{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,4]],"date-time":"2025-07-04T05:34:51Z","timestamp":1751607291800,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":18,"publisher":"ACM","license":[{"start":{"date-parts":[[2014,4,8]],"date-time":"2014-04-08T00:00:00Z","timestamp":1396915200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000015","name":"U.S. Department of Energy","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100000015","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2014,4,8]]},"DOI":"10.1145\/2600176.2600178","type":"proceedings-article","created":{"date-parts":[[2014,8,12]],"date-time":"2014-08-12T13:53:50Z","timestamp":1407851630000},"page":"1-7","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":9,"title":["Phishing in international waters"],"prefix":"10.1145","author":[{"given":"Rucha","family":"Tembe","sequence":"first","affiliation":[{"name":"North Carolina State University"}]},{"given":"Olga","family":"Zielinska","sequence":"additional","affiliation":[{"name":"North Carolina State University"}]},{"given":"Yuqi","family":"Liu","sequence":"additional","affiliation":[{"name":"Zhejiang University, China"}]},{"given":"Kyung Wha","family":"Hong","sequence":"additional","affiliation":[{"name":"North Carolina State University"}]},{"given":"Emerson","family":"Murphy-Hill","sequence":"additional","affiliation":[{"name":"North Carolina State University"}]},{"given":"Chris","family":"Mayhorn","sequence":"additional","affiliation":[{"name":"North Carolina State University"}]},{"given":"Xi","family":"Ge","sequence":"additional","affiliation":[{"name":"North Carolina State University"}]}],"member":"320","published-online":{"date-parts":[[2014,4,8]]},"reference":[{"volume-title":"Phishing Kits -- The same wolf, just a different sheep's clothing","year":"2013","key":"e_1_3_2_1_1_1","unstructured":"RSA. 2013. Phishing Kits -- The same wolf, just a different sheep's clothing . 2013 . Retrieved from: http:\/\/www.emc.com\/collateral\/fraud-report\/rsa-online-fraud-report-012013.pdf RSA. 2013. Phishing Kits -- The same wolf, just a different sheep's clothing. 2013. Retrieved from: http:\/\/www.emc.com\/collateral\/fraud-report\/rsa-online-fraud-report-012013.pdf"},{"key":"e_1_3_2_1_2_1","volume-title":"Gartner Survey Shows Phishing Attacks Escalated in 2007","author":"Gartner","year":"2007","unstructured":"Gartner . 2007. Gartner Survey Shows Phishing Attacks Escalated in 2007 ; More than $3 Billion Lost to These Attacks. Press release. ( December 17, 2007 ) Retrieved from: http:\/\/www.gartner.com\/it\/page.jsp?id=565125 Gartner. 2007. Gartner Survey Shows Phishing Attacks Escalated in 2007; More than $3 Billion Lost to These Attacks. Press release. (December 17, 2007) Retrieved from: http:\/\/www.gartner.com\/it\/page.jsp?id=565125"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1037\/e572172013-438"},{"key":"e_1_3_2_1_4_1","volume-title":"Abstract. (June","author":"Rekouche K.","year":"2011","unstructured":"Rekouche , K. 2011 . Early phishing . Abstract. (June , 2011) Retrieved from: http:\/\/arxiv.org\/abs\/1106.4692v1 Rekouche, K. 2011. Early phishing. Abstract. (June, 2011) Retrieved from: http:\/\/arxiv.org\/abs\/1106.4692v1"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2005.04.003"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2005.12.004"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/1143120.1143131"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1108\/17505931211241369"},{"key":"e_1_3_2_1_9_1","first-page":"87","article-title":"Social networking websites in India and the United States: A cross--national comparison of online privacy and communication. Issues inform","author":"Marshall B. A.","year":"2008","unstructured":"Marshall , B. A. , Cardon , P. W. , Norris , D. T. , Goreva , N. , & D'Souza , R. 2008 . Social networking websites in India and the United States: A cross--national comparison of online privacy and communication. Issues inform . Syst. IX , 2 (2008) 87 -- 94 . Marshall, B. A., Cardon, P. W., Norris, D. T., Goreva, N., & D'Souza, R. 2008. Social networking websites in India and the United States: A cross--national comparison of online privacy and communication. Issues inform. Syst. IX, 2 (2008) 87--94.","journal-title":"Syst."},{"key":"e_1_3_2_1_10_1","first-page":"41","article-title":"Facilitating global ecommerce: A comparison of consumers' willingness to disclose personal information online in the U.S and in India","volume":"11","author":"Gupta B.","year":"2010","unstructured":"Gupta , B. , Iyer , L. S. , & Weisskirch , R. S. 2010 . Facilitating global ecommerce: A comparison of consumers' willingness to disclose personal information online in the U.S and in India . J. of Electron. Commerce Research. 11 , 1, (2010), 41 -- 52 . Gupta, B., Iyer, L. S., & Weisskirch, R. S. 2010. Facilitating global ecommerce: A comparison of consumers' willingness to disclose personal information online in the U.S and in India. J. of Electron. Commerce Research. 11, 1, (2010), 41--52.","journal-title":"J. of Electron. Commerce Research."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10660-013-9105-4"},{"key":"e_1_3_2_1_12_1","volume-title":"Proceedings of the 17th World Congress of the International Ergonomics Association","author":"Nyeste P. G.","year":"2009","unstructured":"Nyeste , P. G. , & Mayhorn , C. B. 2009 . Perceptions of cybersecurity: An exploratory analysis . In Proceedings of the 17th World Congress of the International Ergonomics Association ( Beijing, China , August 9-14, 2009). Nyeste, P. G., & Mayhorn, C. B. 2009. Perceptions of cybersecurity: An exploratory analysis. In Proceedings of the 17th World Congress of the International Ergonomics Association (Beijing, China, August 9-14, 2009)."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/2487788.2488037"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/FIE.2005.1611900"},{"key":"e_1_3_2_1_15_1","volume-title":"Social and Human Elements of Information Security: Emerging trends and countermeasures","author":"West R.","unstructured":"West , R. , Mayhorn , C. B. , Hardee , J. , Mendel , J. 2009. The Weakest Link: A Psychological Perspective on Why Users Make Poor Security Decisions . In Social and Human Elements of Information Security: Emerging trends and countermeasures ( 1 st Ed.). Hershey, PA : IGI Global, Ch . 4, 43--60. West, R., Mayhorn, C. B., Hardee, J., Mendel, J. 2009. The Weakest Link: A Psychological Perspective on Why Users Make Poor Security Decisions. In Social and Human Elements of Information Security: Emerging trends and countermeasures (1st Ed.). Hershey, PA: IGI Global, Ch. 4, 43--60.","edition":"1"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/1124772.1124861"},{"key":"e_1_3_2_1_17_1","volume-title":"Cultural Ergonomics: Theory, Methods, and Applications","author":"Mayhorn C. B.","unstructured":"Mayhorn , C. B. , Wogalter , M. W. , Goldsworthy , R. C. , McDougald , B. R. 2013. Creative Inclusive Warnings: Role of Culture in the Design and Evaluation of Risk Communications . In Cultural Ergonomics: Theory, Methods, and Applications . ( 1 st Ed.) Boca Raton, FL : CRC Press , Ch. 5, 97--128. Mayhorn, C. B., Wogalter, M. W., Goldsworthy, R. C., McDougald, B. R. 2013. Creative Inclusive Warnings: Role of Culture in the Design and Evaluation of Risk Communications. In Cultural Ergonomics: Theory, Methods, and Applications. (1st Ed.) Boca Raton, FL: CRC Press, Ch. 5, 97--128.","edition":"1"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/STAST.2013.10"}],"event":{"name":"HotSoS '14: Symposium and Bootcamp on the Science of Security","sponsor":["No. Carolina State Univeresity North Carolina State University"],"location":"Raleigh North Carolina USA","acronym":"HotSoS '14"},"container-title":["Proceedings of the 2014 Symposium and Bootcamp on the Science of Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2600176.2600178","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2600176.2600178","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T08:10:25Z","timestamp":1750234225000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2600176.2600178"}},"subtitle":["exploring cross-national differences in phishing conceptualizations between Chinese, Indian and American samples"],"short-title":[],"issued":{"date-parts":[[2014,4,8]]},"references-count":18,"alternative-id":["10.1145\/2600176.2600178","10.1145\/2600176"],"URL":"https:\/\/doi.org\/10.1145\/2600176.2600178","relation":{},"subject":[],"published":{"date-parts":[[2014,4,8]]},"assertion":[{"value":"2014-04-08","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}