{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:13:40Z","timestamp":1750220020557,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":33,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,7,10]],"date-time":"2023-07-10T00:00:00Z","timestamp":1688947200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["1816497"],"award-info":[{"award-number":["1816497"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,7,10]]},"DOI":"10.1145\/3579856.3582815","type":"proceedings-article","created":{"date-parts":[[2023,7,5]],"date-time":"2023-07-05T14:52:13Z","timestamp":1688568733000},"page":"494-508","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["#DM-Me: Susceptibility to Direct Messaging-Based Scams"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-5808-0718","authenticated-orcid":false,"given":"Raj","family":"Vardhan","sequence":"first","affiliation":[{"name":"Texas A&amp;M University, United States of America"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0548-1571","authenticated-orcid":false,"given":"Alok","family":"Chandrawal","sequence":"additional","affiliation":[{"name":"Texas A&amp;M University, United States of America"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0177-5524","authenticated-orcid":false,"given":"Phakpoom","family":"Chinprutthiwong","sequence":"additional","affiliation":[{"name":"Sisaket Rajabhat University, Thailand"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3324-2949","authenticated-orcid":false,"given":"Yangyong","family":"Zhang","sequence":"additional","affiliation":[{"name":"Texas A&amp;M University, United States of America"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0630-741X","authenticated-orcid":false,"given":"Guofei","family":"Gu","sequence":"additional","affiliation":[{"name":"Texas A&amp;M University, United States of America"}]}],"member":"320","published-online":{"date-parts":[[2023,7,10]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"[\n  1\n  ]  2016. https:\/\/www.zerofox.com\/blog\/zerofox-research-publishes-instagram-scam-whitepaper\/.  [1] 2016. https:\/\/www.zerofox.com\/blog\/zerofox-research-publishes-instagram-scam-whitepaper\/."},{"key":"e_1_3_2_1_2_1","unstructured":"[\n  2\n  ]  2022. https:\/\/www.forexfraud.com\/news\/young-people-targeted-by-instagram-scams-that-means-you-too\/.  [2] 2022. https:\/\/www.forexfraud.com\/news\/young-people-targeted-by-instagram-scams-that-means-you-too\/."},{"key":"e_1_3_2_1_3_1","unstructured":"[\n  3\n  ]  2022. https:\/\/help.instagram.com\/514187739359208\/.  [3] 2022. https:\/\/help.instagram.com\/514187739359208\/."},{"key":"e_1_3_2_1_4_1","volume-title":"CATS: Characterizing automation of Twitter spammers.. In COMSNETS. 1\u201310.","author":"Amleshwaram A","year":"2013","unstructured":"Amit\u00a0 A Amleshwaram , A L\u00a0Narasimha Reddy , Sandeep Yadav , Guofei Gu , and Chao Yang . 2013 . CATS: Characterizing automation of Twitter spammers.. In COMSNETS. 1\u201310. Amit\u00a0A Amleshwaram, AL\u00a0Narasimha Reddy, Sandeep Yadav, Guofei Gu, and Chao Yang. 2013. CATS: Characterizing automation of Twitter spammers.. In COMSNETS. 1\u201310."},{"key":"e_1_3_2_1_5_1","volume-title":"ISOC Network and Distributed System Security Symposium (NDSS).","author":"Antonatos Spiros","year":"2010","unstructured":"Spiros Antonatos , Iasonas Polakis , Thanasis Petsas , and Evangelos\u00a0 P Markatos . 2010 . A systematic characterization of IM threats using honeypots . In ISOC Network and Distributed System Security Symposium (NDSS). Spiros Antonatos, Iasonas Polakis, Thanasis Petsas, and Evangelos\u00a0P Markatos. 2010. A systematic characterization of IM threats using honeypots. In ISOC Network and Distributed System Security Symposium (NDSS)."},{"key":"e_1_3_2_1_6_1","volume-title":"An analysis of advance fee fraud on the internet. Journal of Financial Crime","author":"Chang JS","year":"2008","unstructured":"Joshua\u00a0 JS Chang . 2008. An analysis of advance fee fraud on the internet. Journal of Financial Crime ( 2008 ). Joshua\u00a0JS Chang. 2008. An analysis of advance fee fraud on the internet. Journal of Financial Crime (2008)."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/1124772.1124861"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/1299015.1299019"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/1143120.1143131"},{"key":"e_1_3_2_1_10_1","volume-title":"Proceedings of the SIGCHI conference on Human Factors in Computing Systems CHI","author":"Erkkila J","year":"2011","unstructured":"J Erkkila . 2011 . Why we fall for phishing . In Proceedings of the SIGCHI conference on Human Factors in Computing Systems CHI 2011. ACM, 7\u201312. J Erkkila. 2011. Why we fall for phishing. In Proceedings of the SIGCHI conference on Human Factors in Computing Systems CHI 2011. ACM, 7\u201312."},{"key":"e_1_3_2_1_11_1","volume-title":"Measurement and Early Detection of Third-Party Application Abuse on Twitter. In The World Wide Web Conference. 448\u2013458","author":"Farooqi Shehroze","year":"2019","unstructured":"Shehroze Farooqi and Zubair Shafiq . 2019 . Measurement and Early Detection of Third-Party Application Abuse on Twitter. In The World Wide Web Conference. 448\u2013458 . Shehroze Farooqi and Zubair Shafiq. 2019. Measurement and Early Detection of Third-Party Application Abuse on Twitter. In The World Wide Web Conference. 448\u2013458."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-20376-8_4"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/1242572.1242660"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/1879141.1879147"},{"volume-title":"26th { USENIX} Security Symposium ({ USENIX} Security 17). 469\u2013485.","author":"Ho Grant","key":"e_1_3_2_1_15_1","unstructured":"Grant Ho , Aashish Sharma , Mobin Javed , Vern Paxson , and David Wagner . 2017. Detecting credential spearphishing in enterprise settings . In 26th { USENIX} Security Symposium ({ USENIX} Security 17). 469\u2013485. Grant Ho, Aashish Sharma, Mobin Javed, Vern Paxson, and David Wagner. 2017. Detecting credential spearphishing in enterprise settings. In 26th { USENIX} Security Symposium ({ USENIX} Security 17). 469\u2013485."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-20550-2_12"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/1240624.1240760"},{"key":"e_1_3_2_1_18_1","volume-title":"Nophish: evaluation of a web application that teaches people being aware of phishing attacks. Informatik 2016","author":"Kunz Alexandra","year":"2016","unstructured":"Alexandra Kunz , Melanie Volkamer , Simon Stockhardt , Sven Palberg , Tessa Lottermann , and Eric Piegert . 2016. Nophish: evaluation of a web application that teaches people being aware of phishing attacks. Informatik 2016 ( 2016 ). Alexandra Kunz, Melanie Volkamer, Simon Stockhardt, Sven Palberg, Tessa Lottermann, and Eric Piegert. 2016. Nophish: evaluation of a web application that teaches people being aware of phishing attacks. Informatik 2016 (2016)."},{"key":"e_1_3_2_1_19_1","volume-title":"Identifying and analyzing cryptocurrency manipulations in social media. arXiv preprint arXiv:1902.03110","author":"Mirtaheri Mehrnoosh","year":"2019","unstructured":"Mehrnoosh Mirtaheri , Sami Abu-El-Haija , Fred Morstatter , Greg\u00a0Ver Steeg , and Aram Galstyan . 2019. Identifying and analyzing cryptocurrency manipulations in social media. arXiv preprint arXiv:1902.03110 ( 2019 ). Mehrnoosh Mirtaheri, Sami Abu-El-Haija, Fred Morstatter, Greg\u00a0Ver Steeg, and Aram Galstyan. 2019. Identifying and analyzing cryptocurrency manipulations in social media. arXiv preprint arXiv:1902.03110 (2019)."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/2046707.2046761"},{"key":"e_1_3_2_1_21_1","unstructured":"Kaan Onarlioglu Utku\u00a0Ozan Yilmaz Engin Kirda and Davide Balzarotti. 2012. Insights into User Behavior in Dealing with Internet Attacks.. In NDSS.  Kaan Onarlioglu Utku\u00a0Ozan Yilmaz Engin Kirda and Davide Balzarotti. 2012. Insights into User Behavior in Dealing with Internet Attacks.. In NDSS."},{"key":"e_1_3_2_1_22_1","volume-title":"Reputation as a sufficient condition for data quality on Amazon Mechanical Turk. Behavior research methods 46, 4","author":"Peer Eyal","year":"2014","unstructured":"Eyal Peer , Joachim Vosgerau , and Alessandro Acquisti . 2014. Reputation as a sufficient condition for data quality on Amazon Mechanical Turk. Behavior research methods 46, 4 ( 2014 ), 1023\u20131031. Eyal Peer, Joachim Vosgerau, and Alessandro Acquisti. 2014. Reputation as a sufficient condition for data quality on Amazon Mechanical Turk. Behavior research methods 46, 4 (2014), 1023\u20131031."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"crossref","unstructured":"Vaibhav Rastogi Rui Shao Yan Chen Xiang Pan Shihong Zou and Ryan Riley. 2016. Are these Ads Safe: Detecting Hidden Attacks through the Mobile App-Web Interfaces.. In NDSS.  Vaibhav Rastogi Rui Shao Yan Chen Xiang Pan Shihong Zou and Ryan Riley. 2016. Are these Ads Safe: Detecting Hidden Attacks through the Mobile App-Web Interfaces.. In NDSS.","DOI":"10.14722\/ndss.2016.23234"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00014"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2007.35"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/1753326.1753383"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/1280680.1280692"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3363269"},{"volume-title":"28th { USENIX} Security Symposium ({ USENIX} Security 19). 1327\u20131340.","author":"Tu Huahong","key":"e_1_3_2_1_29_1","unstructured":"Huahong Tu , Adam Doup\u00e9 , Ziming Zhao , and Gail-Joon Ahn . 2019. Users really do answer telephone scams . In 28th { USENIX} Security Symposium ({ USENIX} Security 19). 1327\u20131340. Huahong Tu, Adam Doup\u00e9, Ziming Zhao, and Gail-Joon Ahn. 2019. Users really do answer telephone scams. In 28th { USENIX} Security Symposium ({ USENIX} Security 19). 1327\u20131340."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-98385-1_9"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2015.85"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1089\/cyber.2011.0352"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2020.101993"}],"event":{"name":"ASIA CCS '23: ACM ASIA Conference on Computer and Communications Security","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Melbourne VIC Australia","acronym":"ASIA CCS '23"},"container-title":["Proceedings of the ACM Asia Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3579856.3582815","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/abs\/10.1145\/3579856.3582815","content-type":"text\/html","content-version":"vor","intended-application":"syndication"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T17:51:27Z","timestamp":1750182687000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3579856.3582815"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,7,10]]},"references-count":33,"alternative-id":["10.1145\/3579856.3582815","10.1145\/3579856"],"URL":"https:\/\/doi.org\/10.1145\/3579856.3582815","relation":{},"subject":[],"published":{"date-parts":[[2023,7,10]]},"assertion":[{"value":"2023-07-10","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}