{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,26]],"date-time":"2025-12-26T07:05:08Z","timestamp":1766732708876,"version":"3.28.0"},"reference-count":46,"publisher":"IEEE","license":[{"start":{"date-parts":[[2020,11,9]],"date-time":"2020-11-09T00:00:00Z","timestamp":1604880000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2020,11,9]],"date-time":"2020-11-09T00:00:00Z","timestamp":1604880000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2020,11,9]],"date-time":"2020-11-09T00:00:00Z","timestamp":1604880000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020,11,9]]},"DOI":"10.1109\/isi49825.2020.9280478","type":"proceedings-article","created":{"date-parts":[[2020,12,9]],"date-time":"2020-12-09T00:41:06Z","timestamp":1607474466000},"page":"1-6","source":"Crossref","is-referenced-by-count":5,"title":["An Ordinal Approach to Modeling and Visualizing Phishing Susceptibility"],"prefix":"10.1109","author":[{"given":"David G.","family":"Dobolyi","sequence":"first","affiliation":[]},{"given":"Ahmed","family":"Abbasi","sequence":"additional","affiliation":[]},{"given":"F. Mariam","family":"Zahedi","sequence":"additional","affiliation":[]},{"given":"Anthony","family":"Vance","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1080\/0144929X.2013.875221"},{"journal-title":"ordinalEffects Improved Effect Plots for Ordinal Models v0 1 0","year":"2019","author":"dobolyi","key":"ref38"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1177\/0049124104268644"},{"key":"ref32","first-page":"392","article-title":"Symbolic description of factorial models for analysis of variance","volume":"22","author":"wilkinson","year":"1973","journal-title":"Journal of the Royal Statistical Society Series C (Applied Statistics)"},{"journal-title":"Analysis of Ordinal Data With Cumulative Link Models&#x2014;Estimation With the R-Package Ordinal","year":"2015","author":"christensen","key":"ref31"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/TPC.2012.2208392"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/TEM.2004.839967"},{"journal-title":"Phishing Personality Traits and Facebook","year":"2013","author":"halevi","key":"ref36"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.25300\/MISQ\/2015\/39.2.04"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.2307\/23042796"},{"key":"ref10","article-title":"Phishing Attacks Cost Millions Despite Low Success Rates","author":"prince","year":"2009","journal-title":"eWeek"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1002\/asi.20941"},{"key":"ref11","article-title":"FDA shuts down 1,677 online pharmacies","author":"hellerman","year":"2013","journal-title":"Cnn health"},{"journal-title":"Few Online &#x2018;Canadian Pharmacies&#x2019; Based in Canada FDA Says Washington Post","year":"2005","author":"krebs","key":"ref12"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1136\/bmj.39063.418391.68"},{"article-title":"Pharma&#x2019;s Black Market Boom","year":"2008","author":"greenberg","key":"ref14"},{"key":"ref15","article-title":"Managing Forward: Customer Satisfaction as a Predictive Metric for Banks","author":"freed","year":"2011","journal-title":"U S ForeSee Results 2011 Online Banking Study"},{"key":"ref16","article-title":"Client-side Defense Against Web-based Identity Theft","author":"chou","year":"2004","journal-title":"Proc Symp Network and Distributed System Security"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.2307\/25750686"},{"key":"ref18","article-title":"Cisco: Targeted Attacks Cost Organizations $1.29 billion annually","author":"lennon","year":"2011","journal-title":"Security Week"},{"journal-title":"McAfee Threats Report First Quarter 2013","year":"2013","key":"ref19"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1145\/1290958.1290968"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2010.198"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1145\/1391949.1391950"},{"key":"ref3","article-title":"A framework for reasoning about the Human in the Loop","author":"cranor","year":"2008","journal-title":"Proceedings of the 1st Conference on Usability Psychology and Security"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/ISI.2016.7745462"},{"journal-title":"A Personality Based Model for Determining Susceptibility to Phishing Attacks","year":"2009","author":"parrish jr","key":"ref29"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/1753326.1753383"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/ISI.2016.7745439"},{"key":"ref7","article-title":"The Phishing Funnel Model: A Design Artifact to Predict User Susceptibility to Phishing Websites","author":"abbasi","year":"0","journal-title":"Information Systems Research"},{"key":"ref2","first-page":"120","article-title":"Effects of Technical Abilities and Phishing Knowledge on Phishing Websites Detection","author":"alnajim","year":"2009","journal-title":"Proc of the IASTED International Conference on Software Engineering"},{"key":"ref9","article-title":"Phishing Attacks: Analyzing Trends in 2006","author":"ramzan","year":"2007","journal-title":"Proceedings of the 4th Conference on Email and Anti-Spam"},{"journal-title":"McAfee Labs COVID-19 Threats Report","year":"2016","author":"beek","key":"ref1"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/MIS.2015.50"},{"key":"ref20","article-title":"Who Does What on the Web: A Large-scale Study of Browsing Behavior","author":"goel","year":"2012","journal-title":"Proceedings of the 6th International Conference on Weblogs and Social Media"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/MIS.2015.19"},{"key":"ref22","article-title":"Google Forks Over Settlement on Rx Ads","author":"catan","year":"2011","journal-title":"The Wall Street Journal"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2005.352"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1145\/1280680.1280692"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/3468.852434"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1145\/2046707.2046763"},{"key":"ref23","article-title":"Google vs. Bing: Search Engines Deliver Infected Websites as Their Top Results","author":"selinger","year":"2013","journal-title":"A New AV-TEST Study Search Engines as Malware Providers"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1214\/10-STS330"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/1124772.1124863"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1145\/1754393.1754396"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/1124772.1124861"}],"event":{"name":"2020 IEEE International Conference on Intelligence and Security Informatics (ISI)","start":{"date-parts":[[2020,11,9]]},"location":"Arlington, VA, USA","end":{"date-parts":[[2020,11,10]]}},"container-title":["2020 IEEE International Conference on Intelligence and Security Informatics (ISI)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9280504\/9280475\/09280478.pdf?arnumber=9280478","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,28]],"date-time":"2022-06-28T17:51:08Z","timestamp":1656438668000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9280478\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,11,9]]},"references-count":46,"URL":"https:\/\/doi.org\/10.1109\/isi49825.2020.9280478","relation":{},"subject":[],"published":{"date-parts":[[2020,11,9]]}}}