{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,13]],"date-time":"2026-04-13T12:57:16Z","timestamp":1776085036922,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":47,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,6,21]],"date-time":"2021-06-21T00:00:00Z","timestamp":1624233600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,6,21]]},"DOI":"10.1145\/3450614.3464472","type":"proceedings-article","created":{"date-parts":[[2021,6,22]],"date-time":"2021-06-22T18:25:06Z","timestamp":1624386306000},"page":"345-350","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":8,"title":["A phishing Mitigation Solution using Human Behaviour and Emotions that Influence the Success of Phishing Attacks"],"prefix":"10.1145","author":[{"given":"Hossein","family":"Abroshan","sequence":"first","affiliation":[{"name":"Ghent University, Belgium"}]},{"given":"Jan","family":"Devos","sequence":"additional","affiliation":[{"name":"Ghent University, Belgium"}]},{"given":"Geert","family":"Poels","sequence":"additional","affiliation":[{"name":"Ghent University, Belgium"}]},{"given":"Eric","family":"Laermans","sequence":"additional","affiliation":[{"name":"Ghent University, Belgium"}]}],"member":"320","published-online":{"date-parts":[[2021,6,22]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/2063176.2063197"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1016\/S1361-3723(20)30098-1"},{"key":"e_1_3_2_1_3_1","unstructured":"APWG. Phishing Activity Trends Report. 2020.  APWG. Phishing Activity Trends Report. 2020."},{"key":"e_1_3_2_1_4_1","first-page":"1","article-title":"Ransomware: Evolution, mitigation and prevention","volume":"13","author":"Richardson R.","year":"2017","journal-title":"International Management Review"},{"key":"e_1_3_2_1_5_1","volume-title":"City","author":"Wang Q.","year":"2020"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/CHILECON.2017.8229528"},{"key":"e_1_3_2_1_7_1","volume-title":"Ten deadly cyber security threats amid COVID-19 pandemic","author":"Khan N. A.","year":"2020"},{"key":"e_1_3_2_1_8_1","volume-title":"Barracuda","author":"Shi F.","year":"2020"},{"key":"e_1_3_2_1_9_1","volume-title":"Classification of phishing attack solutions by employing deep learning techniques: A systematic literature review. Developments and advances in defense and security","author":"Benavides E.","year":"2020"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1007\/s12652-019-01311-4"},{"key":"e_1_3_2_1_11_1","volume-title":"Types of anti-phishing solutions for phishing attack","author":"Apandi S. H.","year":"2020"},{"key":"e_1_3_2_1_12_1","volume-title":"A comprehensive survey of AI-enabled phishing attacks detection techniques. Telecommun Syst","author":"Basit A.","year":"2020"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSPW51379.2020.00027"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijhcs.2018.06.004"},{"key":"e_1_3_2_1_15_1","volume-title":"Why employees (still) click on phishing links: investigation in hospitals. Journal of medical Internet research, 22, 1","author":"Jalali M. S.","year":"2020"},{"key":"e_1_3_2_1_16_1","volume-title":"Phishing Attacks Root Causes","author":"Abroshan H.","year":"2017"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1093\/cybsec\/tyaa009"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"crossref","unstructured":"Halevi T. Memon N. and Nov O. Spear-phishing in the wild: A real-world study of personality phishing self-efficacy and vulnerability to spear-phishing attacks. Phishing Self-Efficacy and Vulnerability to Spear-Phishing Attacks (January 2 2015) (2015).  Halevi T. Memon N. and Nov O. Spear-phishing in the wild: A real-world study of personality phishing self-efficacy and vulnerability to spear-phishing attacks. Phishing Self-Efficacy and Vulnerability to Spear-Phishing Attacks (January 2 2015) (2015).","DOI":"10.2139\/ssrn.2544742"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1002\/asi.20779"},{"key":"e_1_3_2_1_20_1","volume-title":"Phishing happens beyond technology: The effects of human behaviours and demographics on each step of a phishing process","author":"Abroshan H.","year":"2021"},{"key":"e_1_3_2_1_21_1","volume-title":"Correlating human traits and cyber security behavior intentions. computers & security, 73","author":"Gratian M.","year":"2018"},{"key":"e_1_3_2_1_22_1","volume-title":"City","author":"Egelman S.","year":"2015"},{"key":"e_1_3_2_1_23_1","volume-title":"IGI Global","author":"Hadlington L.","year":"2021"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"crossref","DOI":"10.17705\/3JSIS.00013","volume-title":"RISK AND DEMOGRAPHICS'INFLUENCE ON SECURITY BEHAVIOR INTENTIONS. Risk","author":"Ayyagari R.","year":"2020"},{"key":"e_1_3_2_1_25_1","first-page":"7","article-title":"Risky remote purchasing and identity theft victimization among older Internet users. Psychology","volume":"21","author":"Holtfreter K.","year":"2015","journal-title":"Crime & Law"},{"key":"e_1_3_2_1_26_1","volume-title":"COVID-19 and Phishing: effects of human emotions, behaviour, and demographics on the success of phishing attempts during the pandemic. Manuscript submitted for publication","author":"Abroshan H.","year":"2021"},{"key":"e_1_3_2_1_27_1","volume-title":"Individual risk attitudes: Measurement, determinants, and behavioral consequences. Journal of the european economic association, 9, 3","author":"Dohmen T.","year":"2011"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1037\/1076-898X.8.2.75"},{"key":"e_1_3_2_1_29_1","volume-title":"Evaluation of behavioral measures of risk taking propensity with inner city adolescents. Behaviour research and therapy, 43, 2","author":"Aklin W. M.","year":"2005"},{"key":"e_1_3_2_1_30_1","volume-title":"Effects of age and initial risk perception on Balloon Analog Risk Task: the mediating role of processing speed and need for cognitive closure. Frontiers in psychology, 7","author":"Koscielniak M.","year":"2016"},{"key":"e_1_3_2_1_31_1","volume-title":"Coronavirus Anxiety Scale: A brief mental health screener for COVID-19 related anxiety. Death studies, 44, 7","author":"Lee S. A.","year":"2020"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11469-020-00270-8"},{"key":"e_1_3_2_1_33_1","volume-title":"City","author":"Halevi T.","year":"2016"},{"key":"e_1_3_2_1_34_1","volume-title":"City","author":"Sheng S.","year":"2010"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2018.03.050"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.3390\/fi12100168"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICITST.2014.7038814"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1109\/TALE.2018.8615162"},{"key":"e_1_3_2_1_39_1","volume-title":"Phishing for user security awareness. computers & security, 26, 1","author":"Dodge R. C.","year":"2007"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.35741\/issn.0258-2724.55.1.18"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.compedu.2008.06.011"},{"key":"e_1_3_2_1_42_1","volume-title":"The efficacy of cognitive behavioral therapy: A review of meta-analyses. Cognitive therapy and research, 36, 5","author":"Hofmann S. G.","year":"2012"},{"key":"e_1_3_2_1_43_1","volume-title":"Internet-based and other computerized psychological treatments for adult depression: a meta-analysis. Cognitive behaviour therapy, 38, 4","author":"Andersson G.","year":"2009"},{"key":"e_1_3_2_1_44_1","volume-title":"Internet-based psychological treatments for depression. Expert review of neurotherapeutics, 12, 7","author":"Johansson R.","year":"2012"},{"key":"e_1_3_2_1_45_1","volume-title":"Randomised controlled non-inferiority trial with 3-year follow-up of internet-delivered versus face-to-face group cognitive behavioural therapy for depression. Journal of affective disorders, 151, 3","author":"Andersson G.","year":"2013"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"crossref","unstructured":"Radomski A. D. Wozney L. McGrath P. Huguet A. Hartling L. Dyson M. P. Bennett K. and Newton A. S. Design and delivery features that may improve the use of internet-based cognitive behavioral therapy for children and adolescents with anxiety: a realist literature synthesis with a persuasive systems design perspective. Journal of medical Internet research 21 2 (2019) e11128.  Radomski A. D. Wozney L. McGrath P. Huguet A. Hartling L. Dyson M. P. Bennett K. and Newton A. S. Design and delivery features that may improve the use of internet-based cognitive behavioral therapy for children and adolescents with anxiety: a realist literature synthesis with a persuasive systems design perspective. Journal of medical Internet research 21 2 (2019) e11128.","DOI":"10.2196\/11128"},{"key":"e_1_3_2_1_47_1","volume-title":"Digital approaches to remote pediatric health care delivery during the COVID-19 pandemic: existing evidence and a call for further research. JMIR pediatrics and parenting, 3, 1","author":"Badawy S. M.","year":"2020"}],"event":{"name":"UMAP '21: 29th ACM Conference on User Modeling, Adaptation and Personalization","location":"Utrecht Netherlands","acronym":"UMAP '21","sponsor":["SIGWEB ACM Special Interest Group on Hypertext, Hypermedia, and Web","SIGCHI ACM Special Interest Group on Computer-Human Interaction"]},"container-title":["Adjunct Proceedings of the 29th ACM Conference on User Modeling, Adaptation and Personalization"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3450614.3464472","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3450614.3464472","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T20:17:39Z","timestamp":1750191459000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3450614.3464472"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,6,21]]},"references-count":47,"alternative-id":["10.1145\/3450614.3464472","10.1145\/3450614"],"URL":"https:\/\/doi.org\/10.1145\/3450614.3464472","relation":{},"subject":[],"published":{"date-parts":[[2021,6,21]]},"assertion":[{"value":"2021-06-22","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}