{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,19]],"date-time":"2026-03-19T20:54:09Z","timestamp":1773953649311,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":32,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,4,19]],"date-time":"2023-04-19T00:00:00Z","timestamp":1681862400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,4,19]]},"DOI":"10.1145\/3544549.3585802","type":"proceedings-article","created":{"date-parts":[[2023,4,20]],"date-time":"2023-04-20T07:31:00Z","timestamp":1681975860000},"page":"1-6","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":10,"title":["Let warnings interrupt the interaction and explain: designing and evaluating phishing email warnings"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-1421-3686","authenticated-orcid":false,"given":"Paolo","family":"Buono","sequence":"first","affiliation":[{"name":"Dipartimento di Informatica, University of Bari Aldo Moro, Italy"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9894-2116","authenticated-orcid":false,"given":"Giuseppe","family":"Desolda","sequence":"additional","affiliation":[{"name":"Computer Science Department, University of Bari Aldo Moro, Italy"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2730-7697","authenticated-orcid":false,"given":"Francesco","family":"Greco","sequence":"additional","affiliation":[{"name":"Computer Science Department, University of Bari Aldo Moro, Italy"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1561-7073","authenticated-orcid":false,"given":"Antonio","family":"Piccinno","sequence":"additional","affiliation":[{"name":"Department of Computer Science, University of Bari, Italy"}]}],"member":"320","published-online":{"date-parts":[[2023,4,19]]},"reference":[{"key":"e_1_3_3_2_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/3054926"},{"key":"e_1_3_3_2_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2013.030713.00020"},{"key":"e_1_3_3_2_3_1","volume-title":"Warning Design Guidelines (CMU-CyLab-13-002). Retrieved","author":"Bauer Lujo","year":"2023","unstructured":"Lujo Bauer, Cristian Bravo-Lillo, Lorrie\u00a0Faith Cranor, and Elli Fragkaki. 2013. Warning Design Guidelines (CMU-CyLab-13-002). Retrieved 16 Jan 2023 from https:\/\/kilthub.cmu.edu\/articles\/journal_contribution\/Warning_Design_Guidelines_CMU-CyLab-13-002_\/6468131"},{"key":"e_1_3_3_2_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2010.198"},{"key":"e_1_3_3_2_5_1","volume-title":"Human-Computer Interaction \u2013 INTERACT \u201911, Pedro Campos, Nicholas Graham, Joaquim Jorge, Nuno Nunes, Philippe Palanque, and Marco Winckler (Eds.). Vol.\u00a0LNCS","author":"Bravo-Lillo Cristian","unstructured":"Cristian Bravo-Lillo, Lorrie\u00a0Faith Cranor, Julie Downs, Saranga Komanduri, and Manya Sleeper. 2011. Improving Computer Security Dialogs. In Human-Computer Interaction \u2013 INTERACT \u201911, Pedro Campos, Nicholas Graham, Joaquim Jorge, Nuno Nunes, Philippe Palanque, and Marco Winckler (Eds.). Vol.\u00a0LNCS. Springer Berlin Heidelberg, Berlin, Heidelberg, 18\u201335."},{"key":"e_1_3_3_2_6_1","volume-title":"HCI for Cybersecurity, Privacy and Trust(HCI-CPT \u201919)","author":"Desolda Giuseppe","unstructured":"Giuseppe Desolda, Francesco Di\u00a0Nocera, Lauren Ferro, Rosa Lanzilotti, Piero Maggi, and Andrea Marrella. 2019. Alerting Users About Phishing Attacks. In HCI for Cybersecurity, Privacy and Trust(HCI-CPT \u201919), Abbas Moallem (Ed.). Springer International Publishing, Cham, 134\u2013148."},{"key":"e_1_3_3_2_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/3469886"},{"key":"e_1_3_3_2_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/1124772.1124861"},{"key":"e_1_3_3_2_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/3469845"},{"key":"e_1_3_3_2_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/1357054.1357219"},{"key":"e_1_3_3_2_11_1","volume-title":"COVID-19 Phishing Update: Campaigns Exploiting Hope for a Cure. Retrieved","author":"Ellis Jessica","year":"2023","unstructured":"Jessica Ellis. 2020. COVID-19 Phishing Update: Campaigns Exploiting Hope for a Cure. Retrieved 16 Jan 2023 from https:\/\/info.phishlabs.com\/blog\/covid-phishing-update-campaigns-addressing-a-cure"},{"key":"e_1_3_3_2_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/2702123.2702442"},{"key":"e_1_3_3_2_13_1","volume-title":"An explainable AI model to help users avoid being victims of phishing attacks. Master\u2019s thesis","author":"Greco Francesco","unstructured":"Francesco Greco. 2022. An explainable AI model to help users avoid being victims of phishing attacks. Master\u2019s thesis. University of Bari."},{"key":"e_1_3_3_2_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/3236009"},{"key":"e_1_3_3_2_15_1","volume-title":"Cyber Security Intelligence Index. Retrieved","author":"IBM.","year":"2023","unstructured":"IBM. 2014. Cyber Security Intelligence Index. Retrieved 16 Jan 2023 from https:\/\/i.crn.com\/sites\/default\/files\/ckfinderimages\/userfiles\/images\/crn\/custom\/IBMSecurityServices2014.PDF"},{"key":"e_1_3_3_2_16_1","volume-title":"X-Force Threat Intelligence Index. Retrieved","author":"IBM.","year":"2023","unstructured":"IBM. 2022. X-Force Threat Intelligence Index. Retrieved 16 Jan 2023 from https:\/\/www.ibm.com\/downloads\/cas\/ADLMYLAZ"},{"key":"e_1_3_3_2_17_1","doi-asserted-by":"publisher","DOI":"10.2307\/23356461"},{"key":"e_1_3_3_2_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2013.032213.00009"},{"key":"e_1_3_3_2_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/3481357.3481515"},{"key":"e_1_3_3_2_20_1","volume-title":"Top Email Protections Fail in Latest COVID-19 Phishing Campaign. Retrieved","author":"Montalbano Elizabeth","year":"2023","unstructured":"Elizabeth Montalbano. 2020. Top Email Protections Fail in Latest COVID-19 Phishing Campaign. Retrieved 16 Jan 2023 from https:\/\/threatpost.com\/top-email-protections-fail-covid-19-phishing\/154329\/"},{"key":"e_1_3_3_2_21_1","volume-title":"Workshop on Technology and Consumer Protection (ConPro \u201921)","author":"Nthala Norbert","year":"2021","unstructured":"Norbert Nthala and Rick Wash. 2021. How Non-Experts Try to Detect Phishing Scam Emails. Workshop on Technology and Consumer Protection (ConPro \u201921) (2021). https:\/\/www.ieee-security.org\/TC\/SPW2021\/ConPro\/papers\/nthala-conpro21.pdf"},{"key":"e_1_3_3_2_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/3290605.3300748"},{"key":"e_1_3_3_2_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/2078827.2078831"},{"key":"e_1_3_3_2_24_1","volume-title":"Crying Wolf: An Empirical Study of SSL Warning Effectiveness. In Conference on USENIX Security Symposium. USENIX Association, USA, 399\u2013416","author":"Sunshine Joshua","year":"2009","unstructured":"Joshua Sunshine, Serge Egelman, Hazim Almuhimedi, Neha Atri, and Lorrie\u00a0Faith Cranor. 2009. Crying Wolf: An Empirical Study of SSL Warning Effectiveness. In Conference on USENIX Security Symposium. USENIX Association, USA, 399\u2013416."},{"key":"e_1_3_3_2_25_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.inffus.2021.05.009"},{"key":"e_1_3_3_2_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/3415231"},{"key":"e_1_3_3_2_27_1","doi-asserted-by":"publisher","DOI":"10.1201\/9780429462269-3"},{"key":"e_1_3_3_2_28_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0003-6870(02)00009-1"},{"key":"e_1_3_3_2_29_1","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9781107337930.019"},{"key":"e_1_3_3_2_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/1124772.1124863"},{"key":"e_1_3_3_2_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/3055305.3055310"},{"key":"e_1_3_3_2_32_1","volume-title":"Presenting Suspicious Details in User-Facing E-mail Headers Does Not Improve Phishing Detection. In Symposium on Usable Privacy and Security(SOUPS \u201922)","author":"Zheng Sarah","year":"2022","unstructured":"Sarah Zheng and Ingolf Becker. 2022. Presenting Suspicious Details in User-Facing E-mail Headers Does Not Improve Phishing Detection. In Symposium on Usable Privacy and Security(SOUPS \u201922). USENIX Association, Boston, MA, Article 7, 15\u00a0pages. https:\/\/www.usenix.org\/conference\/soups2022\/presentation\/zheng"}],"event":{"name":"CHI '23: CHI Conference on Human Factors in Computing Systems","location":"Hamburg Germany","acronym":"CHI '23","sponsor":["SIGCHI ACM Special Interest Group on Computer-Human Interaction"]},"container-title":["Extended Abstracts of the 2023 CHI Conference on Human Factors in Computing Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3544549.3585802","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3544549.3585802","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T16:47:05Z","timestamp":1750178825000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3544549.3585802"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,4,19]]},"references-count":32,"alternative-id":["10.1145\/3544549.3585802","10.1145\/3544549"],"URL":"https:\/\/doi.org\/10.1145\/3544549.3585802","relation":{},"subject":[],"published":{"date-parts":[[2023,4,19]]},"assertion":[{"value":"2023-04-19","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}