{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T18:20:07Z","timestamp":1730226007974,"version":"3.28.0"},"reference-count":37,"publisher":"IEEE","license":[{"start":{"date-parts":[[2021,7,8]],"date-time":"2021-07-08T00:00:00Z","timestamp":1625702400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,7,8]],"date-time":"2021-07-08T00:00:00Z","timestamp":1625702400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,7,8]]},"DOI":"10.1109\/hsi52170.2021.9538649","type":"proceedings-article","created":{"date-parts":[[2021,9,17]],"date-time":"2021-09-17T16:18:10Z","timestamp":1631895490000},"page":"1-6","source":"Crossref","is-referenced-by-count":0,"title":["Trust me and Click! A Pilot Study of Cognitive Walkthrough for Phishing Emails"],"prefix":"10.1109","author":[{"given":"Pierre-Emmanuel","family":"Arduin","sequence":"first","affiliation":[{"name":"Universit&#x00E9; Paris-Dauphine &#x2013; PSL DRM &#x2013; UMR CNRS,Paris,France,7088"}]},{"given":"Kathia Marcai","family":"de Oliveira","sequence":"additional","affiliation":[{"name":"Univ. Polytechnique Hauts-de-France LAMIH &#x2013; UMR CNRS,Valenciennes,France,8201"}]},{"given":"Christophe","family":"Kolski","sequence":"additional","affiliation":[{"name":"Univ. Polytechnique Hauts-de-France LAMIH &#x2013; UMR CNRS,Valenciennes,France,8201"}]}],"member":"263","reference":[{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1016\/B978-044481862-1.50095-9"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1177\/1071181319631355"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-29387-1_5"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1007\/s11948-014-9519-y"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1037\/0022-3514.46.3.519"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-29381-9_33"},{"key":"ref35","article-title":"Online persuasion mechanisms and processes&#x2013;a research agenda","author":"xiao","year":"2018","journal-title":"The 9th Annual International Conference on Social Media and Society"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2011.03.002"},{"key":"ref10","first-page":"137","article-title":"Training in ethical influence","author":"cialdini","year":"2001","journal-title":"LEA&#x2019;s organization and management series Social influences on ethical behavior in organizations"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2012.09.010"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/1124772.1124861"},{"key":"ref13","first-page":"317","article-title":"Affective design of e-commerce user interfaces: How to maximise perceived trustworthiness","author":"egger","year":"2001","journal-title":"Proceedings of the International Conference on Affective Human Factors Design"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/STAST.2015.10"},{"key":"ref15","article-title":"Social cognition: From brains to culture","author":"fiske","year":"2013","journal-title":"Sage"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1080\/1047840X.2013.846207"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1177\/1541931213571226"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.4337\/9781789902587.00013"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4471-0515-2_24"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1201\/b15703"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.2307\/4132332"},{"key":"ref27","article-title":"Guerrilla HCI: Using discount usability engineering to penetrate the intimidation barrier","author":"nielsen","year":"1994","journal-title":"Tech Rep"},{"key":"ref3","article-title":"Understanding phishing susceptibility: An integrated model of cue-utilization and habits","author":"ayaburi","year":"2019","journal-title":"Proceedings of the 2019 International Conference on Information Systems"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/503457.503459"},{"journal-title":"Tech Rep","article-title":"Email statistics report, 2020-2024","year":"2020","key":"ref29"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.3758\/s13428-014-0530-7"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2020.102020"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-02574-7_4"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-40390-4_11"},{"journal-title":"Influence The Psychology of Persuasion","year":"2007","author":"cialdini","key":"ref9"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1002\/9781119419785"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/97243.97279"},{"key":"ref22","first-page":"99","article-title":"Persuasion as a function of self-awareness in computer-mediated communication","volume":"4","author":"matheson","year":"1989","journal-title":"Social Behaviour"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1080\/10447311003781409"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1057\/s41303-017-0058-x"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1016\/B978-0-12-819204-7.00001-4"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.33965\/ijcsis_2018130207"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1111\/spc3.12115"}],"event":{"name":"2021 14th International Conference on Human System Interaction (HSI)","start":{"date-parts":[[2021,7,8]]},"location":"Gda\u0144sk, Poland","end":{"date-parts":[[2021,7,10]]}},"container-title":["2021 14th International Conference on Human System Interaction (HSI)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9538522\/9538525\/09538649.pdf?arnumber=9538649","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,8,2]],"date-time":"2022-08-02T20:13:19Z","timestamp":1659471199000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9538649\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,7,8]]},"references-count":37,"URL":"https:\/\/doi.org\/10.1109\/hsi52170.2021.9538649","relation":{},"subject":[],"published":{"date-parts":[[2021,7,8]]}}}