{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,6]],"date-time":"2025-11-06T00:58:20Z","timestamp":1762390700332,"version":"3.28.0"},"reference-count":34,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016,6]]},"DOI":"10.1109\/ecrime.2016.7487946","type":"proceedings-article","created":{"date-parts":[[2016,6,9]],"date-time":"2016-06-09T21:34:17Z","timestamp":1465508057000},"page":"1-11","source":"Crossref","is-referenced-by-count":18,"title":["\"Smells Phishy?\": An educational game about online phishing scams"],"prefix":"10.1109","author":[{"given":"Malak","family":"Baslyman","sequence":"first","affiliation":[]},{"given":"Sonia","family":"Chiasson","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref33","doi-asserted-by":"crossref","DOI":"10.1201\/b16671","author":"fullerton","year":"2014","journal-title":"Game Design Workshop A Playcentric Approach to Creating Innovative Games"},{"year":"0","key":"ref32","article-title":"Gamification"},{"key":"ref31","article-title":"Playing a game: The ecology of designing, building and testing games as educational activities","author":"repenning","year":"2005","journal-title":"Conf ED-MEDIA World Conference on Educational Multimedia Hypermedia and Telecommunications"},{"key":"ref30","first-page":"10","article-title":"Active learning with the cyberciege video game","author":"thompson","year":"2011","journal-title":"CSET'11 Proceedings of the 4th conference on Cyber security experimentation and test"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1145\/1978942.1979459"},{"key":"ref10","article-title":"Large-scale automatic classification of phishing pages","volume":"10","author":"whittaker","year":"2010","journal-title":"NDSS"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/1299015.1299016"},{"journal-title":"NSS Labs","article-title":"Evolutions in browser security: Trends in browser security performance","year":"2014","key":"ref12"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/1290958.1290968"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.2753\/MIS0742-1222270111"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2011.03.002"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2014.51"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516753"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/1754393.1754396"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/1753326.1753383"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1145\/1280680.1280692"},{"key":"ref4","article-title":"Phinding phish: Evaluating anti-phishing tools","author":"zhang","year":"2007","journal-title":"Proceedings of the 14th Annual Network and Distributed System Security Symposium (NDSS)"},{"year":"0","key":"ref27","article-title":"OWASP cornucopia"},{"journal-title":"EMC","article-title":"2013 a year in review","year":"0","key":"ref3"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/1837110.1837125"},{"key":"ref29","doi-asserted-by":"crossref","first-page":"127","DOI":"10.20533\/ijels.2046.4568.2012.0016","article-title":"Designing a mobile game to teach conceptual knowledge of avoiding phishing attacks","volume":"2","author":"arachchilage","year":"2012","journal-title":"International Journal for E-Learning Security"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/1719030.1719050"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1016\/S1361-3723(10)70065-8"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/2063176.2063197"},{"year":"0","key":"ref2","article-title":"Anti phishing working group"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.3233\/JCS-2010-0371"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/1124772.1124861"},{"year":"0","key":"ref20","article-title":"Recognizing spoof (fake) ebay websites"},{"journal-title":"Government of Canada et al","article-title":"Get cyber safe","year":"0","key":"ref22"},{"year":"0","key":"ref21","article-title":"What to do and how"},{"year":"0","key":"ref24","article-title":"dOx3d!"},{"article-title":"Phishguru: a system for educating users about semantic attacks","year":"2009","author":"kumaraguru","key":"ref23"},{"journal-title":"Microsoft","article-title":"Elevation of privilege","year":"0","key":"ref26"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2010.58"}],"event":{"name":"2016 APWG Symposium on Electronic Crime Research (eCrime)","start":{"date-parts":[[2016,6,1]]},"location":"Toronto, ON, Canada","end":{"date-parts":[[2016,6,3]]}},"container-title":["2016 APWG Symposium on Electronic Crime Research (eCrime)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7486625\/7487933\/07487946.pdf?arnumber=7487946","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,9]],"date-time":"2019-09-09T13:22:52Z","timestamp":1568035372000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7487946\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,6]]},"references-count":34,"URL":"https:\/\/doi.org\/10.1109\/ecrime.2016.7487946","relation":{},"subject":[],"published":{"date-parts":[[2016,6]]}}}