{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,13]],"date-time":"2026-04-13T17:40:52Z","timestamp":1776102052649,"version":"3.50.1"},"publisher-location":"Cham","reference-count":42,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783319336299","type":"print"},{"value":"9783319336305","type":"electronic"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-33630-5_12","type":"book-chapter","created":{"date-parts":[[2016,5,10]],"date-time":"2016-05-10T08:10:12Z","timestamp":1462867812000},"page":"161-175","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":14,"title":["TORPEDO: TOoltip-poweRed Phishing Email DetectiOn"],"prefix":"10.1007","author":[{"given":"Melanie","family":"Volkamer","sequence":"first","affiliation":[]},{"given":"Karen","family":"Renaud","sequence":"additional","affiliation":[]},{"given":"Benjamin","family":"Reinheimer","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,5,11]]},"reference":[{"key":"12_CR1","doi-asserted-by":"crossref","unstructured":"Alnajim, A., Munro, M.: An anti-phishing approach that uses training intervention for phishing websites detection. In: 6th International Conference on Information Technology: New Generations, pp. 405\u2013410. IEEE (2009)","DOI":"10.1109\/ITNG.2009.109"},{"key":"12_CR2","unstructured":"APWG Internet Policy Committee: Global Phishing Survey: Trends and Domain Name Use in 2H2013 (2013). http:\/\/docs.apwg.org\/reports\/APWG_GlobalPhishingSurvey_2H2013.pdf . Accessed 13 March 2016"},{"issue":"1","key":"12_CR3","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/1462148.1462151","volume":"3","author":"Z Bar-Yossef","year":"2009","unstructured":"Bar-Yossef, Z., Keidar, I., Schonfeld, U.: Do not crawl in the DUST: different URLs with similar text. TWEB 3(1), 1\u201331 (2009). ACM","journal-title":"TWEB"},{"key":"12_CR4","doi-asserted-by":"crossref","unstructured":"Blythe, M., Petrie, H., Clark, J.A.: F for fake: four studies on how we fall for phish. In: CHI, pp. 3469\u20133478. ACM (2011)","DOI":"10.1145\/1978942.1979459"},{"key":"12_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"188","DOI":"10.1007\/978-3-319-11851-2_14","volume-title":"Security and Trust Management","author":"G Canova","year":"2014","unstructured":"Canova, G., Volkamer, M., Bergmann, C., Borza, R.: NoPhish: an anti-phishing education app. In: Mauw, S., Jensen, C.D. (eds.) STM 2014. LNCS, vol. 8743, pp. 188\u2013192. Springer, Heidelberg (2014)"},{"key":"12_CR6","series-title":"IFIP Advances in Information and Communication Technology","doi-asserted-by":"crossref","first-page":"87","DOI":"10.1007\/978-3-319-18500-2_8","volume-title":"Information Security Education Across the Curriculum","author":"G Canova","year":"2015","unstructured":"Canova, G., Volkamer, M., Bergmann, C., Borza, R.: Learn to spot phishing URLs with the android nophish app. In: Bishop, M., Miloslavskaya, N., Theocharidou, M. (eds.) Information Security Education Across the Curriculum. IFIP Advances in Information and Communication Technology, vol. 453, pp. 87\u2013100. Springer, Heidelberg (2015)"},{"key":"12_CR7","doi-asserted-by":"crossref","unstructured":"Canova, G., Volkamer, M., Bergmann, C., Reinheimer, B.: NoPhish app evaluation: lab and retention study. In: USEC. Internet Society (2015)","DOI":"10.14722\/usec.2015.23009"},{"issue":"5","key":"12_CR8","doi-asserted-by":"publisher","first-page":"463","DOI":"10.1037\/0022-3514.36.5.463","volume":"36","author":"RB Cialdini","year":"1978","unstructured":"Cialdini, R.B., Cacioppo, J.T., Bassett, R., Miller, J.A.: Low-ball procedure for producing compliance: commitment then cost. J. Pers. Soc. Psychol. 36(5), 463 (1978). APA","journal-title":"J. Pers. Soc. Psychol."},{"key":"12_CR9","doi-asserted-by":"crossref","unstructured":"Dhamija, R., Tygar, J.D., Hearst, M.: Why phishing works. In: CHI, pp. 581\u2013590. ACM (2006)","DOI":"10.1145\/1124772.1124861"},{"issue":"1","key":"12_CR10","doi-asserted-by":"publisher","first-page":"73","DOI":"10.1016\/j.cose.2006.10.009","volume":"26","author":"RC Dodge","year":"2007","unstructured":"Dodge, R.C., Carver, C., Ferguson, A.J.: Phishing for user security awareness. Comput. Secur. 26(1), 73\u201380 (2007). Elsevier","journal-title":"Comput. Secur."},{"key":"12_CR11","unstructured":"Erkkil\u00e4, J.-P.: Why we fall for phishing. In: Conference on Human Factors in Computer Systems. ACM (2011)"},{"key":"12_CR12","doi-asserted-by":"crossref","unstructured":"Fette, I., Sadeh, N., Tomasic, A.: Learning to detect phishing emails. In: 16th International Conference on World Wide Web, pp. 649\u2013656. ACM (2007)","DOI":"10.1145\/1242572.1242660"},{"key":"12_CR13","unstructured":"Frauenstein, E.D., von Solms, R.: Phishing: how an organization can protect itself. In: Information Security South Africa Conference, pp. 253\u2013268. Information Security South Africa (2009)"},{"key":"12_CR14","doi-asserted-by":"crossref","unstructured":"Friedman, B., Hurley, D., Howe, D.C., Felten, E., Nissenbaum, H.: Users\u2019 conceptions of web security: a comparative study. In: CHI, pp. 746\u2013747. ACM (2002)","DOI":"10.1145\/506443.506577"},{"key":"12_CR15","doi-asserted-by":"crossref","unstructured":"Garera, S., Provos, N., Chew, M., Rubin, A.D.: A framework for detection and measurement of phishing attacks. In: Recurring Malcode, pp. 1\u20138. ACM (2007)","DOI":"10.1145\/1314389.1314391"},{"issue":"10","key":"12_CR16","doi-asserted-by":"publisher","first-page":"94","DOI":"10.1145\/1290958.1290968","volume":"50","author":"TN Jagatic","year":"2007","unstructured":"Jagatic, T.N., Johnson, N.A., Jakobsson, M., Menczer, F.: Social phishing. Commun. ACM 50(10), 94\u2013100 (2007). ACM","journal-title":"Commun. ACM"},{"key":"12_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"356","DOI":"10.1007\/978-3-540-77366-5_32","volume-title":"Financial Cryptography and Data Security","author":"M Jakobsson","year":"2007","unstructured":"Jakobsson, M., Tsow, A., Shah, A., Blevis, E., Lim, Y.: What instills trust? a qualitative study of phishing. In: Dietrich, S., Dhamija, R. (eds.) FC 2007 and USEC 2007. LNCS, vol. 4886, pp. 356\u2013361. Springer, Heidelberg (2007)"},{"key":"12_CR18","doi-asserted-by":"crossref","unstructured":"Jansson, K., von Solms, R.: Simulating malicious emails to educate end users on-demand. In: 3rd Symposium on Web Society, pp. 74\u201380. IEEE (2011)","DOI":"10.1109\/SWS.2011.6101274"},{"issue":"4","key":"12_CR19","doi-asserted-by":"publisher","first-page":"2091","DOI":"10.1109\/SURV.2013.032213.00009","volume":"15","author":"M Khonji","year":"2013","unstructured":"Khonji, M., Iraqi, Y., Jones, A.: Phishing detection: a literature survey. Commun. Surv. Tutorials IEEE 15(4), 2091\u20132121 (2013). IEEE","journal-title":"Commun. Surv. Tutorials IEEE"},{"issue":"2","key":"12_CR20","doi-asserted-by":"publisher","first-page":"24","DOI":"10.1109\/MSP.2011.179","volume":"10","author":"I Kirlappos","year":"2012","unstructured":"Kirlappos, I., Sasse, M.A., Education, S.: Against phishing: a modest proposal for a major rethink. Secur. Priv. 10(2), 24\u201332 (2012). IEEE","journal-title":"Secur. Priv."},{"key":"12_CR21","doi-asserted-by":"crossref","unstructured":"Kumaraguru, P., Rhee, Y., Acquisti, A., Cranor, L.F., Hong, J., Nunge, E.: Protecting people from phishing: the design and evaluation of an embedded training email system. In: CHI, pp. 905\u2013914. ACM (2007)","DOI":"10.1145\/1240624.1240760"},{"key":"12_CR22","doi-asserted-by":"crossref","unstructured":"Kumaraguru, P., Rhee, Y., Sheng, S., Hasan, S., Acquisti, A., Cranor, L.-F., Hong, J.: Getting users to pay attention to anti-phishing education: evaluation of retention and transfer. In: Anti-phishing WG, pp. 70\u201381. ACM (2007)","DOI":"10.1145\/1299015.1299022"},{"issue":"2","key":"12_CR23","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/1754393.1754396","volume":"10","author":"P Kumaraguru","year":"2010","unstructured":"Kumaraguru, P., Sheng, S., Acquisti, A., Cranor, L.F., Hong, J.: Teaching Johnny to fall for phish. Trans. Internet Technol. 10(2), 1\u20137 (2010). ACM","journal-title":"Trans. Internet Technol."},{"issue":"2","key":"12_CR24","doi-asserted-by":"publisher","first-page":"163","DOI":"10.1007\/s11416-007-0050-4","volume":"3","author":"L Li","year":"2007","unstructured":"Li, L., Helenius, M.: Usability evaluation of anti-phishing toolbars. J. Comput. Virol. 3(2), 163\u2013184 (2007). Springer","journal-title":"J. Comput. Virol."},{"key":"12_CR25","doi-asserted-by":"crossref","unstructured":"Lin, E., Greenberg, S., Trotter, E., Ma, D., Aycock, J.: Does domain highlighting help people identify phishing sites? In: CHI, pp. 2075\u20132084. ACM (2011)","DOI":"10.1145\/1978942.1979244"},{"key":"12_CR26","doi-asserted-by":"crossref","unstructured":"Ma, J., Saul, L.K., Savage, S., Voelker, G.M.: Beyond blacklists learning to detect malicious web sites from suspicious URLs. In: 15th SIGKDD, pp. 1245\u20131254. ACM (2009)","DOI":"10.1145\/1557019.1557153"},{"key":"12_CR27","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"190","DOI":"10.1007\/978-3-642-33338-5_10","volume-title":"Research in Attacks, Intrusions, and Defenses","author":"S Marchal","year":"2012","unstructured":"Marchal, S., Fran\u00e7ois, J., State, R., Engel, T.: Proactive discovery of phishing related domain names. In: Balzarotti, D., Stolfo, S.J., Cova, M. (eds.) RAID 2012. LNCS, vol. 7462, pp. 190\u2013209. Springer, Heidelberg (2012)"},{"key":"12_CR28","doi-asserted-by":"crossref","unstructured":"Maurer, M.-E., Herzner, D.: Using visual website similarity for phishing detection and reporting. In: CHI, pp. 1625\u20131630. ACM (2012)","DOI":"10.1145\/2212776.2223683"},{"key":"12_CR29","doi-asserted-by":"crossref","unstructured":"Maurer, M.-E., Luca, A.D., Kempe, S.: Using data type based security alert dialogs to raise online security awareness. In: SOUPS, p. 2. ACM (2011)","DOI":"10.1145\/2078827.2078830"},{"key":"12_CR30","unstructured":"Naidoo, R.: Analysing urgency and trust cues exploited in phishing scam designs. In: 10th International Conference on Cyber Warfare and Security, p. 216. Academic Conferences Limited (2015)"},{"key":"12_CR31","doi-asserted-by":"crossref","unstructured":"Prakash, P., Kumar, M., Kompella, R.R., Gupta, M.: PhishNet: predictive blacklisting to detect phishing attacks. In: INFOCOM, pp. 1\u20135. IEEE (2010)","DOI":"10.1109\/INFCOM.2010.5462216"},{"key":"12_CR32","unstructured":"Rusch, J.J.: The \u201csocial engineering\u201d of internet fraud. In: Internet Society Annual Conference. Internet Society (1999)"},{"key":"12_CR33","doi-asserted-by":"crossref","unstructured":"Sheng, S., Magnien, B., Kumaraguru, P., Acquisti, A., Cranor, L.F., Hong, J., Nunge, E., Phil, A.-P.: The design and evaluation of a game that teaches people not to fall for phish. In: SOUPS, pp. 88\u201399. ACM (2007)","DOI":"10.1145\/1280680.1280692"},{"issue":"3","key":"12_CR34","doi-asserted-by":"publisher","first-page":"70","DOI":"10.1145\/1897852.1897872","volume":"54","author":"F Stajano","year":"2011","unstructured":"Stajano, F., Wilson, P.: Understanding scam victims: seven principles for systems security. Commun. ACM 54(3), 70\u201375 (2011). ACM","journal-title":"Commun. ACM"},{"key":"12_CR35","unstructured":"University of Exeter School of Psychology. The psychology of scams: Provoking and committing errors of judgement, University of Exeter (2012)"},{"key":"12_CR36","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"824","DOI":"10.1007\/978-3-642-33167-1_47","volume-title":"Computer Security \u2013 ESORICS 2012","author":"R Verma","year":"2012","unstructured":"Verma, R., Shashidhar, N., Hossain, N.: Detecting phishing emails the natural language way. In: Foresti, S., Yung, M., Martinelli, F. (eds.) ESORICS 2012. LNCS, vol. 7459, pp. 824\u2013841. Springer, Heidelberg (2012)"},{"issue":"3","key":"12_CR37","doi-asserted-by":"publisher","first-page":"576","DOI":"10.1016\/j.dss.2011.03.002","volume":"51","author":"A Vishwanath","year":"2011","unstructured":"Vishwanath, A., Herath, T., Chen, R., Wang, J., Rao, H.R.: Why do people get phished? testing individual differences in phishing vulnerability within an integrated, information processing model. Decis. Supp. Syst. 51(3), 576\u2013586 (2011). Elsevier","journal-title":"Decis. Supp. Syst."},{"key":"12_CR38","unstructured":"Wang, J., Chen, R., Herath, T., Rao, H.: An empirical exploration of the design pattern of phishing attacks. Inform. Assurance, Security & Privacy Services, Emerald Publishers (2009)"},{"key":"12_CR39","unstructured":"Webroot. Webroot 2015 Threat Brief. http:\/\/www.webroot.com\/shared\/pdf\/Webroot_2015_Threat_Brief.pdf . Accessed 13 March 2016"},{"key":"12_CR40","doi-asserted-by":"crossref","unstructured":"Wu, M., Miller, R.C., Garfinkel, S.L.: Do security toolbars actually prevent phishing attacks? In: CHI, pp. 601\u2013610. ACM (2006)","DOI":"10.1145\/1124772.1124863"},{"issue":"3","key":"12_CR41","first-page":"1","volume":"17","author":"Z Xu","year":"2012","unstructured":"Xu, Z., Zhang, W.: Victimized by phishing: a heuristic-systematic perspective. J. Internet Bank. Commer. 17(3), 1 (2012). ARRAY Development","journal-title":"J. Internet Bank. Commer."},{"key":"12_CR42","unstructured":"Zhang, Y., Egelman, S., Cranor, L.F., Hong, J.: Phinding phish: evaluating anti-phishing tools. In: NDSS. School of Computer Science, Internet Society (2007)"}],"container-title":["IFIP Advances in Information and Communication Technology","ICT Systems Security and Privacy Protection"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-33630-5_12","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,3]],"date-time":"2025-06-03T02:34:36Z","timestamp":1748918076000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-33630-5_12"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783319336299","9783319336305"],"references-count":42,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-33630-5_12","relation":{},"ISSN":["1868-4238","1868-422X"],"issn-type":[{"value":"1868-4238","type":"print"},{"value":"1868-422X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016]]},"assertion":[{"value":"11 May 2016","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}