{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T05:08:30Z","timestamp":1750136910107,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":35,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642393440"},{"type":"electronic","value":"9783642393457"}],"license":[{"start":{"date-parts":[[2013,1,1]],"date-time":"2013-01-01T00:00:00Z","timestamp":1356998400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-642-39345-7_17","type":"book-chapter","created":{"date-parts":[[2013,7,1]],"date-time":"2013-07-01T12:08:43Z","timestamp":1372680523000},"page":"155-166","source":"Crossref","is-referenced-by-count":3,"title":["Click Me If You Can!"],"prefix":"10.1007","author":[{"given":"Thomas","family":"Pfeiffer","sequence":"first","affiliation":[]},{"given":"Heike","family":"Theuerling","sequence":"additional","affiliation":[]},{"given":"Michaela","family":"Kauer","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"17_CR1","unstructured":"Pfeiffer, T., Kauer, M., Bruder, R.: Integrating e-commerce and social engineering perspectives on trust in online communication. In: Workshop \u201cUser-centered Trust in Interactive Systems\u201d at NordiCHI 2012, Copenhagen (2012), http:\/\/tuprints.ulb.tu-darmstadt.de\/id\/eprint\/3249"},{"key":"17_CR2","unstructured":"Tsow, A., Jakobsson, M.: Deceit and deception: A large user study of phishing (retrieved September 9, 2007)"},{"key":"17_CR3","doi-asserted-by":"crossref","unstructured":"Kumaraguru, P., Acquisti, A., Cranor, L.F.: Trust modelling for online transactions: a phishing scenario. In: Proceedings of the 2006 International Conference on Privacy, Security and Trust: Bridge the Gap Between PST Technologies and Business Services, PST 2006, pp. 11:1\u201311:9. ACM, New York (2006)","DOI":"10.1145\/1501434.1501448"},{"issue":"2","key":"17_CR4","doi-asserted-by":"publisher","first-page":"179","DOI":"10.1016\/0749-5978(91)90020-T","volume":"50","author":"I. Ajzen","year":"1991","unstructured":"Ajzen, I.: The theory of planned behavior. Organizational Behavior and Human Decision Processes\u00a050(2), 179\u2013211 (1991)","journal-title":"Organizational Behavior and Human Decision Processes"},{"issue":"2","key":"17_CR5","doi-asserted-by":"publisher","first-page":"544","DOI":"10.1016\/j.dss.2007.07.001","volume":"44","author":"D.J. Kim","year":"2008","unstructured":"Kim, D.J., Ferrin, D.L., Rao, H.R.: A trust-based consumer decision-making model in electronic commerce: The role of trust, perceived risk, and their antecedents. Decision Support Systems\u00a044(2), 544\u2013564 (2008)","journal-title":"Decision Support Systems"},{"issue":"3-4","key":"17_CR6","doi-asserted-by":"publisher","first-page":"297","DOI":"10.1016\/S0963-8687(02)00020-3","volume":"11","author":"D. Harrison McKnight","year":"2002","unstructured":"Harrison McKnight, D., Choudhury, V., Kacmar, C.: The impact of initial consumer trust on intentions to transact with a web site: a trust building model. The Journal of Strategic Information Systems\u00a011(3-4), 297\u2013323 (2002)","journal-title":"The Journal of Strategic Information Systems"},{"issue":"6","key":"17_CR7","doi-asserted-by":"publisher","first-page":"818","DOI":"10.1108\/14684520810923953","volume":"32","author":"H.H. Chang","year":"2008","unstructured":"Chang, H.H., Chen, S.W.: The impact of online store environment cues on purchase intention: Trust and perceived risk as a mediator. Online Information Review\u00a032(6), 818\u2013841 (2008)","journal-title":"Online Information Review"},{"issue":"2","key":"17_CR8","doi-asserted-by":"publisher","first-page":"47","DOI":"10.2753\/JEC1086-4415150202","volume":"15","author":"S. Glover","year":"2010","unstructured":"Glover, S., Benbasat, I.: A comprehensive model of perceived risk of e-commerce transactions. International Journal of Electronic Commerce\u00a015(2), 47\u201378 (2010)","journal-title":"International Journal of Electronic Commerce"},{"issue":"3","key":"17_CR9","doi-asserted-by":"publisher","first-page":"308","DOI":"10.1177\/0092070304271004","volume":"34","author":"K. Aiken","year":"2006","unstructured":"Aiken, K., Boush, D.: Trustmarks, objective-source ratings, and implied investments in advertising: Investigating online trust and the context-specific nature of internet signals. Journal of the Academy of Marketing Science\u00a034(3), 308\u2013323 (2006)","journal-title":"Journal of the Academy of Marketing Science"},{"issue":"4","key":"17_CR10","doi-asserted-by":"publisher","first-page":"1838","DOI":"10.1016\/j.chb.2005.11.003","volume":"23","author":"M. Horst","year":"2007","unstructured":"Horst, M., Kuttschreuter, M., Gutteling, J.M.: Perceived usefulness, personal experiences, risk perception and trust as determinants of adoption of e-government services in the netherlands. Computers in Human Behavior\u00a023(4), 1838\u20131852 (2007)","journal-title":"Computers in Human Behavior"},{"issue":"4","key":"17_CR11","doi-asserted-by":"publisher","first-page":"451","DOI":"10.1016\/S1071-5819(03)00111-3","volume":"59","author":"M.S. Featherman","year":"2003","unstructured":"Featherman, M.S., Pavlou, P.A.: Predicting e-services adoption: a perceived risk facets perspective. International Journal of Human-Computer Studies\u00a059(4), 451\u2013474 (2003)","journal-title":"International Journal of Human-Computer Studies"},{"key":"17_CR12","doi-asserted-by":"crossref","unstructured":"Hardee, J., Mayhorn, C., West, R.: I downloaded what?: An examination of computer security decisions. In: Proceedings of the Human Factors and Ergonomics Society Annual Meeting, vol.\u00a050, pp. 1817\u20131820 (2006)","DOI":"10.1177\/154193120605001721"},{"issue":"1","key":"17_CR13","doi-asserted-by":"crossref","first-page":"33","DOI":"10.1017\/S1930297500000334","volume":"1","author":"A.R. Blais","year":"2006","unstructured":"Blais, A.R., Weber, E.U.: A domain-specific risk-taking (DOSPERT) scale for adult populations. Judgment and Decision Making\u00a01(1), 33\u201347 (2006)","journal-title":"Judgment and Decision Making"},{"key":"17_CR14","doi-asserted-by":"publisher","first-page":"211","DOI":"10.1177\/0963721411415790","volume":"20","author":"B. Figner","year":"2011","unstructured":"Figner, B., Weber, E.U.: Who takes risks when and why? Current Directions in Psychological Science\u00a020, 211\u2013216 (2011)","journal-title":"Current Directions in Psychological Science"},{"key":"17_CR15","doi-asserted-by":"crossref","unstructured":"Weber, E., Hsee, C.: Cross-cultural differences in risk perception, but cross-cultural similarities in attitudes towards perceived risk. Management Science, 1205\u20131217 (1998)","DOI":"10.1287\/mnsc.44.9.1205"},{"key":"17_CR16","first-page":"399","volume-title":"Proceedings of the 18th Conference on USENIX Security Symposium, SSYM 2009","author":"J. Sunshine","year":"2009","unstructured":"Sunshine, J., Egelman, S., Almuhimedi, H., Atri, N., Cranor, L.F.: Crying wolf: an empirical study of SSL warning effectiveness. In: Proceedings of the 18th Conference on USENIX Security Symposium, SSYM 2009, pp. 399\u2013416. USENIX Association, Berkeley (2009)"},{"issue":"4","key":"17_CR17","doi-asserted-by":"publisher","first-page":"263","DOI":"10.1002\/bdm.414","volume":"15","author":"E. Weber","year":"2002","unstructured":"Weber, E., Blais, A., Betz, N.: A domain-specific risk-attitude scale: Measuring risk perceptions and risk behaviors. Journal of Behavioral Decision Making\u00a015(4), 263\u2013290 (2002)","journal-title":"Journal of Behavioral Decision Making"},{"issue":"4","key":"17_CR18","doi-asserted-by":"publisher","first-page":"300","DOI":"10.1111\/j.1467-9280.2006.01702.x","volume":"17","author":"Y. Hanoch","year":"2006","unstructured":"Hanoch, Y., Johnson, J.G., Wilke, A.: Domain specificity in experimental measures and participant recruitment an application to risk-taking behavior. Psychological Science\u00a017(4), 300\u2013304 (2006)","journal-title":"Psychological Science"},{"issue":"1","key":"17_CR19","doi-asserted-by":"publisher","first-page":"171","DOI":"10.1016\/j.jesp.2010.08.007","volume":"47","author":"A.M. Evans","year":"2011","unstructured":"Evans, A.M., Krueger, J.I.: Elements of trust: Risk and perspective-taking. Journal of Experimental Social Psychology\u00a047(1), 171\u2013177 (2011)","journal-title":"Journal of Experimental Social Psychology"},{"key":"17_CR20","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/997078.997097","volume-title":"Proceedings of the 2003 Conference on Designing for User Experiences, DUX 2003","author":"B.J. Fogg","year":"2003","unstructured":"Fogg, B.J., Soohoo, C., Danielson, D.R., Marable, L., Stanford, J., Tauber, E.R.: How do users evaluate the credibility of web sites?: a study with over 2,500 participants. In: Proceedings of the 2003 Conference on Designing for User Experiences, DUX 2003, pp. 1\u201315. ACM, New York (2003)"},{"key":"17_CR21","doi-asserted-by":"crossref","unstructured":"Mayer, R.C., Davis, J.H., Schoorman, F.D.: An integrative model of organizational trust. Academy of Management Review, 709\u2013734 (1995)","DOI":"10.5465\/amr.1995.9508080335"},{"issue":"3","key":"17_CR22","doi-asserted-by":"publisher","first-page":"287","DOI":"10.1007\/s10869-004-2229-8","volume":"19","author":"H. Gill","year":"2005","unstructured":"Gill, H., Boies, K., Finegan, J.E., McNally, J.: Antecedents of trust: Establishing a boundary condition for the relation between propensity to trust and intention to trust. Journal of Business and Psychology\u00a019(3), 287\u2013302 (2005)","journal-title":"Journal of Business and Psychology"},{"key":"17_CR23","doi-asserted-by":"publisher","first-page":"337","DOI":"10.1108\/13632541011090446","volume":"14","author":"S. Bekmeier-Feuerhahn","year":"2010","unstructured":"Bekmeier-Feuerhahn, S., Eichenlaub, A.: What makes for trusting relationships in online communication? Journal of Communication Management\u00a014, 337\u2013355 (2010)","journal-title":"Journal of Communication Management"},{"issue":"4","key":"17_CR24","doi-asserted-by":"publisher","first-page":"662","DOI":"10.1002\/asi.20779","volume":"59","author":"M. Workman","year":"2008","unstructured":"Workman, M.: Wisecrackers: A theory-grounded investigation of phishing and pretext social engineering threats to information security. Journal of the American Society for Information Science and Technology\u00a059(4), 662\u2013674 (2008)","journal-title":"Journal of the American Society for Information Science and Technology"},{"issue":"2","key":"17_CR25","doi-asserted-by":"publisher","first-page":"133","DOI":"10.1509\/jmkg.70.2.133","volume":"70","author":"A.E. Schlosser","year":"2006","unstructured":"Schlosser, A.E., White, T.B., Lloyd, S.M.: Converting web site visitors into buyers: How web site investment increases consumer trusting beliefs and online purchase intentions. Journal of Marketing\u00a070(2), 133\u2013148 (2006)","journal-title":"Journal of Marketing"},{"issue":"1","key":"17_CR26","doi-asserted-by":"publisher","first-page":"159","DOI":"10.1016\/j.im.2003.12.009","volume":"42","author":"R. Walczuch","year":"2004","unstructured":"Walczuch, R., Lundgren, H.: Psychological antecedents of institution-based consumer trust in e-retailing. Information & Management\u00a042(1), 159\u2013177 (2004)","journal-title":"Information & Management"},{"key":"17_CR27","doi-asserted-by":"crossref","unstructured":"Yang, Y., Hu, Y., Chen, J.: A web trust-inducing model for e-commerce and empirical research. In: Proceedings of the 7th International Conference on Electronic Commerce, ICEC 2005, pp. 188\u2013194. ACM, New York (2005)","DOI":"10.1145\/1089551.1089589"},{"key":"17_CR28","first-page":"2075","volume-title":"CHI 2011","author":"E. Lin","year":"2011","unstructured":"Lin, E., Greenberg, S., Trotter, E., Ma, D., Aycock, J.: Does domain highlighting help people identify phishing sites? In: CHI 2011, pp. 2075\u20132084. ACM, New York (2011)"},{"key":"17_CR29","doi-asserted-by":"publisher","first-page":"79","DOI":"10.1145\/1143120.1143131","volume-title":"Proceedings of the Second Symposium on Usable Privacy and Security, SOUPS 2006","author":"J.S. Downs","year":"2006","unstructured":"Downs, J.S., Holbrook, M.B., Cranor, L.F.: Decision strategies and susceptibility to phishing. In: Proceedings of the Second Symposium on Usable Privacy and Security, SOUPS 2006, pp. 79\u201390. ACM, New York (2006)"},{"key":"17_CR30","unstructured":"Karakasiliotis, A., Furnell, S., Papadaki, M.: Assessing end-user awareness of social engineering and phishing. In: Information Warfare and Security Conference, pp. 60\u201372 (2006)"},{"key":"17_CR31","first-page":"581","volume-title":"Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, CHI 2006","author":"R. Dhamija","year":"2006","unstructured":"Dhamija, R., Tygar, J.D., Hearst, M.: Why phishing works. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, CHI 2006, pp. 581\u2013590. ACM, New York (2006)"},{"issue":"10","key":"17_CR32","doi-asserted-by":"publisher","first-page":"94","DOI":"10.1145\/1290958.1290968","volume":"50","author":"T.N. Jagatic","year":"2007","unstructured":"Jagatic, T.N., Johnson, N.A., Jakobsson, M., Menczer, F.: Social phishing. Commun. ACM\u00a050(10), 94\u2013100 (2007)","journal-title":"Commun. ACM"},{"issue":"3","key":"17_CR33","doi-asserted-by":"publisher","first-page":"576","DOI":"10.1016\/j.dss.2011.03.002","volume":"51","author":"A. Vishwanath","year":"2011","unstructured":"Vishwanath, A., Herath, T., Chen, R., Wang, J., Rao, H.R.: Why do people get phished? testing individual differences in phishing vulnerability within an integrated, information processing model. Decision Support Systems\u00a051(3), 576\u2013586 (2011)","journal-title":"Decision Support Systems"},{"key":"17_CR34","doi-asserted-by":"publisher","first-page":"37","DOI":"10.1145\/1299015.1299019","volume-title":"Proceedings of the Anti-Phishing Working Groups 2nd Annual eCrime Researchers Summit, eCrime 2007","author":"J.S. Downs","year":"2007","unstructured":"Downs, J.S., Holbrook, M., Cranor, L.F.: Behavioral response to phishing risk. In: Proceedings of the Anti-Phishing Working Groups 2nd Annual eCrime Researchers Summit, eCrime 2007, pp. 37\u201344. ACM, New York (2007)"},{"key":"17_CR35","first-page":"373","volume-title":"Proceedings of the 28th International Conference on Human Factors in Computing Systems, CHI 2010","author":"S. Sheng","year":"2010","unstructured":"Sheng, S., Holbrook, M., Kumaraguru, P., Cranor, L.F., Downs, J.: Who falls for phish?: a demographic analysis of phishing susceptibility and effectiveness of interventions. In: Proceedings of the 28th International Conference on Human Factors in Computing Systems, CHI 2010, pp. 373\u2013382. ACM, New York (2010)"}],"container-title":["Lecture Notes in Computer Science","Human Aspects of Information Security, Privacy, and Trust"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-39345-7_17","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,7,2]],"date-time":"2023-07-02T19:51:55Z","timestamp":1688327515000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-39345-7_17"}},"subtitle":["When Do Users Follow a Call to Action in an Online Message?"],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783642393440","9783642393457"],"references-count":35,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-39345-7_17","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2013]]}}}