{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,7]],"date-time":"2026-02-07T00:24:35Z","timestamp":1770423875084,"version":"3.49.0"},"reference-count":54,"publisher":"Informa UK Limited","issue":"4","funder":[{"name":"nil","award":["n\/a"],"award-info":[{"award-number":["n\/a"]}]}],"content-domain":{"domain":["www.tandfonline.com"],"crossmark-restriction":true},"short-container-title":["Journal of Computer Information Systems"],"published-print":{"date-parts":[[2022,7,4]]},"DOI":"10.1080\/08874417.2021.1919941","type":"journal-article","created":{"date-parts":[[2021,8,30]],"date-time":"2021-08-30T13:11:31Z","timestamp":1630329091000},"page":"802-821","update-policy":"https:\/\/doi.org\/10.1080\/tandf_crossmark_01","source":"Crossref","is-referenced-by-count":26,"title":["Simulated Phishing Attack and Embedded Training Campaign"],"prefix":"10.1080","volume":"62","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-2964-4518","authenticated-orcid":false,"given":"William","family":"Yeoh","sequence":"first","affiliation":[{"name":"Deakin University","place":["Burwood, Australia"]}]},{"given":"He","family":"Huang","sequence":"additional","affiliation":[{"name":"Deakin University","place":["Burwood, Australia"]}]},{"given":"Wang-Sheng","family":"Lee","sequence":"additional","affiliation":[{"name":"Monash University","place":["Clayton, Australia"]}]},{"given":"Fadi","family":"Al Jafari","sequence":"additional","affiliation":[{"name":"Deakin University","place":["Burwood, Australia"]}]},{"given":"Rachel","family":"Mansson","sequence":"additional","affiliation":[{"name":"Deakin University","place":["Burwood, Australia"]}]}],"member":"301","published-online":{"date-parts":[[2021,8,30]]},"reference":[{"key":"e_1_3_1_2_1","unstructured":"Investigation F. B. O. Business E-mail Compromise The 12 Billion Dollar Scam. [accessed 2020 Dec 12]. https:\/\/www.ic3.gov\/Media\/Y2018\/PSA180712."},{"key":"e_1_3_1_3_1","doi-asserted-by":"publisher","DOI":"10.1177\/0268396220918594"},{"key":"e_1_3_1_4_1","first-page":"311","article-title":"Americans and cybersecurity","volume":"26","author":"Olmstead K","year":"2017","unstructured":"Olmstead K, Smith A. Americans and cybersecurity. Pew Res Center. 2017;26:311\u201327.","journal-title":"Pew Res Center"},{"key":"e_1_3_1_5_1","unstructured":"McKenzie L. Cyberextortion Threat Evolves. [accessed 2020 Dec 12]. https:\/\/www.insidehighered.com\/news\/2020\/06\/11\/colleges-face-evolving-cyber-extortion-threat."},{"key":"e_1_3_1_6_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2014.09.005"},{"key":"e_1_3_1_7_1","doi-asserted-by":"publisher","DOI":"10.1080\/0144929X.2011.632650"},{"key":"e_1_3_1_8_1","doi-asserted-by":"publisher","DOI":"10.1080\/07421222.2017.1334499"},{"key":"e_1_3_1_9_1","doi-asserted-by":"publisher","DOI":"10.1080\/08874417.2020.1712269"},{"key":"e_1_3_1_10_1","doi-asserted-by":"publisher","DOI":"10.1080\/0144929X.2012.708787"},{"key":"e_1_3_1_11_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2017.04.006"},{"key":"e_1_3_1_12_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2006.02.008"},{"key":"e_1_3_1_13_1","doi-asserted-by":"publisher","DOI":"10.1080\/08874417.2020.1812134"},{"key":"e_1_3_1_14_1","doi-asserted-by":"publisher","DOI":"10.1186\/s13673-020-00237-7"},{"key":"e_1_3_1_15_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2016.02.004"},{"key":"e_1_3_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/1572532.1572536"},{"key":"e_1_3_1_17_1","volume-title":"The technology of teaching","author":"Skinner BF","year":"1968","unstructured":"Skinner BF. The technology of teaching. New York (USA): Meredith Corporation; 1968."},{"key":"e_1_3_1_18_1","volume-title":"The science of learning and the art of teaching","author":"Skinner BF","year":"1954","unstructured":"Skinner BF. The science of learning and the art of teaching. USA: Harvard Educational Review; 1954."},{"key":"e_1_3_1_19_1","doi-asserted-by":"publisher","DOI":"10.1037\/h0045185"},{"key":"e_1_3_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/3316615.3316669"},{"key":"e_1_3_1_21_1","volume-title":"Hacking the human: social engineering techniques and security countermeasures","author":"Mann MI","year":"2012","unstructured":"Mann MI. Hacking the human: social engineering techniques and security countermeasures. Aldershot (UK): Gower Publishing, Ltd.; 2012."},{"key":"e_1_3_1_22_1","first-page":"24(2)","article-title":"Increasing information security inside organizations through awareness learning for employees","author":"Btoush M","year":"2011","unstructured":"Btoush M, Alarabeyat A, Zboon M, Ryati O, Hassan M, Ahmad S. Increasing information security inside organizations through awareness learning for employees. J Theore Appl Inform Tech. 2011;24(2).","journal-title":"J Theore Appl Inform Tech"},{"key":"e_1_3_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICITST.2015.7412088"},{"key":"e_1_3_1_24_1","doi-asserted-by":"publisher","DOI":"10.4236\/jss.2013.13004"},{"key":"e_1_3_1_25_1","doi-asserted-by":"publisher","DOI":"10.1108\/10650741111181580"},{"key":"e_1_3_1_26_1","doi-asserted-by":"publisher","DOI":"10.1177\/0018720818810942"},{"key":"e_1_3_1_27_1","unstructured":"Bada M Sasse AM Nurse JR. Cyber security awareness campaigns: why do they fail to change behaviour? (Working paper).\u00a0Global Cyber Security Capacity Centre University of Oxford; 2014. https:\/\/discovery.ucl.ac.uk\/id\/eprint\/1468954\/1\/Awareness%20CampaignsDraftWorkingPaper.pdf."},{"key":"e_1_3_1_28_1","doi-asserted-by":"publisher","DOI":"10.1016\/S1361-3723(06)70370-0"},{"key":"e_1_3_1_29_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0167-4048(03)00007-5"},{"key":"e_1_3_1_30_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2006.10.005"},{"key":"e_1_3_1_31_1","first-page":"259","volume-title":"Sixteenth Symposium on Usable Privacy and Security ({SOUPS} 2020);\u00a0Virtual Event","author":"Reinheimer B","year":"2020","unstructured":"Reinheimer B, Aldag L, Mayer P, Mossano M, Duezguen R, Lofthouse B, Von Landesberger T, Volkamer M. An investigation of phishing awareness and education over time: when and how to best remind users. In: Sixteenth Symposium on Usable Privacy and Security ({SOUPS} 2020);\u00a0Virtual Event; 2020. p. 259\u201384."},{"key":"e_1_3_1_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSPW51379.2020.00027"},{"key":"e_1_3_1_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/BigData.2017.8258485"},{"key":"e_1_3_1_34_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-17610-4_16"},{"key":"e_1_3_1_35_1","first-page":"11","volume-title":"WISP 2016 proceedings.","author":"Karumbaiah S","year":"2016","unstructured":"Karumbaiah S, Wright RT, Durcikova A, Jensen ML. Phishing training: a preliminary look at the effects of different types of training. In: WISP 2016 proceedings. Dublin (Ireland); 2016. p. 11."},{"key":"e_1_3_1_36_1","doi-asserted-by":"publisher","DOI":"10.1093\/jamia\/ocz005"},{"key":"e_1_3_1_37_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-11851-2_14"},{"key":"e_1_3_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/3290605.3300338"},{"key":"e_1_3_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/1280680.1280692"},{"key":"e_1_3_1_40_1","doi-asserted-by":"publisher","DOI":"10.1109\/MITP.2016.84"},{"key":"e_1_3_1_41_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2013.106"},{"key":"e_1_3_1_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/1240624.1240760"},{"key":"e_1_3_1_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/1299015.1299022"},{"key":"e_1_3_1_44_1","doi-asserted-by":"publisher","DOI":"10.1109\/ECRIME.2008.4696970"},{"key":"e_1_3_1_45_1","volume-title":"PHREE of Phish: the effect of anti-phishing training on the ability of users to identify phishing emails","author":"Pars C","year":"2017","unstructured":"Pars C. PHREE of Phish: the effect of anti-phishing training on the ability of users to identify phishing emails. Enschede (Netherlands): University of Twente; 2017."},{"key":"e_1_3_1_46_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-77366-5_27"},{"key":"e_1_3_1_47_1","unstructured":"Bissell K LaSalle R Cin P Accenture\u2019s ninth annual cost of cybercrime study: unlocking the value of improved cybersecurity protection 2019."},{"key":"e_1_3_1_48_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2016.02.065"},{"key":"e_1_3_1_49_1","doi-asserted-by":"publisher","DOI":"10.1145\/1754393.1754396"},{"key":"e_1_3_1_50_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICECENG.2011.6056921"},{"key":"e_1_3_1_51_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.istr.2010.05.002"},{"key":"e_1_3_1_52_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.2044-8287.2012.02086.x"},{"key":"e_1_3_1_53_1","doi-asserted-by":"publisher","DOI":"10.2308\/isys-50563"},{"key":"e_1_3_1_54_1","doi-asserted-by":"publisher","DOI":"10.2308\/accr.00000010"},{"key":"e_1_3_1_55_1","doi-asserted-by":"publisher","DOI":"10.1111\/isj.12277"}],"container-title":["Journal of Computer Information Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.tandfonline.com\/doi\/pdf\/10.1080\/08874417.2021.1919941","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,2,6]],"date-time":"2026-02-06T12:24:29Z","timestamp":1770380669000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.tandfonline.com\/doi\/full\/10.1080\/08874417.2021.1919941"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,8,30]]},"references-count":54,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2022,7,4]]}},"alternative-id":["10.1080\/08874417.2021.1919941"],"URL":"https:\/\/doi.org\/10.1080\/08874417.2021.1919941","relation":{},"ISSN":["0887-4417","2380-2057"],"issn-type":[{"value":"0887-4417","type":"print"},{"value":"2380-2057","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,8,30]]},"assertion":[{"value":"The publishing and review policy for this title is described in its Aims & Scope.","order":1,"name":"peerreview_statement","label":"Peer Review Statement"},{"value":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=ucis20","URL":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=ucis20","order":2,"name":"aims_and_scope_url","label":"Aim & Scope"},{"value":"2021-08-30","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}