{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T05:11:38Z","timestamp":1750137098679,"version":"3.40.3"},"publisher-location":"Singapore","reference-count":30,"publisher":"Springer Nature Singapore","isbn-type":[{"type":"print","value":"9789819997848"},{"type":"electronic","value":"9789819997855"}],"license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024]]},"DOI":"10.1007\/978-981-99-9785-5_40","type":"book-chapter","created":{"date-parts":[[2024,2,3]],"date-time":"2024-02-03T18:02:05Z","timestamp":1706983325000},"page":"579-592","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Email Reading Behavior-Informed Machine Learning Model to\u00a0Predict Phishing Susceptibility"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0009-0006-1600-8113","authenticated-orcid":false,"given":"Ning","family":"Xu","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0009-0007-5593-3106","authenticated-orcid":false,"given":"Jiluan","family":"Fan","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9163-7450","authenticated-orcid":false,"given":"Zikai","family":"Wen","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,2,4]]},"reference":[{"key":"40_CR1","doi-asserted-by":"publisher","DOI":"10.3389\/fcomp.2021.563060","volume":"3","author":"Z Alkhalil","year":"2021","unstructured":"Alkhalil, Z., Hewage, C., Nawaf, L., Khan, I.: Phishing attacks: a recent comprehensive study and a new anatomy. Front. Comput. Sci. 3, 563060 (2021)","journal-title":"Front. Comput. Sci."},{"key":"40_CR2","doi-asserted-by":"crossref","unstructured":"Aonzo, S., Merlo, A., Tavella, G., Fratantonio, Y.: Phishing attacks on modern android. In Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, pp. 1788\u20131801, 2018","DOI":"10.1145\/3243734.3243778"},{"issue":"3","key":"40_CR3","doi-asserted-by":"publisher","first-page":"706","DOI":"10.1016\/j.chb.2012.12.018","volume":"29","author":"NAG Arachchilage","year":"2013","unstructured":"Arachchilage, N.A.G., Love, S.: A game design framework for avoiding phishing attacks. Comput. Hum. Behav. 29(3), 706\u2013714 (2013)","journal-title":"Comput. Hum. Behav."},{"key":"40_CR4","doi-asserted-by":"publisher","first-page":"304","DOI":"10.1016\/j.chb.2014.05.046","volume":"38","author":"NAG Arachchilage","year":"2014","unstructured":"Arachchilage, N.A.G., Love, S.: Security awareness of computer users: a phishing threat avoidance perspective. Comput. Hum. Behav. 38, 304\u2013312 (2014)","journal-title":"Comput. Hum. Behav."},{"key":"40_CR5","doi-asserted-by":"publisher","first-page":"111","DOI":"10.1007\/978-1-4471-4784-8_7","volume-title":"Eye Gaze in Intelligent User Interfaces: Gaze-based Analyses, Models and Applications","author":"R Bednarik","year":"2013","unstructured":"Bednarik, R., Eivazi, S., Vrzakova, H.: A computational approach for prediction of problem-solving behavior using support vector machines and eye-tracking data. In: Nakano, Y.I., Conati, C., Bader, T. (eds.) Eye Gaze in Intelligent User Interfaces: Gaze-based Analyses, Models and Applications, pp. 111\u2013134. Springer London, London (2013). https:\/\/doi.org\/10.1007\/978-1-4471-4784-8_7"},{"key":"40_CR6","doi-asserted-by":"crossref","unstructured":"Bhattacharya, N., Rakshit, S., Gwizdka, J., Kogut, P.: Relevance prediction from eye-movements using semi-interpretable convolutional neural networks. In: Proceedings of the 2020 Conference on Human Information Interaction and Retrieval, pp. 223\u2013233, 2020","DOI":"10.1145\/3343413.3377960"},{"key":"40_CR7","doi-asserted-by":"crossref","unstructured":"Caputo, D.D., Pfleeger, S.L., Freeman, J D., Johnson, M.E.: Going spear phishing: Exploring embedded training and awareness. IEEE Secur. Priv. 12(1), 28\u201338, 2014","DOI":"10.1109\/MSP.2013.106"},{"issue":"1","key":"40_CR8","doi-asserted-by":"publisher","first-page":"11","DOI":"10.1007\/s42979-019-0011-2","volume":"1","author":"S Chanti","year":"2020","unstructured":"Chanti, S., Chithralekha, T.: Classification of anti-phishing solutions. SN Comput. Sci. 1(1), 11 (2020)","journal-title":"SN Comput. Sci."},{"key":"40_CR9","doi-asserted-by":"crossref","unstructured":"Cui, Q., Jourdan, G-V., Bochmann, G V., Couturier, R., Onut, I-V.: Tracking phishing attacks over time. In: Proceedings of the 26th International Conference on World Wide Web, pp. 667\u2013676, 2017","DOI":"10.1145\/3038912.3052654"},{"key":"40_CR10","doi-asserted-by":"crossref","unstructured":"Das, S., Christena, N-E., Camp, L.J.: Evaluating user susceptibility to phishing attacks. Inf. Comput. Secur. 30(1), 1\u201318, 2022","DOI":"10.1108\/ICS-12-2020-0204"},{"key":"40_CR11","unstructured":"John, B.D., Peacock, C., Zhang, T., Murdison, T.S., Benko, H., Jonker, T.R.: Towards gaze-based prediction of the intent to interact in virtual reality. In: ACM Symposium on Eye Tracking Research and Applications, pp. 1\u20137, 2021"},{"key":"40_CR12","doi-asserted-by":"crossref","unstructured":"Dhamija, R., Tygar, J.D., Hearst, M. :Why phishing works. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, pp. 581\u2013590, 2006","DOI":"10.1145\/1124772.1124861"},{"key":"40_CR13","doi-asserted-by":"crossref","unstructured":"Jr, R.C.D., Carver, C., Ferguson, A.J.:Phishing for user security awareness. Comput. Secur. 26(1):73\u201380, 2007","DOI":"10.1016\/j.cose.2006.10.009"},{"key":"40_CR14","doi-asserted-by":"crossref","unstructured":"Han, X., Kheir, N., Balzarotti, D. Phisheye: live monitoring of sandboxed phishing kits. In: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, pp. 1402\u20131413, 2016","DOI":"10.1145\/2976749.2978330"},{"key":"40_CR15","doi-asserted-by":"publisher","first-page":"1049","DOI":"10.3389\/fpsyg.2015.01049","volume":"6","author":"C-M Huang","year":"2015","unstructured":"Huang, C.-M., Andrist, S., Saupp\u00e9, A., Mutlu, B.: Using gaze patterns to predict task intent in collaboration. Front. Psychol. 6, 1049 (2015)","journal-title":"Front. Psychol."},{"key":"40_CR16","doi-asserted-by":"publisher","first-page":"2585","DOI":"10.1109\/TIFS.2022.3189530","volume":"17","author":"L Huang","year":"2022","unstructured":"Huang, L., Jia, S., Balcetis, E., Zhu, Q.: Advert: an adaptive and data-driven attention enhancement mechanism for phishing prevention. IEEE Trans. Inf. Forensics Secur. 17, 2585\u20132597 (2022)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"40_CR17","doi-asserted-by":"crossref","unstructured":"Ishii, R., Ooko, R., Nakano, Y.I., Nishida, T. Effectiveness of gaze-based engagement estimation in conversational agents. In: Eye Gaze in Intelligent User Interfaces: Gaze-Based Analyses, Models and Applications, pp. 85\u2013110, 2013","DOI":"10.1007\/978-1-4471-4784-8_6"},{"key":"40_CR18","doi-asserted-by":"crossref","unstructured":"Just, M.A., Carpenter, P.A.: A theory of reading: from eye fixations to comprehension. Psychol. Rev. 87(4):329, 1980","DOI":"10.1037\/\/0033-295X.87.4.329"},{"key":"40_CR19","unstructured":"Kay, R., phish, F.: Fake mandatory Covid-19 vaccine form, 2023. https:\/\/www.inky.com\/en\/blog\/fake-mandatory-Covid-19-vaccine-form"},{"issue":"1","key":"40_CR20","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/s40537-021-00552-5","volume":"9","author":"D Koggalahewa","year":"2022","unstructured":"Koggalahewa, D., Yue, X., Foo, E.: An unsupervised method for social network spammer detection based on user information interests. J. Big Data 9(1), 1\u201335 (2022)","journal-title":"J. Big Data"},{"key":"40_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"539","DOI":"10.1007\/978-3-642-02490-0_66","volume-title":"Advances in Neuro-Information Processing","author":"Daisuke Miyamoto","year":"2009","unstructured":"Miyamoto, Daisuke, Hazeyama, Hiroaki, Kadobayashi, Youki: An Evaluation of Machine Learning-Based Methods for Detection of Phishing Sites. In: K\u00f6ppen, Mario, Kasabov, Nikola, Coghill, George (eds.) ICONIP 2008. LNCS, vol. 5506, pp. 539\u2013546. Springer, Heidelberg (2009). https:\/\/doi.org\/10.1007\/978-3-642-02490-0_66"},{"issue":"5\u20136","key":"40_CR22","doi-asserted-by":"publisher","first-page":"183","DOI":"10.1016\/0925-2312(91)90023-5","volume":"2","author":"F Murtagh","year":"1991","unstructured":"Murtagh, F.: Multilayer perceptrons for classification and regression. Neurocomputing 2(5\u20136), 183\u2013197 (1991)","journal-title":"Neurocomputing"},{"key":"40_CR23","doi-asserted-by":"crossref","unstructured":"Sharma, P., Dash, B., Ansari, M F.: Anti-phishing techniques-a review of cyber defense mechanisms. Int. J. Adv. Res. Comput. Commun. Eng. ISO, 3297:2007, 2022","DOI":"10.17148\/IJARCCE.2022.11728"},{"key":"40_CR24","doi-asserted-by":"crossref","unstructured":"Sheng, S., et al.: Anti-Phishing Phil: the design and evaluation of a game that teaches people not to fall for phish. In: Proceedings of the 3rd Symposium on Usable Privacy and Security, pp 88\u201399, 2007","DOI":"10.1145\/1280680.1280692"},{"key":"40_CR25","unstructured":"Shie, E.W.S.: Critical analysis of current research aimed at improving detection of phishing attacks. Sel. Comput. Res. pap. 45, 2020"},{"key":"40_CR26","doi-asserted-by":"crossref","unstructured":"Stein, N., Bremer, G., Lappe, M.: Eye tracking-based LSTM for locomotion prediction in VR. In: 2022 IEEE Conference on Virtual Reality and 3D User Interfaces (VR), pp. 493\u2013503. IEEE, 2022","DOI":"10.1109\/VR51125.2022.00069"},{"key":"40_CR27","doi-asserted-by":"crossref","unstructured":"Subasi, A., Molah, E., Almkallawi, F., Chaudhery, T.J.: Intelligent phishing website detection using random forest classifier. In: 2017 International Conference on Electrical and Computing Technologies and Applications (ICECTA), pp. 1\u20135. IEEE, 2017","DOI":"10.1109\/ICECTA.2017.8252051"},{"key":"40_CR28","unstructured":"Vaswani, A., et al.: Attention is all you need. Advances in neural information processing systems, 30, 2017"},{"key":"40_CR29","doi-asserted-by":"crossref","unstructured":"Wei, P., Liu, Y., Shu, T., Zheng, N., Zhu, S-C.: Where and why are they looking? jointly inferring human attention and intentions in complex tasks. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp. 6801\u20136809, 2018","DOI":"10.1109\/CVPR.2018.00711"},{"key":"40_CR30","doi-asserted-by":"crossref","unstructured":"Wen, Z.A., Lin, Z., Chen, R., Andersen, E.: What. hack: engaging anti-phishing training through a role-playing phishisng simulation game. In: Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems, pp. 1\u201312, 2019","DOI":"10.1145\/3290605.3300338"}],"container-title":["Lecture Notes in Computer Science","Artificial Intelligence Security and Privacy"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-99-9785-5_40","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,2,3]],"date-time":"2024-02-03T18:14:37Z","timestamp":1706984077000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-99-9785-5_40"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"ISBN":["9789819997848","9789819997855"],"references-count":30,"URL":"https:\/\/doi.org\/10.1007\/978-981-99-9785-5_40","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2024]]},"assertion":[{"value":"4 February 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"AIS&P","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Artificial Intelligence Security and Privacy","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Guangzhou","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2023","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"3 December 2023","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"5 December 2023","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"1","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"ais&p2023","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/nsclab.org\/aisp2023","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Easychair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"115","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"40","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"35% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"11","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"23 large model and security workshop papers","order":10,"name":"additional_info_on_review_process","label":"Additional Info on Review Process","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}