{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:27:49Z","timestamp":1750220869075,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":19,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,12,2]],"date-time":"2019-12-02T00:00:00Z","timestamp":1575244800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,12,2]]},"DOI":"10.1145\/3366030.3366086","type":"proceedings-article","created":{"date-parts":[[2020,2,22]],"date-time":"2020-02-22T12:18:47Z","timestamp":1582373927000},"page":"589-592","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":6,"title":["A Design of an Anti-Phishing Training System Collaborated with Multiple Organizations"],"prefix":"10.1145","author":[{"given":"Masayuki","family":"Higashino","sequence":"first","affiliation":[{"name":"Center for Information Infrastructure and Multimedia, Tottori University, Tottori, Japan"}]}],"member":"320","published-online":{"date-parts":[[2020,2,22]]},"reference":[{"volume-title":"Retrieved","year":"2018","author":"Akimov Ivan","key":"e_1_3_2_1_1_1"},{"volume-title":"Lecture Notes in Engineering and Computer Science: Proceedings of The World Congress on Engineering","year":"2017","author":"Al-Daeef Melad Mohamed","key":"e_1_3_2_1_2_1"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2017.04.006"},{"key":"e_1_3_2_1_4_1","unstructured":"Anti-Phishing Working Group (APWG) Inc. 2018. Phishing Activity Trends Report 2nd Quarter 2018. Technical Report. Anti-Phishing Working Group (APWG) Inc.  Anti-Phishing Working Group (APWG) Inc. 2018. Phishing Activity Trends Report 2nd Quarter 2018. Technical Report. Anti-Phishing Working Group (APWG) Inc."},{"key":"e_1_3_2_1_5_1","unstructured":"Cofense Inc. 2016. Enterprise Phishing Susceptibility and Resiliency Report. Technical Report. Cofense Inc.  Cofense Inc. 2016. Enterprise Phishing Susceptibility and Resiliency Report. Technical Report. Cofense Inc."},{"key":"e_1_3_2_1_6_1","unstructured":"Cofense Inc. 2017. Enterprise Phishing Resiliency and Defense Report. Technical Report. Cofense Inc.  Cofense Inc. 2017. Enterprise Phishing Resiliency and Defense Report. Technical Report. Cofense Inc."},{"volume-title":"Retrieved","year":"2019","author":"Compton Adam","key":"e_1_3_2_1_7_1"},{"key":"e_1_3_2_1_8_1","unstructured":"C. Dambra A. Gralewski E. Frumento R. Puricelli F. Valentini A. Mamelli M. Russo N. Weiss B. Pacheco O. Segou J. Beaume and F. Custodio. 2016. Report on existing tools their evaluation and the gap to be filled by DOGANA development. In Advanced Social Engineering and Vulnerability Assessment Framework. DOGANA Project.  C. Dambra A. Gralewski E. Frumento R. Puricelli F. Valentini A. Mamelli M. Russo N. Weiss B. Pacheco O. Segou J. Beaume and F. Custodio. 2016. Report on existing tools their evaluation and the gap to be filled by DOGANA development. In Advanced Social Engineering and Vulnerability Assessment Framework. DOGANA Project."},{"volume-title":"Retrieved","year":"2019","author":"Geek Pentest","key":"e_1_3_2_1_9_1"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00521-016-2275-y"},{"volume-title":"Retrieved","year":"2018","author":"Hansson David Heinemeier","key":"e_1_3_2_1_11_1"},{"volume-title":"Retrieved","year":"2019","author":"Kennedy David","key":"e_1_3_2_1_12_1"},{"key":"e_1_3_2_1_13_1","unstructured":"KnowBe4 Inc. 2018. 2018 Phishing By Industry Benchmarking Report. Technical Report. KnowBe4 Inc.  KnowBe4 Inc. 2018. 2018 Phishing By Industry Benchmarking Report. Technical Report. KnowBe4 Inc."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/1572532.1572536"},{"key":"e_1_3_2_1_15_1","unstructured":"Andreas Pfitzmann and Marit Hansen. 2010. A Terminology for Talking about Privacy by Data Minimization: Anonymity Unlinkability Undetectability Un-observability Pseudonymity and Identity Management. http:\/\/dud.inf.tu-dresden.de\/Anon_Terminology.shtml  Andreas Pfitzmann and Marit Hansen. 2010. A Terminology for Talking about Privacy by Data Minimization: Anonymity Unlinkability Undetectability Un-observability Pseudonymity and Identity Management. http:\/\/dud.inf.tu-dresden.de\/Anon_Terminology.shtml"},{"volume-title":"Retrieved","year":"2018","author":"Community The Ruby","key":"e_1_3_2_1_16_1"},{"volume-title":"Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems. 492:1-492:12","author":"Wash Rick","key":"e_1_3_2_1_18_1"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/3290605.3300338"},{"volume-title":"Retrieved","year":"2019","author":"Wright Jordan","key":"e_1_3_2_1_20_1"}],"event":{"name":"iiWAS2019: The 21st International Conference on Information Integration and Web-based Applications & Services","sponsor":["JKU Johannes Kepler Universit\u00e4t Linz","@WAS International Organization of Information Integration and Web-based Applications and Services"],"location":"Munich Germany","acronym":"iiWAS2019"},"container-title":["Proceedings of the 21st International Conference on Information Integration and Web-based Applications &amp; Services"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3366030.3366086","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3366030.3366086","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:23:50Z","timestamp":1750202630000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3366030.3366086"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,12,2]]},"references-count":19,"alternative-id":["10.1145\/3366030.3366086","10.1145\/3366030"],"URL":"https:\/\/doi.org\/10.1145\/3366030.3366086","relation":{},"subject":[],"published":{"date-parts":[[2019,12,2]]},"assertion":[{"value":"2020-02-22","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}