{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,13]],"date-time":"2026-04-13T21:47:05Z","timestamp":1776116825602,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":60,"publisher":"ACM","license":[{"start":{"date-parts":[[2017,5,2]],"date-time":"2017-05-02T00:00:00Z","timestamp":1493683200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["SES-1450624"],"award-info":[{"award-number":["SES-1450624"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2017,5,2]]},"DOI":"10.1145\/3025453.3025831","type":"proceedings-article","created":{"date-parts":[[2017,5,3]],"date-time":"2017-05-03T12:34:28Z","timestamp":1493814868000},"page":"6412-6424","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":115,"title":["Dissecting Spear Phishing Emails for Older vs Young Adults"],"prefix":"10.1145","author":[{"given":"Daniela","family":"Oliveira","sequence":"first","affiliation":[{"name":"University of Florida, Gainesville, FL, USA"}]},{"given":"Harold","family":"Rocha","sequence":"additional","affiliation":[{"name":"University of Florida, Gainesville, FL, USA"}]},{"given":"Huizi","family":"Yang","sequence":"additional","affiliation":[{"name":"University of Florida, Gainesville, USA"}]},{"given":"Donovan","family":"Ellis","sequence":"additional","affiliation":[{"name":"University of Florida, Gainesville, FL, USA"}]},{"given":"Sandeep","family":"Dommaraju","sequence":"additional","affiliation":[{"name":"University of Florida, Gainesville, FL, USA"}]},{"given":"Melis","family":"Muradoglu","sequence":"additional","affiliation":[{"name":"University of Florida &amp; New York University, Gainesville, FL, USA"}]},{"given":"Devon","family":"Weir","sequence":"additional","affiliation":[{"name":"University of Florida, Gainesville, FL, USA"}]},{"given":"Adam","family":"Soliman","sequence":"additional","affiliation":[{"name":"University of Florida, Gainesville, FL, USA"}]},{"given":"Tian","family":"Lin","sequence":"additional","affiliation":[{"name":"University of Florida, Gainesville, FL, USA"}]},{"given":"Natalie","family":"Ebner","sequence":"additional","affiliation":[{"name":"University of Florida, Gainesville, USA"}]}],"member":"320","published-online":{"date-parts":[[2017,5,2]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1093\/wentk\/9780199918096.001.0001"},{"key":"e_1_3_2_1_2_1","unstructured":"L. James Phishing Exposed. Syngress 2006.  L. James Phishing Exposed. Syngress 2006."},{"key":"e_1_3_2_1_3_1","volume-title":"Advanced Persistent Threat Hacking: The Art and Science of Hacking Any Organization","author":"Wrightson T.","year":"2014","unstructured":"T. Wrightson , Advanced Persistent Threat Hacking: The Art and Science of Hacking Any Organization . McGraw-Hill Education , 2014 . T. Wrightson, Advanced Persistent Threat Hacking: The Art and Science of Hacking Any Organization. McGraw-Hill Education, 2014."},{"key":"e_1_3_2_1_4_1","unstructured":"RSA\n  : SecurID Attack Was Phishing Via an Excel Spreadsheet (https:\/\/threatpost.com\/rsasecurid-attack-was-phishing-excelspreadsheet-040111\/75099\/).  RSA: SecurID Attack Was Phishing Via an Excel Spreadsheet (https:\/\/threatpost.com\/rsasecurid-attack-was-phishing-excelspreadsheet-040111\/75099\/)."},{"key":"e_1_3_2_1_5_1","unstructured":"J. Carr Cyber Warfare. O'Reily 2011.  J. Carr Cyber Warfare. O'Reily 2011."},{"key":"e_1_3_2_1_6_1","unstructured":"Email Attacks: This Time It's Personal (http: \/\/itknowledgeexchange.techtarget.com\/ security-detail\/cisco-report-emailattacks-this-time-its-personal\/).  Email Attacks: This Time It's Personal (http: \/\/itknowledgeexchange.techtarget.com\/ security-detail\/cisco-report-emailattacks-this-time-its-personal\/)."},{"key":"e_1_3_2_1_7_1","volume-title":"Influence - The Psychology of Persuasion. Collins Business Essentials","author":"Cialdini R. B.","year":"2006","unstructured":"R. B. Cialdini , Influence - The Psychology of Persuasion. Collins Business Essentials , 2006 . R. B. Cialdini, Influence - The Psychology of Persuasion. Collins Business Essentials, 2006."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1037\/0033-2909.122.3.231"},{"key":"e_1_3_2_1_9_1","volume-title":"When I'm 64 - A Review of Decision-Making Processes: Weighing the Risks and Benefits of Aging","author":"Mather M.","year":"2006","unstructured":"M. Mather , When I'm 64 - A Review of Decision-Making Processes: Weighing the Risks and Benefits of Aging . The National Academies Press , 2006 . M. Mather, When I'm 64 - A Review of Decision-Making Processes: Weighing the Risks and Benefits of Aging. The National Academies Press, 2006."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1093\/geronj\/45.2.P75"},{"key":"e_1_3_2_1_11_1","volume-title":"Age Differences in Risky Choice: A Meta-Analysis,\" NY Academy of Sciences","author":"Mata R.","year":"2011","unstructured":"R. Mata , A. Josef , G. Samanez-Larkin , and R. Hertwig , \" Age Differences in Risky Choice: A Meta-Analysis,\" NY Academy of Sciences , 2011 . R. Mata, A. Josef, G. Samanez-Larkin, and R. Hertwig, \"Age Differences in Risky Choice: A Meta-Analysis,\" NY Academy of Sciences, 2011."},{"key":"e_1_3_2_1_12_1","volume-title":"Wisdom and Aging: Irrational Preferences in College Students But Not Older Adults,\" Elsevier Science","author":"Tentoria K.","year":"2001","unstructured":"K. Tentoria , D. Oshersonb , L. Hasherc , and C. May , \" Wisdom and Aging: Irrational Preferences in College Students But Not Older Adults,\" Elsevier Science , 2001 . K. Tentoria, D. Oshersonb, L. Hasherc, and C. May, \"Wisdom and Aging: Irrational Preferences in College Students But Not Older Adults,\" Elsevier Science, 2001."},{"key":"e_1_3_2_1_13_1","unstructured":"USA Census 2010 (http:\/\/www.census.gov\/2010census\/).  USA Census 2010 (http:\/\/www.census.gov\/2010census\/)."},{"key":"e_1_3_2_1_14_1","unstructured":"Healthy Aging Improving and Extending Quality of Life Among Older Americans CDC (http:\/\/www.cdc.gov\/nccdphp\/publications\/aag\/).  Healthy Aging Improving and Extending Quality of Life Among Older Americans CDC (http:\/\/www.cdc.gov\/nccdphp\/publications\/aag\/)."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1002\/cncr.23944"},{"key":"e_1_3_2_1_16_1","volume-title":"Neuroscience","author":"Samanez-Larkin G. R.","year":"2015","unstructured":"G. R. Samanez-Larkin and B. Knutson , \" Decision Making In The Ageing Brain: Changes In Affective And Motivational Circuits,\" Nature reviews . Neuroscience , 2015 . G. R. Samanez-Larkin and B. Knutson, \"Decision Making In The Ageing Brain: Changes In Affective And Motivational Circuits,\" Nature reviews. Neuroscience, 2015."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1093\/occmed\/50.7.478"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2013.106"},{"key":"e_1_3_2_1_19_1","volume-title":"Qrishing: The susceptibility of smartphone users to qr code phishing attacks,\" Carnegie Mellon University-CyLab-12-022","author":"Vidas T.","year":"2012","unstructured":"T. Vidas , E. Owusu , S. Wang , C. Zen , and L. F. Cranor , \" Qrishing: The susceptibility of smartphone users to qr code phishing attacks,\" Carnegie Mellon University-CyLab-12-022 , 2012 . T. Vidas, E. Owusu, S. Wang, C. Zen, and L. F. Cranor, \"Qrishing: The susceptibility of smartphone users to qr code phishing attacks,\" Carnegie Mellon University-CyLab-12-022, 2012."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/1242572.1242660"},{"key":"e_1_3_2_1_21_1","volume-title":"ltd","author":"Toolbar N.","year":"2009","unstructured":"N. Toolbar , \"Netcraft , ltd ,\" 2009 . N. Toolbar, \"Netcraft, ltd,\" 2009."},{"key":"e_1_3_2_1_22_1","volume-title":"Phinding phish: Evaluating anti-phishing tools,\" ISOC","author":"Zhang Y.","year":"2006","unstructured":"Y. Zhang , S. Egelman , L. Cranor , and J. Hong , \" Phinding phish: Evaluating anti-phishing tools,\" ISOC , 2006 . Y. Zhang, S. Egelman, L. Cranor, and J. Hong, \"Phinding phish: Evaluating anti-phishing tools,\" ISOC, 2006."},{"key":"e_1_3_2_1_23_1","volume-title":"An empirical analysis of phishing blacklists","author":"Sheng S.","year":"2009","unstructured":"S. Sheng , B. Wardman , G. Warner , L. F. Cranor , J. Hong , and C. Zhang , \" An empirical analysis of phishing blacklists ,\" 2009 . S. Sheng, B. Wardman, G. Warner, L. F. Cranor, J. Hong, and C. Zhang, \"An empirical analysis of phishing blacklists,\" 2009."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/1357054.1357219"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/1124772.1124863"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/2078827.2078838"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/1124772.1124861"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/1280680.1280692"},{"key":"e_1_3_2_1_29_1","volume-title":"ProQuest","author":"Kumaraguru P.","year":"2009","unstructured":"P. Kumaraguru , Phishguru : a system for educating users about semantic attacks . ProQuest , 2009 . P. Kumaraguru, Phishguru: a system for educating users about semantic attacks. ProQuest, 2009."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/1240624.1240760"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/1754393.1754396"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/1753326.1753383"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/1572532.1572536"},{"issue":"5","key":"e_1_3_2_1_34_1","first-page":"30","article-title":"Financial decision making and the aging brain","volume":"26","author":"Samanez-Larkin G. R.","year":"2013","unstructured":"G. R. Samanez-Larkin , \" Financial decision making and the aging brain ,\" APS observer , vol. 26 , no. 5 , p. 30 , 2013 . G. R. Samanez-Larkin, \"Financial decision making and the aging brain,\" APS observer, vol. 26, no. 5, p. 30, 2013.","journal-title":"APS observer"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/1143120.1143131"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/1299015.1299019"},{"key":"e_1_3_2_1_37_1","volume-title":"Carleton University","author":"Boothroyd V.","year":"2014","unstructured":"V. Boothroyd , \"Older adults' Perception of Online Risk,\" Master's thesis , Carleton University , 2014 . V. Boothroyd, \"Older adults' Perception of Online Risk,\" Master's thesis, Carleton University, 2014."},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1177\/0963721414552473"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1093\/geronb\/gbs064"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1073\/pnas.1218518109"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1037\/a0023380"},{"key":"e_1_3_2_1_42_1","volume-title":"Sommerville & J. Decety","author":"Ebner N. C.","year":"2015","unstructured":"N. C. Ebner , P. E. Bailey , M. Horta , and J. Joiner , Multidisciplinary Perspective on Prosociality in Aging. (Invited book chapter) . Sommerville & J. Decety , 2015 . N. C. Ebner, P. E. Bailey, M. Horta, and J. Joiner, Multidisciplinary Perspective on Prosociality in Aging. (Invited book chapter). Sommerville & J. Decety, 2015."},{"key":"e_1_3_2_1_43_1","volume-title":"Sommerville & J. Decety","author":"Ebner N. C.","year":"2015","unstructured":"N. C. Ebner , P. E. Bailey , M. Horta , J. Joiner , and S. W. C. Chang, Multidisciplinary perspective on prosociality in aging. In (Eds.), in Social Cognition for the Frontiers in Developmental Science Series (Psychology). J . Sommerville & J. Decety , 2015 . N. C. Ebner, P. E. Bailey, M. Horta, J. Joiner, and S. W. C. Chang, Multidisciplinary perspective on prosociality in aging. In (Eds.), in Social Cognition for the Frontiers in Developmental Science Series (Psychology). J. Sommerville & J. Decety, 2015."},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1093\/geronb\/61.4.P187"},{"key":"e_1_3_2_1_45_1","first-page":"1","volume-title":"Meta-Analysis of the Age-Related Positivity Effect: Age Differences in Preferences for Positive Over Negative Information,\" in Psychology and Aging","author":"Reed L. C. A. E.","year":"2014","unstructured":"L. C. A. E. Reed and J. A. Mikels , \" Meta-Analysis of the Age-Related Positivity Effect: Age Differences in Preferences for Positive Over Negative Information,\" in Psychology and Aging , pp. 1 -- 15 , 2014 . L. C. A. E. Reed and J. A. Mikels, \"Meta-Analysis of the Age-Related Positivity Effect: Age Differences in Preferences for Positive Over Negative Information,\" in Psychology and Aging, pp. 1--15, 2014."},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1145\/322796.322806"},{"key":"e_1_3_2_1_47_1","volume-title":"Risk Communication Design for Older Adults,\" Gerontechnology","author":"Garg V.","unstructured":"V. Garg and L. J. Camp , \" Risk Communication Design for Older Adults,\" Gerontechnology , vol. 11 , no. 2, 2012. V. Garg and L. J. Camp, \"Risk Communication Design for Older Adults,\" Gerontechnology, vol. 11, no. 2, 2012."},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2006.11.004"},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.5555\/1785594.1785641"},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijhcs.2011.07.007"},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1109\/HICSS.2012.245"},{"key":"e_1_3_2_1_52_1","volume-title":"Policy Sciences","author":"Fischhoff B.","unstructured":"B. Fischhoff , P. Slovic , S. Lichtenstein , and B. C. Stephen Read , \"How Safe is Safe Enough\" A Osychometric Study of Attitudes Towards Technological Risks and Benefits , Policy Sciences , vol. 9 , no. 2, 1978. B. Fischhoff, P. Slovic, S. Lichtenstein, and B. C. Stephen Read, \"How Safe is Safe Enough\" A Osychometric Study of Attitudes Towards Technological Risks and Benefits, Policy Sciences, vol. 9, no. 2, 1978."},{"key":"e_1_3_2_1_53_1","unstructured":"Lies Secrets and Scams: How to Prevent Elder Abuse (http:\/\/www.consumerreports.org\/cro\/ consumer-protection\/preventing-elderabuse).  Lies Secrets and Scams: How to Prevent Elder Abuse (http:\/\/www.consumerreports.org\/cro\/ consumer-protection\/preventing-elderabuse)."},{"key":"e_1_3_2_1_54_1","unstructured":"D. Kahneman Thinking Fast and Slow. Farrar Straus and Giroux 2011.  D. Kahneman Thinking Fast and Slow. Farrar Straus and Giroux 2011."},{"key":"e_1_3_2_1_55_1","volume-title":"The Art of Deception: Controlling the Human Element of Security","author":"Mitnick K.","year":"2002","unstructured":"K. Mitnick , W. L. Simonand , and S. Wozniak , The Art of Deception: Controlling the Human Element of Security . Wiley , 2002 . K. Mitnick, W. L. Simonand, and S. Wozniak, The Art of Deception: Controlling the Human Element of Security. Wiley, 2002."},{"key":"e_1_3_2_1_56_1","volume-title":"Social Engineering: The Art of Human Hacking","author":"Hadnagy C.","year":"2010","unstructured":"C. Hadnagy , Social Engineering: The Art of Human Hacking . Wiley , 2010 . C. Hadnagy, Social Engineering: The Art of Human Hacking. Wiley, 2010."},{"key":"e_1_3_2_1_57_1","volume-title":"Life Span Theory in Developmental Psychology,\" Wiley Online Library","author":"Baltes P. B.","year":"2007","unstructured":"P. B. Baltes , U. Lindenberger , and U. M. Staudinger , \" Life Span Theory in Developmental Psychology,\" Wiley Online Library , 2007 . P. B. Baltes, U. Lindenberger, and U. M. Staudinger, \"Life Span Theory in Developmental Psychology,\" Wiley Online Library, 2007."},{"key":"e_1_3_2_1_58_1","first-page":"111","article-title":"The telephone interview for cognitive status","volume":"1","author":"Brandt J.","year":"1988","unstructured":"J. Brandt , M. Spencer , and D. R. Davies , \" The telephone interview for cognitive status ,\" Neuropsychiatry, Neuropsychology, & Behavioral Neurology , vol. 1 , pp. 111 -- 117 , 1988 . J. Brandt, M. Spencer, and D. R. Davies, \"The telephone interview for cognitive status,\" Neuropsychiatry, Neuropsychology, & Behavioral Neurology, vol. 1, pp. 111--117, 1988.","journal-title":"Neuropsychiatry, Neuropsychology, & Behavioral Neurology"},{"key":"e_1_3_2_1_59_1","doi-asserted-by":"publisher","DOI":"10.1093\/ageing\/afl095"},{"key":"e_1_3_2_1_60_1","unstructured":"Symantec Internet Security Threat Report 2016 https:\/\/www.symantec.com\/securitycenter\/threat-report.  Symantec Internet Security Threat Report 2016 https:\/\/www.symantec.com\/securitycenter\/threat-report."}],"event":{"name":"CHI '17: CHI Conference on Human Factors in Computing Systems","location":"Denver Colorado USA","acronym":"CHI '17","sponsor":["SIGCHI ACM Special Interest Group on Computer-Human Interaction"]},"container-title":["Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3025453.3025831","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3025453.3025831","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3025453.3025831","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T03:03:39Z","timestamp":1750215819000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3025453.3025831"}},"subtitle":["On the Interplay of Weapons of Influence and Life Domains in Predicting Susceptibility to Phishing"],"short-title":[],"issued":{"date-parts":[[2017,5,2]]},"references-count":60,"alternative-id":["10.1145\/3025453.3025831","10.1145\/3025453"],"URL":"https:\/\/doi.org\/10.1145\/3025453.3025831","relation":{},"subject":[],"published":{"date-parts":[[2017,5,2]]},"assertion":[{"value":"2017-05-02","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}