{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,25]],"date-time":"2026-02-25T00:58:27Z","timestamp":1771981107469,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":64,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,4,19]],"date-time":"2023-04-19T00:00:00Z","timestamp":1681862400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100013405","name":"Rijksdienst voor Ondernemend Nederland","doi-asserted-by":"publisher","award":["DEFRAUDIfy (grant no. ITEA191010)"],"award-info":[{"award-number":["DEFRAUDIfy (grant no. ITEA191010)"]}],"id":[{"id":"10.13039\/100013405","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,4,19]]},"DOI":"10.1145\/3544548.3580985","type":"proceedings-article","created":{"date-parts":[[2023,4,20]],"date-time":"2023-04-20T04:27:20Z","timestamp":1681964840000},"page":"1-18","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":25,"title":["The Influence of Human Factors on the Intention to Report Phishing Emails"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-6464-5209","authenticated-orcid":false,"given":"Ioana Andreea","family":"Marin","sequence":"first","affiliation":[{"name":"Mathematics and Computer Science, Technical University Eindhoven, Netherlands"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4554-5410","authenticated-orcid":false,"given":"Pavlo","family":"Burda","sequence":"additional","affiliation":[{"name":"Mathematics and Computer Science, Technical University Eindhoven, Netherlands"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9081-5996","authenticated-orcid":false,"given":"Nicola","family":"Zannone","sequence":"additional","affiliation":[{"name":"Mathematics and Computer Science, Technical University Eindhoven, Netherlands"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1600-0868","authenticated-orcid":false,"given":"Luca","family":"Allodi","sequence":"additional","affiliation":[{"name":"Mathematics and Computer Science, Technical University Eindhoven, Netherlands"}]}],"member":"320","published-online":{"date-parts":[[2023,4,19]]},"reference":[{"key":"e_1_3_3_3_1_1","doi-asserted-by":"publisher","DOI":"10.1016\/0749-5978(91)90020-T"},{"key":"e_1_3_3_3_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSEC.2019.2940952"},{"key":"e_1_3_3_3_3_1","volume-title":"Adam D\u00a0G Jenkins, and Kami Vaniea","author":"Althobaiti Kholoud","year":"2021","unstructured":"Kholoud Althobaiti, Adam D\u00a0G Jenkins, and Kami Vaniea. 2021. A Case Study of Phishing Incident Response in an Educational Organization. Proceedings of the ACM on Human-Computer Interaction 5, CSCW2, Article 338 (2021), 32\u00a0pages."},{"key":"e_1_3_3_3_4_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.leaqua.2003.12.003"},{"key":"e_1_3_3_3_5_1","volume-title":"Retrieved","year":"2022","unstructured":"Amazon. 2022. Amazon Mechanical Turk. Retrieved September 12, 2022 from https:\/\/www.mturk.com\/"},{"key":"e_1_3_3_3_6_1","volume-title":"MWAIS 2018 Proceedings(2018)","author":"Bansal Gaurav","year":"2018","unstructured":"Gaurav Bansal. 2018. Got Phished! Role of Top Management Support in Creating Phishing Safe Organizations. MWAIS 2018 Proceedings(2018)."},{"key":"e_1_3_3_3_7_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1744-6570.1991.tb00688.x"},{"key":"e_1_3_3_3_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSPW51379.2020.00069"},{"key":"e_1_3_3_3_9_1","volume-title":"ACIS 2015 Proceedings 98(2015)","author":"Butavicius Marcus","year":"2015","unstructured":"Marcus Butavicius, Kathryn Parsons, Malcolm Pattinson, and Agata McCormac. 2015. Breaching the Human Firewall: Social engineering in Phishing and Spear-Phishing Emails. ACIS 2015 Proceedings 98(2015), 11."},{"key":"e_1_3_3_3_10_1","volume-title":"Proceedings of the Survey Research Methods Section","author":"Colosi Robert","year":"2005","unstructured":"Robert Colosi. 2005. Negatively Worded Questions Cause Respondent Confusion. Proceedings of the Survey Research Methods Section (2005), 2896\u20132903."},{"key":"e_1_3_3_3_11_1","unstructured":"Rachel\u00a0Christine Dreibelbis. 2016. It\u2019s More Than Just Changing Your Password: Exploring the Nature and Antecedents of Cyber-Security Behaviors. USF Tampa Graduate Theses and Dissertations(2016)."},{"key":"e_1_3_3_3_12_1","volume-title":"Crime Report","author":"Internet Crime Complaint Centre FBI","year":"2020","unstructured":"FBI Internet Crime Complaint Centre. 2020. Internet Crime Report 2020."},{"key":"e_1_3_3_3_13_1","volume-title":"Breakthroughs in Statistics: Methodology and Distribution","author":"Fisher A.","unstructured":"R.\u00a0A. Fisher. 1992. Statistical Methods for Research Workers. In Breakthroughs in Statistics: Methodology and Distribution. Springer, New York, NY, 66\u201370."},{"key":"e_1_3_3_3_14_1","volume-title":"International Symposium on Wearable Computers. IEEE, 3\u20139.","author":"Gershman A.V.","unstructured":"A.V. Gershman, J.F. McCarthy, and A.E. Fano. 1999. Situated computing: bridging the gap between intention and action. In International Symposium on Wearable Computers. IEEE, 3\u20139."},{"key":"e_1_3_3_3_15_1","first-page":"7","article-title":"A broad-bandwidth, public-domain, personality inventory measuring the lower-level facets of several five-factor models","volume":"7","author":"Goldberg R.","year":"1999","unstructured":"Lewis\u00a0R. Goldberg. 1999. A broad-bandwidth, public-domain, personality inventory measuring the lower-level facets of several five-factor models. Personality Psychology in Europe 7 (1999), 7\u2013\u201328.","journal-title":"Personality Psychology in Europe"},{"key":"e_1_3_3_3_16_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2012.10.003"},{"key":"e_1_3_3_3_17_1","doi-asserted-by":"publisher","DOI":"10.4097\/kja.19087"},{"key":"e_1_3_3_3_18_1","volume-title":"Cultural and Psychological Factors in Cyber-Security. In International Conference on Information Integration and Web-based Applications & Services. ACM","author":"Halevi Tzipora","year":"2016","unstructured":"Tzipora Halevi, Nasir Memon, James Lewis, Ponnurangam Kumaraguru, Sumit Arora, Nikita Dagar, Fadi Aloul, and Jay Chen. 2016. Cultural and Psychological Factors in Cyber-Security. In International Conference on Information Integration and Web-based Applications & Services. ACM, New York, NY, USA, 43\u201356."},{"key":"e_1_3_3_3_19_1","doi-asserted-by":"publisher","unstructured":"Tzipora Halevi Nasir Memon and Oded Nov. 2015. Spear-Phishing in the Wild: A Real-World Study of Personality Phishing Self-Efficacy and Vulnerability to Spear-Phishing Attacks. SSRN Scholarly Paper. Social Science Research Network. https:\/\/doi.org\/10.2139\/ssrn.2544742","DOI":"10.2139\/ssrn.2544742"},{"key":"e_1_3_3_3_20_1","doi-asserted-by":"crossref","unstructured":"Graeme\u00a0D Hutcheson. 2011. Ordinary least-squares regression. In The SAGE dictionary of quantitative management research. SAGE Knowledge 224\u2013228.","DOI":"10.4135\/9781446251119.n67"},{"key":"e_1_3_3_3_21_1","unstructured":"IBM Corp.[n. d.]. IBM SPSS Statistics for Windows."},{"key":"e_1_3_3_3_22_1","first-page":"75","article-title":"Organisational Citizenship Behavior: Its Nature and Antecedents","volume":"1","author":"Jahangir Nadim","year":"2004","unstructured":"Nadim Jahangir, Mohammad\u00a0Muzahid Akbar, and Mahmudul Haq. 2004. Organisational Citizenship Behavior: Its Nature and Antecedents. BRAC University Journal 1, 2 (2004), 75\u201385.","journal-title":"BRAC University Journal"},{"key":"e_1_3_3_3_23_1","doi-asserted-by":"publisher","DOI":"10.2196\/16775"},{"key":"e_1_3_3_3_24_1","doi-asserted-by":"publisher","DOI":"10.1080\/07421222.2022.2096551"},{"key":"e_1_3_3_3_25_1","volume-title":"Investigating the Effect of Phishing Believability on Phishing Reporting. In European Symposium on Security and Privacy Workshops (EuroS&PW). IEEE, 117\u2013128","author":"Kersten Leon","year":"2022","unstructured":"Leon Kersten, Pavlo Burda, Luca Allodi, and Nicola Zannone. 2022. Investigating the Effect of Phishing Believability on Phishing Reporting. In European Symposium on Security and Privacy Workshops (EuroS&PW). IEEE, 117\u2013128."},{"key":"e_1_3_3_3_26_1","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0205089"},{"key":"e_1_3_3_3_27_1","volume-title":"The Handbook of Psychological Testing","author":"Kline P.","unstructured":"P. Kline. 1993. The Handbook of Psychological Testing (2nd ed.). Routledge. 66\u201370 pages.","edition":"2"},{"key":"e_1_3_3_3_28_1","doi-asserted-by":"publisher","DOI":"10.1177\/2158244019854834"},{"key":"e_1_3_3_3_29_1","volume-title":"Krosnick and Stanley Presser","author":"A.","year":"2010","unstructured":"Jon\u00a0A. Krosnick and Stanley Presser. 2010. Question and questionnaire design. In Handbook of survey research. Emerald, 263\u2013314."},{"key":"e_1_3_3_3_30_1","volume-title":"Why Do Users Not Report Spear Phishing Emails?Telematics and Informatics 48","author":"Kwak Youngsun","year":"2020","unstructured":"Youngsun Kwak, Seyoung Lee, Amanda Damiano, and Arun Vishwanath. 2020. Why Do Users Not Report Spear Phishing Emails?Telematics and Informatics 48 (2020), 101343."},{"key":"e_1_3_3_3_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP46214.2022.9833766"},{"key":"e_1_3_3_3_32_1","volume-title":"Much ado about acquiescence: The relative validity and reliability of construct-specific and agree\u2013disagree questions. Research & Politics 2, 3","author":"Lelkes Yphtach","year":"2015","unstructured":"Yphtach Lelkes and Rebecca Weiss. 2015. Much ado about acquiescence: The relative validity and reliability of construct-specific and agree\u2013disagree questions. Research & Politics 2, 3 (2015)."},{"key":"e_1_3_3_3_33_1","doi-asserted-by":"publisher","DOI":"10.1037\/0021-9010.87.1.52"},{"key":"e_1_3_3_3_34_1","volume-title":"Sample size: how many participants do I need in my research?Anais brasileiros de dermatologia 89","author":"Mart\u00ednez-Mesa Jeovany","year":"2014","unstructured":"Jeovany Mart\u00ednez-Mesa, David Gonz\u00e1lez-Chica, Jo\u00e3o Bastos, Renan Bonamigo, and Rodrigo Duquia. 2014. Sample size: how many participants do I need in my research?Anais brasileiros de dermatologia 89 (2014), 609\u2013615."},{"key":"e_1_3_3_3_35_1","volume-title":"Reliable Behavioural Factors in the Information Security Context. In International Conference on Availability, Reliability and Security. ACM","author":"Mayer Peter","year":"2017","unstructured":"Peter Mayer, Alexandra Kunz, and Melanie Volkamer. 2017. Reliable Behavioural Factors in the Information Security Context. In International Conference on Availability, Reliability and Security. ACM, New York, NY, USA, Article 9, 10\u00a0pages."},{"key":"e_1_3_3_3_36_1","doi-asserted-by":"publisher","DOI":"10.1037\/0022-3514.52.1.81"},{"key":"e_1_3_3_3_37_1","volume-title":"Human Cognition Through the Lens of Social Engineering Cyberattacks. Frontiers in Psychology 11","author":"Monta\u00f1ez Rosana","year":"2020","unstructured":"Rosana Monta\u00f1ez, Edward Golob, and Shouhuai Xu. 2020. Human Cognition Through the Lens of Social Engineering Cyberattacks. Frontiers in Psychology 11 (2020)."},{"key":"e_1_3_3_3_38_1","doi-asserted-by":"publisher","DOI":"10.1177\/0149206309356326"},{"key":"e_1_3_3_3_39_1","doi-asserted-by":"publisher","DOI":"10.1037\/h0040291"},{"key":"e_1_3_3_3_40_1","doi-asserted-by":"publisher","DOI":"10.1207\/s15327043hup1002_2"},{"key":"e_1_3_3_3_41_1","volume-title":"Organizational citizenship behavior: The good soldier syndrome","author":"Organ W","unstructured":"Dennis\u00a0W Organ. 1988. Organizational citizenship behavior: The good soldier syndrome.Lexington Books\/DC Heath and Com."},{"key":"e_1_3_3_3_42_1","volume-title":"Behavioural Response to Emails. In Security and Privacy Protection in Information Processing Systems(IFIP Advances in Information and Communication Technology)","author":"Parsons Kathryn","unstructured":"Kathryn Parsons, Agata McCormac, Malcolm Pattinson, Marcus Butavicius, and Cate Jerram. 2013. Phishing for the Truth: A Scenario-Based Experiment of Users\u2019 Behavioural Response to Emails. In Security and Privacy Protection in Information Processing Systems(IFIP Advances in Information and Communication Technology). Springer, 366\u2013378."},{"key":"e_1_3_3_3_43_1","volume-title":"Why do some people manage phishing e-mails better than others?Information Management & Computer Security 20, 1","author":"Pattinson Malcolm","year":"2012","unstructured":"Malcolm Pattinson, Cate Jerram, Kathryn Parsons, Agata McCormac, and Marcus Butavicius. 2012. Why do some people manage phishing e-mails better than others?Information Management & Computer Security 20, 1 (2012), 18\u201328."},{"key":"e_1_3_3_3_44_1","doi-asserted-by":"publisher","DOI":"10.1016\/1048-9843(90)90009-7"},{"key":"e_1_3_3_3_45_1","volume-title":"The Measurement of Organizational Citizenship Behavior: Are We Assuming Too Much?Journal of Applied Social Psychology 27","author":"Samuel","year":"2006","unstructured":"Samuel Pond\u00a0III, Rupert Nacoste, Monique Mohr, and Christopher Rodriguez. 2006. The Measurement of Organizational Citizenship Behavior: Are We Assuming Too Much?Journal of Applied Social Psychology 27 (2006), 1527\u20131544."},{"key":"e_1_3_3_3_46_1","doi-asserted-by":"publisher","DOI":"10.1080\/07421222.2015.1138374"},{"key":"e_1_3_3_3_48_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00014"},{"key":"e_1_3_3_3_49_1","doi-asserted-by":"publisher","DOI":"10.2307\/2393868"},{"key":"e_1_3_3_3_50_1","doi-asserted-by":"publisher","DOI":"10.1080\/00223980.1975.9915803"},{"key":"e_1_3_3_3_51_1","doi-asserted-by":"publisher","DOI":"10.6007\/IJARBSS\/v9-i8\/6222"},{"key":"e_1_3_3_3_52_1","unstructured":"Edgar Schein. 2010. Organizational Culture and Leadership. Jossey-Bass."},{"key":"e_1_3_3_3_53_1","doi-asserted-by":"publisher","DOI":"10.1080\/08874417.2020.1812134"},{"key":"e_1_3_3_3_54_1","doi-asserted-by":"publisher","DOI":"10.1145\/1753326.1753383"},{"key":"e_1_3_3_3_55_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.im.2013.08.006"},{"key":"e_1_3_3_3_56_1","doi-asserted-by":"publisher","DOI":"10.5709\/acp-0306-9"},{"key":"e_1_3_3_3_57_1","volume-title":"The External Validity of Online Privacy and Security Surveys. In Symposium on Usable Privacy and Security (SOUPS","author":"Tang Jenny","year":"2022","unstructured":"Jenny Tang, Eleanor Birrell, and Ada Lerner. 2022. Replication: How Well Do My Results Generalize Now? The External Validity of Online Privacy and Security Surveys. In Symposium on Usable Privacy and Security (SOUPS 2022). USENIX Association, Boston, MA, 367\u2013385."},{"key":"e_1_3_3_3_58_1","unstructured":"US Department of Labor. 2022. Minimum wage."},{"key":"e_1_3_3_3_60_1","doi-asserted-by":"crossref","unstructured":"Verizon. 2021. 2021 Data Breach Investigations Report.","DOI":"10.1016\/S1361-3723(21)00061-0"},{"key":"e_1_3_3_3_61_1","doi-asserted-by":"crossref","unstructured":"Verizon. 2022. 2022 Data Breach Investigations Report.","DOI":"10.12968\/S1361-3723(22)70578-7"},{"key":"e_1_3_3_3_62_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.2044-8309.1998.tb01160.x"},{"key":"e_1_3_3_3_63_1","doi-asserted-by":"publisher","DOI":"10.1111\/jcc4.12126"},{"key":"e_1_3_3_3_64_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2011.03.002"},{"key":"e_1_3_3_3_65_1","doi-asserted-by":"publisher","DOI":"10.1177\/014920639101700305"},{"key":"e_1_3_3_3_66_1","doi-asserted-by":"publisher","DOI":"10.2753\/MIS0742-1222270111"}],"event":{"name":"CHI '23: CHI Conference on Human Factors in Computing Systems","location":"Hamburg Germany","acronym":"CHI '23","sponsor":["SIGCHI ACM Special Interest Group on Computer-Human Interaction"]},"container-title":["Proceedings of the 2023 CHI Conference on Human Factors in Computing Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3544548.3580985","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3544548.3580985","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T16:47:54Z","timestamp":1750178874000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3544548.3580985"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,4,19]]},"references-count":64,"alternative-id":["10.1145\/3544548.3580985","10.1145\/3544548"],"URL":"https:\/\/doi.org\/10.1145\/3544548.3580985","relation":{},"subject":[],"published":{"date-parts":[[2023,4,19]]},"assertion":[{"value":"2023-04-19","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}