{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,6]],"date-time":"2026-03-06T19:56:37Z","timestamp":1772826997337,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":24,"publisher":"ACM","license":[{"start":{"date-parts":[[2012,10,3]],"date-time":"2012-10-03T00:00:00Z","timestamp":1349222400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2012,10,3]]},"DOI":"10.1145\/2393132.2393170","type":"proceedings-article","created":{"date-parts":[[2012,11,13]],"date-time":"2012-11-13T15:04:07Z","timestamp":1352819047000},"page":"195-202","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":4,"title":["A usability test of whitelist and blacklist-based anti-phishing application"],"prefix":"10.1145","author":[{"given":"Linfeng","family":"Li","sequence":"first","affiliation":[{"name":"University of Tampere, Kanslerinrinne, Tampere, Finland"}]},{"given":"Marko","family":"Helenius","sequence":"additional","affiliation":[{"name":"Tampere University of Technology, Korkeakoulunkatu, Tampere, Finland"}]},{"given":"Eleni","family":"Berki","sequence":"additional","affiliation":[{"name":"University of Tampere, Kanslerinrinne, Tampere, Finland"}]}],"member":"320","published-online":{"date-parts":[[2012,10,3]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Anti-Phishing Working Group (APWG) 2011 In Phishing Attack Trends Report http:\/\/www.apwg.org\/reports\/apwg_report_h2_2010.pdf. Retrieved in December 2011  Anti-Phishing Working Group (APWG) 2011 In Phishing Attack Trends Report http:\/\/www.apwg.org\/reports\/apwg_report_h2_2010.pdf. Retrieved in December 2011"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/1124772.1124863"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/2063176.2063197"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/1135777.1135853"},{"key":"e_1_3_2_1_5_1","unstructured":"Litan A. 2004. Phishing attack victims likely targets for identity theft. FT-22-8873 Gartner Research.  Litan A. 2004. Phishing attack victims likely targets for identity theft. FT-22-8873 Gartner Research."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"crossref","unstructured":"Dhamija R. Tygar J. D. and Hearst M. 2006. Why phishing works SecurityFocus Universities study http:\/\/people.deas.harvard.edu\/~rachna\/papers\/why_phishing_works.pdf. Retrieved in April 2006  Dhamija R. Tygar J. D. and Hearst M. 2006. Why phishing works SecurityFocus Universities study http:\/\/people.deas.harvard.edu\/~rachna\/papers\/why_phishing_works.pdf. Retrieved in April 2006","DOI":"10.1145\/1124772.1124861"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/1978942.1979459"},{"key":"e_1_3_2_1_8_1","volume-title":"Proceedings of the 14th Annual Network and Distributed System Security Symposium (NDSS 2007","author":"Zhang Y.","year":"2007","unstructured":"Zhang , Y. , Egelman , S. , Cranor , L. , and Hong , J . 2007. Phinding Phish: Evaluating Anti-Phishing Tools . In Proceedings of the 14th Annual Network and Distributed System Security Symposium (NDSS 2007 ), San Diego, CA , 28 February -2 March, 2007 , 79--92. Zhang, Y., Egelman, S., Cranor, L., and Hong, J. 2007. Phinding Phish: Evaluating Anti-Phishing Tools. In Proceedings of the 14th Annual Network and Distributed System Security Symposium (NDSS 2007), San Diego, CA, 28 February -2 March, 2007, 79--92."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/1357054.1357219"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/1978942.1979072"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/1978942.1979244"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/1753326.1753382"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/1753326.1753383"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11416-007-0050-4"},{"key":"e_1_3_2_1_15_1","volume-title":"http:\/\/www.google.com\/tools\/firefox\/toolbar\/FT3\/intl\/en. Retrieved","author":"Google Safe Browsing","year":"2006","unstructured":"Google Safe Browsing 2007. http:\/\/www.google.com\/tools\/firefox\/toolbar\/FT3\/intl\/en. Retrieved in April 2006 Google Safe Browsing 2007. http:\/\/www.google.com\/tools\/firefox\/toolbar\/FT3\/intl\/en. Retrieved in April 2006"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/1143120.1143133"},{"key":"e_1_3_2_1_17_1","volume-title":"http:\/\/www.phishtank.com. Retrieved","author":"Phish Tank","year":"2011","unstructured":"Phish Tank 2011. http:\/\/www.phishtank.com. Retrieved in November 2011 Phish Tank 2011. http:\/\/www.phishtank.com. Retrieved in November 2011"},{"key":"e_1_3_2_1_18_1","unstructured":"Google Safe Browsing 2007. Tutorials for Google Safe Browsing http:\/\/www.cs.uta.fi\/%7Ell79452\/Tutorials-GSB.doc  Google Safe Browsing 2007. Tutorials for Google Safe Browsing http:\/\/www.cs.uta.fi\/%7Ell79452\/Tutorials-GSB.doc"},{"key":"e_1_3_2_1_19_1","volume-title":"Google Toolbar for Firefox Help Center http:\/\/www.google.com\/support\/firefox\/bin\/static.py?page=features.html&v=3. Retrieved","author":"Google Safe Browsing","year":"2006","unstructured":"Google Safe Browsing 2007. Google Toolbar for Firefox Help Center http:\/\/www.google.com\/support\/firefox\/bin\/static.py?page=features.html&v=3. Retrieved in April 2006 Google Safe Browsing 2007. Google Toolbar for Firefox Help Center http:\/\/www.google.com\/support\/firefox\/bin\/static.py?page=features.html&v=3. Retrieved in April 2006"},{"key":"e_1_3_2_1_20_1","unstructured":"Phishing Protection 2007. Firefox phishing protection http:\/\/www.mozilla.com\/en-US\/firefox\/phishing-protection\/. Retrieved in April 2007  Phishing Protection 2007. Firefox phishing protection http:\/\/www.mozilla.com\/en-US\/firefox\/phishing-protection\/. Retrieved in April 2007"},{"key":"e_1_3_2_1_21_1","unstructured":"Microsoft 2006. How to shop online more safely http:\/\/www.microsoft.com\/protect\/yourself\/finances\/shopping_us.mspx. Retrieved in Febrary 2007  Microsoft 2006. How to shop online more safely http:\/\/www.microsoft.com\/protect\/yourself\/finances\/shopping_us.mspx. Retrieved in Febrary 2007"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/765891.765936"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.3758\/BF03195514"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/1240624.1240839"}],"event":{"name":"AcademicMindTrek '12: International Conference on Media of the Future","location":"Tampere Finland","acronym":"AcademicMindTrek '12","sponsor":["SIGMM ACM Special Interest Group on Multimedia","SIGCHI ACM Special Interest Group on Computer-Human Interaction"]},"container-title":["Proceeding of the 16th International Academic MindTrek Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2393132.2393170","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2393132.2393170","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T08:19:11Z","timestamp":1750234751000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2393132.2393170"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,10,3]]},"references-count":24,"alternative-id":["10.1145\/2393132.2393170","10.1145\/2393132"],"URL":"https:\/\/doi.org\/10.1145\/2393132.2393170","relation":{},"subject":[],"published":{"date-parts":[[2012,10,3]]},"assertion":[{"value":"2012-10-03","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}