{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,29]],"date-time":"2026-01-29T23:14:58Z","timestamp":1769728498527,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":33,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,4,21]],"date-time":"2020-04-21T00:00:00Z","timestamp":1587427200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,4,21]]},"DOI":"10.1145\/3313831.3376679","type":"proceedings-article","created":{"date-parts":[[2020,5,27]],"date-time":"2020-05-27T18:26:57Z","timestamp":1590604017000},"page":"1-12","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":4,"title":["Robocalling: STIRRED AND SHAKEN! - An Investigation of Calling Displays on Trust and Answer Rates"],"prefix":"10.1145","author":[{"given":"Gregory W.","family":"Edwards","sequence":"first","affiliation":[{"name":"AT&amp;T Design Technology, Austin, TX, USA"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Michael J.","family":"Gonzales","sequence":"additional","affiliation":[{"name":"AT&amp;T Design Technology, Austin, TX, USA"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Marc A.","family":"Sullivan","sequence":"additional","affiliation":[{"name":"AT&amp;T Design Technology, Austin, TX, USA"}],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"320","published-online":{"date-parts":[[2020,4,23]]},"reference":[{"key":"e_1_3_2_2_2_1","unstructured":"AT&T. visited 2019-09--20. Robocalls & Unwanted Calls | AT&T Cyber Aware. (visited 2019-09--20). https:\/\/about.att.com\/pages\/cyberaware\/ae\/robocall"},{"key":"e_1_3_2_2_3_1","unstructured":"Brooke Crothers. visited 2019-09--11. In 2019 Here's How To Stop And Block Robocalls Spam And Unknown Calls On iPhone Android. (visited 2019-09--11)."},{"key":"e_1_3_2_2_4_1","doi-asserted-by":"publisher","DOI":"10.2197\/ipsjjip.21.188"},{"key":"e_1_3_2_2_5_1","first-page":"169","article-title":"Secure Calls and Caller ID Spoofing Countermeasures","volume":"2015","author":"Chaudhry Junaid","year":"2016","unstructured":"Junaid Chaudhry. 2016. Secure Calls and Caller ID Spoofing Countermeasures. Racs 2015 (2016), 169--172.","journal-title":"Racs"},{"key":"e_1_3_2_2_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/1277741.1277951"},{"key":"e_1_3_2_2_7_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2012.02.053"},{"key":"e_1_3_2_2_8_1","unstructured":"FCC. visited 2019-09-01. The FCC's Push to Combat Robocalls & Spoofing | Federal Communications Commission. (visited 2019-09-01). https:\/\/www.fcc.gov\/about-fcc\/fcc-initiatives\/fccs-push-combat-robocalls-spoofing"},{"key":"e_1_3_2_2_9_1","doi-asserted-by":"crossref","unstructured":"Geoffrey A. Fowler. visited 2019-09-01. The best apps to block robocalls on cellphones - The Washington Post. (visited 2019-09-01). https:\/\/www.washingtonpost.com\/technology\/2019\/04\/04\/die-robocalls-die-how-to-guide-stop-spammers-exact-revenge","DOI":"10.35652\/IGJPS.2019.9101"},{"key":"e_1_3_2_2_10_1","unstructured":"HiYa. 2019. State of the Phone Call. (2019) 7. https:\/\/assets.hiya.com\/public\/pdf\/StateOfThePhoneCall.pdf?"},{"key":"e_1_3_2_2_11_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-43862-6_9"},{"key":"e_1_3_2_2_12_1","unstructured":"Katie Bernard. visited 2019-09-01. FCC: Nearly half of phone calls in 2019 will be spam - CNNPolitics. (visited 2019-09-01). https:\/\/www.cnn.com\/2019\/02\/14\/politics\/fcc-robocalls-report\/index.html"},{"key":"e_1_3_2_2_13_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2014.09.005"},{"key":"e_1_3_2_2_14_1","unstructured":"R.V. Lenth. 2009. Java Applets for Power and Sample Size [Computer software]. (2009). http:\/\/www.stat.uiowa.edu\/~rlenth\/Power"},{"key":"e_1_3_2_2_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/2632951.2632953"},{"key":"e_1_3_2_2_16_1","unstructured":"Lookout. visited 2019-09--20. Lookout Personal. (visited 2019-09--20). https:\/\/www.lookout.com\/products\/personal"},{"key":"e_1_3_2_2_17_1","volume-title":"visited 2019-09--20","year":"2019","unstructured":"Norton. visited 2019-09--20. Norton Mobile Security. (visited 2019-09--20). https:\/\/my.norton.com\/mobile\/home"},{"key":"e_1_3_2_2_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/1622103.1629656"},{"key":"e_1_3_2_2_19_1","unstructured":"Ken Politz. 2019. Restoring Trust in Phone Calls : STIR \/ SHAKEN & Neustar Certified Caller Trusted Steward of Enterprise Identity. (2019)."},{"key":"e_1_3_2_2_20_1","doi-asserted-by":"publisher","DOI":"10.1080\/21642583.2014.913213"},{"key":"e_1_3_2_2_21_1","volume-title":"Proceedings of the 26th Usenix Security Symposium (Usenix Security '17)","author":"Reaves B","year":"2017","unstructured":"B Reaves, L Blue, H Abdullah, L Vargas, P Traynor, and T Shrimpton. 2017. AuthentiCall: Efficient Identity and Content Authentication for Phone Calls. Proceedings of the 26th Usenix Security Symposium (Usenix Security '17) March (2017), 575--592."},{"key":"e_1_3_2_2_22_1","volume-title":"Using chatbots against voice spam : Analyzing Lenny's effectiveness This paper is included in the Proceedings of the Using chatbots against voice spam : Analyzing Lenny's effectiveness. Soups","author":"Sahin Merve","year":"2017","unstructured":"Merve Sahin, Security Agency, Marc Relieu, T\u00e9l\u00e9com Paristech, Aur\u00e9lien Francillon, Santa Clara, Merve Sahin, Sophia Antipolis, Sophia Antipolis, and Aur\u00e9lien Francillon. 2017. Using chatbots against voice spam : Analyzing Lenny's effectiveness This paper is included in the Proceedings of the Using chatbots against voice spam : Analyzing Lenny's effectiveness. Soups (2017)."},{"key":"e_1_3_2_2_23_1","unstructured":"Jeff Sauro. visited 2019--12--20. How to Find the Sample Size for 8 Common Research Designs. (visited 2019--12--20). https:\/\/measuringu.com\/sample-size-designs\/"},{"key":"e_1_3_2_2_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/2736277.2741084"},{"key":"e_1_3_2_2_25_1","unstructured":"Tmobile. visited 2019-09--11. Scam ID & Scam Block | T-Mobile Support. (visited 2019-09--11). https:\/\/support.t-mobile.com\/docs\/DOC-38784"},{"key":"e_1_3_2_2_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/ITU-WT.2016.7805728"},{"key":"e_1_3_2_2_27_1","volume-title":"Sok: Everyone Hates Robocalls.","author":"Tu Huahong","year":"2016","unstructured":"Huahong Tu, Ziming Zhao, and Gail-joon Ahn. 2016. Sok: Everyone Hates Robocalls. (2016)."},{"key":"e_1_3_2_2_28_1","unstructured":"Twilio. visited 2019--12--20. Programmable Voice. (visited 2019--12--20). https:\/\/www.twilio.com\/voice"},{"key":"e_1_3_2_2_29_1","unstructured":"Verizon. visited 2019-09--11. Stop Unwanted and Annoying Phone Calls | Verizon Phone Support. (visited 2019-09--11). https:\/\/www.verizon.com\/support\/residential\/ homephone\/calling-features\/stop-unwanted-calls"},{"key":"e_1_3_2_2_30_1","doi-asserted-by":"publisher","DOI":"10.4108\/icst.collaboratecom.2013.254082"},{"key":"e_1_3_2_2_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/2184489.2184491"},{"key":"e_1_3_2_2_32_1","first-page":"297","article-title":"Phishing, SMiShing & Vishing: an assessment of threats against mobile devices","volume":"5","author":"Yeboah-Boateng Ezer Osei","year":"2014","unstructured":"Ezer Osei Yeboah-Boateng and Priscilla Mateko Amanor. 2014. Phishing, SMiShing & Vishing: an assessment of threats against mobile devices. Journal of Emerging Trends in Computing and Information Sciences 5, 4 (2014), 297--307.","journal-title":"Journal of Emerging Trends in Computing and Information Sciences"},{"key":"e_1_3_2_2_33_1","unstructured":"YouMail. visited 2019-09--10. Robocall Index | YouMail. (visited 2019-09--10). https:\/\/robocallindex.com\/"},{"key":"e_1_3_2_2_34_1","first-page":"774","article-title":"Incoming spoof call detection. (July 8 2014)","volume":"8","author":"Youngs Simon","year":"2014","unstructured":"Simon Youngs, Gary Duane Koller, Mark Douglas Peden, and Raymond Emilio Reeves. 2014. Incoming spoof call detection. (July 8 2014). US Patent 8,774,379.","journal-title":"US Patent"}],"event":{"name":"CHI '20: CHI Conference on Human Factors in Computing Systems","location":"Honolulu HI USA","acronym":"CHI '20","sponsor":["SIGCHI ACM Special Interest Group on Computer-Human Interaction"]},"container-title":["Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3313831.3376679","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3313831.3376679","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:38:28Z","timestamp":1750199908000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3313831.3376679"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,4,21]]},"references-count":33,"alternative-id":["10.1145\/3313831.3376679","10.1145\/3313831"],"URL":"https:\/\/doi.org\/10.1145\/3313831.3376679","relation":{},"subject":[],"published":{"date-parts":[[2020,4,21]]},"assertion":[{"value":"2020-04-23","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}