{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,13]],"date-time":"2026-04-13T17:40:41Z","timestamp":1776102041185,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":48,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,4,21]],"date-time":"2020-04-21T00:00:00Z","timestamp":1587427200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/100004789","name":"State Farm","doi-asserted-by":"publisher","award":["Doctoral Fellowship Program"],"award-info":[{"award-number":["Doctoral Fellowship Program"]}],"id":[{"id":"10.13039\/100004789","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100007515","name":"National Science Foundation","doi-asserted-by":"publisher","award":["CNS 1518741"],"award-info":[{"award-number":["CNS 1518741"]}],"id":[{"id":"10.13039\/100007515","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,4,21]]},"DOI":"10.1145\/3313831.3376298","type":"proceedings-article","created":{"date-parts":[[2020,5,27]],"date-time":"2020-05-27T13:14:48Z","timestamp":1590585288000},"page":"1-12","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":23,"title":["Measuring Identity Confusion with Uniform Resource Locators"],"prefix":"10.1145","author":[{"given":"Joshua","family":"Reynolds","sequence":"first","affiliation":[{"name":"University of Illinois at Urbana-Champaign, Urbana, IL, USA"}]},{"given":"Deepak","family":"Kumar","sequence":"additional","affiliation":[{"name":"University of Illinois at Urbana-Champaign, Champaign, IL, USA"}]},{"given":"Zane","family":"Ma","sequence":"additional","affiliation":[{"name":"University of Illinois at Urbana-Champaign, Urbana, IL, USA"}]},{"given":"Rohan","family":"Subramanian","sequence":"additional","affiliation":[{"name":"University of Illinois at Urbana-Champaign, Urbana, IL, USA"}]},{"given":"Meishan","family":"Wu","sequence":"additional","affiliation":[{"name":"University of Illinois at Urbana-Champaign, Urbana, IL, USA"}]},{"given":"Martin","family":"Shelton","sequence":"additional","affiliation":[{"name":"Google, Inc., San Francisco, CA, USA"}]},{"given":"Joshua","family":"Mason","sequence":"additional","affiliation":[{"name":"University of Illinois at Urbana-Champaign, Urbana, IL, USA"}]},{"given":"Emily","family":"Stark","sequence":"additional","affiliation":[{"name":"Google, Inc., Mountain View, CA, USA"}]},{"given":"Michael","family":"Bailey","sequence":"additional","affiliation":[{"name":"University of Illinois at Urbana-Champaign, Champaign, IL, USA"}]}],"member":"320","published-online":{"date-parts":[[2020,4,23]]},"reference":[{"key":"e_1_3_2_2_1_1","unstructured":"2019. PhishTank. https:\/\/www.phishtank.com. (2019)."},{"key":"e_1_3_2_2_2_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2015.23058"},{"key":"e_1_3_2_2_3_1","volume-title":"22nd USENIX Security Symposium.","author":"Akhawe Devdatta","year":"2013","unstructured":"Devdatta Akhawe and Adrienne Porter Felt. 2013. Alice in warningland: A large-scale field study of browser security warning effectiveness. In 22nd USENIX Security Symposium."},{"key":"e_1_3_2_2_4_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijhcs.2015.05.005"},{"key":"e_1_3_2_2_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSPW.2019.00027"},{"key":"e_1_3_2_2_6_1","volume-title":"Symposium on Digital Behaviour Intervention for Cyber Security.","author":"Althobaiti Kholoud","year":"2018","unstructured":"Kholoud Althobaiti, Kami Vaniea, and Serena Zheng. 2018. Faheem: Explaining URLs to people using a Slack bot. In Symposium on Digital Behaviour Intervention for Cyber Security."},{"key":"e_1_3_2_2_7_1","volume-title":"Phishing threat avoidance behaviour: An empirical investigation. Computers in Human Behavior","author":"Gamagedara Arachchilage Nalin Asanka","year":"2016","unstructured":"Nalin Asanka Gamagedara Arachchilage, Steve Love, and Konstantin Beznosov. 2016. Phishing threat avoidance behaviour: An empirical investigation. Computers in Human Behavior (2016)."},{"key":"e_1_3_2_2_8_1","unstructured":"T. Berners-Lee. 1994. Universal Resource Identifiers in www.(1994)."},{"key":"e_1_3_2_2_9_1","doi-asserted-by":"crossref","unstructured":"T. Berners-Lee L. Masinter and M. McCahill. 1994. Uniform Resource Locators (URL). (1994).","DOI":"10.17487\/rfc1738"},{"key":"e_1_3_2_2_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/1655008.1655012"},{"key":"e_1_3_2_2_11_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-11851-2_14"},{"key":"e_1_3_2_2_12_1","volume-title":"Anti-Abuse and Spam Conference.","author":"Chhabra Sidharth","year":"2011","unstructured":"Sidharth Chhabra, Anupama Aggarwal, Fabricio Benevenuto, and Ponnurangam Kumaraguru. 2011. Phi.sh\/$ocial: the phishing landscape through short urls. In 8th Annual Collaboration, Electronic messaging, Anti-Abuse and Spam Conference."},{"key":"e_1_3_2_2_13_1","volume-title":"Uncovering content publishing and sharing through URL shortening services. Telematics and Informatics","author":"Choi Daejin","year":"2018","unstructured":"Daejin Choi, Jinyoung Han, Selin Chun, Efstratios Rappos, Stephan Robert, and Ted Taekyoung Kwon. 2018. Bit.ly\/practice: Uncovering content publishing and sharing through URL shortening services. Telematics and Informatics (2018)."},{"key":"e_1_3_2_2_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/1073001.1073009"},{"key":"e_1_3_2_2_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/1124772.1124861"},{"key":"e_1_3_2_2_16_1","volume-title":"2nd Anti-phishing working group eCrime researchers summit.","author":"Downs Julie S","unstructured":"Julie S Downs, Mandy Holbrook, and Lorrie Faith Cranor. 2007. Behavioral response to phishing risk. In 2nd Anti-phishing working group eCrime researchers summit."},{"key":"e_1_3_2_2_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/1143120.1143131"},{"key":"e_1_3_2_2_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/1357054.1357219"},{"key":"e_1_3_2_2_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/2702123.2702249"},{"key":"e_1_3_2_2_20_1","volume-title":"29th ACM Conference Human Factors in Computing Systems. ACM.","author":"Erkkila J","year":"2011","unstructured":"J Erkkila. 2011. Why we fall for phishing. In 29th ACM Conference Human Factors in Computing Systems. ACM."},{"key":"e_1_3_2_2_21_1","volume-title":"12th Symposium On Usable Privacy and Security (SOUPS).","author":"Felt Adrienne Porter","year":"2016","unstructured":"Adrienne Porter Felt, Robert W Reeder, Alex Ainslie, Helen Harris, Max Walker, Christopher Thompson, Mustafa Embre Acer, Elisabeth Morant, and Sunny Consolvo. 2016. Rethinking connection security indicators. In 12th Symposium On Usable Privacy and Security (SOUPS)."},{"key":"e_1_3_2_2_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/1242572.1242660"},{"key":"e_1_3_2_2_23_1","doi-asserted-by":"crossref","unstructured":"R. Fielding J Gettys J. Mogul H Frystyk L. Masinter P. Leach and T. Berners-Lee. 1999. Hypertext Transfer Protocol -- HTTP\/1.1. (1999).","DOI":"10.17487\/rfc2616"},{"key":"e_1_3_2_2_24_1","volume-title":"The homograph attack. Commun. ACM 45","author":"Gabrilovich Evgeniy","year":"2002","unstructured":"Evgeniy Gabrilovich and Alex Gontmakher. 2002. The homograph attack. Commun. ACM 45 (2002)."},{"key":"e_1_3_2_2_25_1","unstructured":"Google. 2016. IDN in Google Chrome. https:\/\/www.chromium.org\/developers\/design-documents\/ idn-in-google-chrome. (2016)."},{"key":"e_1_3_2_2_26_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-77366-5_32"},{"key":"e_1_3_2_2_27_1","volume-title":"11th Symposium On Usable Privacy and Security (SOUPS).","author":"Kang Ruogu","year":"2015","unstructured":"Ruogu Kang, Laura Dabbish, Nathaniel Fruchter, and Sara Kiesler. 2015. \"My Data Just Goes Everywhere:\" User Mental Models of the Internet and Implications for Privacy and Security. In 11th Symposium On Usable Privacy and Security (SOUPS)."},{"key":"e_1_3_2_2_28_1","volume-title":"Malicious URL protection based on attackers' habitual behavioral analysis. Computers & Security 77","author":"Kim Sungjin","year":"2018","unstructured":"Sungjin Kim, Jinkook Kim, and Brent ByungHoon Kang. 2018. Malicious URL protection based on attackers' habitual behavioral analysis. Computers & Security 77 (2018)."},{"key":"e_1_3_2_2_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134002"},{"key":"e_1_3_2_2_30_1","volume-title":"Nophish: evaluation of a web application that teaches people being aware of phishing attacks. Informatik 2016","author":"Kunz Alexandra","year":"2016","unstructured":"Alexandra Kunz, Melanie Volkamer, Simon Stockhardt, Sven Palberg, Tessa Lottermann, and Eric Piegert. 2016. Nophish: evaluation of a web application that teaches people being aware of phishing attacks. Informatik 2016 (2016)."},{"key":"e_1_3_2_2_31_1","volume-title":"The assessment of interrater agreement for multiple attribute responses","author":"Kupper Lawrence L","unstructured":"Lawrence L Kupper and Kerry B Hafner. 1989. The assessment of interrater agreement for multiple attribute responses. International Biometric Society. Implementation by Nathan Malkin at https:\/\/github.com\/nmalkin\/kupper_hafner"},{"key":"e_1_3_2_2_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/1978942.1979244"},{"key":"e_1_3_2_2_33_1","unstructured":"Mozilla. 2017. IDN Display Algorithm. https:\/\/wiki.mozilla.org\/IDN_Display_Algorithm. (2017)."},{"key":"e_1_3_2_2_34_1","volume-title":"Reputation as a sufficient condition for data quality on Amazon Mechanical Turk. Behavior research methods 46","author":"Peer Eyal","year":"2014","unstructured":"Eyal Peer, Joachim Vosgerau, and Alessandro Acquisti. 2014. Reputation as a sufficient condition for data quality on Amazon Mechanical Turk. Behavior research methods 46 (2014)."},{"key":"e_1_3_2_2_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/3290605.3300748"},{"key":"e_1_3_2_2_36_1","unstructured":"The Chromium Project. 2019. Guidelines for URL Display. https:\/\/chromium.googlesource.com\/chromium\/ src\/+\/master\/docs\/security\/url_display_guidelines\/ url_display_guidelines.md. (2019)."},{"key":"e_1_3_2_2_37_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00014"},{"key":"e_1_3_2_2_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3363188"},{"key":"e_1_3_2_2_39_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2007.35"},{"key":"e_1_3_2_2_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/1280680.1280692"},{"key":"e_1_3_2_2_41_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-33630-5_10"},{"key":"e_1_3_2_2_42_1","volume-title":"23rd USENIX Security Symposium (Security '14)","author":"Szurdi Janos","year":"2014","unstructured":"Janos Szurdi, Balazs Kocso, Gabor Cseh, Jonathan Spring, Mark Felegyhazi, and Chris Kanich. 2014. The long \"taile\" of typosquatting domain names. In 23rd USENIX Security Symposium (Security '14)."},{"key":"e_1_3_2_2_43_1","volume-title":"28th USENIX Security Symposium (Security '19)","author":"Thompson Christopher","year":"2019","unstructured":"Christopher Thompson, Martin Shelton, Emily Stark, Max Walker, Emily Schechter, and Adrienne Porter Felt. 2019. The Web's Identity Crisis: Understanding the Effectiveness of Website Identity Indicators. In 28th USENIX Security Symposium (Security '19)."},{"key":"e_1_3_2_2_44_1","volume-title":"Development and validation of the Internet Skills Scale (ISS). Information","author":"Van Deursen Alexander J.A.M.","year":"2015","unstructured":"Alexander J.A.M. Van Deursen, Ellen J Helsper, and Rebecca Eynon. 2015. Development and validation of the Internet Skills Scale (ISS). Information, Communication & Society 19 (2015)."},{"key":"e_1_3_2_2_45_1","doi-asserted-by":"publisher","DOI":"10.1108\/ICS-07-2015-0032"},{"key":"e_1_3_2_2_46_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-33630-5_12"},{"key":"e_1_3_2_2_47_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-98385-1_9"},{"key":"e_1_3_2_2_48_1","doi-asserted-by":"publisher","DOI":"10.1145\/1124772.1124863"}],"event":{"name":"CHI '20: CHI Conference on Human Factors in Computing Systems","location":"Honolulu HI USA","acronym":"CHI '20","sponsor":["SIGCHI ACM Special Interest Group on Computer-Human Interaction"]},"container-title":["Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3313831.3376298","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3313831.3376298","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:32:56Z","timestamp":1750199576000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3313831.3376298"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,4,21]]},"references-count":48,"alternative-id":["10.1145\/3313831.3376298","10.1145\/3313831"],"URL":"https:\/\/doi.org\/10.1145\/3313831.3376298","relation":{},"subject":[],"published":{"date-parts":[[2020,4,21]]},"assertion":[{"value":"2020-04-23","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}