{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,8]],"date-time":"2026-03-08T02:03:29Z","timestamp":1772935409745,"version":"3.50.1"},"reference-count":23,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,12,8]],"date-time":"2025-12-08T00:00:00Z","timestamp":1765152000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,12,8]],"date-time":"2025-12-08T00:00:00Z","timestamp":1765152000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,12,8]]},"DOI":"10.1109\/bigdata66926.2025.11402180","type":"proceedings-article","created":{"date-parts":[[2026,3,6]],"date-time":"2026-03-06T20:57:57Z","timestamp":1772830677000},"page":"7854-7862","source":"Crossref","is-referenced-by-count":0,"title":["Sustaining Cyber Awareness: The Long-Term Impact of Continuous Phishing Training and Emotional Triggers"],"prefix":"10.1109","author":[{"given":"Rebeka","family":"T\u00f3th","sequence":"first","affiliation":[{"name":"University of Oslo,Oslo,Norway"}]},{"given":"Richard A.","family":"Dubniczky","sequence":"additional","affiliation":[{"name":"E&#x00F6;tv&#x00F6;s Lor&#x00E1;nd University,Budapest,Hungary"}]},{"given":"Olga","family":"Limonova","sequence":"additional","affiliation":[{"name":"University of Luxembourg,Luxembourg,Luxembourg"}]},{"given":"Norbert","family":"Tihanyi","sequence":"additional","affiliation":[{"name":"Technology Innovation Institute,Abu Dhabi,UAE"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/2063176.2063197"},{"key":"ref2","article-title":"Four things you can do to protect against cyberattacks","year":"2023"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2013.032213.00009"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/3469886"},{"issue":"1","key":"ref5","doi-asserted-by":"crossref","first-page":"73","DOI":"10.1016\/j.cose.2006.10.009","article-title":"Phishing for user security awareness","volume":"26","author":"Dodge","year":"2007","journal-title":"Computers & Security"},{"issue":"6","key":"ref6","first-page":"564","article-title":"Why do people fall for phishing? a theoretical model and empirical test","volume":"40","author":"Abroshan","year":"2021","journal-title":"Behaviour & Information Technology"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/SP46214.2022.9833766"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.14722\/usec.2024.23072"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2018.12.036"},{"issue":"2","key":"ref10","first-page":"71","article-title":"Psychological tactics of phishing emails","volume":"24","author":"Wang","year":"2023","journal-title":"Journal of Information Security Research"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/trustcom60117.2023.00222"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/3407023.3409179"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/3613904.3641943"},{"key":"ref14","article-title":"Content, nudges and incentives: A study on the effectiveness and perception of embedded phishing training","volume-title":"Proceedings of the CHI Conference on Human Factors in Computing Systems","author":"Lain","year":"2025"},{"key":"ref15","doi-asserted-by":"crossref","DOI":"10.1109\/CSEET66350.2025.00036","article-title":"Phishing awareness via game-based learning","volume-title":"arXiv.org","author":"Rahartomo","year":"2025"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.3390\/app15042236"},{"key":"ref17","first-page":"1309","article-title":"Cognitive triaging of phishing attacks","volume-title":"28th USENIX Security Symposium (USENIX Security 19)","author":"van der Heijden"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1177\/21582440231217720"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/1753326.1753383"},{"key":"ref20","article-title":"Antiphishing - classification of cyberattacks on employees","volume-title":"electronic source","author":"Bogdanov","year":"2018"},{"key":"ref21","first-page":"103486","article-title":"Phishing awareness via game-based learning","volume":"136","author":"Rahartomo","year":"2025","journal-title":"Computers & Security"},{"key":"ref22","article-title":"Top phishing statistics for 2025: Latest figures and trends","volume-title":"StationX","author":"Smith","year":"2025"},{"key":"ref23","article-title":"2025 phishing by industry benchmark report","volume-title":"KnowBe4, Clearwater, Florida, USA, Tech. Rep.","year":"2025"}],"event":{"name":"2025 IEEE International Conference on Big Data (BigData)","location":"Macau, China","start":{"date-parts":[[2025,12,8]]},"end":{"date-parts":[[2025,12,11]]}},"container-title":["2025 IEEE International Conference on Big Data (BigData)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/11400704\/11400712\/11402180.pdf?arnumber=11402180","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,7]],"date-time":"2026-03-07T07:31:58Z","timestamp":1772868718000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11402180\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,12,8]]},"references-count":23,"URL":"https:\/\/doi.org\/10.1109\/bigdata66926.2025.11402180","relation":{},"subject":[],"published":{"date-parts":[[2025,12,8]]}}}