{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,13]],"date-time":"2026-04-13T16:32:37Z","timestamp":1776097957624,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":26,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,4,19]],"date-time":"2023-04-19T00:00:00Z","timestamp":1681862400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Deutscher Akademischer Auslandsdienst (DAAD)","award":["57609539"],"award-info":[{"award-number":["57609539"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,4,19]]},"DOI":"10.1145\/3544549.3585823","type":"proceedings-article","created":{"date-parts":[[2023,4,20]],"date-time":"2023-04-20T07:31:00Z","timestamp":1681975860000},"page":"1-8","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":14,"title":["Training Users to Recognize Persuasion Techniques in Vishing Calls"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-7609-1012","authenticated-orcid":false,"given":"Sumair Ijaz","family":"Hashmi","sequence":"first","affiliation":[{"name":"Computer Science, Lahore University of Management Sciences (LUMS), Pakistan"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9006-825X","authenticated-orcid":false,"given":"Niklas","family":"George","sequence":"additional","affiliation":[{"name":"Industrial and Organizational Psychology, Universit\u00e4t des Saarlandes, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8467-6670","authenticated-orcid":false,"given":"Eimaan","family":"Saqib","sequence":"additional","affiliation":[{"name":"Computer Science, Lahore University of Management Sciences (LUMS), Pakistan"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4679-4611","authenticated-orcid":false,"given":"Fatima","family":"Ali","sequence":"additional","affiliation":[{"name":"Computer Science, Lahore University of Management Sciences (LUMS), Pakistan"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0327-7032","authenticated-orcid":false,"given":"Nawaal","family":"Siddique","sequence":"additional","affiliation":[{"name":"Computer Science, Lahore University of Management Sciences (LUMS), Pakistan"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2841-6417","authenticated-orcid":false,"given":"Shafay","family":"Kashif","sequence":"additional","affiliation":[{"name":"Computer Science, Lahore University of Management Sciences (LUMS), Pakistan"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6175-4824","authenticated-orcid":false,"given":"Shahzaib","family":"Ali","sequence":"additional","affiliation":[{"name":"Computer Science, Lahore University of Management Sciences (LUMS), Pakistan"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9943-8042","authenticated-orcid":false,"given":"Nida Ul Habib","family":"Bajwa","sequence":"additional","affiliation":[{"name":"Industrial and Organizational Psychology, Universit\u00e4t des Saarlandes, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1321-1988","authenticated-orcid":false,"given":"Mobin","family":"Javed","sequence":"additional","affiliation":[{"name":"Computer Science, Lahore University of Management Sciences (LUMS), Pakistan"}]}],"member":"320","published-online":{"date-parts":[[2023,4,19]]},"reference":[{"key":"e_1_3_3_2_1_1","unstructured":"Federal Trade Commission\u00a0Consumer Advice. 2023. COVID-19 Scams. https:\/\/consumer.ftc.gov\/all-scams\/covid-19-scams."},{"key":"e_1_3_3_2_2_1","unstructured":"Federal Trade Commission\u00a0Consumer Advice. 2023. How to Avoid a Government Impersonator Scam. https:\/\/consumer.ftc.gov\/articles\/how-avoid-government-impersonator-scam."},{"key":"e_1_3_3_2_3_1","unstructured":"Federal Trade Commission\u00a0Consumer Advice. 2023. How to Spot Avoid and Report Tech Support Scams. https:\/\/consumer.ftc.gov\/articles\/how-spot-avoid-and-report-tech-support-scams."},{"key":"e_1_3_3_2_4_1","volume-title":"Proceedings of the Singapore Cyber-Security Conference (SG-CRC)","author":"Bull\u00e9e Jan-Willem","year":"2016","unstructured":"Jan-Willem Bull\u00e9e, Lorena Montoya, Marianne Junger, and Pieter\u00a0H Hartel. 2016. Telephone-based Social Engineering Attacks: An Experiment Testing the Success and Time Decay of an Intervention. In Proceedings of the Singapore Cyber-Security Conference (SG-CRC) 2016. IOS Press, 107\u2013114."},{"key":"e_1_3_3_2_5_1","volume-title":"Recent trends in Social Engineering Scams and Case study of Gift Card Scam. arXiv preprint arXiv:2110.06487","author":"Chaganti Rajasekhar","year":"2021","unstructured":"Rajasekhar Chaganti, Bharat Bhushan, Anand Nayyar, and Azrour Mourade. 2021. Recent trends in Social Engineering Scams and Case study of Gift Card Scam. arXiv preprint arXiv:2110.06487 (2021)."},{"key":"e_1_3_3_2_6_1","doi-asserted-by":"publisher","DOI":"10.25300\/MISQ\/2016\/40.1.09"},{"key":"e_1_3_3_2_7_1","volume-title":"Influence: The Psychology of Persuasion. Vol.\u00a055. Collins New York.","author":"Cialdini B","year":"2007","unstructured":"Robert\u00a0B Cialdini and Robert\u00a0B Cialdini. 2007. Influence: The Psychology of Persuasion. Vol.\u00a055. Collins New York."},{"key":"e_1_3_3_2_8_1","unstructured":"Federal\u00a0Trade Commission. 2023. Federal Trade Commission. https:\/\/www.ftc.gov\/"},{"key":"e_1_3_3_2_9_1","unstructured":"Australian Competition and Consumer\u00a0Commission (ACCC). 2023. Scamwatch. https:\/\/www.scamwatch.gov.au\/"},{"key":"e_1_3_3_2_10_1","volume-title":"International Workshop on Socio-Technical Aspects in Security and Trust. Springer, 63\u201382","author":"Harris G","year":"2020","unstructured":"Ian\u00a0G Harris, Ali Derakhshan, and Marcel Carlsson. 2020. A Study of Targeted Telephone Scams Involving Live Attackers. In International Workshop on Socio-Technical Aspects in Security and Trust. Springer, 63\u201382."},{"key":"e_1_3_3_2_11_1","unstructured":"Greg Iacurci. 2023. Covid-related scams have bilked Americans out of $586 million. https:\/\/www.cnbc.com\/2021\/10\/18\/covid-related-scams-have-bilked-americans-out-of-586-million.html."},{"key":"e_1_3_3_2_12_1","volume-title":"How Social Engineers use Persuasion Principles During Vishing Attacks. Information & Computer Security","author":"Jones S","year":"2020","unstructured":"Keith\u00a0S Jones, Miriam\u00a0E Armstrong, McKenna\u00a0K Tornblad, and Akbar\u00a0Siami Namin. 2020. How Social Engineers use Persuasion Principles During Vishing Attacks. Information & Computer Security (2020)."},{"key":"e_1_3_3_2_13_1","volume-title":"Proceedings of the 2007 Joint Conference on Empirical Methods in Natural Language Processing and Computational Natural Language Learning (EMNLP-CoNLL). 877\u2013886","author":"Langlais Philippe","year":"2007","unstructured":"Philippe Langlais and Alexandre Patry. 2007. Translating Unknown Words by Analogical Learning. In Proceedings of the 2007 Joint Conference on Empirical Methods in Natural Language Processing and Computational Natural Language Learning (EMNLP-CoNLL). 877\u2013886."},{"key":"e_1_3_3_2_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2018.00034"},{"key":"e_1_3_3_2_15_1","doi-asserted-by":"publisher","DOI":"10.3758\/BF03212967"},{"key":"e_1_3_3_2_16_1","doi-asserted-by":"publisher","DOI":"10.5465\/amle.2003.9901663"},{"key":"e_1_3_3_2_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/SPW53761.2021.00018"},{"key":"e_1_3_3_2_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/3314344.3332500"},{"key":"e_1_3_3_2_19_1","unstructured":"PTA. 2023. Pakistan Telecommunication Authority: Recognise Scams. https:\/\/www.pta.gov.pk\/en\/consumer-support\/\/recognise-scams-170920."},{"key":"e_1_3_3_2_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/3449115"},{"key":"e_1_3_3_2_21_1","volume-title":"AuthentiCall: Efficient Identity and Content Authentication for Phone Calls. In 26th USENIX Security Symposium (USENIX Security 17)","author":"Reaves Bradley","year":"2017","unstructured":"Bradley Reaves, Logan Blue, Hadi Abdullah, Luis Vargas, Patrick Traynor, and Thomas Shrimpton. 2017. AuthentiCall: Efficient Identity and Content Authentication for Phone Calls. In 26th USENIX Security Symposium (USENIX Security 17). 575\u2013592."},{"key":"e_1_3_3_2_22_1","volume-title":"25th USENIX Security Symposium (USENIX Security 16)","author":"Reaves Bradley","year":"2016","unstructured":"Bradley Reaves, Logan Blue, and Patrick Traynor. 2016. AuthLoop: End-to-End Cryptographic Authentication for Telephony over Voice Channels. In 25th USENIX Security Symposium (USENIX Security 16). 963\u2013978."},{"key":"e_1_3_3_2_23_1","doi-asserted-by":"publisher","DOI":"10.1080\/01973533.2014.903844"},{"key":"e_1_3_3_2_24_1","volume-title":"Sok: Everyone Hates Robocalls: A Survey of Techniques Against Telephone Spam. In 2016 IEEE Symposium on Security and Privacy (SP). IEEE, 320\u2013338","author":"Tu Huahong","year":"2016","unstructured":"Huahong Tu, Adam Doup\u00e9, Ziming Zhao, and Gail-Joon Ahn. 2016. Sok: Everyone Hates Robocalls: A Survey of Techniques Against Telephone Spam. In 2016 IEEE Symposium on Security and Privacy (SP). IEEE, 320\u2013338."},{"key":"e_1_3_3_2_25_1","volume-title":"Users Really Do Answer Telephone Scams. In 28th USENIX Security Symposium (USENIX Security 19)","author":"Tu Huahong","year":"2019","unstructured":"Huahong Tu, Adam Doup\u00e9, Ziming Zhao, and Gail-Joon Ahn. 2019. Users Really Do Answer Telephone Scams. In 28th USENIX Security Symposium (USENIX Security 19). 1327\u20131340."},{"key":"e_1_3_3_2_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/3209811.3209818"}],"event":{"name":"CHI '23: CHI Conference on Human Factors in Computing Systems","location":"Hamburg Germany","acronym":"CHI '23","sponsor":["SIGCHI ACM Special Interest Group on Computer-Human Interaction"]},"container-title":["Extended Abstracts of the 2023 CHI Conference on Human Factors in Computing Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3544549.3585823","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3544549.3585823","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T16:47:05Z","timestamp":1750178825000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3544549.3585823"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,4,19]]},"references-count":26,"alternative-id":["10.1145\/3544549.3585823","10.1145\/3544549"],"URL":"https:\/\/doi.org\/10.1145\/3544549.3585823","relation":{},"subject":[],"published":{"date-parts":[[2023,4,19]]},"assertion":[{"value":"2023-04-19","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}