{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:28:23Z","timestamp":1750220903024,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":85,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,6,2]],"date-time":"2020-06-02T00:00:00Z","timestamp":1591056000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,6,2]]},"DOI":"10.1145\/3379155.3391328","type":"proceedings-article","created":{"date-parts":[[2020,5,6]],"date-time":"2020-05-06T00:31:32Z","timestamp":1588725092000},"page":"1-10","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":5,"title":["Eyes on URLs: Relating Visual Behavior to Safety Decisions"],"prefix":"10.1145","author":[{"given":"Niveta","family":"Ramkumar","sequence":"first","affiliation":[{"name":"University of New Hampshire"}]},{"given":"Vijay","family":"Kothari","sequence":"additional","affiliation":[{"name":"Dartmouth University"}]},{"given":"Caitlin","family":"Mills","sequence":"additional","affiliation":[{"name":"University of New Hampshire"}]},{"given":"Ross","family":"Koppel","sequence":"additional","affiliation":[{"name":"University of Pennsylvania"}]},{"given":"Jim","family":"Blythe","sequence":"additional","affiliation":[{"name":"USC Information Sciences Institute"}]},{"given":"Sean","family":"Smith","sequence":"additional","affiliation":[{"name":"Dartmouth College"}]},{"given":"Andrew L","family":"Kun","sequence":"additional","affiliation":[{"name":"University of New Hampshire"}]}],"member":"320","published-online":{"date-parts":[[2020,6,2]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2013.030713.00020"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijhcs.2015.05.005"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSPW.2019.00027"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2016.02.065"},{"key":"e_1_3_2_1_5_1","volume-title":"Task-evoked pupillary responses, processing load, and the structure of processing resources.Psychological bulletin 91, 2","author":"Beatty Jackson","year":"1982","unstructured":"Jackson Beatty . 1982. Task-evoked pupillary responses, processing load, and the structure of processing resources.Psychological bulletin 91, 2 ( 1982 ), 276. Jackson Beatty. 1982. Task-evoked pupillary responses, processing load, and the structure of processing resources.Psychological bulletin 91, 2 (1982), 276."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/1595676.1595684"},{"volume-title":"Financial Cryptography and Data Security, Michael Brenner, Kurt Rohloff, Joseph Bonneau, Andrew Miller, Peter\u00a0Y.A. Ryan","author":"Benenson Zinaida","key":"e_1_3_2_1_7_1","unstructured":"Zinaida Benenson , Freya Gassmann , and Robert Landwirth . 2017. Unpacking Spear Phishing Susceptibility . In Financial Cryptography and Data Security, Michael Brenner, Kurt Rohloff, Joseph Bonneau, Andrew Miller, Peter\u00a0Y.A. Ryan , Vanessa Teague, Andrea Bracciali, Massimiliano Sala, Federico Pintore, and Markus Jakobsson(Eds.). Springer International Publishing , Cham , 610\u2013627. Zinaida Benenson, Freya Gassmann, and Robert Landwirth. 2017. Unpacking Spear Phishing Susceptibility. In Financial Cryptography and Data Security, Michael Brenner, Kurt Rohloff, Joseph Bonneau, Andrew Miller, Peter\u00a0Y.A. Ryan, Vanessa Teague, Andrea Bracciali, Massimiliano Sala, Federico Pintore, and Markus Jakobsson(Eds.). Springer International Publishing, Cham, 610\u2013627."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/PerComW.2014.6815275"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.5555\/1734234.1734239"},{"volume-title":"Eye Tracking in User Experience Design","author":"Bergstrom Jennifer\u00a0Romano","key":"e_1_3_2_1_10_1","unstructured":"Jennifer\u00a0Romano Bergstrom and Andrew Schall . 2014. Eye Tracking in User Experience Design . Elsevier . Jennifer\u00a0Romano Bergstrom and Andrew Schall. 2014. Eye Tracking in User Experience Design. Elsevier."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"crossref","unstructured":"Tim Berners-Lee Roy Fielding and Larry Masinter. 1998. Uniform Resource Identifiers (URI): Generic Syntax. RFC 3986. RFC Editor. 1\u201361 pages. https:\/\/tools.ietf.org\/html\/rfc3986  Tim Berners-Lee Roy Fielding and Larry Masinter. 1998. Uniform Resource Identifiers (URI): Generic Syntax. RFC 3986. RFC Editor. 1\u201361 pages. https:\/\/tools.ietf.org\/html\/rfc3986","DOI":"10.17487\/rfc2396"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"crossref","unstructured":"Tim Berners-Lee Larry Masinter Mark McCahill 1994. Uniform Resource Locators (URL). RFC 1738. RFC Editor. 1\u201325 pages. https:\/\/tools.ietf.org\/html\/rfc1738  Tim Berners-Lee Larry Masinter Mark McCahill 1994. Uniform Resource Locators (URL). RFC 1738. RFC Editor. 1\u201325 pages. https:\/\/tools.ietf.org\/html\/rfc1738","DOI":"10.17487\/rfc1738"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.14236\/ewic\/HCI2008.23"},{"key":"e_1_3_2_1_14_1","volume-title":"ACM","author":"Beymer David","year":"2005","unstructured":"David Beymer and Daniel\u00a0 M. Russell . 2005 . WebGazeAnalyzer: A System for Capturing and Analyzing Web Reading Behavior Using Eye Gaze. In CHI \u201905 Extended Abstracts on Human Factors in Computing Systems(CHI EA \u201905) . ACM , New York, NY, USA , 1913\u20131916. https:\/\/doi.org\/10.1145\/1056808.1057055 David Beymer and Daniel\u00a0M. Russell. 2005. WebGazeAnalyzer: A System for Capturing and Analyzing Web Reading Behavior Using Eye Gaze. In CHI \u201905 Extended Abstracts on Human Factors in Computing Systems(CHI EA \u201905). ACM, New York, NY, USA, 1913\u20131916. https:\/\/doi.org\/10.1145\/1056808.1057055"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/1866423.1866434"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1037\/a0023458"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1469-8986.2008.00654.x"},{"key":"e_1_3_2_1_18_1","volume-title":"The Eyes Never Lie: The Use of Eye Tracking Data in HCI Research. In In Proceedings of the CHI\u201902 Workshop on Physiological Computing. ACM Press.","author":"Bruneau Daniel","year":"2002","unstructured":"Daniel Bruneau , M.\u00a0 Angela Sasse , and John Mccarthy . 2002 . The Eyes Never Lie: The Use of Eye Tracking Data in HCI Research. In In Proceedings of the CHI\u201902 Workshop on Physiological Computing. ACM Press. Daniel Bruneau, M.\u00a0Angela Sasse, and John Mccarthy. 2002. The Eyes Never Lie: The Use of Eye Tracking Data in HCI Research. In In Proceedings of the CHI\u201902 Workshop on Physiological Computing. ACM Press."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1080\/02702710601186407"},{"key":"e_1_3_2_1_20_1","unstructured":"Bennett Cyphers Alexei Miagkov and Andr\u00e9s Arrieta. 2018. Privacy Badger Now Fights More Sneaky Google Tracking. https:\/\/www.eff.org\/deeplinks\/2018\/10\/privacy-badger-now-fights-more-sneaky-google-tracking.  Bennett Cyphers Alexei Miagkov and Andr\u00e9s Arrieta. 2018. Privacy Badger Now Fights More Sneaky Google Tracking. https:\/\/www.eff.org\/deeplinks\/2018\/10\/privacy-badger-now-fights-more-sneaky-google-tracking."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/1124772.1124861"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/1299015.1299019"},{"key":"e_1_3_2_1_23_1","volume-title":"CEAS 2004 - First Conference on Email and Anti-Spam","author":"Drake E.","year":"2004","unstructured":"Christine\u00a0 E. Drake , Jonathan\u00a0 J. Oliver , and Eugene\u00a0 J. Koontz . 2004 . Anatomy of a Phishing Email . In CEAS 2004 - First Conference on Email and Anti-Spam , July 30-31, 2004, Mountain View, California, USA. Christine\u00a0E. Drake, Jonathan\u00a0J. Oliver, and Eugene\u00a0J. Koontz. 2004. Anatomy of a Phishing Email. In CEAS 2004 - First Conference on Email and Anti-Spam, July 30-31, 2004, Mountain View, California, USA."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/1357054.1357219"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/1242572.1242660"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1080\/00049538908260083"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.17705\/1jais.00447"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/507072.507082"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1177\/1541931213571226"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1037\/0022-0663.94.1.44"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"crossref","unstructured":"Jukka Hy\u00f6n\u00e4 Robert\u00a0F Lorch\u00a0Jr and Mike Rinck. 2003. Chapter 16 - Eye Movement Measures to Study Global Text Processing. In The Mind\u2019s Eye Jukka Hy\u00f6n\u00e4 Ralph Radach and Heiner Deubel(Eds.). North-Holland Amsterdam 313\u2013334. https:\/\/doi.org\/10.1016\/B978-044451020-4\/50018-9  Jukka Hy\u00f6n\u00e4 Robert\u00a0F Lorch\u00a0Jr and Mike Rinck. 2003. Chapter 16 - Eye Movement Measures to Study Global Text Processing. In The Mind\u2019s Eye Jukka Hy\u00f6n\u00e4 Ralph Radach and Heiner Deubel(Eds.). North-Holland Amsterdam 313\u2013334. https:\/\/doi.org\/10.1016\/B978-044451020-4\/50018-9","DOI":"10.1016\/B978-044451020-4\/50018-9"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.3758\/BF03196793"},{"key":"e_1_3_2_1_33_1","volume-title":"A Theory of Reading: From Eye Fixations to Comprehension. Psychological review 87, 4","author":"Just A","year":"1980","unstructured":"Marcel\u00a0 A Just and Patricia\u00a0 A Carpenter . 1980. A Theory of Reading: From Eye Fixations to Comprehension. Psychological review 87, 4 ( 1980 ), 329. Marcel\u00a0A Just and Patricia\u00a0A Carpenter. 1980. A Theory of Reading: From Eye Fixations to Comprehension. Psychological review 87, 4 (1980), 329."},{"key":"e_1_3_2_1_34_1","unstructured":"KnowBe4. 2019. Kevin Mitnick Security Awareness Training. https:\/\/www.knowbe4.com\/products\/kevin-mitnick-security-awareness-training\/.  KnowBe4. 2019. Kevin Mitnick Security Awareness Training. https:\/\/www.knowbe4.com\/products\/kevin-mitnick-security-awareness-training\/."},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.16910\/jemr.9.5.3"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/1572532.1572536"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/1240624.1240760"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.21437\/Interspeech.2013-595"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.edurev.2013.10.001"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/2078827.2078830"},{"key":"e_1_3_2_1_41_1","unstructured":"Microsoft. 2019. Office 365 ATP Safe Links. https:\/\/docs.microsoft.com\/en-us\/office365\/securitycompliance\/atp-safe-links.  Microsoft. 2019. Office 365 ATP Safe Links. https:\/\/docs.microsoft.com\/en-us\/office365\/securitycompliance\/atp-safe-links."},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1080\/0163853X.2017.1381059"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"crossref","unstructured":"D. Miyamoto T. Iimura G. Blanc H. Tazaki and Y. Kadobayashi. 2014. EyeBit: Eye-Tracking Approach for Enforcing Phishing Prevention Habits. In 2014 Third International Workshop on Building Analysis Datasets and Gathering Experience Returns for Security (BADGERS). 56\u201365. https:\/\/doi.org\/10.1109\/BADGERS.2014.14  D. Miyamoto T. Iimura G. Blanc H. Tazaki and Y. Kadobayashi. 2014. EyeBit: Eye-Tracking Approach for Enforcing Phishing Prevention Habits. In 2014 Third International Workshop on Building Analysis Datasets and Gathering Experience Returns for Security (BADGERS). 56\u201365. https:\/\/doi.org\/10.1109\/BADGERS.2014.14","DOI":"10.1109\/BADGERS.2014.14"},{"key":"e_1_3_2_1_44_1","unstructured":"Mozilla. 2019. How does built-in Phishing and Malware Protection work?https:\/\/support.mozilla.org\/en-US\/kb\/how-does-phishing-and-malware-protection-work.  Mozilla. 2019. How does built-in Phishing and Malware Protection work?https:\/\/support.mozilla.org\/en-US\/kb\/how-does-phishing-and-malware-protection-work."},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/1394281.1394287"},{"key":"e_1_3_2_1_46_1","volume-title":"Attack Report: Office 365 Security Hacked Using Google Redirect. https:\/\/www.avanan.com\/resources\/open-redirect-vulnerability.","author":"Nathaniel Yoav","year":"2017","unstructured":"Yoav Nathaniel . 2017 . Attack Report: Office 365 Security Hacked Using Google Redirect. https:\/\/www.avanan.com\/resources\/open-redirect-vulnerability. Yoav Nathaniel. 2017. Attack Report: Office 365 Security Hacked Using Google Redirect. https:\/\/www.avanan.com\/resources\/open-redirect-vulnerability."},{"key":"e_1_3_2_1_47_1","volume-title":"The influence of calibration method and eye physiology on eyetracking data quality. Behavior Research Methods 45, 1 (01","author":"Nystr\u00f6m Marcus","year":"2013","unstructured":"Marcus Nystr\u00f6m , Richard Andersson , Kenneth Holmqvist , and Joost van\u00a0de Weijer . 2013. The influence of calibration method and eye physiology on eyetracking data quality. Behavior Research Methods 45, 1 (01 Mar 2013 ), 272\u2013288. https:\/\/doi.org\/10.3758\/s13428-012-0247-4 Marcus Nystr\u00f6m, Richard Andersson, Kenneth Holmqvist, and Joost van\u00a0de Weijer. 2013. The influence of calibration method and eye physiology on eyetracking data quality. Behavior Research Methods 45, 1 (01 Mar 2013), 272\u2013288. https:\/\/doi.org\/10.3758\/s13428-012-0247-4"},{"key":"e_1_3_2_1_48_1","unstructured":"Gunter Ollmann. 2004. The Phishing Guide\u2013Understanding & Preventing Phishing Attacks. NGS Software Insight Security Research(2004).  Gunter Ollmann. 2004. The Phishing Guide\u2013Understanding & Preventing Phishing Attacks. NGS Software Insight Security Research(2004)."},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1145\/2168556.2168650"},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1145\/1743666.1743701"},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCE.2017.7889231"},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1145\/2858036.2858117"},{"key":"e_1_3_2_1_53_1","unstructured":"PhishingBox. 2019. phishingbox. https:\/\/www.phishingbox.com  PhishingBox. 2019. phishingbox. https:\/\/www.phishingbox.com"},{"key":"e_1_3_2_1_54_1","unstructured":"PhishLabs. 2019. Security Awareness Training. https:\/\/www.phishlabs.com\/security-awareness-training\/.  PhishLabs. 2019. Security Awareness Training. https:\/\/www.phishlabs.com\/security-awareness-training\/."},{"key":"e_1_3_2_1_55_1","volume-title":"Proceedings of the International Conference on HCI.","author":"Pomplun Marc","year":"2003","unstructured":"Marc Pomplun and Sindhura Sunkara . 2003 . Pupil Dilation as an Indicator of Cognitive Workload in Human-Computer Interaction . In Proceedings of the International Conference on HCI. Marc Pomplun and Sindhura Sunkara. 2003. Pupil Dilation as an Indicator of Cognitive Workload in Human-Computer Interaction. In Proceedings of the International Conference on HCI."},{"volume-title":"Eye Tracking in Human-Computer Interaction and Usability Research: Current Status and Future Prospects","author":"Poole A","key":"e_1_3_2_1_56_1","unstructured":"A Poole and Linden Ball . 2006. Eye Tracking in Human-Computer Interaction and Usability Research: Current Status and Future Prospects . Idea Group, Inc , 211\u2013219. A Poole and Linden Ball. 2006. Eye Tracking in Human-Computer Interaction and Usability Research: Current Status and Future Prospects. Idea Group, Inc, 211\u2013219."},{"key":"e_1_3_2_1_57_1","unstructured":"Proofpoint. 2019a. Proofpoint Essentials URL Defense: Advanced Protection with Proofpoint\u2019s Targeted Attack Protection. https:\/\/www.proofpoint.com\/us\/resources\/data-sheets\/essentials-url-defense.  Proofpoint. 2019a. Proofpoint Essentials URL Defense: Advanced Protection with Proofpoint\u2019s Targeted Attack Protection. https:\/\/www.proofpoint.com\/us\/resources\/data-sheets\/essentials-url-defense."},{"key":"e_1_3_2_1_58_1","unstructured":"Proofpoint. 2019b. Proofpoint Security Awareness Training. https:\/\/www.proofpoint.com\/us\/product-family\/security-awareness-training.  Proofpoint. 2019b. Proofpoint Security Awareness Training. https:\/\/www.proofpoint.com\/us\/product-family\/security-awareness-training."},{"key":"e_1_3_2_1_59_1","doi-asserted-by":"publisher","DOI":"10.1145\/3321335.3324930"},{"key":"e_1_3_2_1_60_1","volume-title":"Eye Movements in Reading and Information Processing: 20 Years of Research.Psychological bulletin 124 3","author":"Rayner Keith","year":"1998","unstructured":"Keith Rayner . 1998. Eye Movements in Reading and Information Processing: 20 Years of Research.Psychological bulletin 124 3 ( 1998 ), 372\u2013422. Keith Rayner. 1998. Eye Movements in Reading and Information Processing: 20 Years of Research.Psychological bulletin 124 3 (1998), 372\u2013422."},{"key":"e_1_3_2_1_61_1","doi-asserted-by":"publisher","DOI":"10.1207\/s1532799xssr1003_3"},{"key":"e_1_3_2_1_62_1","volume-title":"Lexical complexity and fixation times in reading: Effects of word frequency, verb complexity, and lexical ambiguity. Memory & Cognition 14, 3 (01","author":"Rayner Keith","year":"1986","unstructured":"Keith Rayner and Susan\u00a0 A. Duffy . 1986. Lexical complexity and fixation times in reading: Effects of word frequency, verb complexity, and lexical ambiguity. Memory & Cognition 14, 3 (01 May 1986 ), 191\u2013201. https:\/\/doi.org\/10.3758\/BF03197692 Keith Rayner and Susan\u00a0A. Duffy. 1986. Lexical complexity and fixation times in reading: Effects of word frequency, verb complexity, and lexical ambiguity. Memory & Cognition 14, 3 (01 May 1986), 191\u2013201. https:\/\/doi.org\/10.3758\/BF03197692"},{"key":"e_1_3_2_1_63_1","volume-title":"Mindless reading revisited: Eye movements during reading and scanning are different. Perception & Psychophysics 58, 5 (01","author":"Rayner Keith","year":"1996","unstructured":"Keith Rayner and Martin\u00a0 H. Fischer . 1996. Mindless reading revisited: Eye movements during reading and scanning are different. Perception & Psychophysics 58, 5 (01 Jul 1996 ), 734\u2013747. https:\/\/doi.org\/10.3758\/BF03213106 Keith Rayner and Martin\u00a0H. Fischer. 1996. Mindless reading revisited: Eye movements during reading and scanning are different. Perception & Psychophysics 58, 5 (01 Jul 1996), 734\u2013747. https:\/\/doi.org\/10.3758\/BF03213106"},{"key":"e_1_3_2_1_64_1","doi-asserted-by":"publisher","DOI":"10.1037\/a0026473"},{"volume-title":"Proceedings of the 2000 Symposium on Eye Tracking Research & Applications(ETRA \u201900)","author":"D.","key":"e_1_3_2_1_65_1","unstructured":"Dario\u00a0 D. Salvucci and Joseph\u00a0H. Goldberg. 2000. Identifying Fixations and Saccades in Eye-tracking Protocols . In Proceedings of the 2000 Symposium on Eye Tracking Research & Applications(ETRA \u201900) . ACM, New York, NY, USA, 71\u201378. https:\/\/doi.org\/10.1145\/355017.355028 Dario\u00a0D. Salvucci and Joseph\u00a0H. Goldberg. 2000. Identifying Fixations and Saccades in Eye-tracking Protocols. In Proceedings of the 2000 Symposium on Eye Tracking Research & Applications(ETRA \u201900). ACM, New York, NY, USA, 71\u201378. https:\/\/doi.org\/10.1145\/355017.355028"},{"key":"e_1_3_2_1_66_1","unstructured":"SANS. 2019a. Robust Phishing Awareness Simulation Training that Changes Behavior. https:\/\/www.sans.org\/security-awareness-training\/products\/phishing.  SANS. 2019a. Robust Phishing Awareness Simulation Training that Changes Behavior. https:\/\/www.sans.org\/security-awareness-training\/products\/phishing."},{"key":"e_1_3_2_1_67_1","unstructured":"SANS. 2019b. The 2019 SANS EndUser Training Suite. https:\/\/www.sans.org\/security-awareness-training\/products\/end-user.  SANS. 2019b. The 2019 SANS EndUser Training Suite. https:\/\/www.sans.org\/security-awareness-training\/products\/end-user."},{"key":"e_1_3_2_1_68_1","doi-asserted-by":"publisher","DOI":"10.1080\/02699930903274322"},{"key":"e_1_3_2_1_69_1","volume-title":"The Emperor\u2019s New Security Indicators. In 2007 IEEE Symposium on Security and Privacy (SP \u201907)","author":"Schechter E.","year":"2007","unstructured":"S.\u00a0 E. Schechter , R. Dhamija , A. Ozment , and I. Fischer . 2007 . The Emperor\u2019s New Security Indicators. In 2007 IEEE Symposium on Security and Privacy (SP \u201907) . 51\u201365. https:\/\/doi.org\/10.1109\/SP. 2007 .35 S.\u00a0E. Schechter, R. Dhamija, A. Ozment, and I. Fischer. 2007. The Emperor\u2019s New Security Indicators. In 2007 IEEE Symposium on Security and Privacy (SP \u201907). 51\u201365. https:\/\/doi.org\/10.1109\/SP.2007.35"},{"key":"e_1_3_2_1_70_1","doi-asserted-by":"publisher","DOI":"10.1145\/1753326.1753383"},{"key":"e_1_3_2_1_71_1","doi-asserted-by":"publisher","DOI":"10.1145\/1280680.1280692"},{"key":"e_1_3_2_1_72_1","doi-asserted-by":"publisher","DOI":"10.1145\/354401.354418"},{"key":"e_1_3_2_1_73_1","volume-title":"The Pupillary Response as an Indicator of Arousal and Cognition. Motivation and Emotion 3, 4 (01","author":"Stanners F.","year":"1979","unstructured":"Robert\u00a0 F. Stanners , Michelle Coulter , Allen\u00a0 W. Sweet , and Philip Murphy . 1979. The Pupillary Response as an Indicator of Arousal and Cognition. Motivation and Emotion 3, 4 (01 Dec 1979 ), 319\u2013340. https:\/\/doi.org\/10.1007\/BF00994048 Robert\u00a0F. Stanners, Michelle Coulter, Allen\u00a0W. Sweet, and Philip Murphy. 1979. The Pupillary Response as an Indicator of Arousal and Cognition. Motivation and Emotion 3, 4 (01 Dec 1979), 319\u2013340. https:\/\/doi.org\/10.1007\/BF00994048"},{"volume-title":"Teaching Phishing-Security: Which Way is Best?","author":"Stockhardt Simon","key":"e_1_3_2_1_74_1","unstructured":"Simon Stockhardt , Benjamin Reinheimer , Melanie Volkamer , Peter Mayer , Alexandra Kunz , Philipp Rack , and Daniel Lehmann . 2016. Teaching Phishing-Security: Which Way is Best? . In ICT Systems Security and Privacy Protection, Jaap-Henk Hoepman and Stefan Katzenbeisser (Eds.). Springer International Publishing , Cham , 135\u2013149. Simon Stockhardt, Benjamin Reinheimer, Melanie Volkamer, Peter Mayer, Alexandra Kunz, Philipp Rack, and Daniel Lehmann. 2016. Teaching Phishing-Security: Which Way is Best?. In ICT Systems Security and Privacy Protection, Jaap-Henk Hoepman and Stefan Katzenbeisser (Eds.). Springer International Publishing, Cham, 135\u2013149."},{"key":"e_1_3_2_1_75_1","doi-asserted-by":"publisher","DOI":"10.1145\/3290605.3300338"},{"key":"e_1_3_2_1_76_1","doi-asserted-by":"publisher","DOI":"10.1002\/(SICI)1099-0992(199607)26:4<557::AID-EJSP769>3.0.CO;2-4"},{"key":"e_1_3_2_1_77_1","unstructured":"WHATWG. 2019. URL Living Standard. https:\/\/url.spec.whatwg.org.  WHATWG. 2019. URL Living Standard. https:\/\/url.spec.whatwg.org."},{"key":"e_1_3_2_1_78_1","unstructured":"Colin Whittaker Brian Ryner and Marria Nazif. 2010. Large-Scale Automatic Classification of Phishing Pages. In NDSS \u201910. http:\/\/www.isoc.org\/isoc\/conferences\/ndss\/10\/pdf\/08.pdf  Colin Whittaker Brian Ryner and Marria Nazif. 2010. Large-Scale Automatic Classification of Phishing Pages. In NDSS \u201910. http:\/\/www.isoc.org\/isoc\/conferences\/ndss\/10\/pdf\/08.pdf"},{"key":"e_1_3_2_1_79_1","volume-title":"The Free Encyclopedia. https:\/\/en.wikipedia.org\/w\/index.php?title=Monospace_(typeface)&oldid=884652181 [Online","author":"Wikipedia Wikipedia","year":"2020","unstructured":"Wikipedia contributors. 2019a. Monospace (typeface) \u2014 Wikipedia , The Free Encyclopedia. https:\/\/en.wikipedia.org\/w\/index.php?title=Monospace_(typeface)&oldid=884652181 [Online ; accessed 20- February - 2020 ]. Wikipedia contributors. 2019a. Monospace (typeface) \u2014 Wikipedia, The Free Encyclopedia. https:\/\/en.wikipedia.org\/w\/index.php?title=Monospace_(typeface)&oldid=884652181 [Online; accessed 20-February-2020]."},{"key":"e_1_3_2_1_80_1","volume-title":"The Free Encyclopedia. https:\/\/en.wikipedia.org\/w\/index.php?title=Phishing&oldid=914413259. [Online","author":"Wikipedia Wikipedia","year":"2019","unstructured":"Wikipedia contributors. 2019b. Phishing \u2014 Wikipedia , The Free Encyclopedia. https:\/\/en.wikipedia.org\/w\/index.php?title=Phishing&oldid=914413259. [Online ; accessed 8- September - 2019 ]. Wikipedia contributors. 2019b. Phishing \u2014 Wikipedia, The Free Encyclopedia. https:\/\/en.wikipedia.org\/w\/index.php?title=Phishing&oldid=914413259. [Online; accessed 8-September-2019]."},{"key":"e_1_3_2_1_81_1","volume-title":"The Free Encyclopedia. https:\/\/en.wikipedia.org\/w\/index.php?title=URL&oldid=909233629 [Online","author":"Wikipedia Wikipedia","year":"2019","unstructured":"Wikipedia contributors. 2019c. URL \u2014 Wikipedia , The Free Encyclopedia. https:\/\/en.wikipedia.org\/w\/index.php?title=URL&oldid=909233629 [Online ; accessed 11- September - 2019 ]. Wikipedia contributors. 2019c. URL \u2014 Wikipedia, The Free Encyclopedia. https:\/\/en.wikipedia.org\/w\/index.php?title=URL&oldid=909233629 [Online; accessed 11-September-2019]."},{"key":"e_1_3_2_1_82_1","volume-title":"The Free Encyclopedia. https:\/\/en.wikipedia.org\/w\/index.php?title=URL_redirection&oldid=916373985. [Online","author":"Wikipedia","year":"2019","unstructured":"Wikipedia contributors. 2019d. URL redirection \u2014 Wikipedia , The Free Encyclopedia. https:\/\/en.wikipedia.org\/w\/index.php?title=URL_redirection&oldid=916373985. [Online ; accessed 19- September - 2019 ]. Wikipedia contributors. 2019d. URL redirection \u2014 Wikipedia, The Free Encyclopedia. https:\/\/en.wikipedia.org\/w\/index.php?title=URL_redirection&oldid=916373985. [Online; accessed 19-September-2019]."},{"key":"e_1_3_2_1_83_1","doi-asserted-by":"publisher","DOI":"10.1145\/1124772.1124863"},{"key":"e_1_3_2_1_84_1","volume-title":"CHI \u201911 Extended Abstracts on Human Factors in Computing Systems(CHI EA \u201911)","author":"Xu Jie","year":"1979","unstructured":"Jie Xu , Yang Wang , Fang Chen , Ho Choi , Guanzhong Li , Siyuan Chen , and Sazzad Hussain . 2011. Pupillary Response Based Cognitive Workload Index Under Luminance and Emotional Changes . In CHI \u201911 Extended Abstracts on Human Factors in Computing Systems(CHI EA \u201911) . ACM , New York, NY, USA , 1627\u20131632. https:\/\/doi.org\/10.1145\/ 1979 742.1979819 Jie Xu, Yang Wang, Fang Chen, Ho Choi, Guanzhong Li, Siyuan Chen, and Sazzad Hussain. 2011. Pupillary Response Based Cognitive Workload Index Under Luminance and Emotional Changes. In CHI \u201911 Extended Abstracts on Human Factors in Computing Systems(CHI EA \u201911). ACM, New York, NY, USA, 1627\u20131632. https:\/\/doi.org\/10.1145\/1979742.1979819"},{"key":"e_1_3_2_1_85_1","doi-asserted-by":"publisher","DOI":"10.1145\/2993901.2993908"}],"event":{"name":"ETRA '20: 2020 Symposium on Eye Tracking Research and Applications","sponsor":["SIGGRAPH ACM Special Interest Group on Computer Graphics and Interactive Techniques","SIGCHI ACM Special Interest Group on Computer-Human Interaction"],"location":"Stuttgart Germany","acronym":"ETRA '20"},"container-title":["ACM Symposium on Eye Tracking Research and Applications"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3379155.3391328","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3379155.3391328","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:44:48Z","timestamp":1750203888000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3379155.3391328"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,6,2]]},"references-count":85,"alternative-id":["10.1145\/3379155.3391328","10.1145\/3379155"],"URL":"https:\/\/doi.org\/10.1145\/3379155.3391328","relation":{},"subject":[],"published":{"date-parts":[[2020,6,2]]},"assertion":[{"value":"2020-06-02","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}