{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,8]],"date-time":"2025-10-08T16:14:24Z","timestamp":1759940064115,"version":"3.41.0"},"reference-count":59,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016,8]]},"DOI":"10.1109\/issa.2016.7802935","type":"proceedings-article","created":{"date-parts":[[2017,1,2]],"date-time":"2017-01-02T21:21:42Z","timestamp":1483392102000},"page":"98-105","source":"Crossref","is-referenced-by-count":10,"title":["Social network phishing: Becoming habituated to clicks and ignorant to threats?"],"prefix":"10.1109","author":[{"given":"Edwin D.","family":"Frauenstein","sequence":"first","affiliation":[]},{"given":"Stephen V.","family":"Flowerday","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1108\/09685221211219173"},{"key":"ref38","article-title":"A Personality Based Model for Determining Susceptibility to Phishing Attacks","author":"parish","year":"2009","journal-title":"Southwestern Decision Sciences Institute"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1145\/1240624.1240760"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1145\/1280680.1280692"},{"article-title":"Security education against phishing: A modest proposal for a major re-think","year":"2009","author":"kirlappos","key":"ref31"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/HICSS.2013.606"},{"key":"ref37","article-title":"Assessing Individual Differences in a Phishing Detection Task","author":"mayhorn","year":"2015","journal-title":"Proc 19th Triennial Congr IEA"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1145\/1753326.1753383"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1016\/S0092-6566(03)00046-1"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2006.10.009"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1145\/1357054.1357219"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1145\/1143120.1143131"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.4018\/978-1-60566-036-3.ch004"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-24306-1_6"},{"journal-title":"The Statisticain","article-title":"Statistics and facts about Social Networks","year":"2015","key":"ref1"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/1242572.1242660"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/1299015.1299021"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/1314389.1314391"},{"article-title":"Phinding phish: Evaluating anti-phishing tools","year":"2006","author":"zhang","key":"ref24"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/1062745.1062868"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/1124772.1124863"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/1124772.1124861"},{"article-title":"Is Social Media Just Another Bad Habit To Break?","year":"2015","author":"priestley","key":"ref50"},{"key":"ref51","doi-asserted-by":"crossref","first-page":"705","DOI":"10.2307\/25148817","article-title":"How Habitual Limit The Predictive Power of Intention: The Case Of Information Systems Continuance","volume":"31","author":"limayem","year":"0","journal-title":"MIS Quarterly"},{"year":"0","key":"ref59","article-title":"Heuristic-Systematic Persuasion Model"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1177\/009365002237833"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1016\/j.pec.2008.12.003"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1146\/annurev.psych.57.102904.190034"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1002\/asi.20779"},{"journal-title":"The Psychology of Attitudes","year":"1993","author":"eagly","key":"ref54"},{"key":"ref53","article-title":"Suspicion, Cognition, Automaticity Model (SCAM) of Phishing Susceptibility","author":"vishwanath","year":"0","journal-title":"Communication Research"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1207\/s15506878jobem4803_2"},{"key":"ref10","doi-asserted-by":"crossref","DOI":"10.1002\/0470086106","author":"jakobsson","year":"2006","journal-title":"Phishing and Countermeasures Understanding the Increasing Problem of Electronic Identity Theft"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1186\/s40163-014-0009-y"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1145\/1290958.1290968"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2012.12.003"},{"journal-title":"Top 5 social media scams to avoid CNN Money","year":"0","author":"king","key":"ref13"},{"key":"ref14","article-title":"Social Networkers Beware: Facebook is a Major Phishing Portal","author":"stern","year":"2014","journal-title":"Kaspersky Lab"},{"key":"ref15","article-title":"Social Network Security Issues: Social Engineering and Phishing Attacks","author":"allen","year":"2012","journal-title":"Proc Student-Faculty Res Day CSIS Pace Univ"},{"journal-title":"SOPHOS","article-title":"Social Networking Security Threats","year":"2011","key":"ref16"},{"key":"ref17","article-title":"Warning - Facebook Color Changer App Is Just A Scam, Infects 10000 Users","author":"khandelwal","year":"2014","journal-title":"The Hacker News"},{"key":"ref18","article-title":"Hoax Alert! No, Zuckerberg Isn't Giving Millions to Facebook Users","author":"wagstaff","year":"2015","journal-title":"NBC News"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/1242572.1242659"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/2487788.2488034"},{"journal-title":"The Art of Deception Controlling the Human Element of Security","year":"2002","author":"mitnick","key":"ref3"},{"journal-title":"Influence The Psychology of Persuasion","year":"2007","author":"cialdini","key":"ref6"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-20376-8_4"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/1897852.1897872"},{"key":"ref7","article-title":"A Multi-Level Defense Against Social Engineering","author":"gragg","year":"2003","journal-title":"Tech Rep SANS Institute InfoSec Reading Room"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1111\/jcc4.12100"},{"journal-title":"APWG Phishing activity trends report","year":"2014","key":"ref9"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1016\/S1361-3723(10)70066-X"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1145\/2030376.2030387"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2011.03.002"},{"key":"ref47","article-title":"Effect of Frame of Mind on Users' Deception Detection Attitudes and Behaviours","author":"ivaturi","year":"2014","journal-title":"CONF-IRM"},{"key":"ref42","article-title":"Social engineering in social networking sites: how good becomes evil","author":"algarni","year":"2014","journal-title":"The Proceedings of Pacific Asia Conference on Information Systems"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/ECRIME.2014.6963163"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1108\/JFC-05-2013-0038"},{"article-title":"Estate agent forced to go into hiding after Facebook post deriding black people as &#x2018;monkeys&#x2019; for dropping litter on beaches causes a storm in South Africa","year":"2015","author":"flanagan","key":"ref43"}],"event":{"name":"2016 Information Security for South Africa (ISSA)","start":{"date-parts":[[2016,8,17]]},"location":"Johannesburg, South Africa","end":{"date-parts":[[2016,8,18]]}},"container-title":["2016 Information Security for South Africa (ISSA)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7786562\/7802913\/07802935.pdf?arnumber=7802935","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,13]],"date-time":"2025-06-13T23:50:42Z","timestamp":1749858642000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7802935\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,8]]},"references-count":59,"URL":"https:\/\/doi.org\/10.1109\/issa.2016.7802935","relation":{},"subject":[],"published":{"date-parts":[[2016,8]]}}}