{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:09:25Z","timestamp":1750219765947,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":30,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,4,19]],"date-time":"2023-04-19T00:00:00Z","timestamp":1681862400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,4,19]]},"DOI":"10.1145\/3544549.3585658","type":"proceedings-article","created":{"date-parts":[[2023,4,20]],"date-time":"2023-04-20T07:31:18Z","timestamp":1681975878000},"page":"1-15","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Towards an Empirical Study to Determine the Effectiveness of Support Systems against E-Mail Phishing Attacks"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0004-5128-0257","authenticated-orcid":false,"given":"Katharina","family":"Schiller","sequence":"first","affiliation":[{"name":"Institute of Information Systems (iisys), Hof University of Applied Sciences, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0009-0002-6642-6904","authenticated-orcid":false,"given":"Florian","family":"Adamsky","sequence":"additional","affiliation":[{"name":"Institute of Information Systems (iisys), Hof University of Applied Sciences, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0009-0006-7158-0219","authenticated-orcid":false,"given":"Zinaida","family":"Benenson","sequence":"additional","affiliation":[{"name":"Friedrich-Alexander-Universit\u00e4t Erlangen-N\u00fcrnberg (FAU), Germany"}]}],"member":"320","published-online":{"date-parts":[[2023,4,19]]},"reference":[{"key":"e_1_3_3_3_1_1","volume-title":"Proceedings of the 22nd USENIX Security Symposium. USENIX Association, 182\u2013191","author":"Akhawe Devdatta","year":"2013","unstructured":"Devdatta Akhawe and Adrienne\u00a0Porter Felt. 2013. Alice in Warningland: A Large-Scale Field Study of Browser Security Warning Effectiveness. In Proceedings of the 22nd USENIX Security Symposium. USENIX Association, 182\u2013191."},{"doi-asserted-by":"publisher","key":"e_1_3_3_3_2_1","DOI":"10.1145\/3313831.3376168"},{"doi-asserted-by":"publisher","key":"e_1_3_3_3_3_1","DOI":"10.1109\/EuroSPW.2019.00027"},{"key":"e_1_3_3_3_5_1","volume-title":"\u00a0C. Nurse","author":"Bada Maria","year":"2019","unstructured":"Maria Bada, Angela\u00a0M. Sasse, and Jason R.\u00a0C. Nurse. 2019. Cyber Security Awareness Campaigns: Why Do They Fail to Change Behaviour?CoRR abs\/1901.02672 (2019). arXiv:1901.02672http:\/\/arxiv.org\/abs\/1901.02672"},{"doi-asserted-by":"publisher","key":"e_1_3_3_3_6_1","DOI":"10.1109\/MSP.2013.106"},{"doi-asserted-by":"publisher","key":"e_1_3_3_3_7_1","DOI":"10.1109\/BigData.2017.8258485"},{"doi-asserted-by":"crossref","unstructured":"D. Crocker T. Hansen and M. Kucherawy. 2011. RFC 6376: DomainKeys Identified Mail (DKIM) Signatures. STD\u00a076. RFC Editor. http:\/\/www.rfc-editor.org\/rfc\/rfc6376.txt","key":"e_1_3_3_3_9_1","DOI":"10.17487\/rfc6376"},{"doi-asserted-by":"publisher","key":"e_1_3_3_3_10_1","DOI":"10.1145\/1124772.1124861"},{"doi-asserted-by":"publisher","key":"e_1_3_3_3_11_1","DOI":"10.1145\/1143120.1143131"},{"doi-asserted-by":"publisher","key":"e_1_3_3_3_12_1","DOI":"10.1145\/1357054.1357219"},{"key":"e_1_3_3_3_13_1","volume-title":"Proceedings of the 13th International Symposium on Human Aspects of Information Security & Assurance (HAISA)","author":"Ives\u00a0Philipp Erbenich Vivian","year":"2019","unstructured":"Vivian Ives\u00a0Philipp Erbenich, Daniel Tr\u00e4der, A. Heinemann, and Meltem Nural. 2019. Phishing Attack Recognition by End-Users: Concepts for URL Visualization and Implementation. In Proceedings of the 13th International Symposium on Human Aspects of Information Security & Assurance (HAISA). University of Plymouth, 179\u2013188."},{"key":"e_1_3_3_3_15_1","volume-title":"Proceedings of the 12th Symposium On Usable Privacy and Security (SOUPS). 1\u201313","author":"Felt Adrienne\u00a0Porter","year":"2016","unstructured":"Adrienne\u00a0Porter Felt, R. Reeder, A. Ainslie, H. Harris, M. Walker, C. Thompson, M. Acer, E. Morant, and Sunny Consolvo. 2016. Rethinking Connection Security Indicators. In Proceedings of the 12th Symposium On Usable Privacy and Security (SOUPS). 1\u201313."},{"doi-asserted-by":"publisher","key":"e_1_3_3_3_16_1","DOI":"10.1109\/SecDev.2018.00020"},{"doi-asserted-by":"publisher","key":"e_1_3_3_3_17_1","DOI":"10.1080\/0144929X.2011.632650"},{"doi-asserted-by":"crossref","unstructured":"S. Kitterman. 2014. RFC 7208: Sender Policy Framework (SPF) for Authorizing Use of Domains in Email Version 1. RFC 7208. RFC Editor. http:\/\/www.rfc-editor.org\/rfc\/rfc7208.txt","key":"e_1_3_3_3_18_1","DOI":"10.17487\/rfc7208"},{"doi-asserted-by":"publisher","key":"e_1_3_3_3_19_1","DOI":"10.1016\/j.jisa.2014.09.005"},{"doi-asserted-by":"publisher","key":"e_1_3_3_3_20_1","DOI":"10.1145\/1299015.1299022"},{"doi-asserted-by":"crossref","unstructured":"Ponnurangam Kumaraguru Steve Sheng Alessandro Acquisti Lorrie\u00a0Faith Cranor and Jason\u00a0I. Hong. 2010-05. Teaching Johnny not to fall for phish. ACM Transactions on Internet Technology 10 (2010-05) 1\u201331.","key":"e_1_3_3_3_21_1","DOI":"10.1145\/1754393.1754396"},{"doi-asserted-by":"publisher","key":"e_1_3_3_3_22_1","DOI":"10.1145\/1978942.1979244"},{"doi-asserted-by":"publisher","key":"e_1_3_3_3_23_1","DOI":"10.1109\/TNSM.2021.3065422"},{"doi-asserted-by":"publisher","key":"e_1_3_3_3_24_1","DOI":"10.1145\/3290605.3300748"},{"doi-asserted-by":"publisher","key":"e_1_3_3_3_25_1","DOI":"10.1145\/1280680.1280692"},{"doi-asserted-by":"publisher","key":"e_1_3_3_3_26_1","DOI":"10.1093\/cybsec"},{"volume-title":"Proceedings of the 31st International Conference on ICT Systems Security and Privacy Protection (IFIP SEC 2016).","author":"Stockhardt Simon","unstructured":"Simon Stockhardt, Benjamin Reinheimer, M. Volkamer, P. Mayer, Alexandra Kunz, P. Rack, and D. Lehmann. 2016. Teaching Phishing-Security: Which Way is Best?. In Proceedings of the 31st International Conference on ICT Systems Security and Privacy Protection (IFIP SEC 2016).","key":"e_1_3_3_3_27_1"},{"volume-title":"Hackers Now Use \u2018Sock Puppets","author":"Toulas Bill","unstructured":"Bill Toulas. 2022-09-13. Hackers Now Use \u2018Sock Puppets\u2019 for More Realistic Phishing Attacks. BleepingComputer. https:\/\/www.bleepingcomputer.com\/news\/security\/hackers-now-use-sock-puppets-for-more-realistic-phishing-attacks\/","key":"e_1_3_3_3_28_1"},{"doi-asserted-by":"publisher","key":"e_1_3_3_3_30_1","DOI":"10.1016\/j.cose.2017.02.004"},{"doi-asserted-by":"publisher","key":"e_1_3_3_3_31_1","DOI":"10.1007\/978-3-030-66504-3_19"},{"key":"e_1_3_3_3_32_1","first-page":"2018","article-title":"-12. Using a Game to Improve Phishing Awareness","volume":"2018","author":"Weanquoi Patrickson","year":"2018","unstructured":"Patrickson Weanquoi, J. Johnson, and Jinghua Zhang. 2018-12. Using a Game to Improve Phishing Awareness. Journal of Cybersecurity Education, Research and Practice 2018, 2 (2018-12). https:\/\/digitalcommons.kennesaw.edu\/jcerp\/vol2018\/iss2\/2","journal-title":"Journal of Cybersecurity Education, Research and Practice"},{"doi-asserted-by":"publisher","key":"e_1_3_3_3_33_1","DOI":"10.1145\/3290605.3300338"},{"doi-asserted-by":"publisher","key":"e_1_3_3_3_34_1","DOI":"10.5555\/1089508.1089532"}],"event":{"sponsor":["SIGCHI ACM Special Interest Group on Computer-Human Interaction"],"acronym":"CHI '23","name":"CHI '23: CHI Conference on Human Factors in Computing Systems","location":"Hamburg Germany"},"container-title":["Extended Abstracts of the 2023 CHI Conference on Human Factors in Computing Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3544549.3585658","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3544549.3585658","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T16:37:17Z","timestamp":1750178237000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3544549.3585658"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,4,19]]},"references-count":30,"alternative-id":["10.1145\/3544549.3585658","10.1145\/3544549"],"URL":"https:\/\/doi.org\/10.1145\/3544549.3585658","relation":{},"subject":[],"published":{"date-parts":[[2023,4,19]]},"assertion":[{"value":"2023-04-19","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}