{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,6]],"date-time":"2026-04-06T10:10:22Z","timestamp":1775470222746,"version":"3.50.1"},"reference-count":22,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,6]]},"DOI":"10.1109\/cybconf.2017.7985810","type":"proceedings-article","created":{"date-parts":[[2017,7,20]],"date-time":"2017-07-20T20:38:12Z","timestamp":1500583092000},"page":"1-8","source":"Crossref","is-referenced-by-count":7,"title":["Simulating Human Detection of Phishing Websites: An Investigation into the Applicability of the ACT-R Cognitive Behaviour Architecture Model"],"prefix":"10.1109","author":[{"given":"Nick","family":"Williams","sequence":"first","affiliation":[]},{"given":"Shujun","family":"Li","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","first-page":"90","article-title":"Functional cognitive models of malware identification","author":"lebiere","year":"2015","journal-title":"Proceedings of 13th Annual International Conference on Cognitive Modeling"},{"key":"ref11","article-title":"The security mindset","author":"schneier","year":"0","journal-title":"Schneier on Security 2008"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/1124772.1124861"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2011.179"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-26555-1_26"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/1125864.1125890"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1016\/S0079-6123(07)00020-9"},{"key":"ref17","author":"mitnick","year":"2002","journal-title":"The Art of Deception Controlling the Human Element of Security"},{"key":"ref18","first-page":"45","article-title":"The impact of public information on phishing attack and defense","author":"moore","year":"2011","journal-title":"Communications and Strategies"},{"key":"ref19","article-title":"Thinking, Fast and Slow, Penguin","author":"kahneman","year":"2012"},{"key":"ref4","article-title":"People, process, and technology","author":"schneier","year":"2013","journal-title":"Schneier on Security"},{"key":"ref3","year":"2016","journal-title":"APWG Phishing Attack Trends Report - IQ 2016"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/322796.322806"},{"key":"ref5","article-title":"ISO\/IEC, Information technology - Security techniques - Information security management systems Requirements","year":"2013","journal-title":"ISO\/IEC"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1037\/0033-295X.111.4.1036"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1098\/rsta.2009.0027"},{"key":"ref2","article-title":"Top ten things you need to know about data breaches","author":"green","year":"2015","journal-title":"Information Age"},{"key":"ref1","article-title":"Phishing: What is it and how does it affect me?","year":"2015","journal-title":"CERT-UK (now part of National Cyber Security Centre&#x2014; NCSC)"},{"key":"ref9","article-title":"ACT-R Research Group, ACT-R Software","year":"0"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1093\/acprof:oso\/9780195324259.001.0001"},{"key":"ref22","author":"bothell","year":"2015","journal-title":"ACT-R 7 Reference Manual"},{"key":"ref21","article-title":"ACT-R","year":"0","journal-title":"ACT-R Research Group"}],"event":{"name":"2017 3rd IEEE International Conference on Cybernetics (CYBCONF)","location":"Exeter, United Kingdom","start":{"date-parts":[[2017,6,21]]},"end":{"date-parts":[[2017,6,23]]}},"container-title":["2017 3rd IEEE International Conference on Cybernetics (CYBCONF)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7984317\/7985735\/07985810.pdf?arnumber=7985810","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,8,16]],"date-time":"2017-08-16T16:04:02Z","timestamp":1502899442000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7985810\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,6]]},"references-count":22,"URL":"https:\/\/doi.org\/10.1109\/cybconf.2017.7985810","relation":{},"subject":[],"published":{"date-parts":[[2017,6]]}}}