments. IEEE Technol. Soc. Mag. 26(1), 46\u201358 (2007)","journal-title":"IEEE Technol. Soc. Mag."},{"issue":"2","key":"33_CR19","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0171620","volume":"12","author":"BE Gavett","year":"2017","unstructured":"Gavett, B.E., Zhao, R., John, S.E., et al.: Phishing suspiciousness in older and younger adults: the role of executive functioning. PLoS ONE 12(2), e0171620 (2017)","journal-title":"PLoS ONE"},{"key":"33_CR20","doi-asserted-by":"publisher","first-page":"345","DOI":"10.1016\/j.cose.2017.11.015","volume":"73","author":"M Gratian","year":"2018","unstructured":"Gratian, M., Bandi, S., Cukier, M., et al.: Correlating human traits and cyber security behavior intentions. Comput. Secur. 73, 345\u2013358 (2018)","journal-title":"Comput. Secur."},{"key":"33_CR21","doi-asserted-by":"publisher","first-page":"318","DOI":"10.1016\/j.chb.2004.10.015","volume":"23","author":"GA Grimes","year":"2007","unstructured":"Grimes, G.A., Hough, M.G., Signorella, M.L.: Email end users and spam: relations of gender and age group to attitudes and actions. Comput. Hum. Behav. 23, 318\u2013332 (2007)","journal-title":"Comput. Hum. Behav."},{"key":"33_CR22","doi-asserted-by":"crossref","unstructured":"Halevi, T., Memon, N., Lewis, J.: Cultural and psychological factors in cyber-security. In: ACM International Conference on Information Integration and Web-based Applications and Services (iiWAS 2016), pp. 318\u2013324, ACM Press (2016)","DOI":"10.1145\/3011141.3011165"},{"key":"33_CR23","doi-asserted-by":"crossref","unstructured":"Halevi, T., Memon, N., Nov, O.: Spear-phishing in the wild: a real-world study of personality, phishing self-efficacy and vulnerability to spear-phishing attacks (2015). SSRN. https:\/\/papers.ssrn.com\/sol3\/papers.cfm?abstract_id=2544742","DOI":"10.2139\/ssrn.2544742"},{"key":"33_CR24","unstructured":"Hofstede, G., Hofstede, G.J., Minkov, M.: Cultures and Organizations: Software of the Mind, 3rd edn. McGraw Hill (2010)"},{"key":"33_CR25","volume-title":"Contextual Design: Design for Life","author":"K Holtzblatt","year":"2016","unstructured":"Holtzblatt, K., Beyer, H.: Contextual Design: Design for Life, 2nd edn. Morgan Kaufmann, Burlington (2016)","edition":"2"},{"issue":"10","key":"33_CR26","doi-asserted-by":"publisher","first-page":"94","DOI":"10.1145\/1290958.1290968","volume":"50","author":"TN Jagatic","year":"2007","unstructured":"Jagatic, T.N., Johnson, N.A., Jakobsson, M., Menczer, F.: Social phishing. Commun. ACM 50(10), 94\u2013100 (2007)","journal-title":"Commun. ACM"},{"issue":"2","key":"33_CR27","doi-asserted-by":"publisher","first-page":"325","DOI":"10.1037\/pag0000228","volume":"33","author":"K Kircanski","year":"2018","unstructured":"Kircanski, K., Notthoff, N., DeLiema, M., et al.: Emotional arousal may increase susceptibility to fraud in older and younger adults. Psychol. Aging 33(2), 325\u2013337 (2018)","journal-title":"Psychol. Aging"},{"issue":"1","key":"33_CR28","first-page":"17","volume":"6","author":"A Karakasiliotis","year":"2007","unstructured":"Karakasiliotis, A., Furnell, S., Papadaki, M.: An assessment of end-user vulnerability to phishing attacks. J. Inf. Warf. 6(1), 17\u201328 (2007)","journal-title":"J. Inf. Warf."},{"issue":"7","key":"33_CR29","doi-asserted-by":"publisher","DOI":"10.1016\/j.im.2021.103500","volume":"58","author":"D-HA Kwak","year":"2021","unstructured":"Kwak, D.-H.A., Ma, X., Kim, S.: When does social desirability become a problem? Detection and reduction of social desirability bias in information systems research. Inf. Manag 58(7), 103500 (2021)","journal-title":"Inf. Manag"},{"key":"33_CR30","doi-asserted-by":"publisher","DOI":"10.1016\/j.apergo.2020.103084","volume":"86","author":"P Lawson","year":"2020","unstructured":"Lawson, P., Pearson, C.J., Crowson, A., Mayhorn, C.B.: Email phishing and signal detection: how persuasion principles and personality influence response patterns and accuracy. Appl. Ergon. 86, 103084 (2020)","journal-title":"Appl. Ergon."},{"key":"33_CR31","volume-title":"Research Methods in Human-Computer Interaction","author":"J Lazar","year":"2017","unstructured":"Lazar, J., Feng, J.H., Hochheiser, H.: Research Methods in Human-Computer Interaction, 2nd edn. Wiley, Chichester (2017)","edition":"2"},{"key":"33_CR32","doi-asserted-by":"crossref","unstructured":"Li, W., Lee, J., Purl, J. et al.: Experimental investigation of demographic factors related to phishing susceptibility. In: Hawaii International Conference on System Sciences (2020)","DOI":"10.24251\/HICSS.2020.274"},{"issue":"5","key":"33_CR33","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3336141","volume":"26","author":"T Lin","year":"2019","unstructured":"Lin, T., Capecci, D.E., Ellis, D.M., et al.: Susceptibility to spear-phishing emails. ACM Trans. Comput. Hum. Interact. 26(5), 1\u201328 (2019)","journal-title":"ACM Trans. Comput. Hum. Interact."},{"key":"33_CR34","doi-asserted-by":"publisher","first-page":"151","DOI":"10.1016\/j.chb.2016.11.065","volume":"69","author":"A McCormac","year":"2016","unstructured":"McCormac, A., Zwaans, T., Parsons, K.: Individual differences and information security awareness. Comput. Hum. Behav. 69, 151\u2013156 (2016)","journal-title":"Comput. Hum. Behav."},{"key":"33_CR35","unstructured":"Office of Communication (Ofcom): Adults\u2019 Media Use and Attitudes Report 2023 (2023). https:\/\/www.ofcom.org.uk\/siteassets\/resources\/documents\/research-and-data\/media-literacy-research\/adults\/adults-media-use-and-attitudes-2023\/adults-media-use-and-attitudes-report-2023.pdf"},{"key":"33_CR36","unstructured":"Office for National Statistics (ONS). Education, England and Wales: Census 2021. Statistical Bulleting (2021). https:\/\/www.ons.gov.uk\/peoplepopulationandcommunity\/educationandchildcare\/bulletins\/educationenglandandwales\/census2021"},{"key":"33_CR37","unstructured":"Office for National Statistics (ONS). Nature of fraud and computer misuse in England and Wales (2022). ns.gov.uk\/peoplepopulationandcommunity\/crimeandjustice\/articles\/natureoffraudandcomputermisuseinenglandandwales\/yearendingmarch2022"},{"key":"33_CR38","doi-asserted-by":"crossref","unstructured":"Parsons, K., McCormac, A., Pattinson, M.: Phishing for the truth: a scenario-based experiment of users\u2019 behavioural response to emails. In: IFIP TC 11 International Conference, (SEC 2013), Auckland, New Zealand. IFIP (2013)","DOI":"10.1007\/978-3-642-39218-4_27"},{"key":"33_CR39","doi-asserted-by":"publisher","first-page":"1241","DOI":"10.1007\/s11948-017-9952-9","volume":"24","author":"DB Resnik","year":"2018","unstructured":"Resnik, D.B., Finn, P.R.: Ethics and phishing experiments. Sci. Eng. Ethics 24, 1241\u20131252 (2018)","journal-title":"Sci. Eng. Ethics"},{"key":"33_CR40","unstructured":"Rosnow, R.L., Rosenthal, R.: Beginning Behavioral Research: A Conceptual Primer, 7th edn. Pearson Prentice Hall, Upper Saddle River (2012)"},{"issue":"4","key":"33_CR41","doi-asserted-by":"publisher","first-page":"789","DOI":"10.1002\/acp.4075","volume":"37","author":"DM Sarno","year":"2023","unstructured":"Sarno, D.M., Harris, M.W., Black, J.: Which phish is captured in the net? Understanding phishing susceptibility and individual differences. Appl. Cogn. Psychol. 37(4), 789\u2013803 (2023)","journal-title":"Appl. Cogn. Psychol."},{"issue":"5","key":"33_CR42","doi-asserted-by":"publisher","first-page":"704","DOI":"10.1177\/0018720819855570","volume":"62","author":"DM Sarno","year":"2020","unstructured":"Sarno, D.M., Lewis, J.E., Bohil, C.J., Neider, M.B.: Which phish is on the hook? Phishing vulnerability for older versus younger adults. Hum. Factors 62(5), 704\u2013717 (2020)","journal-title":"Hum. Factors"},{"key":"33_CR43","doi-asserted-by":"crossref","unstructured":"Sheng, S., Holbrook, M., Kumaraguru, P.: Who falls for phish? A Demographic analysis of phishing susceptibility and effectiveness of interventions. In: ACM Conference on Human Factors in Computing (CHI 2011). ACM Press (2011)","DOI":"10.1145\/1753326.1753383"},{"key":"33_CR44","volume-title":"Nonparametric Statistics for the Behavioral Sciences","author":"S Siegel","year":"2000","unstructured":"Siegel, S., Castellan, N.J.: Nonparametric Statistics for the Behavioral Sciences, 2nd edn. McGraw-Hill, New York (2000)","edition":"2"},{"key":"33_CR45","doi-asserted-by":"publisher","first-page":"35","DOI":"10.1016\/j.chb.2016.02.050","volume":"60","author":"M Silic","year":"2016","unstructured":"Silic, M., Back, A.: The dark side of social networking sites: understanding phishing risks. Comput. Hum. Behav. 60, 35\u201343 (2016)","journal-title":"Comput. Hum. Behav."},{"issue":"1","key":"33_CR46","first-page":"1","volume":"6","author":"M Steves","year":"2020","unstructured":"Steves, M., Greene, K., Theofanos, M.: Categorizing human phishing difficulty: a phish scale. J. Cybersecur. 6(1), 1\u201316 (2020)","journal-title":"J. Cybersecur."},{"key":"33_CR47","doi-asserted-by":"crossref","unstructured":"Thomopoulos, G., Lyras, D., Fidas, C.: Methodologies and ethical considerations in phishing research: a comprehensive review In: International Conference of the ACM Greek SIGCHI Chapter. ACM Press (2023)","DOI":"10.1145\/3609987.3609990"},{"key":"33_CR48","doi-asserted-by":"crossref","unstructured":"Vidas, T., Owusu, E., Wang, S., et al.: QRishing: the susceptibility of smartphone users to QR code phishing attacks. In: Financial Cryptography and Data Security: FC 2013 Workshops, USEC and WAHC 2013, Revised Selected Papers 17 (2013)","DOI":"10.1007\/978-3-642-41320-9_4"},{"issue":"3","key":"33_CR49","doi-asserted-by":"publisher","first-page":"576","DOI":"10.1016\/j.dss.2011.03.002","volume":"51","author":"A Vishwanath","year":"2011","unstructured":"Vishwanath, A., Herath, T., Chen, R.: Why do people get phished? Testing individual differences in phishing vulnerability within an integrated, information processing model. Decis. Support. Syst. 51(3), 576\u2013586 (2011)","journal-title":"Decis. Support. Syst."},{"issue":"4","key":"33_CR50","doi-asserted-by":"publisher","first-page":"345","DOI":"10.1109\/TPC.2012.2208392","volume":"55","author":"J Wang","year":"2012","unstructured":"Wang, J., Herath, T., Chen, R.: Phishing susceptibility: an investigation into the processing of a targeted spear phishing email. IEEE Trans. Prof. Commun. 55(4), 345\u2013362 (2012)","journal-title":"IEEE Trans. Prof. Commun.Commun."}],"container-title":["Lecture Notes in Computer Science","Human-Computer Interaction \u2013 INTERACT 2025"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-032-05005-2_33","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,8]],"date-time":"2025-09-08T04:42:05Z","timestamp":1757306525000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-032-05005-2_33"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,9,9]]},"ISBN":["9783032050045","9783032050052"],"references-count":50,"URL":"https:\/\/doi.org\/10.1007\/978-3-032-05005-2_33","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2025,9,9]]},"assertion":[{"value":"9 September 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"INTERACT","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"IFIP Conference on Human-Computer Interaction","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Belo Horizonte","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Brazil","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"8 September 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"12 September 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"20","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"interact2025","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/ifip-tc13.org\/interact2025\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}