{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,6]],"date-time":"2025-12-06T04:43:20Z","timestamp":1764996200151,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":15,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,5,2]],"date-time":"2019-05-02T00:00:00Z","timestamp":1556755200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,5,2]]},"DOI":"10.1145\/3290607.3313026","type":"proceedings-article","created":{"date-parts":[[2019,4,30]],"date-time":"2019-04-30T15:55:05Z","timestamp":1556639705000},"page":"1-6","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":14,"title":["Engaging Users with Educational Games"],"prefix":"10.1145","author":[{"given":"Matt","family":"Dixon","sequence":"first","affiliation":[{"name":"Northumbria University, Newcastle upon Tyne, United Kingdom"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Nalin Asanka","family":"Gamagedara Arachchilage","sequence":"additional","affiliation":[{"name":"University of New South Wales, Canberra, ACT, Australia"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"James","family":"Nicholson","sequence":"additional","affiliation":[{"name":"Northumbria University, Newcastle upon Tyne, United Kingdom"}],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"320","published-online":{"date-parts":[[2019,5,2]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2014.05.046"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2016.02.065"},{"key":"e_1_3_2_1_3_1","first-page":"95","article-title":"Thematic analysis","volume":"24","author":"Braun Virginia","year":"2014","unstructured":"Virginia Braun , Victoria Clarke , and Gareth Terry . 2014 . Thematic analysis . Qual Res Clin Health Psychol 24 (2014), 95 -- 114 . Virginia Braun, Victoria Clarke, and Gareth Terry. 2014. Thematic analysis. Qual Res Clin Health Psychol 24 (2014), 95--114.","journal-title":"Qual Res Clin Health Psychol"},{"key":"e_1_3_2_1_4_1","volume-title":"NoPhish app evaluation: lab and retention study","author":"Canova Gamze","year":"2015","unstructured":"Gamze Canova , Melanie Volkamer , Clemens Bergmann , and Benjamin Reinheimer . 2015. NoPhish app evaluation: lab and retention study . USEC. Internet Society ( 2015 ). Gamze Canova, Melanie Volkamer, Clemens Bergmann, and Benjamin Reinheimer. 2015. NoPhish app evaluation: lab and retention study. USEC. Internet Society (2015)."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1504\/IJMLO.2019.096468"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijhcs.2018.10.004"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2011.179"},{"key":"e_1_3_2_1_9_1","volume-title":"Mark Button, and Victoria Wang.","author":"Klahr Rebecca","year":"2016","unstructured":"Rebecca Klahr , Sophie Amili , Jayesh Navin Shah , Mark Button, and Victoria Wang. 2016 . Cyber security breaches survey 2016. UK Government, Ipsos MORI and University of Portsmouth . DOI= http:\/\/bit. ly\/1T4MveX (2016). Rebecca Klahr, Sophie Amili, Jayesh Navin Shah, Mark Button, and Victoria Wang. 2016. Cyber security breaches survey 2016. UK Government, Ipsos MORI and University of Portsmouth. DOI= http:\/\/bit. ly\/1T4MveX (2016)."},{"key":"e_1_3_2_1_10_1","unstructured":"Aamna Mohdin. 2018. Scammers target students with fake tax refund emails. https:\/\/www.theguardian.com\/money\/2018\/nov\/17\/scammers-target-students-with-fake-tax-refund-emails  Aamna Mohdin. 2018. Scammers target students with fake tax refund emails. https:\/\/www.theguardian.com\/money\/2018\/nov\/17\/scammers-target-students-with-fake-tax-refund-emails"},{"key":"e_1_3_2_1_11_1","volume-title":"Fourteenth Symposium on Usable Privacy and Security ({SOUPS}","author":"Nicholson James","year":"2018","unstructured":"James Nicholson , Lynne Coventry , and Pam Briggs . 2018 . Introducing the cybersurvival task: assessing and addressing staff beliefs about effective cyber protection . In Fourteenth Symposium on Usable Privacy and Security ({SOUPS} 2018). 443--457. James Nicholson, Lynne Coventry, and Pam Briggs. 2018. Introducing the cybersurvival task: assessing and addressing staff beliefs about effective cyber protection. In Fourteenth Symposium on Usable Privacy and Security ({SOUPS} 2018). 443--457."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1177\/1609406917733847"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/3270316.3273042"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/1753326.1753383"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/1280680.1280692"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"crossref","unstructured":"Amber A Smith-Ditizio and Alan D Smith. 2019. Computer Fraud Challenges and Its Legal Implications. In Advanced Methodologies and Technologies in System Security Information Privacy and Forensics. IGI Global 152--165.  Amber A Smith-Ditizio and Alan D Smith. 2019. Computer Fraud Challenges and Its Legal Implications. In Advanced Methodologies and Technologies in System Security Information Privacy and Forensics. IGI Global 152--165.","DOI":"10.4018\/978-1-5225-7492-7.ch013"}],"event":{"name":"CHI '19: CHI Conference on Human Factors in Computing Systems","sponsor":["SIGCHI ACM Special Interest Group on Computer-Human Interaction"],"location":"Glasgow Scotland Uk","acronym":"CHI '19"},"container-title":["Extended Abstracts of the 2019 CHI Conference on Human Factors in Computing Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3290607.3313026","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3290607.3313026","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:54:14Z","timestamp":1750204454000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3290607.3313026"}},"subtitle":["The Case of Phishing"],"short-title":[],"issued":{"date-parts":[[2019,5,2]]},"references-count":15,"alternative-id":["10.1145\/3290607.3313026","10.1145\/3290607"],"URL":"https:\/\/doi.org\/10.1145\/3290607.3313026","relation":{},"subject":[],"published":{"date-parts":[[2019,5,2]]},"assertion":[{"value":"2019-05-02","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}