{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,25]],"date-time":"2025-10-25T19:12:21Z","timestamp":1761419541256,"version":"3.41.0"},"reference-count":66,"publisher":"Association for Computing Machinery (ACM)","issue":"MHCI","license":[{"start":{"date-parts":[[2022,9,19]],"date-time":"2022-09-19T00:00:00Z","timestamp":1663545600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100000266","name":"Engineering and Physical Sciences Research Council","doi-asserted-by":"crossref","award":["EP\/P011446\/1"],"award-info":[{"award-number":["EP\/P011446\/1"]}],"id":[{"id":"10.13039\/501100000266","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["Proc. ACM Hum.-Comput. Interact."],"published-print":{"date-parts":[[2022,9,19]]},"abstract":"<jats:p>Phishing emails continue to be a major cause of cybersecurity breaches despite the development of technical measures designed to thwart these attacks. Most phishing studies have investigated desktop email platforms, but the use of mobile devices for email exchanges has soared in recent years, especially amongst young adults. In this paper, we explore how the digital platform (desktop vs. mobile) influences users' phish detection strategies. Twenty-one young adults (18-25 years) were asked to rate the legitimacy of emails using a live inbox test while using a think-aloud protocol on both platforms. Our results suggest that a lack of knowledge about key defence information on the mobile platform results in weak phish detection. We discuss the implications of these findings and offer design recommendations to support effective phish detection by smartphone users.<\/jats:p>","DOI":"10.1145\/3546730","type":"journal-article","created":{"date-parts":[[2022,9,20]],"date-time":"2022-09-20T23:14:30Z","timestamp":1663715670000},"page":"1-22","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":9,"title":["Holding Your Hand on the Danger Button"],"prefix":"10.1145","volume":"6","author":[{"given":"Matt","family":"Dixon","sequence":"first","affiliation":[{"name":"Northumbria University, Newcastle upon Tyne, United Kingdom"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"James","family":"Nicholson","sequence":"additional","affiliation":[{"name":"Northumbria University, Newcastle upon Tyne, United Kingdom"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Dawn","family":"Branley-Bell","sequence":"additional","affiliation":[{"name":"Northumbria University, Newcastle Upon Tyne, United Kingdom"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Pam","family":"Briggs","sequence":"additional","affiliation":[{"name":"Northumbria University, Newcastle upon Tyne, United Kingdom"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Lynne","family":"Coventry","sequence":"additional","affiliation":[{"name":"Northumbria University, Newcastle upon Tyne, United Kingdom"}],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"320","published-online":{"date-parts":[[2022,9,20]]},"reference":[{"key":"e_1_2_1_1_1","volume-title":"et al","author":"Albakry S.","year":"2020","unstructured":"Albakry , S. et al . 2020 . What is this URL's Destination?Empirical Evaluation of Users' URL Reading . (2020). DOI:https:\/\/doi.org\/10.1145\/3313831.3376168. 10.1145\/3313831.3376168 Albakry, S. et al. 2020. What is this URL's Destination?Empirical Evaluation of Users' URL Reading. (2020). DOI:https:\/\/doi.org\/10.1145\/3313831.3376168."},{"doi-asserted-by":"publisher","key":"e_1_2_1_2_1","DOI":"10.1016\/j.ijhcs.2015.05.005"},{"key":"e_1_2_1_3_1","volume-title":"et al","author":"Amran A.","year":"2018","unstructured":"Amran , A. et al . 2018 . Habituation effects in computer security warning. https:\/\/doi.org\/10.1080\/19393555.2018.1505008. 27, 4 (Jul. 2018), 192--204. DOI:https:\/\/doi.org\/10.1080\/19393555.2018.1505008. 10.1080\/19393555.2018.1505008 Amran, A. et al. 2018. Habituation effects in computer security warning. https:\/\/doi.org\/10.1080\/19393555.2018.1505008. 27, 4 (Jul. 2018), 192--204. DOI:https:\/\/doi.org\/10.1080\/19393555.2018.1505008."},{"doi-asserted-by":"publisher","key":"e_1_2_1_4_1","DOI":"10.1016\/j.chb.2016.02.065"},{"key":"e_1_2_1_5_1","volume-title":"Reckless behavior in adolescence: A developmental perspective. Developmental Review. 12, 4","author":"Arnett J.","year":"1992","unstructured":"Arnett , J. 1992. Reckless behavior in adolescence: A developmental perspective. Developmental Review. 12, 4 ( 1992 ), 339--373. DOI:https:\/\/doi.org\/10.1016\/0273--2297(92)90013-R. 10.1016\/0273--2297(92)90013-R Arnett, J. 1992. Reckless behavior in adolescence: A developmental perspective. Developmental Review. 12, 4 (1992), 339--373. DOI:https:\/\/doi.org\/10.1016\/0273--2297(92)90013-R."},{"key":"e_1_2_1_6_1","volume-title":"et al","author":"Benenson Z.","year":"2017","unstructured":"Benenson , Z. et al . 2017 . Unpacking spear phishing susceptibility. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 10323 LNCS , (2017), 610--627. DOI:https:\/\/doi.org\/10.1007\/978--3--319--70278-0_39. 10.1007\/978--3--319--70278-0_39 Benenson, Z. et al. 2017. Unpacking spear phishing susceptibility. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 10323 LNCS, (2017), 610--627. DOI:https:\/\/doi.org\/10.1007\/978--3--319--70278-0_39."},{"key":"e_1_2_1_7_1","volume-title":"Conference on Human Factors in Computing Systems - Proceedings.","author":"Blythe M.","year":"2014","unstructured":"Blythe , M. et al. 2011. F for fake: Four studies on how we fall for phish . Conference on Human Factors in Computing Systems - Proceedings. October 2014 (2011), 3469--3478. DOI:https:\/\/doi.org\/10.1145\/1978942.1979459. 10.1145\/1978942.1979459 Blythe, M. et al. 2011. F for fake: Four studies on how we fall for phish. Conference on Human Factors in Computing Systems - Proceedings. October 2014 (2011), 3469--3478. DOI:https:\/\/doi.org\/10.1145\/1978942.1979459."},{"doi-asserted-by":"publisher","key":"e_1_2_1_8_1","DOI":"10.1016\/j.cose.2008.11.001"},{"doi-asserted-by":"publisher","key":"e_1_2_1_9_1","DOI":"10.1016\/j.chb.2017.09.036"},{"doi-asserted-by":"publisher","key":"e_1_2_1_10_1","DOI":"10.1016\/j.jisa.2018.08.002"},{"key":"e_1_2_1_11_1","volume-title":"et al","author":"Canfield C.I.","year":"2019","unstructured":"Canfield , C.I. et al . 2019 . Better beware: comparing metacognition for phishing and legitimate emails. Metacognition and Learning . (2019). DOI:https:\/\/doi.org\/10.1007\/s11409-019-09197--5. 10.1007\/s11409-019-09197--5 Canfield, C.I. et al. 2019. Better beware: comparing metacognition for phishing and legitimate emails. Metacognition and Learning. (2019). DOI:https:\/\/doi.org\/10.1007\/s11409-019-09197--5."},{"key":"e_1_2_1_12_1","first-page":"8","article-title":"2016","volume":"58","author":"Canfield C.I.","year":"2016","unstructured":"Canfield , C.I. . 2016 . Quantifying Phishing Susceptibility for Detection and Behavior Decisions. Human Factors. 58 , 8 ( 2016 ), 1158--1172. DOI:https:\/\/doi.org\/10.1177\/0018720816665025. 10.1177\/0018720816665025 Canfield, C.I. et al. 2016. Quantifying Phishing Susceptibility for Detection and Behavior Decisions. Human Factors. 58, 8 (2016), 1158--1172. DOI:https:\/\/doi.org\/10.1177\/0018720816665025.","journal-title":"Quantifying Phishing Susceptibility for Detection and Behavior Decisions. Human Factors."},{"key":"e_1_2_1_13_1","volume-title":"et al","author":"Casey B.J.","year":"2008","unstructured":"Casey , B.J. et al . 2008 . The adolescent brain. Annals of the New York Academy of Sciences. Blackwell Publishing Inc . Casey, B.J. et al. 2008. The adolescent brain. Annals of the New York Academy of Sciences. Blackwell Publishing Inc."},{"doi-asserted-by":"publisher","key":"e_1_2_1_14_1","DOI":"10.1016\/j.cose.2006.10.009"},{"key":"e_1_2_1_15_1","volume-title":"ACM International Conference Proceeding Series. 269","author":"Downs J.S.","year":"2007","unstructured":"Downs , J.S. et al. 2007. Behavioral response to phishing risk . ACM International Conference Proceeding Series. 269 , ( 2007 ), 37--44. DOI:https:\/\/doi.org\/10.1145\/1299015.1299019. 10.1145\/1299015.1299019 Downs, J.S. et al. 2007. Behavioral response to phishing risk. ACM International Conference Proceeding Series. 269, (2007), 37--44. DOI:https:\/\/doi.org\/10.1145\/1299015.1299019."},{"key":"e_1_2_1_16_1","volume-title":"ACM International Conference Proceeding Series. 149","author":"Downs J.S.","year":"2006","unstructured":"Downs , J.S. et al. 2006. Decision strategies and susceptibility to phishing . ACM International Conference Proceeding Series. 149 , ( 2006 ), 79--90. DOI:https:\/\/doi.org\/10.1145\/1143120.1143131. 10.1145\/1143120.1143131 Downs, J.S. et al. 2006. Decision strategies and susceptibility to phishing. ACM International Conference Proceeding Series. 149, (2006), 79--90. DOI:https:\/\/doi.org\/10.1145\/1143120.1143131."},{"unstructured":"Email Client Market Share and Popularity - 2022: 2022. https:\/\/www.litmus.com\/email-client-market-share\/. Accessed: 2022-05--17.  Email Client Market Share and Popularity - 2022: 2022. https:\/\/www.litmus.com\/email-client-market-share\/. Accessed: 2022-05--17.","key":"e_1_2_1_17_1"},{"doi-asserted-by":"publisher","key":"e_1_2_1_18_1","DOI":"10.1080\/15391523.2010.10782551"},{"key":"e_1_2_1_19_1","volume-title":"A Description of Think Aloud Method and Protocol Analysis. Qualitative health research. 3, 4","author":"Fonteyn M.E.","year":"1993","unstructured":"Fonteyn , M.E. 1993. A Description of Think Aloud Method and Protocol Analysis. Qualitative health research. 3, 4 ( 1993 ), 430--441. Fonteyn, M.E. 1993. A Description of Think Aloud Method and Protocol Analysis. Qualitative health research. 3, 4 (1993), 430--441."},{"doi-asserted-by":"crossref","unstructured":"Furnell S. and Thomson K.L. 2009. Recognising and addressing \"security fatigue.\" Computer Fraud and Security. 2009 11 (2009) 7--11. DOI:https:\/\/doi.org\/10.1016\/S1361--3723(09)70139--3. 10.1016\/S1361--3723(09)70139--3","key":"#cr-split#-e_1_2_1_20_1.1","DOI":"10.1016\/S1361-3723(09)70139-3"},{"doi-asserted-by":"crossref","unstructured":"Furnell S. and Thomson K.L. 2009. Recognising and addressing \"security fatigue.\" Computer Fraud and Security. 2009 11 (2009) 7--11. DOI:https:\/\/doi.org\/10.1016\/S1361--3723(09)70139--3.","key":"#cr-split#-e_1_2_1_20_1.2","DOI":"10.1016\/S1361-3723(09)70139-3"},{"key":"e_1_2_1_21_1","volume-title":"WWW 2013 Companion - Proceedings of the 22nd International Conference on World Wide Web.","author":"Halevi T.","year":"2013","unstructured":"Halevi , T. et al. 2013. A pilot study of cyber security and privacy related behavior and personality traits . WWW 2013 Companion - Proceedings of the 22nd International Conference on World Wide Web. ( 2013 ), 737--744. Halevi, T. et al. 2013. A pilot study of cyber security and privacy related behavior and personality traits. WWW 2013 Companion - Proceedings of the 22nd International Conference on World Wide Web. (2013), 737--744."},{"doi-asserted-by":"publisher","key":"e_1_2_1_22_1","DOI":"10.1109\/HICSS.2015.419"},{"unstructured":"HM Revenues & Customs 2020. HMRC urges universities to warn new students of tax scams danger.  HM Revenues & Customs 2020. HMRC urges universities to warn new students of tax scams danger.","key":"e_1_2_1_23_1"},{"key":"e_1_2_1_24_1","volume-title":"Proceedings of the Human Factors and Ergonomics Society. (2013","author":"Hong K.W.","year":"1931","unstructured":"Hong , K.W. et al. 2013. Keeping up with the joneses: Assessing phishing susceptibility in an email task . Proceedings of the Human Factors and Ergonomics Society. (2013 ), 1012--1016. DOI:https:\/\/doi.org\/10.1177\/154 1931 213571226. 10.1177\/1541931213571226 Hong, K.W. et al. 2013. Keeping up with the joneses: Assessing phishing susceptibility in an email task. Proceedings of the Human Factors and Ergonomics Society. (2013), 1012--1016. DOI:https:\/\/doi.org\/10.1177\/1541931213571226."},{"unstructured":"How To Identify A Phishing Email: 2018. https:\/\/www.cybsafe.com\/community\/blog\/how-to-identify-a-phishing-email\/. Accessed: 2021-06-04.  How To Identify A Phishing Email: 2018. https:\/\/www.cybsafe.com\/community\/blog\/how-to-identify-a-phishing-email\/. Accessed: 2021-06-04.","key":"e_1_2_1_25_1"},{"unstructured":"Israeli-Made Spyware Used to Monitor Journalists and Activists Worldwide: 2021. https:\/\/www.occrp.org\/en\/the-pegasus-project\/israeli-made-spyware-used-to-monitor-journalists-and-activists-worldwide. Accessed: 2021-09-02.  Israeli-Made Spyware Used to Monitor Journalists and Activists Worldwide: 2021. https:\/\/www.occrp.org\/en\/the-pegasus-project\/israeli-made-spyware-used-to-monitor-journalists-and-activists-worldwide. Accessed: 2021-09-02.","key":"e_1_2_1_26_1"},{"key":"e_1_2_1_27_1","volume-title":"et al","author":"Jagatic T.","year":"2005","unstructured":"Jagatic , T. et al . 2005 . Social Phishing . (2005), 2762--2768. DOI:https:\/\/doi.org\/10.1007\/978--1--4939--7131--2_290. 10.1007\/978--1--4939--7131--2_290 Jagatic, T. et al. 2005. Social Phishing. (2005), 2762--2768. DOI:https:\/\/doi.org\/10.1007\/978--1--4939--7131--2_290."},{"key":"e_1_2_1_28_1","first-page":"1","article-title":"2005","volume":"2005","author":"Jagatic T.","year":"2005","unstructured":"Jagatic , T. . 2005 . Social Pishing . 2005 , ( 2005 ), 1 -- 10 . Jagatic, T. et al. 2005. Social Pishing. 2005, (2005), 1--10.","journal-title":"Social Pishing"},{"key":"e_1_2_1_29_1","volume-title":"et al","author":"Jakobsson M.","year":"2007","unstructured":"Jakobsson , M. et al . 2007 . What instills trust? A qualitative study of phishing. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 4886 LNCS , (2007), 356--361. Jakobsson, M. et al. 2007. What instills trust? A qualitative study of phishing. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 4886 LNCS, (2007), 356--361."},{"doi-asserted-by":"crossref","unstructured":"King N. 2017. Doing Template Analysis. Qualitative Organizational Research: Core Methods and Current Challenges. 426--449.  King N. 2017. Doing Template Analysis. Qualitative Organizational Research: Core Methods and Current Challenges. 426--449.","key":"e_1_2_1_30_1","DOI":"10.4135\/9781526435620.n24"},{"key":"e_1_2_1_31_1","volume-title":"et al","author":"Kumaraguru P.","year":"2008","unstructured":"Kumaraguru , P. et al . 2008 . Lessons from a real world evaluation of anti-phishing training. eCrime Researchers Summit , eCrime 2008 (2008). Kumaraguru, P. et al. 2008. Lessons from a real world evaluation of anti-phishing training. eCrime Researchers Summit, eCrime 2008 (2008)."},{"key":"e_1_2_1_32_1","volume-title":"Proceedings of the 5th Symposium on Usable Privacy and Security - SOUPS '09","author":"Kumaraguru P.","year":"2009","unstructured":"Kumaraguru , P. et al. 2009. School of Phish?: A Real-World Evaluation of Anti-Phishing Training Categories and Subject Descriptors . Proceedings of the 5th Symposium on Usable Privacy and Security - SOUPS '09 . ( 2009 ), 12. DOI:https:\/\/doi.org\/10.1145\/1572532.1572536. 10.1145\/1572532.1572536 Kumaraguru, P. et al. 2009. School of Phish?: A Real-World Evaluation of Anti-Phishing Training Categories and Subject Descriptors. Proceedings of the 5th Symposium on Usable Privacy and Security - SOUPS '09. (2009), 12. DOI:https:\/\/doi.org\/10.1145\/1572532.1572536."},{"doi-asserted-by":"publisher","key":"e_1_2_1_33_1","DOI":"10.1145\/1572532.1572536"},{"doi-asserted-by":"publisher","key":"e_1_2_1_34_1","DOI":"10.1145\/1754393.1754396"},{"key":"e_1_2_1_35_1","volume-title":"et al","author":"Lastdrager E.","year":"2017","unstructured":"Lastdrager , E. et al . 2017 . How Effective is Anti-Phishing Training for Children?? This paper is included in the Proceedings of the. Soups ( 2017). Lastdrager, E. et al. 2017. How Effective is Anti-Phishing Training for Children?? This paper is included in the Proceedings of the. Soups (2017)."},{"key":"e_1_2_1_36_1","volume-title":"et al","author":"Marczak B.","year":"2018","unstructured":"Marczak , B. et al . 2018 . NSO Group Infrastructure Linked to Targeting of Amnesty International and Saudi Dissident Suggested Citation Copyright. (2018). Marczak, B. et al. 2018. NSO Group Infrastructure Linked to Targeting of Amnesty International and Saudi Dissident Suggested Citation Copyright. (2018)."},{"unstructured":"Mobile malware evolution 2020 | Securelist: https:\/\/securelist.com\/mobile-malware-evolution-2020\/101029\/. Accessed: 2021-09-02.  Mobile malware evolution 2020 | Securelist: https:\/\/securelist.com\/mobile-malware-evolution-2020\/101029\/. Accessed: 2021-09-02.","key":"e_1_2_1_37_1"},{"unstructured":"Mohdin A. 2018. Scammers target students with fake tax refund emails. The Guardian.  Mohdin A. 2018. Scammers target students with fake tax refund emails. The Guardian.","key":"e_1_2_1_38_1"},{"key":"e_1_2_1_39_1","volume-title":"Proceedings - 5th IEEE European Symposium on Security and Privacy Workshops, Euro S and PW 2020","author":"Mossano M.","year":"2020","unstructured":"Mossano , M. et al. 2020. Analysis of publicly available anti-phishing webpages: Contradicting information, lack of concrete advice and very narrow attack vector . Proceedings - 5th IEEE European Symposium on Security and Privacy Workshops, Euro S and PW 2020 . ( Sep. 2020 ), 130--139. DOI:https:\/\/doi.org\/10.1109\/EUROSPW51379.2020.00026. 10.1109\/EUROSPW51379.2020.00026 Mossano, M. et al. 2020. Analysis of publicly available anti-phishing webpages: Contradicting information, lack of concrete advice and very narrow attack vector. Proceedings - 5th IEEE European Symposium on Security and Privacy Workshops, Euro S and PW 2020. (Sep. 2020), 130--139. DOI:https:\/\/doi.org\/10.1109\/EUROSPW51379.2020.00026."},{"key":"e_1_2_1_40_1","volume-title":"et al","author":"Nicholson J.","year":"2017","unstructured":"Nicholson , J. et al . 2017 . Can we fight social engineering attacks by social means? Assessing social salience as a means to improve phish detection. Nicholson, J. et al. 2017. Can we fight social engineering attacks by social means? Assessing social salience as a means to improve phish detection."},{"key":"e_1_2_1_41_1","volume-title":"Proceedings - 5th IEEE European Symposium on Security and Privacy Workshops, Euro S and PW 2020","author":"Nicholson J.","year":"2020","unstructured":"Nicholson , J. et al. 2020. Investigating Teenagers' Ability to Detect Phishing Messages . Proceedings - 5th IEEE European Symposium on Security and Privacy Workshops, Euro S and PW 2020 ( 2020 ), 140--149. Nicholson, J. et al. 2020. Investigating Teenagers' Ability to Detect Phishing Messages. Proceedings - 5th IEEE European Symposium on Security and Privacy Workshops, Euro S and PW 2020 (2020), 140--149."},{"key":"e_1_2_1_42_1","volume-title":"ACM International Conference Proceeding Series. (Oct.","author":"Nicholson J.","year":"2021","unstructured":"Nicholson , J. et al. 2021. Understanding young people's experiences of cybersecurity . ACM International Conference Proceeding Series. (Oct. 2021 ), 200--210. DOI:https:\/\/doi.org\/10.1145\/3481357.3481520. 10.1145\/3481357.3481520 Nicholson, J. et al. 2021. Understanding young people's experiences of cybersecurity. ACM International Conference Proceeding Series. (Oct. 2021), 200--210. DOI:https:\/\/doi.org\/10.1145\/3481357.3481520."},{"volume-title":"A Modern Perspective on Phishing: An investigation into susceptibility to phishing attacks between mobile and desktop email clients","author":"Nowitz J.","unstructured":"Nowitz , J. 2018. A Modern Perspective on Phishing: An investigation into susceptibility to phishing attacks between mobile and desktop email clients . Victoria University of Wellington . Nowitz, J. 2018. A Modern Perspective on Phishing: An investigation into susceptibility to phishing attacks between mobile and desktop email clients. Victoria University of Wellington.","key":"e_1_2_1_43_1"},{"key":"e_1_2_1_44_1","volume-title":"Ofcom Communications Market Report: UK","author":"Ofcom","year":"2018","unstructured":"Ofcom 2018. Ofcom Communications Market Report: UK ( 2018 ). Ofcom 2018. Ofcom Communications Market Report: UK (2018)."},{"unstructured":"Ofcom 2018. The consumer mobile experience Measuring the consumer experience of using Android mobile services.  Ofcom 2018. The consumer mobile experience Measuring the consumer experience of using Android mobile services.","key":"e_1_2_1_45_1"},{"doi-asserted-by":"publisher","key":"e_1_2_1_46_1","DOI":"10.1016\/j.cose.2015.02.008"},{"unstructured":"Phishing scams are becoming ever more sophisticated -- and firms are struggling to keep up: 2017. https:\/\/theconversation.com\/phishing-scams-are-becoming-ever-more-sophisticated-and-firms-are-struggling-to-keep-up-73934. Accessed: 2021-06-04.  Phishing scams are becoming ever more sophisticated -- and firms are struggling to keep up: 2017. https:\/\/theconversation.com\/phishing-scams-are-becoming-ever-more-sophisticated-and-firms-are-struggling-to-keep-up-73934. Accessed: 2021-06-04.","key":"e_1_2_1_47_1"},{"key":"e_1_2_1_48_1","volume-title":"2015 Cost of Data Breach Study: Impact of Business Continuity Management. June","author":"Ponemon Institute 2015.","year":"2015","unstructured":"Ponemon Institute 2015. 2015 Cost of Data Breach Study: Impact of Business Continuity Management. June ( 2015 ), 1--19. Ponemon Institute 2015. 2015 Cost of Data Breach Study: Impact of Business Continuity Management. June (2015), 1--19."},{"unstructured":"Proofpoint 2022. 2022 State of the Phish.  Proofpoint 2022. 2022 State of the Phish.","key":"e_1_2_1_49_1"},{"doi-asserted-by":"publisher","key":"e_1_2_1_50_1","DOI":"10.1109\/TDSC.2015.2410795"},{"key":"e_1_2_1_51_1","first-page":"8","article-title":"2022. Phishing simulation exercise in a large hospital: A case study","author":"Rizzoni F.","year":"2022","unstructured":"Rizzoni , F. . 2022. Phishing simulation exercise in a large hospital: A case study . Digital Health. 8 , ( 2022 ). DOI:https:\/\/doi.org\/10.1177\/20552076221081716. 10.1177\/20552076221081716 Rizzoni, F. et al. 2022. Phishing simulation exercise in a large hospital: A case study. Digital Health. 8, (2022). DOI:https:\/\/doi.org\/10.1177\/20552076221081716.","journal-title":"Digital Health."},{"key":"e_1_2_1_52_1","volume-title":"ACM International Conference Proceeding Series. 229","author":"Sheng S.","year":"2007","unstructured":"Sheng , S. et al. 2007. Anti-Phishing Phil: The design and evaluation of a game that teaches people not to fall for phish . ACM International Conference Proceeding Series. 229 , ( 2007 ), 88--99. DOI:https:\/\/doi.org\/10.1145\/1280680.1280692. 10.1145\/1280680.1280692 Sheng, S. et al. 2007. Anti-Phishing Phil: The design and evaluation of a game that teaches people not to fall for phish. ACM International Conference Proceeding Series. 229, (2007), 88--99. DOI:https:\/\/doi.org\/10.1145\/1280680.1280692."},{"doi-asserted-by":"publisher","key":"e_1_2_1_53_1","DOI":"10.1145\/1753326.1753383"},{"unstructured":"Spam & Phishing | Phishing Scam Threats | Kaspersky Lab: 2018. https:\/\/www.kaspersky.co.uk\/resource-center\/threats\/spam-phishing. Accessed: 2021-06-01.  Spam & Phishing | Phishing Scam Threats | Kaspersky Lab: 2018. https:\/\/www.kaspersky.co.uk\/resource-center\/threats\/spam-phishing. Accessed: 2021-06-01.","key":"e_1_2_1_54_1"},{"doi-asserted-by":"publisher","key":"e_1_2_1_55_1","DOI":"10.1093\/cybsec\/tyaa009"},{"unstructured":"Taylor B.Y.K. and Silver L. 2019. Smartphone Ownership Is Growing Rapidly Around the World but Not Always Equally.  Taylor B.Y.K. and Silver L. 2019. Smartphone Ownership Is Growing Rapidly Around the World but Not Always Equally.","key":"e_1_2_1_56_1"},{"volume-title":"Email Statistics Report","year":"2018","unstructured":"THE RADICATI GROUP, I. 2018. Email Statistics Report , 2018 --2022. THE RADICATI GROUP, I. 2018. Email Statistics Report, 2018--2022.","key":"e_1_2_1_57_1"},{"key":"e_1_2_1_58_1","volume-title":"et al","author":"Turland J.","year":"2015","unstructured":"Turland , J. et al . 2015 . Nudging Towards security: Developing an Application for Wireless Network Selection for Android Phones . (2015). DOI:https:\/\/doi.org\/10.1145\/2783446.2783588. 10.1145\/2783446.2783588 Turland, J. et al. 2015. Nudging Towards security: Developing an Application for Wireless Network Selection for Android Phones. (2015). DOI:https:\/\/doi.org\/10.1145\/2783446.2783588."},{"volume-title":"The UK Digital Market Overview","year":"2022","unstructured":"UKOM 2022. The UK Digital Market Overview January 2022 . January (2022). UKOM 2022. The UK Digital Market Overview January 2022. January (2022).","key":"e_1_2_1_59_1"},{"volume-title":"UK Digital Market Overview --","year":"2020","unstructured":"UKOM 2020. UK Digital Market Overview -- September 2020 . UKOM 2020. UK Digital Market Overview -- September 2020.","key":"e_1_2_1_60_1"},{"doi-asserted-by":"publisher","key":"e_1_2_1_61_1","DOI":"10.1016\/j.chb.2016.05.035"},{"doi-asserted-by":"publisher","key":"e_1_2_1_62_1","DOI":"10.1145\/3025453"},{"doi-asserted-by":"publisher","key":"e_1_2_1_63_1","DOI":"10.1145\/3415231"},{"key":"e_1_2_1_64_1","volume-title":"et al","author":"Williams E.J.","year":"2018","unstructured":"Williams , E.J. et al . 2018 . Exploring susceptibility to phishing in the workplace. International Journal of Human Computer Studies. 120, April (2018), 1--13. DOI:https:\/\/doi.org\/10.1016\/j.ijhcs.2018.06.004. 10.1016\/j.ijhcs.2018.06.004 Williams, E.J. et al. 2018. Exploring susceptibility to phishing in the workplace. International Journal of Human Computer Studies. 120, April (2018), 1--13. DOI:https:\/\/doi.org\/10.1016\/j.ijhcs.2018.06.004."},{"doi-asserted-by":"publisher","key":"e_1_2_1_65_1","DOI":"10.1145\/1124772.1124863"}],"container-title":["Proceedings of the ACM on Human-Computer Interaction"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3546730","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3546730","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T18:44:03Z","timestamp":1750272243000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3546730"}},"subtitle":["Observing User Phish Detection Strategies Across Mobile and Desktop"],"short-title":[],"issued":{"date-parts":[[2022,9,19]]},"references-count":66,"journal-issue":{"issue":"MHCI","published-print":{"date-parts":[[2022,9,19]]}},"alternative-id":["10.1145\/3546730"],"URL":"https:\/\/doi.org\/10.1145\/3546730","relation":{},"ISSN":["2573-0142"],"issn-type":[{"type":"electronic","value":"2573-0142"}],"subject":[],"published":{"date-parts":[[2022,9,19]]},"assertion":[{"value":"2022-09-20","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}