{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,1]],"date-time":"2026-03-01T11:08:41Z","timestamp":1772363321209,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":106,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,4,19]],"date-time":"2023-04-19T00:00:00Z","timestamp":1681862400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,4,19]]},"DOI":"10.1145\/3544548.3580650","type":"proceedings-article","created":{"date-parts":[[2023,4,20]],"date-time":"2023-04-20T04:27:20Z","timestamp":1681964840000},"page":"1-13","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":11,"title":["Tips, Tricks, and Training: Supporting Anti-Phishing Awareness among Mid-Career Office Workers Based on Employees\u2019 Current Practices"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-6699-187X","authenticated-orcid":false,"given":"Anne Clara","family":"Tally","sequence":"first","affiliation":[{"name":"Informatics, Indiana University Bloomington, United States"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7173-6643","authenticated-orcid":false,"given":"Jacob","family":"Abbott","sequence":"additional","affiliation":[{"name":"Informatics, Indiana University Bloomington, United States"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6840-6961","authenticated-orcid":false,"given":"Ashley M","family":"Bochner","sequence":"additional","affiliation":[{"name":"Informatics, Indiana University Bloomington, United States"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1299-7867","authenticated-orcid":false,"given":"Sanchari","family":"Das","sequence":"additional","affiliation":[{"name":"Computer Science, University of Denver, United States"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1212-3628","authenticated-orcid":false,"given":"Christena","family":"Nippert-Eng","sequence":"additional","affiliation":[{"name":"Informatics, Indiana University Bloomington, United States"}]}],"member":"320","published-online":{"date-parts":[[2023,4,19]]},"reference":[{"key":"e_1_3_3_3_1_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1741-5446.2008.00282.x"},{"key":"e_1_3_3_3_2_1","unstructured":"Cyber Infrastructure &\u00a0Security Agency. 2021. Reminder for critical infrastructure to stay vigilant against threats during holidays and weekends."},{"key":"e_1_3_3_3_3_1","first-page":"446","article-title":"Security awareness training: A review","volume":"2229","author":"Al-Daeef Melad\u00a0Mohamed","year":"2017","unstructured":"Melad\u00a0Mohamed Al-Daeef, Nurlida Basir, and Madihah\u00a0Mohd Saudi. 2017. Security awareness training: A review. Lecture Notes in Engineering and Computer Science 2229 (2017), 446\u2013451.","journal-title":"Lecture Notes in Engineering and Computer Science"},{"key":"e_1_3_3_3_4_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2017.04.006"},{"key":"e_1_3_3_3_5_1","volume-title":"A multi-classifier network-based crypto ransomware detection system: A case study of locky ransomware","author":"Almashhadani O","year":"2019","unstructured":"Ahmad\u00a0O Almashhadani, Mustafa Kaiiali, Sakir Sezer, and Philip O\u2019Kane. 2019. A multi-classifier network-based crypto ransomware detection system: A case study of locky ransomware. IEEE access 7(2019), 47053\u201347067."},{"key":"e_1_3_3_3_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/ITNG.2009.109"},{"key":"e_1_3_3_3_7_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2012.12.018"},{"key":"e_1_3_3_3_8_1","doi-asserted-by":"publisher","unstructured":"Maria Bada and Jason\u00a0R.C. Nurse. 2020. Chapter 4 - The social and psychological impact of cyberattacks. In Emerging Cyber Threats and Cognitive Vulnerabilities Vladlena Benson and John Mcalaney (Eds.). Academic Press San Diego CA 73\u201392. https:\/\/doi.org\/10.1016\/B978-0-12-816203-3.00004-6","DOI":"10.1016\/B978-0-12-816203-3.00004-6"},{"key":"e_1_3_3_3_9_1","volume-title":"The SAGE handbook of interview research: The complexity of the craft","author":"Beitin K","unstructured":"Ben\u00a0K Beitin. 2012. Interview and sampling. In The SAGE handbook of interview research: The complexity of the craft. Sage Publications, Thousand Oaks, CA, 243\u2013254."},{"key":"e_1_3_3_3_10_1","volume-title":"Naturalistic inquiry and the saturation concept: a research note. Qualitative research 8, 1","author":"Bowen A","year":"2008","unstructured":"Glenn\u00a0A Bowen. 2008. Naturalistic inquiry and the saturation concept: a research note. Qualitative research 8, 1 (2008), 137\u2013152."},{"key":"e_1_3_3_3_11_1","volume-title":"Using thematic analysis in psychology. Qualitative research in psychology 3, 2","author":"Braun Virginia","year":"2006","unstructured":"Virginia Braun and Victoria Clarke. 2006. Using thematic analysis in psychology. Qualitative research in psychology 3, 2 (2006), 77\u2013101."},{"key":"e_1_3_3_3_12_1","doi-asserted-by":"publisher","DOI":"10.1108\/ICS-03-2017-0009"},{"key":"e_1_3_3_3_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/2858036.2858498"},{"key":"e_1_3_3_3_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2013.106"},{"key":"e_1_3_3_3_15_1","volume-title":"Constructing grounded theory(2 ed.)","author":"Charmaz Kathy","unstructured":"Kathy Charmaz. 2014. Constructing grounded theory(2 ed.). SAGE Publications, London, England."},{"key":"e_1_3_3_3_16_1","volume-title":"Proceedings of SITE Interactive Conference 2021","author":"Chen Weiru","year":"2021","unstructured":"Weiru Chen, Yuming He, Xin Tian, and Wu He. 2021. Exploring Cybersecurity Education at the K-12 Level. In Proceedings of SITE Interactive Conference 2021, Elizabeth Langranand David Rutledge (Eds.). Association for the Advancement of Computing in Education (AACE), Online, United States, 108\u2013114. https:\/\/www.learntechlib.org\/p\/220175"},{"key":"e_1_3_3_3_17_1","unstructured":"Cofense. 2016. Enterprise Phishing Susceptibility Report: An Inside Look at Employee Behavior Pertaining to Highly-Effective Phishing Scenarios. 13\u00a0pages. https:\/\/cofense.com\/wp-content\/uploads\/2017\/10\/PhishMe_EnterprisePhishingSusceptibilityReport_2015_Final.pdf"},{"key":"e_1_3_3_3_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/3377811.3380387"},{"key":"e_1_3_3_3_19_1","unstructured":"Hasan Darwish. 2017. Gamifying the industrial engineering profession. 1148\u20131161\u00a0pages. https:\/\/www.scopus.com\/inward\/record.uri?eid=2-s2.0-85018967165&partnerID=40&md5=399c9f1b99a2ea9306fdba815f51319d"},{"key":"e_1_3_3_3_20_1","volume-title":"Proceedings of the Thirteenth International Symposium on Human Aspects of Information Security & Assurance (HAISA","author":"Das Sanchari","year":"2019","unstructured":"Sanchari Das, Andrew Kim, Zachary Tingle, and Christena Nippert-Eng. 2019. All about phishing: Exploring user research through a systematic literature review. In Proceedings of the Thirteenth International Symposium on Human Aspects of Information Security & Assurance (HAISA 2019). International Federation for Information Processing (IFIP), Laxenburg, Austria, 198\u2013202."},{"key":"e_1_3_3_3_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/3173574.3173575"},{"key":"e_1_3_3_3_22_1","volume-title":"Feminist ethnography (2ed.). Rowman & Littlefield","author":"Davis Dana-Ain","unstructured":"Dana-Ain Davis and Christa Craven. 2022. Feminist ethnography (2ed.). Rowman & Littlefield, Lanham, MD."},{"key":"e_1_3_3_3_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/1124772.1124861"},{"key":"e_1_3_3_3_24_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00779-004-0308-5"},{"key":"e_1_3_3_3_25_1","doi-asserted-by":"publisher","DOI":"10.4324\/9781003015994"},{"key":"e_1_3_3_3_26_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10551-008-9909-7"},{"key":"e_1_3_3_3_27_1","volume-title":"Non-formal learning and tacit knowledge in professional work. British journal of educational psychology 70, 1","author":"Eraut Michael","year":"2000","unstructured":"Michael Eraut. 2000. Non-formal learning and tacit knowledge in professional work. British journal of educational psychology 70, 1 (2000), 113\u2013136."},{"key":"e_1_3_3_3_28_1","volume-title":"Twelfth Symposium on Usable Privacy and Security (SOUPS 2016","author":"Fagan Michael","year":"2016","unstructured":"Michael Fagan and Mohammad Maifi\u00a0Hasan Khan. 2016. Why Do They Do What They Do?: A Study of What Motivates Users to (Not) Follow Computer Security Advice. In Twelfth Symposium on Usable Privacy and Security (SOUPS 2016). USENIX Association, Denver, CO, 59\u201375. https:\/\/www.usenix.org\/conference\/soups2016\/technical-sessions\/presentation\/fagan"},{"key":"e_1_3_3_3_29_1","doi-asserted-by":"publisher","DOI":"10.3233\/JCS-181253"},{"key":"e_1_3_3_3_30_1","volume-title":"Do stories help people adopt two-factor authentication?Studies 1, 2","author":"Fennell Chris","year":"2019","unstructured":"Chris Fennell and Rick Wash. 2019. Do stories help people adopt two-factor authentication?Studies 1, 2 (2019), 3."},{"key":"e_1_3_3_3_31_1","doi-asserted-by":"publisher","DOI":"10.1093\/workar\/wau002"},{"key":"e_1_3_3_3_32_1","volume-title":"Seventeenth Symposium on Usable Privacy and Security (SOUPS 2021","author":"Franz Anjuli","year":"2021","unstructured":"Anjuli Franz, Verena Zimmermann, Gregor Albrecht, Katrin Hartwig, Christian Reuter, Alexander Benlian, and Joachim Vogt. 2021. {SoK}: Still Plenty of Phish in the Sea \u2014 A Taxonomy of User-Oriented Phishing Interventions and Avenues for Future Research. In Seventeenth Symposium on Usable Privacy and Security (SOUPS 2021). USENIX Association, Berkeley, CA, 339\u2013358. https:\/\/www.usenix.org\/conference\/soups2021\/presentation\/franz"},{"key":"e_1_3_3_3_33_1","volume-title":"Fifteenth Symposium on Usable Privacy and Security (SOUPS","author":"Fulton R","year":"2019","unstructured":"Kelsey\u00a0R Fulton, Rebecca Gelles, Alexandra McKay, Yasmin Abdi, Richard Roberts, and Michelle\u00a0L Mazurek. 2019. The effect of entertainment media on mental models of computer security. In Fifteenth Symposium on Usable Privacy and Security (SOUPS 2019). USENIX Association, Berkeley, CA, 79\u201395."},{"key":"e_1_3_3_3_34_1","unstructured":"Fiona Fylan. 2005. Semi-structured interviewing. A handbook of research methods for clinical and health psychology 5 2(2005) 65\u201378."},{"key":"e_1_3_3_3_35_1","doi-asserted-by":"publisher","DOI":"10.1002\/9781118663219.wbegss765"},{"key":"e_1_3_3_3_36_1","doi-asserted-by":"publisher","DOI":"10.14722\/usec.2018.23016"},{"key":"e_1_3_3_3_37_1","volume-title":"Phishing Activity Trends Report: 3rd Quarter. https:\/\/docs.apwg.org\/reports\/apwg_trends_report_q3_2021.pdf","author":"Anti-Phishing\u00a0Working Group","unstructured":"Anti-Phishing\u00a0Working Group. 2021. Phishing Activity Trends Report: 3rd Quarter. https:\/\/docs.apwg.org\/reports\/apwg_trends_report_q3_2021.pdf"},{"key":"e_1_3_3_3_38_1","volume-title":"Phishing Activity Trends Report: 4th Quarter. https:\/\/docs.apwg.org\/reports\/apwg_trends_report_q4_2020.pdf","author":"Anti-Phishing\u00a0Working Group","unstructured":"Anti-Phishing\u00a0Working Group. 2021. Phishing Activity Trends Report: 4th Quarter. https:\/\/docs.apwg.org\/reports\/apwg_trends_report_q4_2020.pdf"},{"key":"e_1_3_3_3_39_1","volume-title":"Using feature selection and classification scheme for automating phishing email detection. Studies in informatics and control 22, 1","author":"Hamid Isredza","year":"2013","unstructured":"Isredza Rahmi\u00a0A Hamid, Jemal Abawajy, and TH Kim. 2013. Using feature selection and classification scheme for automating phishing email detection. Studies in informatics and control 22, 1 (2013), 61\u201370."},{"key":"e_1_3_3_3_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/2835375"},{"key":"e_1_3_3_3_41_1","unstructured":"Katie Hendrickson Liz Gauthier Maggie\u00a0Osorio Glennon Alexis\u00a0Menocal Harrigan Hannah Weissman Carol Fletcher Sarah Dunton Jake Baskin and Janice Mak. 2021. 2021 State of Computer Science Education Accelerating Action Through Advocacy."},{"key":"e_1_3_3_3_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/3366030.3366086"},{"key":"e_1_3_3_3_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/2063176.2063197"},{"key":"e_1_3_3_3_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/1290958.1290968"},{"key":"e_1_3_3_3_45_1","doi-asserted-by":"publisher","DOI":"10.2196\/16775"},{"key":"e_1_3_3_3_46_1","doi-asserted-by":"publisher","DOI":"10.1186\/s13673-020-00237-7"},{"key":"e_1_3_3_3_47_1","doi-asserted-by":"publisher","DOI":"10.1108\/ICS-03-2018-0038"},{"key":"e_1_3_3_3_48_1","doi-asserted-by":"publisher","DOI":"10.1109\/FIE.2018.8659021"},{"key":"e_1_3_3_3_49_1","doi-asserted-by":"publisher","DOI":"10.1080\/07421222.2017.1334499"},{"key":"e_1_3_3_3_50_1","doi-asserted-by":"publisher","DOI":"10.1177\/2372732215624708"},{"key":"e_1_3_3_3_51_1","volume-title":"Statistical models for predicting threat detection from human behavior. Frontiers in psychology 9","author":"Kelley Timothy","year":"2018","unstructured":"Timothy Kelley, Mary\u00a0J Amon, and Bennett\u00a0I Bertenthal. 2018. Statistical models for predicting threat detection from human behavior. Frontiers in psychology 9 (2018), 466."},{"key":"e_1_3_3_3_52_1","unstructured":"Morgan Klaus\u00a0Scheuerman Katta Spiel Oliver\u00a0L Haimson Foad Hamidi and Stacy\u00a0M Branham. 2019. HCI Guidelines for Gender Equity and Inclusivity. Version 1.1. https:\/\/www.morgan-klaus.com\/gender-guidelines.html."},{"key":"e_1_3_3_3_53_1","doi-asserted-by":"publisher","DOI":"10.1145\/1572532.1572536"},{"key":"e_1_3_3_3_54_1","doi-asserted-by":"publisher","DOI":"10.1145\/1240624.1240760"},{"key":"e_1_3_3_3_55_1","doi-asserted-by":"publisher","DOI":"10.1145\/1754393.1754396"},{"key":"e_1_3_3_3_56_1","unstructured":"Ponemon\u00a0Institute LLC. 2021. The 2021 Cost of Phishing Study. https:\/\/www.proofpoint.com\/sites\/default\/files\/analyst-reports\/pfpt-us-ar-ponemon-2021-cost-of-phishing-study.pdf"},{"key":"e_1_3_3_3_57_1","volume-title":"The Repetition-Break plot structure: A cognitive influence on selection in the marketplace of ideas. Cognitive science 33, 1","author":"Loewenstein Jeffrey","year":"2009","unstructured":"Jeffrey Loewenstein and Chip Heath. 2009. The Repetition-Break plot structure: A cognitive influence on selection in the marketplace of ideas. Cognitive science 33, 1 (2009), 1\u201319."},{"key":"e_1_3_3_3_58_1","volume-title":"Applications of social research methods to questions in information and library science","author":"Luo Lili","unstructured":"Lili Luo and Barbara\u00a0M Wildemuth. 2016. Semistructured interviews. In Applications of social research methods to questions in information and library science, 2nd edition(2 ed.), Barbara\u00a0M Wildemuth (Ed.). Vol.\u00a0232. Libraries Unlimited Westport, Englewood, CO.","edition":"2"},{"key":"e_1_3_3_3_59_1","doi-asserted-by":"publisher","DOI":"10.1108\/13665620310504783"},{"key":"e_1_3_3_3_60_1","doi-asserted-by":"crossref","unstructured":"Amelia Manuti Serafina Pastore Anna\u00a0Fausta Scardigno Maria\u00a0Luisa Giancaspro and Daniele Morciano. 2015. Formal and informal learning in the workplace: A research review. International journal of training and development 19 1(2015) 1\u201317.","DOI":"10.1111\/ijtd.12044"},{"key":"e_1_3_3_3_61_1","doi-asserted-by":"publisher","DOI":"10.17169\/fqs-11.3.1428"},{"key":"e_1_3_3_3_62_1","doi-asserted-by":"publisher","DOI":"10.1145\/3359174"},{"key":"e_1_3_3_3_63_1","first-page":"5","article-title":"Enhancing cybersecurity awareness training: A comprehensive phishing exercise approach","volume":"14","author":"Miranda JA","year":"2018","unstructured":"Michael\u00a0JA Miranda. 2018. Enhancing cybersecurity awareness training: A comprehensive phishing exercise approach. International Management Review 14, 2 (2018), 5\u201310.","journal-title":"International Management Review"},{"key":"e_1_3_3_3_64_1","volume-title":"Eleventh International Symposium on Human Aspects of Information Security & Assurance (HAISA) 2017, Proceedings, Steven Furnell and Nathan\u00a0L. Clarke (Eds.)","author":"Misra Gaurav","year":"2017","unstructured":"Gaurav Misra, Nalin Asanka\u00a0Gamagedara Arachchilage, and Shlomo Berkovsky. 2017. Phish Phinder: A Game Design Approach to Enhance User Confidence in Mitigating Phishing Attacks. In Eleventh International Symposium on Human Aspects of Information Security & Assurance (HAISA) 2017, Proceedings, Steven Furnell and Nathan\u00a0L. Clarke (Eds.). University of Plymouth, Plymouth, UK, 41\u201351. http:\/\/www.cscan.org\/openaccess\/?paperid=349"},{"key":"e_1_3_3_3_65_1","volume-title":"Princeton University Press","author":"Molotch Harvey","unstructured":"Harvey Molotch. 2014.. Princeton University Press, Princeton, NJ."},{"key":"e_1_3_3_3_66_1","volume-title":"Cybercrime to cost the world $10.5 trillion annually by","author":"Morgan Steve","year":"2025","unstructured":"Steve Morgan. 2021. Cybercrime to cost the world $10.5 trillion annually by 2025. https:\/\/cybersecurityventures.com\/cybercrime-damages-6-trillion-by-2021\/"},{"key":"e_1_3_3_3_67_1","volume-title":"A practical introduction to in-depth interviewing","author":"Morris Alan","unstructured":"Alan Morris. 2015. A practical introduction to in-depth interviewing. SAGE Publications, London, England."},{"key":"e_1_3_3_3_68_1","doi-asserted-by":"publisher","DOI":"10.1145\/3347709.3347774"},{"key":"e_1_3_3_3_69_1","volume-title":"Proceedings of the Annual Meeting of the Cognitive Science Society, Vol.\u00a029","author":"Munnich Edward","year":"2007","unstructured":"Edward Munnich, Micheal\u00a0Andrew Ranney, and Mirian Song. 2007. Surprise, surprise: The role of surprising numerical feedback in belief change. In Proceedings of the Annual Meeting of the Cognitive Science Society, Vol.\u00a029. Cognitive Science Society, Seattle, WA, 503\u2013508."},{"key":"e_1_3_3_3_70_1","unstructured":"Francois Murphy. 2019. Austrian court rejects FACC lawsuit against ex-CEO in cyber fraud case. https:\/\/www.nasdaq.com\/articles\/austrian-court-rejects-facc-lawsuit-against-ex-ceo-in-cyber-fraud-case-2019-11-27"},{"key":"e_1_3_3_3_71_1","unstructured":"Shadia Nasralla. 2016. Austria\u2019s FACC hit by Cyber Fraud fires CEO. https:\/\/www.reuters.com\/article\/us-facc-ceo-idUSKCN0YG0ZF"},{"key":"e_1_3_3_3_72_1","doi-asserted-by":"publisher","DOI":"10.1080\/0960085X.2021.1931494"},{"key":"e_1_3_3_3_73_1","doi-asserted-by":"publisher","DOI":"10.1145\/3290605.3300579"},{"key":"e_1_3_3_3_74_1","volume-title":"Workshop on Consumer Protection. USENIX Association","author":"Nthala Norbert","year":"2021","unstructured":"Norbert Nthala and Rick Wash. 2021. How Non-Experts Try to Detect Phishing Scam Emails. In Workshop on Consumer Protection. USENIX Association, Berkeley, CA, 7\u00a0pages."},{"key":"e_1_3_3_3_75_1","volume-title":"Automation & Test in Europe Conference & Exhibition (DATE). IEEE","author":"Pan Zhixin","year":"2021","unstructured":"Zhixin Pan, Jennifer Sheldon, Chamika Sudusinghe, Subodha Charles, and Prabhat Mishra. 2021. Hardware-assisted malware detection using machine learning. In 2021 Design, Automation & Test in Europe Conference & Exhibition (DATE). IEEE, New York, NY, 1775\u20131780."},{"key":"e_1_3_3_3_76_1","doi-asserted-by":"publisher","DOI":"10.1080\/15205436.2018.1490434"},{"key":"e_1_3_3_3_77_1","volume-title":"About three-in-ten U.S. adults say they are \u2018almost constantly","author":"Perrin Andrew","year":"2021","unstructured":"Andrew Perrin and Sara Atske. 2021. About three-in-ten U.S. adults say they are \u2018almost constantly\u2019 online. https:\/\/www.pewresearch.org\/fact-tank\/2021\/03\/26\/about-three-in-ten-u-s-adults-say-they-are-almost-constantly-online\/"},{"key":"e_1_3_3_3_78_1","doi-asserted-by":"publisher","DOI":"10.1145\/3290605.3300748"},{"key":"e_1_3_3_3_79_1","volume-title":"Eighteenth Symposium on Usable Privacy and Security (SOUPS","author":"Pfeffer Katharina","year":"2022","unstructured":"Katharina Pfeffer, Alexandra Mai, Edgar Weippl, Emilee Rader, and Katharina Krombholz. 2022. Replication: Stories as Informal Lessons about Security. In Eighteenth Symposium on Usable Privacy and Security (SOUPS 2022). USENIX Association, Berkeley, CA, 1\u201318."},{"key":"e_1_3_3_3_80_1","first-page":"121","article-title":"Identifying patterns in informal sources of security information","volume":"1","author":"Rader Emilee","year":"2015","unstructured":"Emilee Rader and Rick Wash. 2015. Identifying patterns in informal sources of security information. Journal of Cybersecurity 1, 1 (2015), 121\u2013144.","journal-title":"Journal of Cybersecurity"},{"key":"e_1_3_3_3_81_1","doi-asserted-by":"publisher","DOI":"10.1145\/2335356.2335364"},{"key":"e_1_3_3_3_82_1","doi-asserted-by":"publisher","DOI":"10.3390\/app10072363"},{"key":"e_1_3_3_3_83_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978307"},{"key":"e_1_3_3_3_84_1","doi-asserted-by":"publisher","DOI":"10.1145\/3173574.3174086"},{"key":"e_1_3_3_3_85_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10639-018-9765-8"},{"key":"e_1_3_3_3_86_1","doi-asserted-by":"publisher","DOI":"10.1007\/BF02691916"},{"key":"e_1_3_3_3_87_1","volume-title":"The classroom and the everyday: The importance of informal learning for formal learning. Investigar em educa\u00e7\u00e3o 2, 1","author":"Rogers Alan","year":"2014","unstructured":"Alan Rogers. 2014. The classroom and the everyday: The importance of informal learning for formal learning. Investigar em educa\u00e7\u00e3o 2, 1 (2014), 7\u201334."},{"key":"e_1_3_3_3_88_1","volume-title":"A review of phishing attacks and countermeasures for internet of things-based smart business applications in industry 4.0. Human behavior and emerging technologies 3, 5","author":"Sadiq Ashina","year":"2021","unstructured":"Ashina Sadiq, Muhammad Anwar, Rizwan\u00a0A Butt, Farhan Masud, Muhammad\u00a0K Shahzad, Shahid Naseem, and Muhammad Younas. 2021. A review of phishing attacks and countermeasures for internet of things-based smart business applications in industry 4.0. Human behavior and emerging technologies 3, 5 (2021), 854\u2013864."},{"key":"e_1_3_3_3_89_1","doi-asserted-by":"crossref","unstructured":"Michael\u00a0L Schwalbe and Michelle Wolkomir. 2012. 10 Interviewing Men. SAGE Publications Inc. Thousand Oaks CA. 202\u2013219 pages.","DOI":"10.4135\/9781412973588.d14"},{"key":"e_1_3_3_3_90_1","doi-asserted-by":"publisher","DOI":"10.1126\/science.182.4112.553"},{"key":"e_1_3_3_3_91_1","doi-asserted-by":"publisher","DOI":"10.1109\/RTEICT.2017.8256835"},{"key":"e_1_3_3_3_92_1","doi-asserted-by":"publisher","DOI":"10.1145\/1280680.1280692"},{"key":"e_1_3_3_3_93_1","doi-asserted-by":"publisher","unstructured":"Kuldeep Singh Palvi Aggarwal Prashanth Rajivan and Cleotilde Gonzalez. 2019. Training to Detect Phishing Emails: Effects of the Frequency of Experienced Phishing Emails. 453-457\u00a0pages. https:\/\/doi.org\/10.1177\/1071181319631355 arXiv:https:\/\/doi.org\/10.1177\/1071181319631355","DOI":"10.1177\/1071181319631355"},{"key":"e_1_3_3_3_94_1","doi-asserted-by":"publisher","DOI":"10.1109\/BESC53957.2021.9635235"},{"key":"e_1_3_3_3_95_1","volume-title":"Phishing and Communication Channels","author":"Sonowal Gunikhan","unstructured":"Gunikhan Sonowal. 2022. Introduction to Phishing. In Phishing and Communication Channels. Apress, Berkeley, CA, 1\u201324."},{"key":"e_1_3_3_3_96_1","doi-asserted-by":"publisher","DOI":"10.1016\/0277-5395(88)90004-0"},{"key":"e_1_3_3_3_97_1","doi-asserted-by":"crossref","unstructured":"Michelle\u00a0P Steves Kristen\u00a0K Greene Mary\u00a0F Theofanos 2019. A phish scale: rating human phishing message detection difficulty. 14\u00a0pages.","DOI":"10.14722\/usec.2019.23028"},{"key":"e_1_3_3_3_98_1","doi-asserted-by":"publisher","DOI":"10.1108\/13665620410566441"},{"key":"e_1_3_3_3_99_1","doi-asserted-by":"publisher","DOI":"10.1145\/1837110.1837125"},{"key":"e_1_3_3_3_100_1","doi-asserted-by":"publisher","DOI":"10.1145\/3415231"},{"key":"e_1_3_3_3_101_1","volume-title":"Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems. Association for Computing Machinery","author":"Wash Rick","year":"2018","unstructured":"Rick Wash and Molly\u00a0M. Cooper. 2018. Who Provides Phishing Training? Facts, Stories, and People Like Me. In Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems. Association for Computing Machinery, New York, NY, USA, 1\u201312. https:\/\/doi-org.proxyiub.uits.iu.edu\/10.1145\/3173574.3174066"},{"key":"e_1_3_3_3_102_1","volume-title":"Seventeenth Symposium on Usable Privacy and Security (SOUPS","author":"Wash Rick","year":"2021","unstructured":"Rick Wash, Norbert Nthala, and Emilee Rader. 2021. Knowledge and Capabilities that {Non-Expert} Users Bring to Phishing Detection. In Seventeenth Symposium on Usable Privacy and Security (SOUPS 2021). USENIX Association, Berkeley, CA, 377\u2013396."},{"key":"e_1_3_3_3_103_1","doi-asserted-by":"publisher","DOI":"10.1145\/2073276.2073283"},{"key":"e_1_3_3_3_104_1","first-page":"50","article-title":"Guerilla-Pedagogy: On the Importance of Surprise and Responsibility in Education.","volume":"44","author":"Weems D","year":"2013","unstructured":"Lisa\u00a0D Weems. 2013. Guerilla-Pedagogy: On the Importance of Surprise and Responsibility in Education.Philosophical Studies in Education 44 (2013), 50\u201359.","journal-title":"Philosophical Studies in Education"},{"key":"e_1_3_3_3_105_1","doi-asserted-by":"publisher","DOI":"10.1145\/3290605.3300338"},{"key":"e_1_3_3_3_106_1","volume-title":"Equifax Data Breach. In Fourteenth Symposium on Usable Privacy and Security (SOUPS","author":"Zou Yixin","year":"2018","unstructured":"Yixin Zou, Abraham\u00a0H Mhaidli, Austin McCall, and Florian Schaub. 2018. \"I\u2019ve Got Nothing to Lose\": Consumers\u2019 Risk Perceptions and Protective Actions after the Equifax Data Breach. In Fourteenth Symposium on Usable Privacy and Security (SOUPS 2018). USENIX Association, Berkeley, CA, 197\u2013216."}],"event":{"name":"CHI '23: CHI Conference on Human Factors in Computing Systems","location":"Hamburg Germany","acronym":"CHI '23","sponsor":["SIGCHI ACM Special Interest Group on Computer-Human Interaction"]},"container-title":["Proceedings of the 2023 CHI Conference on Human Factors in Computing Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3544548.3580650","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3544548.3580650","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T19:02:55Z","timestamp":1750186975000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3544548.3580650"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,4,19]]},"references-count":106,"alternative-id":["10.1145\/3544548.3580650","10.1145\/3544548"],"URL":"https:\/\/doi.org\/10.1145\/3544548.3580650","relation":{},"subject":[],"published":{"date-parts":[[2023,4,19]]},"assertion":[{"value":"2023-04-19","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}