{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,20]],"date-time":"2025-11-20T12:34:01Z","timestamp":1763642041709,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":4,"publisher":"ACM","license":[{"start":{"date-parts":[[2016,4,19]],"date-time":"2016-04-19T00:00:00Z","timestamp":1461024000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2016,4,19]]},"DOI":"10.1145\/2898375.2898382","type":"proceedings-article","created":{"date-parts":[[2016,4,14]],"date-time":"2016-04-14T21:09:21Z","timestamp":1460668161000},"page":"126-126","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":16,"title":["The persuasive phish"],"prefix":"10.1145","author":[{"given":"Olga","family":"Zielinska","sequence":"first","affiliation":[{"name":"North Carolina State University, Raleigh, NC"}]},{"given":"Allaire","family":"Welk","sequence":"additional","affiliation":[{"name":"North Carolina State University, Raleigh, NC"}]},{"given":"Christopher B.","family":"Mayhorn","sequence":"additional","affiliation":[{"name":"North Carolina State University, Raleigh, NC"}]},{"given":"Emerson","family":"Murphy-Hill","sequence":"additional","affiliation":[{"name":"North Carolina State University, Raleigh, NC"}]}],"member":"320","published-online":{"date-parts":[[2016,4,19]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Analysing Persuasion Principles in Phishing Emails. Unpublished Master's Thesis","author":"Akbar N","year":"2014","unstructured":"Akbar , N ( 2014 ). Analysing Persuasion Principles in Phishing Emails. Unpublished Master's Thesis . University of Twente . Enschede, Netherlands. Akbar, N (2014). Analysing Persuasion Principles in Phishing Emails. Unpublished Master's Thesis. University of Twente. Enschede, Netherlands."},{"key":"e_1_3_2_1_2_1","volume-title":"Influence: The psychology of persuasion","author":"Cialdini R. B.","year":"2007","unstructured":"Cialdini , R. B. ( 2007 ). Influence: The psychology of persuasion . New York : Collins . Cialdini, R. B. (2007). Influence: The psychology of persuasion. New York: Collins."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_3_1","DOI":"10.1109\/STAST.2015.10"},{"key":"e_1_3_2_1_4_1","first-page":"1466","volume-title":"Proceedings of the Human Factors and Ergonomics Society Annual Meeting (Vol. 58","author":"Zielinska O. A.","year":"2014","unstructured":"Zielinska , O. A. , Tembe , R. , Hong , K. W. , Ge , X. , Murphy-Hill , E. , & Mayhorn , C. B. ( 2014 ). One Phish, Two Phish, How to Avoid the Internet Phish Analysis of Training Strategies to Detect Phishing Emails . In Proceedings of the Human Factors and Ergonomics Society Annual Meeting (Vol. 58 , No. 1, pp. 1466 -- 1470 ). SAGE Publications Zielinska, O. A., Tembe, R., Hong, K. W., Ge, X., Murphy-Hill, E., & Mayhorn, C. B. (2014). One Phish, Two Phish, How to Avoid the Internet Phish Analysis of Training Strategies to Detect Phishing Emails. In Proceedings of the Human Factors and Ergonomics Society Annual Meeting (Vol. 58, No. 1, pp. 1466--1470). SAGE Publications"}],"event":{"acronym":"HotSoS '16","name":"HotSoS '16: HotSos 2016 Science of Security","location":"Pittsburgh Pennsylvania"},"container-title":["Proceedings of the Symposium and Bootcamp on the Science of Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2898375.2898382","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2898375.2898382","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:56:29Z","timestamp":1750222589000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2898375.2898382"}},"subtitle":["examining the social psychological principles hidden in phishing emails"],"short-title":[],"issued":{"date-parts":[[2016,4,19]]},"references-count":4,"alternative-id":["10.1145\/2898375.2898382","10.1145\/2898375"],"URL":"https:\/\/doi.org\/10.1145\/2898375.2898382","relation":{},"subject":[],"published":{"date-parts":[[2016,4,19]]},"assertion":[{"value":"2016-04-19","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}