{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,5]],"date-time":"2026-03-05T19:18:24Z","timestamp":1772738304421,"version":"3.50.1"},"reference-count":85,"publisher":"Informa UK Limited","issue":"4","license":[{"start":{"date-parts":[[2025,7,14]],"date-time":"2025-07-14T00:00:00Z","timestamp":1752451200000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0\/"}],"funder":[{"DOI":"10.13039\/100015539","name":"Australian Government","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100015539","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["www.tandfonline.com"],"crossmark-restriction":true},"short-container-title":["Behaviour &amp; Information Technology"],"published-print":{"date-parts":[[2026,2,25]]},"DOI":"10.1080\/0144929x.2025.2530012","type":"journal-article","created":{"date-parts":[[2025,7,14]],"date-time":"2025-07-14T08:02:47Z","timestamp":1752480167000},"page":"728-753","update-policy":"https:\/\/doi.org\/10.1080\/tandf_crossmark_01","source":"Crossref","is-referenced-by-count":0,"title":["Forest or trees? Evidence for global processing via an information board study into cues utilised in phishing identification"],"prefix":"10.1080","volume":"45","author":[{"ORCID":"https:\/\/orcid.org\/0009-0007-9963-9611","authenticated-orcid":false,"given":"Daniel","family":"Conway","sequence":"first","affiliation":[{"name":"University of Technology Sydney","place":["Sydney, Australia"]}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5138-6749","authenticated-orcid":false,"given":"Kun","family":"Yu","sequence":"additional","affiliation":[{"name":"University of Technology Sydney","place":["Sydney, Australia"]}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0722-3912","authenticated-orcid":false,"given":"Marcus","family":"Butavicius","sequence":"additional","affiliation":[{"name":"Defence Science and Technology Group, Department of Defence","place":["Adelaide, Australia"]}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4971-8729","authenticated-orcid":false,"given":"Fang","family":"Chen","sequence":"additional","affiliation":[{"name":"University of Technology Sydney","place":["Sydney, Australia"]}]},{"given":"Anna","family":"Hepworth","sequence":"additional","affiliation":[{"name":"Curtin University","place":["Perth, Australia"]}]}],"member":"301","published-online":{"date-parts":[[2025,7,14]]},"reference":[{"key":"e_1_3_2_2_1","doi-asserted-by":"publisher","DOI":"10.3127\/AJIS.V26I0.3615"},{"key":"e_1_3_2_3_1","unstructured":"Akbar N. 2014. \u201cAnalysing Persuasion Principles in Phishing Emails.\u201d Master thesis University of Twente. http:\/\/essay.utwente.nl\/66177\/."},{"key":"e_1_3_2_4_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cognition.2016.10.014"},{"key":"e_1_3_2_5_1","doi-asserted-by":"publisher","DOI":"10.1080\/13546783.2018.1507949"},{"key":"e_1_3_2_6_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-54455-3_5"},{"key":"e_1_3_2_7_1","doi-asserted-by":"publisher","DOI":"10.1080\/02699930500203369"},{"key":"e_1_3_2_8_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jesp.2005.09.005"},{"key":"e_1_3_2_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/1978942.1979459"},{"key":"e_1_3_2_10_1","doi-asserted-by":"publisher","DOI":"10.1108\/ICS-03-2017-0009"},{"key":"e_1_3_2_11_1","doi-asserted-by":"publisher","DOI":"10.34190\/iccws.17.1.28"},{"key":"e_1_3_2_12_1","unstructured":"Butavicius M. K. Parsons M. Pattinson and A. McCormac. 2016. \u201cBreaching the Human Firewall: Social Engineering in Phishing and Spear-Phishing Emails.\u201d arXiv:1606.00887 [Cs]. http:\/\/arxiv.org\/abs\/1606.00887."},{"key":"e_1_3_2_13_1","doi-asserted-by":"publisher","DOI":"10.1177\/0018720816665025"},{"key":"e_1_3_2_14_1","unstructured":"Carpenter Perry. 2023. Cyber Mindfulness: How to Face Cyber Risks and Human Error. https:\/\/www.forbes.com\/sites\/forbesbusinesscouncil\/2023\/06\/26\/cyber-mindfulness-How-to-face-cyber-risks-and-human-error\/."},{"key":"e_1_3_2_15_1","doi-asserted-by":"publisher","DOI":"10.1037\/0022-3514.39.5.752"},{"key":"e_1_3_2_16_1","doi-asserted-by":"publisher","DOI":"10.3390\/su13041651"},{"key":"e_1_3_2_17_1","volume-title":"The Psychology of Persuasion","author":"Cialdini R. B.","year":"1993","unstructured":"Cialdini, R. B. 1993. The Psychology of Persuasion. New York: HaperCollins."},{"key":"e_1_3_2_18_1","unstructured":"Collard A. 2023. \u201cMindfulness in Cybersecurity Culture.\u201d AnnaCollard February 20. https:\/\/www.annacollard.com\/post\/mindfulness-in-cybersecurity-culture."},{"key":"e_1_3_2_19_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-38530-8_25"},{"key":"e_1_3_2_20_1","doi-asserted-by":"publisher","DOI":"10.1080\/02724980543000123"},{"key":"e_1_3_2_21_1","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0015954"},{"key":"e_1_3_2_22_1","doi-asserted-by":"publisher","DOI":"10.1080\/00332747.1969.11023575"},{"key":"e_1_3_2_23_1","doi-asserted-by":"publisher","DOI":"10.1177\/1745691612460685"},{"key":"e_1_3_2_24_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-20376-8_4"},{"key":"e_1_3_2_25_1","doi-asserted-by":"publisher","DOI":"10.14722\/usec.2018.23016"},{"key":"e_1_3_2_26_1","doi-asserted-by":"publisher","DOI":"10.1080\/00223891.2015.1132426"},{"key":"e_1_3_2_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/HICSS.2016.696"},{"key":"e_1_3_2_28_1","first-page":"35","volume-title":"Decision Making","author":"Harte J. M.","year":"2002","unstructured":"Harte, J. M., and P. Koele. 2002. \u201cPsychometric and Methodological Aspects of Process Tracing Research.\u201d In Decision Making, edited by R. Crozier, R. Ranyard, and O. Svenson, 35\u201348. Routledge."},{"key":"e_1_3_2_29_1","doi-asserted-by":"publisher","DOI":"10.3758\/BF03198553"},{"key":"e_1_3_2_30_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jesp.2003.06.003"},{"issue":"1","key":"e_1_3_2_31_1","first-page":"1","article-title":"The Human Factor in Phishing","volume":"7","author":"Jakobsson M.","year":"2007","unstructured":"Jakobsson, M. 2007. \u201cThe Human Factor in Phishing.\u201d Privacy & Security of Consumer Information 7 (1): 1\u201319.","journal-title":"Privacy & Security of Consumer Information"},{"key":"e_1_3_2_32_1","doi-asserted-by":"publisher","DOI":"10.5121\/csit.2022.121319"},{"key":"e_1_3_2_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/CIC48465.2019.00047"},{"issue":"36","key":"e_1_3_2_34_1","first-page":"2441","article-title":"The Unbearable Burden of Executive Load on Cognitive Reflection: A Validation of Dual Process Theory","volume":"36","author":"Johnson E. D.","year":"2014","unstructured":"Johnson, E. D., E. Tubau, and W. De Neys. 2014. \u201cThe Unbearable Burden of Executive Load on Cognitive Reflection: A Validation of Dual Process Theory.\u201d Proceedings of the Annual Meeting of the Cognitive Science Society 36 (36): 2441\u20132446. https:\/\/escholarship.org\/uc\/item\/01x9w1hw.","journal-title":"Proceedings of the Annual Meeting of the Cognitive Science Society"},{"key":"e_1_3_2_35_1","doi-asserted-by":"publisher","DOI":"10.4018\/IJCBPL.2015070102"},{"key":"e_1_3_2_36_1","volume-title":"Thinking, Fast and Slow","author":"Kahneman D.","year":"2011","unstructured":"Kahneman, D. 2011. Thinking, Fast and Slow, 499. Farrar, Straus and Giroux."},{"key":"e_1_3_2_37_1","doi-asserted-by":"publisher","DOI":"10.4225\/75\/57a80e47aa0cb"},{"key":"e_1_3_2_38_1","doi-asserted-by":"publisher","DOI":"10.1108\/OIR-03-2012-0037"},{"key":"e_1_3_2_39_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.apergo.2020.103084"},{"key":"e_1_3_2_40_1","unstructured":"Liu E. L. Sun A. Bellon G. Ho G. M. Voelker S. Savage and I. N. S. Munyaka. 2023. Understanding the Viability of Gmail\u2019s Origin Indicator for Identifying the Sender 77\u201395. https:\/\/www.usenix.org\/conference\/soups2023\/presentation\/liu."},{"key":"e_1_3_2_41_1","unstructured":"Marett K. and R. Wright. 2009. \u201cThe Effectiveness of Deceptive Tactics in Phishing.\u201d AMCIS 2009 Proceedings. https:\/\/aisel.aisnet.org\/amcis2009\/340."},{"key":"e_1_3_2_42_1","doi-asserted-by":"publisher","DOI":"10.3389\/fpsyg.2020.01756"},{"key":"e_1_3_2_43_1","doi-asserted-by":"publisher","DOI":"10.1037\/0096-3445.130.4.621"},{"key":"e_1_3_2_44_1","doi-asserted-by":"publisher","DOI":"10.3389\/fpsyg.2020.01755"},{"key":"e_1_3_2_45_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2018.12.036"},{"key":"e_1_3_2_46_1","doi-asserted-by":"publisher","DOI":"10.3389\/fdata.2020.546860"},{"key":"e_1_3_2_47_1","doi-asserted-by":"publisher","DOI":"10.1016\/0010-0285(77)90012-3"},{"key":"e_1_3_2_48_1","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813660"},{"key":"e_1_3_2_49_1","doi-asserted-by":"publisher","DOI":"10.1145\/3025453.3025831"},{"key":"e_1_3_2_50_1","doi-asserted-by":"publisher","DOI":"10.1177\/1745691613483475"},{"key":"e_1_3_2_51_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijhcs.2019.02.007"},{"key":"e_1_3_2_52_1","doi-asserted-by":"publisher","DOI":"10.48550\/arXiv.1605.04717"},{"key":"e_1_3_2_53_1","doi-asserted-by":"publisher","DOI":"10.1016\/0030-5073(76)90022-2"},{"key":"e_1_3_2_54_1","doi-asserted-by":"publisher","DOI":"10.3758\/s13428-018-01193-y"},{"key":"e_1_3_2_55_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-21814-0_21"},{"key":"e_1_3_2_56_1","doi-asserted-by":"publisher","DOI":"10.1080\/13546783.2020.1793813"},{"key":"e_1_3_2_57_1","doi-asserted-by":"publisher","DOI":"10.1037\/0033-2909.114.3.510"},{"key":"e_1_3_2_58_1","doi-asserted-by":"publisher","DOI":"10.1177\/0963721417708229"},{"key":"e_1_3_2_59_1","doi-asserted-by":"publisher","DOI":"10.1109\/INDICON.2016.7839123"},{"key":"e_1_3_2_60_1","doi-asserted-by":"publisher","DOI":"10.1080\/13546783.2018.1459314"},{"key":"e_1_3_2_61_1","doi-asserted-by":"publisher","DOI":"10.1037\/a0030550"},{"key":"e_1_3_2_62_1","unstructured":"Stephanou A. 2008. \u201cThe Impact of Information Security Awareness Training on Information Security Behaviour.\u201d"},{"key":"e_1_3_2_63_1","doi-asserted-by":"publisher","DOI":"10.1037\/0033-2909.95.2.334"},{"key":"e_1_3_2_64_1","volume-title":"Perception and Its Modalities","author":"Stokes D.","year":"2015","unstructured":"Stokes, D., and M. Matthen. 2015. Perception and Its Modalities. Oxford University Press."},{"key":"e_1_3_2_65_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.apergo.2022.103887"},{"key":"e_1_3_2_66_1","doi-asserted-by":"publisher","DOI":"10.1016\/0030-5073(79)90048-5"},{"key":"e_1_3_2_67_1","doi-asserted-by":"publisher","DOI":"10.25300\/MISQ\/2018\/11881"},{"key":"e_1_3_2_68_1","unstructured":"Valenzuela C. 2021. \u201cThe Individual Differences in Cue Utilisation Decision Making and Time Pressure on Phishing Susceptibility.\u201d Thesis. https:\/\/digital.library.adelaide.edu.au\/dspace\/handle\/2440\/133959."},{"key":"e_1_3_2_69_1","doi-asserted-by":"publisher","DOI":"10.1111\/jcc4.12126"},{"key":"e_1_3_2_70_1","doi-asserted-by":"publisher","DOI":"10.7551\/mitpress\/14653.001.0001"},{"key":"e_1_3_2_71_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2011.03.002"},{"key":"e_1_3_2_72_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPC.2012.2208392"},{"key":"e_1_3_2_73_1","unstructured":"Warner L. 2022. \u201c3 Mindfulness Techniques Your Team Can Use to Prevent Phishing.\u201d AMP Creative February 25. https:\/\/ampcreative.com\/the-human-firewall-3-mindfulness-techniques-Your-team-Can-use-to-prevent-phishing\/."},{"key":"e_1_3_2_74_1","doi-asserted-by":"publisher","DOI":"10.1006\/lmot.2000.1065"},{"key":"e_1_3_2_75_1","doi-asserted-by":"publisher","DOI":"10.1016\/0010-0277(74)90017-1"},{"key":"e_1_3_2_76_1","doi-asserted-by":"publisher","DOI":"10.3758\/PBR.15.6.1179"},{"key":"e_1_3_2_77_1","doi-asserted-by":"publisher","DOI":"10.1080\/0144929X.2023.2230307"},{"key":"e_1_3_2_78_1","doi-asserted-by":"publisher","DOI":"10.1080\/0144929X.2018.1519599"},{"key":"e_1_3_2_79_1","doi-asserted-by":"publisher","DOI":"10.4018\/jthi.2008010105"},{"key":"e_1_3_2_80_1","doi-asserted-by":"publisher","DOI":"10.25300\/MISQ\/2022\/16625"},{"key":"e_1_3_2_81_1","doi-asserted-by":"publisher","DOI":"10.2753\/MIS0742-1222270111"},{"key":"e_1_3_2_82_1","doi-asserted-by":"publisher","DOI":"10.1177\/0018720816684064"},{"issue":"3","key":"e_1_3_2_83_1","first-page":"1","article-title":"Victimized by Phishing: A Heuristic-Systematic Perspective","volume":"17","author":"Xu Z.","year":"2012","unstructured":"Xu, Z., and W. Zhang. 2012. \u201cVictimized by Phishing: A Heuristic-Systematic Perspective.\u201d Journal of Internet Banking and Commerce 17 (3): 1\u201316.","journal-title":"Journal of Internet Banking and Commerce"},{"key":"e_1_3_2_84_1","doi-asserted-by":"publisher","DOI":"10.1145\/3688459.3688465"},{"key":"e_1_3_2_85_1","doi-asserted-by":"publisher","DOI":"10.1177\/1541931215591165"},{"key":"e_1_3_2_86_1","doi-asserted-by":"publisher","DOI":"10.1037\/edu0000441"}],"container-title":["Behaviour &amp; Information Technology"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.tandfonline.com\/doi\/pdf\/10.1080\/0144929X.2025.2530012","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,5]],"date-time":"2026-03-05T18:35:00Z","timestamp":1772735700000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.tandfonline.com\/doi\/full\/10.1080\/0144929X.2025.2530012"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,7,14]]},"references-count":85,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2026,2,25]]}},"alternative-id":["10.1080\/0144929X.2025.2530012"],"URL":"https:\/\/doi.org\/10.1080\/0144929x.2025.2530012","relation":{},"ISSN":["0144-929X","1362-3001"],"issn-type":[{"value":"0144-929X","type":"print"},{"value":"1362-3001","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,7,14]]},"assertion":[{"value":"The publishing and review policy for this title is described in its Aims & Scope.","order":1,"name":"peerreview_statement","label":"Peer Review Statement"},{"value":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=tbit20","URL":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=tbit20","order":2,"name":"aims_and_scope_url","label":"Aim & Scope"},{"value":"2024-09-01","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2025-06-30","order":2,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2025-07-14","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}