{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,15]],"date-time":"2025-12-15T23:38:13Z","timestamp":1765841893219,"version":"3.48.0"},"publisher-location":"New York, NY, USA","reference-count":58,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,10,27]],"date-time":"2020-10-27T00:00:00Z","timestamp":1603756800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,10,27]]},"DOI":"10.1145\/3419394.3423617","type":"proceedings-article","created":{"date-parts":[[2020,10,22]],"date-time":"2020-10-22T20:30:22Z","timestamp":1603398622000},"page":"567-576","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":16,"title":["Who is targeted by email-based phishing and malware?"],"prefix":"10.1145","author":[{"given":"Camelia","family":"Simoiu","sequence":"first","affiliation":[{"name":"Stanford University"}]},{"given":"Ali","family":"Zand","sequence":"additional","affiliation":[{"name":"Google"}]},{"given":"Kurt","family":"Thomas","sequence":"additional","affiliation":[{"name":"Google"}]},{"given":"Elie","family":"Bursztein","sequence":"additional","affiliation":[{"name":"Google"}]}],"member":"320","published-online":{"date-parts":[[2020,10,27]]},"reference":[{"key":"e_1_3_2_2_1_1","volume-title":"Proceedings of the USENIX Security Symposium","author":"Akhawe Devdatta","year":"2013","unstructured":"Devdatta Akhawe and Adrienne Porter Felt. Alice in warningland: A large-scale field study of browser security warning effectiveness. In Proceedings of the USENIX Security Symposium, 2013."},{"key":"e_1_3_2_2_2_1","unstructured":"Monica Anderson and Madhumitha Kumar. Digital divide persists even as lower-income americans make gains in tech adoption. https:\/\/www.pewresearch.org\/fact-tank\/2019\/05\/07\/digital-divide-persists-even-as-lower-income-americans-make-gains-in-tech-adoption\/ 2019."},{"key":"e_1_3_2_2_3_1","volume-title":"Proceedings of the Workshop on Economics of Information Security","author":"Anderson Ross","year":"2012","unstructured":"Ross Anderson, Chris Barton, Rainer Boehme, Richard Clayton, Michel J.G. van Eeten, Michael Levi, Tyler Moore, and Stefan Savage. Measuring the cost of cybercrime. In Proceedings of the Workshop on Economics of Information Security, 2012."},{"key":"e_1_3_2_2_4_1","unstructured":"Anti-Phishing Working Group. APWG Trends Report Q1 2019. https:\/\/docs.apwg.org\/reports\/apwg_trends_report_q1_2019.pdf."},{"key":"e_1_3_2_2_5_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-70278-0_39"},{"key":"e_1_3_2_2_6_1","volume-title":"Understanding why phishing attacks are so effective and how to mitigate them. https:\/\/security.googleblog.com\/2019\/08\/understanding-why-phishing-attacks-are.html","author":"Bursztein Elie","year":"2019","unstructured":"Elie Bursztein and Daniela Oliveira. Understanding why phishing attacks are so effective and how to mitigate them. https:\/\/security.googleblog.com\/2019\/08\/understanding-why-phishing-attacks-are.html, 2019."},{"key":"e_1_3_2_2_7_1","volume-title":"Breaching the human firewall: Social engineering in phishing and spear-phishing emails. arXiv preprint arXiv.1606.00887","author":"Butavicius Marcus","year":"2016","unstructured":"Marcus Butavicius, Kathryn Parsons, Malcolm Pattinson, and Agata McCormac. Breaching the human firewall: Social engineering in phishing and spear-phishing emails. arXiv preprint arXiv.1606.00887, 2016."},{"key":"e_1_3_2_2_8_1","volume-title":"Proceedings of the USENIX Security Symposium","author":"Caballero Juan","year":"2011","unstructured":"Juan Caballero, Chris Grier, Christian Kreibich, and Vern Paxson. Measuring pay-per-install: The commoditization of malware distribution. In Proceedings of the USENIX Security Symposium, 2011."},{"key":"e_1_3_2_2_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/2590296.2590347"},{"key":"e_1_3_2_2_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/509907.509965"},{"key":"e_1_3_2_2_11_1","volume-title":"Do zebras get more spam than aardvarks? ratio, 20:40","author":"Clayton Richard","year":"2008","unstructured":"Richard Clayton. Do zebras get more spam than aardvarks? ratio, 20:40, 2008."},{"key":"e_1_3_2_2_12_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-58387-6_9"},{"key":"e_1_3_2_2_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/1124772.1124861"},{"key":"e_1_3_2_2_14_1","volume-title":"Proceedings of the Web Conference","author":"Doerfler Periwinkle","year":"2019","unstructured":"Periwinkle Doerfler, Maija Marincenko, Juri Ranieri, Angelika Moscicki Yu Jiang, Damon McCoy, and Kurt Thomas. Evaluating login challenges as a defense against account takeover. In Proceedings of the Web Conference, 2019."},{"key":"e_1_3_2_2_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/1299015.1299019"},{"key":"e_1_3_2_2_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/1143120.1143131"},{"key":"e_1_3_2_2_17_1","volume-title":"Shaping intention to resist social engineering through transformational leadership, information security culture and awareness. computers & security, 59:26--44","author":"Flores Waldo Rocha","year":"2016","unstructured":"Waldo Rocha Flores and Mathias Ekstedt. Shaping intention to resist social engineering through transformational leadership, information security culture and awareness. computers & security, 59:26--44, 2016."},{"key":"e_1_3_2_2_18_1","volume-title":"There's a reason your inbox has more malicious spam-emotet is back. https:\/\/arstechnica.com\/information-technology\/2020\/07\/destructive-emotet-botnet-returns-with-250k-strong-blast-of-toxic-email\/","author":"Goodin Dan","year":"2020","unstructured":"Dan Goodin. There's a reason your inbox has more malicious spam-emotet is back. https:\/\/arstechnica.com\/information-technology\/2020\/07\/destructive-emotet-botnet-returns-with-250k-strong-blast-of-toxic-email\/, 2020."},{"volume-title":"About targeting geographic locations. https:\/\/support.google.com\/google-ads\/answer\/2453995?visit_id=637363906136362321-1839693281&rd=1","year":"2020","key":"e_1_3_2_2_19_1","unstructured":"Google. About targeting geographic locations. https:\/\/support.google.com\/google-ads\/answer\/2453995?visit_id=637363906136362321-1839693281&rd=1, 2020."},{"volume-title":"File types blocked in Gmail. https:\/\/support.google.com\/mail\/answer\/6590?hl=en","year":"2020","key":"e_1_3_2_2_20_1","unstructured":"Google. File types blocked in Gmail. https:\/\/support.google.com\/mail\/answer\/6590?hl=en, 2020."},{"volume-title":"Google Safe Browsing. https:\/\/https:\/\/safebrowsing.google.com\/","year":"2020","key":"e_1_3_2_2_21_1","unstructured":"Google. Google Safe Browsing. https:\/\/https:\/\/safebrowsing.google.com\/, 2020."},{"volume-title":"Google's strongest security for those who need it most. https:\/\/landing.google.com\/advancedprotection\/","year":"2020","key":"e_1_3_2_2_22_1","unstructured":"Google. Google's strongest security for those who need it most. https:\/\/landing.google.com\/advancedprotection\/, 2020."},{"volume-title":"How Google infers interest and demographic categories. https:\/\/support.google.com\/google-ads\/answer\/2580383?hl=en","year":"2020","key":"e_1_3_2_2_23_1","unstructured":"Google. How Google infers interest and demographic categories. https:\/\/support.google.com\/google-ads\/answer\/2580383?hl=en, 2020."},{"key":"e_1_3_2_2_24_1","doi-asserted-by":"crossref","unstructured":"Tzipora Halevi Nasir Memon and Oded Nov. Spear-phishing in the wild: A real-world study of personality phishing self-efficacy and vulnerability to spearphishing attacks. Phishing Self-Efficacy and Vulnerability to Spear-Phishing Attacks (January 2 2015) 2015.","DOI":"10.2139\/ssrn.2544742"},{"key":"e_1_3_2_2_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/1164394.1164399"},{"key":"e_1_3_2_2_26_1","volume-title":"Ronald J Deibert. Targeted Threat Index: Characterizing and Quantifying Politically-Motivated Targeted Malware. In Proceedings of the USENIX Security Symposium","author":"Hardy Seth","year":"2014","unstructured":"Seth Hardy, Masashi Crete-Nishihata, Katharine Kleemola, Adam Senft, Byron Sonne, Greg Wiseman, Phillipa Gill, and Ronald J Deibert. Targeted Threat Index: Characterizing and Quantifying Politically-Motivated Targeted Malware. In Proceedings of the USENIX Security Symposium, 2014."},{"key":"e_1_3_2_2_27_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2014.23269"},{"key":"e_1_3_2_2_28_1","doi-asserted-by":"publisher","DOI":"10.1186\/s13673-016-0065-2"},{"key":"e_1_3_2_2_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/1290958.1290968"},{"key":"e_1_3_2_2_30_1","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0209684"},{"key":"e_1_3_2_2_31_1","doi-asserted-by":"publisher","DOI":"10.5555\/1387709.1387710"},{"key":"e_1_3_2_2_32_1","volume-title":"Lorrie Faith Cranor, and Jason Hong. Teaching johnny not to fall for phish. ACM Transactions on Internet Technology (TOIT), 10(2):7","author":"Kumaraguru Ponnurangam","year":"2010","unstructured":"Ponnurangam Kumaraguru, Steve Sheng, Alessandro Acquisti, Lorrie Faith Cranor, and Jason Hong. Teaching johnny not to fall for phish. ACM Transactions on Internet Technology (TOIT), 10(2):7, 2010."},{"key":"e_1_3_2_2_33_1","volume-title":"Protecting businesses against cyber threats during COVID-19 and beyond. https:\/\/cloud.google.com\/blog\/products\/identity-security\/protecting-against-cyber-threats-during-covid-19-and-beyond","author":"Kumaran Neil","year":"2020","unstructured":"Neil Kumaran and Sam Lugani. Protecting businesses against cyber threats during COVID-19 and beyond. https:\/\/cloud.google.com\/blog\/products\/identity-security\/protecting-against-cyber-threats-during-covid-19-and-beyond, 2020."},{"key":"e_1_3_2_2_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516747"},{"key":"e_1_3_2_2_35_1","volume-title":"Proceedings of the International Conference on Financial Cryptography and Data Security","author":"Lang Juan","year":"2016","unstructured":"Juan Lang, Alexei Czeskis, Dirk Balfanz, Marius Schilder, and Sampath Srinivas. Security keys: Practical cryptographic second factors for the modern web. In Proceedings of the International Conference on Financial Cryptography and Data Security, 2016."},{"key":"e_1_3_2_2_36_1","volume-title":"Proceedings of the USENIXSecurity Symposium","author":"Blond Stevens Le","year":"2014","unstructured":"Stevens Le Blond, Adina Uritesc, C\u00e9dric Gilbert, Zheng Leong Chua, Prateek Saxena, and Engin Kirda. A Look at Targeted Attacks Through the Lense of an NGO. In Proceedings of the USENIXSecurity Symposium, 2014."},{"key":"e_1_3_2_2_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/3336141"},{"key":"e_1_3_2_2_38_1","volume-title":"Proceedings of the USENIX Security Symposium","author":"Marczak William R","year":"2014","unstructured":"William R Marczak, John Scott-Railton, Morgan Marquis-Boire, and Vern Paxson. When governments hack opponents: a look at actors and technology. In Proceedings of the USENIX Security Symposium, 2014."},{"key":"e_1_3_2_2_39_1","volume-title":"SBC","author":"Miani Rodrigo Sanches","year":"2018","unstructured":"Rodrigo Sanches Miani, Danielle Oliveira, Kil Jin Brandini Park, and Bruno Bogaz Zarpelao. An empirical study of factors affecting the rate of spam. In Anais Principais do XXXVI Simp\u00f3sio Brasileiro de Redes de Computadores e Sistemas Distribuidos. SBC, 2018."},{"key":"e_1_3_2_2_40_1","volume-title":"https:\/\/www.microsoftaccountguard.com\/enus\/","author":"AccountGuard Microsoft","year":"2020","unstructured":"Microsft. Microsoft AccountGuard. https:\/\/www.microsoftaccountguard.com\/enus\/, 2020."},{"key":"e_1_3_2_2_41_1","doi-asserted-by":"publisher","DOI":"10.1109\/INNOVATIONS.2012.6207742"},{"key":"e_1_3_2_2_42_1","volume-title":"Logistic regression: Why we cannot do what we think we can do, and what we can do about it. European sociological review, 26(1):67--82","author":"Mood Carina","year":"2010","unstructured":"Carina Mood. Logistic regression: Why we cannot do what we think we can do, and what we can do about it. European sociological review, 26(1):67--82, 2010."},{"key":"e_1_3_2_2_43_1","doi-asserted-by":"publisher","DOI":"10.1057\/s41303-017-0058-x"},{"key":"e_1_3_2_2_44_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00049"},{"key":"e_1_3_2_2_45_1","volume-title":"Proceedings of the U SENIX Security Symposium","author":"Oest Adam","year":"2020","unstructured":"Adam Oest, Penghui Zhang, Brad Wardman, Eric Nunes, Jakub Burgis, Ali Zand, Kurt Thomas, Adam Doup\u00e9, and Gail-Joon Ahn. Sunrise to sunset: Analyzing the end-to-end life cycle and effectiveness of phishing attacks at scale. In Proceedings of the U SENIX Security Symposium, 2020."},{"key":"e_1_3_2_2_46_1","doi-asserted-by":"publisher","DOI":"10.1145\/3025453.3025831"},{"key":"e_1_3_2_2_47_1","volume-title":"Australasian Conference on Information Systems","author":"Parsons Kathryn","year":"2016","unstructured":"Kathryn Parsons, Marcus Butavicius, Malcolm Pattinson, Dragana Calic, Agata Mccormac, and Cate Jerram. Do users focus on the correct cues to differentiate between phishing and genuine emails? In Australasian Conference on Information Systems, 2016."},{"key":"e_1_3_2_2_48_1","doi-asserted-by":"publisher","DOI":"10.1093\/biomet\/66.3.403"},{"volume-title":"Fitting generalized linear models. https:\/\/www.rdocumentation.org\/packages\/stats\/versions\/3.6.2\/topics\/glm","year":"2020","key":"e_1_3_2_2_49_1","unstructured":"rdocumentation. Fitting generalized linear models. https:\/\/www.rdocumentation.org\/packages\/stats\/versions\/3.6.2\/topics\/glm, 2020."},{"key":"e_1_3_2_2_50_1","doi-asserted-by":"publisher","DOI":"10.1145\/1753326.1753383"},{"key":"e_1_3_2_2_51_1","volume-title":"Fifteenth Symposium on Usable Privacy and Security ({SOUPS} 2019)","author":"Simoiu Camelia","year":"2019","unstructured":"Camelia Simoiu, Joseph Bonneau, Christopher Gates, and Sharad Goel. \" i was told to buy a software or lose my computer. i ignored it\": A study of ransomware. In Fifteenth Symposium on Usable Privacy and Security ({SOUPS} 2019), 2019."},{"key":"e_1_3_2_2_52_1","volume-title":"New built-in gmail protections to combat malware in attachments. https:\/\/gsuiteupdates.googleblog.com\/2017\/05\/new-built-in-gmail-protections-to.html","author":"Somanchi Sri","year":"2017","unstructured":"Sri Somanchi. New built-in gmail protections to combat malware in attachments. https:\/\/gsuiteupdates.googleblog.com\/2017\/05\/new-built-in-gmail-protections-to.html, 2017."},{"key":"e_1_3_2_2_53_1","doi-asserted-by":"publisher","DOI":"10.1142\/S021848850200165X"},{"key":"e_1_3_2_2_54_1","volume-title":"Proceedings of the Workshop on the Economics of Information Security","author":"Thomas Kurt","year":"2015","unstructured":"Kurt Thomas, Danny Yuxing Huang, David Wang, Elie Bursztein, Chris Grier, Tom Holt, Christopher Kruegel, Damon McCoy, Stefan Savage, and Giovanni Vigna. Framing Dependencies Introduced by Underground Commoditization. In Proceedings of the Workshop on the Economics of Information Security, 2015."},{"key":"e_1_3_2_2_55_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134067"},{"key":"e_1_3_2_2_56_1","volume-title":"Spam and phishing in Q2","author":"Vergelis Maria","year":"2019","unstructured":"Maria Vergelis, Tatyana Shcherbakova, and Tatyana Sidorina. Spam and phishing in Q2 2019. https:\/\/securelist.com\/spam-and-phishing-in-q2-2019\/92379\/, 2019."},{"key":"e_1_3_2_2_57_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2011.03.002"},{"key":"e_1_3_2_2_58_1","volume-title":"Research article phishing susceptibility: An investigation into the processing of a targeted spear phishing email","author":"Wang Jingguo","year":"2012","unstructured":"Jingguo Wang, Tejaswini Herath, Rui Chen, Arun Vishwanath, and H Raghav Rao. Research article phishing susceptibility: An investigation into the processing of a targeted spear phishing email. IEEE transactions on professional communication, 55(4):345--362, 2012."}],"event":{"name":"IMC '20: ACM Internet Measurement Conference","sponsor":["SIGCOMM ACM Special Interest Group on Data Communication","SIGMETRICS ACM Special Interest Group on Measurement and Evaluation"],"location":"Virtual Event USA","acronym":"IMC '20"},"container-title":["Proceedings of the ACM Internet Measurement Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3419394.3423617","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3419394.3423617","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,12,15]],"date-time":"2025-12-15T23:36:16Z","timestamp":1765841776000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3419394.3423617"}},"subtitle":["Measuring factors that differentiate risk"],"short-title":[],"issued":{"date-parts":[[2020,10,27]]},"references-count":58,"alternative-id":["10.1145\/3419394.3423617","10.1145\/3419394"],"URL":"https:\/\/doi.org\/10.1145\/3419394.3423617","relation":{},"subject":[],"published":{"date-parts":[[2020,10,27]]},"assertion":[{"value":"2020-10-27","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}