{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,4]],"date-time":"2026-03-04T21:46:32Z","timestamp":1772660792289,"version":"3.50.1"},"reference-count":41,"publisher":"Informa UK Limited","issue":"2","funder":[{"DOI":"10.13039\/501100000266","name":"Engineering and Physical Sciences Research Council","doi-asserted-by":"publisher","award":["EP\/P011454\/1"],"award-info":[{"award-number":["EP\/P011454\/1"]}],"id":[{"id":"10.13039\/501100000266","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["www.tandfonline.com"],"crossmark-restriction":true},"short-container-title":["Behaviour &amp; Information Technology"],"published-print":{"date-parts":[[2019,2,1]]},"DOI":"10.1080\/0144929x.2018.1519599","type":"journal-article","created":{"date-parts":[[2018,9,7]],"date-time":"2018-09-07T17:25:04Z","timestamp":1536341104000},"page":"184-197","update-policy":"https:\/\/doi.org\/10.1080\/tandf_crossmark_01","source":"Crossref","is-referenced-by-count":59,"title":["How persuasive is phishing email? The role of authentic design, influence and current events in email judgements"],"prefix":"10.1080","volume":"38","author":[{"given":"Emma J.","family":"Williams","sequence":"first","affiliation":[{"name":"School of Management, University of Bath, Bath, UK"},{"name":"School of Experimental Psychology, University of Bristol, Bristol, UK"}]},{"given":"Danielle","family":"Polage","sequence":"additional","affiliation":[{"name":"School of Psychology, Central Washington University, Ellensburg, USA"}]}],"member":"301","published-online":{"date-parts":[[2018,9,7]]},"reference":[{"key":"CIT0001","doi-asserted-by":"publisher","DOI":"10.1080\/0144929X.2012.708787"},{"key":"CIT0002","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2014.05.046"},{"key":"CIT0003","doi-asserted-by":"publisher","DOI":"10.4236\/jss.2013.13004"},{"key":"CIT0004","unstructured":"BBC News. 2016. \u201cStudents Warned of New \u2018Phishing\u2019 Scam.\u201d Accessed January 30, 2017. http:\/\/www.bbc.co.uk\/news\/education-37408373."},{"key":"CIT0005","unstructured":"BBC News. 2017. \u201cUK Tourists Hit by Booking Scams up by Nearly a Fifth.\u201d Accessed May 7, 2017. http:\/\/www.bbc.co.uk\/news\/uk-39835874."},{"key":"CIT0006","doi-asserted-by":"publisher","DOI":"10.1037\/0096-3445.121.4.446"},{"key":"CIT0007","unstructured":"Butavicius, M., K. Parsons, M. Pattinson, and A. McCormac. 2015. \u201cBreaching the Human Firewall: Social Engineering in Phishing and Spear Phishing Emails.\u201d In Australasian Conference on Information Systems. arXiv:1606.00887."},{"key":"CIT0008","doi-asserted-by":"publisher","DOI":"10.1177\/0018720816665025"},{"key":"CIT0009","volume-title":"Influence: The Psychology of Persuasion","author":"Cialdini R.","year":"2007"},{"key":"CIT0010","doi-asserted-by":"publisher","DOI":"10.1038\/scientificamerican1062-93"},{"key":"CIT0011","doi-asserted-by":"publisher","DOI":"10.1145\/633292.633460"},{"key":"CIT0012","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0171620"},{"key":"CIT0013","doi-asserted-by":"publisher","DOI":"10.1108\/OIR-04-2015-0106"},{"key":"CIT0014","doi-asserted-by":"publisher","DOI":"10.1109\/HICSS.2016.696"},{"key":"CIT0015","doi-asserted-by":"publisher","DOI":"10.2307\/1914185"},{"key":"CIT0016","doi-asserted-by":"publisher","DOI":"10.1037\/0003-066X.39.4.341"},{"key":"CIT0017","doi-asserted-by":"publisher","DOI":"10.1016\/j.obhdp.2005.07.002"},{"key":"CIT0018","doi-asserted-by":"publisher","DOI":"10.1145\/1299015.1299022"},{"key":"CIT0019","doi-asserted-by":"publisher","DOI":"10.1111\/j.1460-2466.2000.tb02833.x"},{"key":"CIT0020","doi-asserted-by":"publisher","DOI":"10.1177\/0261927X14535916"},{"key":"CIT0021","doi-asserted-by":"publisher","DOI":"10.5465\/amr.1995.9508080335"},{"key":"CIT0022","doi-asserted-by":"publisher","DOI":"10.1111\/j.1460-2466.2010.01488.x"},{"key":"CIT0023","doi-asserted-by":"publisher","DOI":"10.1037\/h0031564"},{"key":"CIT0024","doi-asserted-by":"publisher","DOI":"10.1080\/0144929X.2016.1262897"},{"key":"CIT0025","doi-asserted-by":"publisher","DOI":"10.1145\/3025453.3025831"},{"key":"CIT0026","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-39218-4_27"},{"key":"CIT0027","doi-asserted-by":"publisher","DOI":"10.1108\/09685221211219173"},{"key":"CIT0028","doi-asserted-by":"publisher","DOI":"10.1145\/1753326.1753383"},{"key":"CIT0029","doi-asserted-by":"publisher","DOI":"10.1145\/1280680.1280692"},{"key":"CIT0030","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijhcs.2006.02.007"},{"key":"CIT0031","doi-asserted-by":"publisher","DOI":"10.1145\/1897852.1897872"},{"key":"CIT0032","doi-asserted-by":"publisher","DOI":"10.1016\/j.compedu.2016.08.002"},{"key":"CIT0033","doi-asserted-by":"publisher","DOI":"10.1111\/j.1460-2466.2011.01619.x"},{"key":"CIT0034","unstructured":"Verizon. 2016. \u201c2016 Data Breach Investigations Report.\u201d Accessed September 23, 2016. http:\/\/www.verizonenterprise.com\/verizon-insights-lab\/dbir\/."},{"key":"CIT0035","doi-asserted-by":"publisher","DOI":"10.1111\/j.1559-1816.2003.tb01951.x"},{"key":"CIT0036","doi-asserted-by":"publisher","DOI":"10.1111\/jcc4.12100"},{"key":"CIT0037","doi-asserted-by":"publisher","DOI":"10.1177\/0093650215627483"},{"key":"CIT0038","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2011.03.002"},{"key":"CIT0039","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2017.02.014"},{"key":"CIT0040","doi-asserted-by":"publisher","DOI":"10.1002\/asi.20779"},{"key":"CIT0041","doi-asserted-by":"publisher","DOI":"10.2753\/MIS0742-1222270111"}],"container-title":["Behaviour &amp; Information Technology"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.tandfonline.com\/doi\/pdf\/10.1080\/0144929X.2018.1519599","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,8,18]],"date-time":"2020-08-18T09:53:28Z","timestamp":1597744408000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.tandfonline.com\/doi\/full\/10.1080\/0144929X.2018.1519599"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,9,7]]},"references-count":41,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2019,2,1]]}},"alternative-id":["10.1080\/0144929X.2018.1519599"],"URL":"https:\/\/doi.org\/10.1080\/0144929x.2018.1519599","relation":{},"ISSN":["0144-929X","1362-3001"],"issn-type":[{"value":"0144-929X","type":"print"},{"value":"1362-3001","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,9,7]]},"assertion":[{"value":"The publishing and review policy for this title is described in its Aims & Scope.","order":1,"name":"peerreview_statement","label":"Peer Review Statement"},{"value":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=tbit20","URL":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=tbit20","order":2,"name":"aims_and_scope_url","label":"Aim & Scope"},{"value":"2017-08-02","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2018-08-30","order":2,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2018-09-07","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}