{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T17:12:17Z","timestamp":1743009137462,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":29,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783662493007"},{"type":"electronic","value":"9783662493014"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-662-49301-4_13","type":"book-chapter","created":{"date-parts":[[2016,3,18]],"date-time":"2016-03-18T11:15:43Z","timestamp":1458299743000},"page":"177-194","source":"Crossref","is-referenced-by-count":0,"title":["SpoofKiller: You Can Teach People How to Pay, but Not How to Pay Attention"],"prefix":"10.1007","author":[{"given":"Markus","family":"Jakobsson","sequence":"first","affiliation":[]},{"given":"Hossein","family":"Siadati","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,3,18]]},"reference":[{"unstructured":"Chou, N., Ledesma, R., Teraguchi, Y., Boneh, D., Mitchell, J.C.: Client-side defense against web-based identity theft (2004)","key":"13_CR1"},{"unstructured":"Daniel, P.: Android users demographics, 19 November 2010. \n                      http:\/\/www.phonearena.com\/news\/Android-users-demographics_id14786\/","key":"13_CR2"},{"doi-asserted-by":"crossref","unstructured":"Dhamija, R., Tygar, J.D.: The battle against phishing: dynamic security skins. In: Proceedings of the 2005 Symposium on Usable Privacy and Security, SOUPS 2005. ACM, New York, pp. 77\u201388 (2005)","key":"13_CR3","DOI":"10.1145\/1073001.1073009"},{"doi-asserted-by":"crossref","unstructured":"Dhamija, R., Tygar, J.D., Hearst, M.: Why phishing works. In: Proceedings of the SIGCHI Conference on Human Factors Incomputing Systems, CHI 2006. ACM, New York, pp. 581\u2013590 (2006)","key":"13_CR4","DOI":"10.1145\/1124772.1124861"},{"unstructured":"Felten, E.W., Balfanz, D., Dean, D., Wallach, D.S.: Web spoofing: an internet con game. Technical report 540-96, Department of Computer Science, Princeton University, February 1997. \n                      http:\/\/www.cs.princeton.edu\/sip\/pub\/spoofing.pdf","key":"13_CR5"},{"doi-asserted-by":"crossref","unstructured":"Fette, I., Sadeh, N., Tomasic, A.: Learning to detect phishing emails. In: Proceedings of the 16th International Conference on World Wide Web, WWW 2007. ACM, New York, pp. 649\u2013656 (2007)","key":"13_CR6","DOI":"10.1145\/1242572.1242660"},{"unstructured":"Fulcher, E.: Cognitive psychology (2003). \n                      http:\/\/www.eamonfulcher.com\/CogPsych\/page5.htm","key":"13_CR7"},{"doi-asserted-by":"crossref","unstructured":"Garera, S., Provos, N., Chew, M., Rubin, A.D.: A framework for detection and measurement of phishing attacks. In: Proceedings of the 2007 ACM Workshop on Recurring Malcode, WORM 2007. ACM, New York, pp. 1\u20138 (2007)","key":"13_CR8","DOI":"10.1145\/1314389.1314391"},{"doi-asserted-by":"crossref","unstructured":"Garfinkel, S.L., Miller, R.C.: Johnny 2: a user test of key continuity management with s\/mime and outlook express. In: Proceedings of the 2005 Symposium on Usable Privacy and Security, SOUPS 2005. ACM, New York, pp. 13\u201324 (2005)","key":"13_CR9","DOI":"10.1145\/1073001.1073003"},{"unstructured":"Goldberg, I.: e-gold stomps on phishing?, July 2004. \n                      http:\/\/www.financialcryptography.com\/mt\/archives\/000190.html","key":"13_CR10"},{"issue":"1\u20132","key":"13_CR11","doi-asserted-by":"publisher","first-page":"63","DOI":"10.1016\/j.cose.2008.09.007","volume":"28","author":"A Herzberg","year":"2009","unstructured":"Herzberg, A.: Why Johnny can\u2019t surf (safely)? attacks and defenses for web users. Comput. Secur. 28(1\u20132), 63\u201371 (2009)","journal-title":"Comput. Secur."},{"unstructured":"Herzberg, A., Gbara, A.: Security and identification indicators for browsers against spoofing and phishing attacks. Cryptology ePrint Archive, Report 2004\/155 (2004)","key":"13_CR12"},{"unstructured":"Ivan Petrovich Pavlov, G.V.A.: Conditioned reflexes : an investigation of the physiological activity of the cerebral cortex. Dover Publications, September 2003","key":"13_CR13"},{"key":"13_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"281","DOI":"10.1007\/978-3-540-77366-5_27","volume-title":"Financial Cryptography and Data Security","author":"C Jackson","year":"2007","unstructured":"Jackson, C., Simon, D.R., Tan, D.S., Barth, A.: An evaluation of extended validation and picture-in-picture phishing attacks. In: Dietrich, S., Dhamija, R. (eds.) FC 2007 and USEC 2007. LNCS, vol. 4886, pp. 281\u2013293. Springer, Heidelberg (2007)"},{"issue":"10","key":"13_CR15","doi-asserted-by":"publisher","first-page":"94","DOI":"10.1145\/1290958.1290968","volume":"50","author":"TN Jagatic","year":"2007","unstructured":"Jagatic, T.N., Johnson, N.A., Jakobsson, M., Menczer, F.: Social phishing. Commun. ACM 50(10), 94\u2013100 (2007)","journal-title":"Commun. ACM"},{"doi-asserted-by":"crossref","unstructured":"Jakobsson, M., Ratkiewicz, J.: Designing ethical phishing experiments: a study of (ROT13) rOnl query features. In: WWW 2006: Proceedings of the 15th International Conference on World Wide Web. ACM, New York, pp. 513\u2013522 (2006)","key":"13_CR16","DOI":"10.1145\/1135777.1135853"},{"key":"13_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"356","DOI":"10.1007\/978-3-540-77366-5_32","volume-title":"Financial Cryptography and Data Security","author":"M Jakobsson","year":"2007","unstructured":"Jakobsson, M., Tsow, A., Shah, A., Blevis, E., Lim, Y.: What instills trust? a qualitative study of phishing. In: Dietrich, S., Dhamija, R. (eds.) FC 2007 and USEC 2007. LNCS, vol. 4886, pp. 356\u2013361. Springer, Heidelberg (2007)"},{"issue":"2","key":"13_CR18","doi-asserted-by":"publisher","first-page":"24","DOI":"10.1109\/MSP.2011.179","volume":"10","author":"I Kirlappos","year":"2011","unstructured":"Kirlappos, I., Sasse, M.A.: Security education against phishing: a modest proposal for a major re-think. IEEE Secur. Priv. 10(2), 24\u201332 (2011)","journal-title":"IEEE Secur. Priv."},{"doi-asserted-by":"crossref","unstructured":"Kumaraguru, P., Rhee, Y., Sheng, S., Hasan, S., Acquisti, A., Cranor, L.F., Hong, J.: Getting users to pay attention to anti-phishing education: evaluationof retention and transfer. In: Proceedings of the Anti-phishing Working Groups 2nd Annual eCrime Researchers Summit, eCrime 2007. ACM, New York, pp. 70\u201381 (2007)","key":"13_CR19","DOI":"10.1145\/1299015.1299022"},{"key":"13_CR20","doi-asserted-by":"publisher","first-page":"43","DOI":"10.1504\/IJSN.2009.023425","volume":"4","author":"JM McCune","year":"2009","unstructured":"McCune, J.M., Perrig, A., Reiter, M.K.: Seeing is believing; using camera phones for human verifiable authentication. Int. J. Secur. Netw. 4, 43\u201356 (2009)","journal-title":"Int. J. Secur. Netw."},{"key":"13_CR21","doi-asserted-by":"publisher","first-page":"381","DOI":"10.1016\/j.ijhcs.2005.01.001","volume":"62","author":"J Riegelsberger","year":"2005","unstructured":"Riegelsberger, J., Sasse, M.A., McCarthy, J.D.: The mechanics of trust: a framework for research and design. Int. J. Hum.-Comput. Stud. 62, 381\u2013422 (2005)","journal-title":"Int. J. Hum.-Comput. Stud."},{"unstructured":"Ross, B., Jackson, C., Miyake, N., Boneh, D., Mitchell, J.C.: Stronger password authentication using browser extensions. In: Proceedings of the 14th Conference on USENIX Security Symposium. USENIX Association, Berkeley, vol. 14, p. 2 (2005)","key":"13_CR22"},{"issue":"2","key":"13_CR23","doi-asserted-by":"publisher","first-page":"137","DOI":"10.1080\/01611190701743724","volume":"32","author":"S Srikwan","year":"2008","unstructured":"Srikwan, S., Jakobsson, M.: Using cartoons to teach Internet security. Cryptologia 32(2), 137\u2013154 (2008)","journal-title":"Cryptologia"},{"key":"13_CR24","doi-asserted-by":"publisher","first-page":"70","DOI":"10.1145\/1897852.1897872","volume":"54","author":"F Stajano","year":"2011","unstructured":"Stajano, F., Wilson, P.: Understanding scam victims: seven principles for systems security. Commun. ACM 54, 70\u201375 (2011)","journal-title":"Commun. ACM"},{"doi-asserted-by":"crossref","unstructured":"Wash, R.: Folk models of home computer security. In: Proceedings of the Sixth Symposium on Usable Privacy and Security, SOUPS 2010. ACM, New York, pp. 11:1\u201311:16 (2010)","key":"13_CR25","DOI":"10.1145\/1837110.1837125"},{"unstructured":"Whalen, T., Inkpen, K.M.: Gathering evidence: use of visual security cues in web browsers. In: Proceedings of Graphics Interface 2005, GI 2005, School of Computer Science, University of Waterloo. Canadian Human-Computer Communications Society, Waterloo, Ontario, Canada, pp. 137\u2013144 (2005)","key":"13_CR26"},{"unstructured":"Woolston, L.: Mobclix index: android marketplace, 17 November 2010. \n                      http:\/\/blog.mobclix.com\/2010\/11\/17\/mobclix-index-android-marketplace\/","key":"13_CR27"},{"doi-asserted-by":"crossref","unstructured":"Wu, M., Miller, R.C., Garfinkel, S.L.: Do security toolbars actually prevent phishing attacks? In: Proceedings of the SIGCHI Conference on Human Factors Incomputing Systems, CHI 2006. ACM, New York, pp. 601\u2013610 (2006)","key":"13_CR28","DOI":"10.1145\/1124772.1124863"},{"doi-asserted-by":"crossref","unstructured":"Wu, M., Miller, R.C., Little, G.: Web wallet: preventing phishing attacks by revealing user intentions. In: Proceedings of the Second Symposium on Usable Privacy and Security, SOUPS 2006. ACM, New York, pp. 102\u2013113 (2006)","key":"13_CR29","DOI":"10.1145\/1143120.1143133"}],"container-title":["Lecture Notes in Computer Science","The New Codebreakers"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-662-49301-4_13","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,1]],"date-time":"2019-06-01T14:51:28Z","timestamp":1559400688000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-662-49301-4_13"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783662493007","9783662493014"],"references-count":29,"URL":"https:\/\/doi.org\/10.1007\/978-3-662-49301-4_13","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2016]]}}}