{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,1]],"date-time":"2026-05-01T06:03:41Z","timestamp":1777615421005,"version":"3.51.4"},"publisher-location":"New York, NY, USA","reference-count":94,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,5,11]],"date-time":"2024-05-11T00:00:00Z","timestamp":1715385600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/https:\/\/doi.org\/10.13039\/100000001","name":"NSF (National Science Foundation)","doi-asserted-by":"publisher","award":["2030521"],"award-info":[{"award-number":["2030521"]}],"id":[{"id":"10.13039\/https:\/\/doi.org\/10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Jump ARCHES (Jump Applied Research in Community Health through Engineering and Simulation)","award":["P336"],"award-info":[{"award-number":["P336"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,5,11]]},"DOI":"10.1145\/3613904.3642027","type":"proceedings-article","created":{"date-parts":[[2024,5,11]],"date-time":"2024-05-11T08:38:25Z","timestamp":1715416705000},"page":"1-17","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["VeriSMS: A Message Verification System for Inclusive Patient Outreach against Phishing Attacks"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0003-4036-2321","authenticated-orcid":false,"given":"Chenkai","family":"Wang","sequence":"first","affiliation":[{"name":"Computer Science, University of Illinois at Urbana-Champaign, United States"}]},{"ORCID":"https:\/\/orcid.org\/0009-0004-5892-9047","authenticated-orcid":false,"given":"Zhuofan","family":"Jia","sequence":"additional","affiliation":[{"name":"Computer Science, University of Illinois at Urbana-Champaign, United States"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5511-3182","authenticated-orcid":false,"given":"Hadjer","family":"Benkraouda","sequence":"additional","affiliation":[{"name":"Computer Science, University of Illinois at Urbana-Champaign, United States"}]},{"ORCID":"https:\/\/orcid.org\/0009-0003-3833-5842","authenticated-orcid":false,"given":"Cody","family":"Zevnik","sequence":"additional","affiliation":[{"name":"Analytics, OSF Healthcare, United States"}]},{"ORCID":"https:\/\/orcid.org\/0009-0008-9383-7964","authenticated-orcid":false,"given":"Nicholas","family":"Heuermann","sequence":"additional","affiliation":[{"name":"Analytics, OSF Healthcare, United States"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4781-0962","authenticated-orcid":false,"given":"Roopa","family":"Foulger","sequence":"additional","affiliation":[{"name":"Analytics, OSF Healthcare, United States"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0304-7539","authenticated-orcid":false,"given":"Jonathan A.","family":"Handler","sequence":"additional","affiliation":[{"name":"Analytics, OSF Healthcare, United States"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8910-8979","authenticated-orcid":false,"given":"Gang","family":"Wang","sequence":"additional","affiliation":[{"name":"Computer Science, University of Illinois at Urbana-Champaign, United States"}]}],"member":"320","published-online":{"date-parts":[[2024,5,11]]},"reference":[{"key":"e_1_3_3_3_1_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijhcs.2015.05.005"},{"key":"e_1_3_3_3_2_1","unstructured":"Monica Anderson and Andrew Perrin. 2017. Technology use among seniors. https:\/\/www.pewresearch.org\/internet\/2017\/05\/17\/technology-use-among-seniors\/."},{"key":"e_1_3_3_3_3_1","unstructured":"Anon.2023. Supplementary Materials for the Anonymous Submission. https:\/\/app.box.com\/s\/dtibikazdsjfifboocm8unruzo89kcme."},{"key":"e_1_3_3_3_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2022.3151103"},{"key":"e_1_3_3_3_5_1","doi-asserted-by":"publisher","DOI":"10.1191\/1478088706qp063oa"},{"key":"e_1_3_3_3_6_1","volume-title":"SUS: A quick and dirty usability scale. Usability Eval. Ind. 189 (11","author":"Brooke John","year":"1995","unstructured":"John Brooke. 1995. SUS: A quick and dirty usability scale. Usability Eval. Ind. 189 (11 1995)."},{"key":"e_1_3_3_3_7_1","volume-title":"Proc. of USENIX Security.","author":"Chen Jianjun","year":"2020","unstructured":"Jianjun Chen, Vern Paxson, and Jian Jiang. 2020. Composition Kills: A Case Study of Email Sender Authentication. In Proc. of USENIX Security."},{"key":"e_1_3_3_3_8_1","doi-asserted-by":"publisher","DOI":"10.1177\/0022242920913025"},{"key":"e_1_3_3_3_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/PST.2014.6890941"},{"key":"e_1_3_3_3_10_1","doi-asserted-by":"crossref","unstructured":"Max Clasen Fudong Li and David Williams. 2021. Friend or Foe: An Investigation into Recipient Identification of SMS-Based Phishing. In Human Aspects of Information Security and Assurance Steven Furnell and Nathan Clarke (Eds.). 148\u2013163.","DOI":"10.1007\/978-3-030-81111-2_13"},{"key":"e_1_3_3_3_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/3038912.3052654"},{"key":"e_1_3_3_3_12_1","volume-title":"2023. Use and Experiences with Patient Portals Among Older Adults","author":"Anthony","unstructured":"Anthony D, Singer D, Kirch M, Solway E, Roberts S, Smith E, Hutchens L, Malani P, and Kullgren J.2023. Use and Experiences with Patient Portals Among Older Adults. University of Michigan National Poll on Healthy Aging (2023). https:\/\/www.healthyagingpoll.org\/reports-more\/report\/use-and-experiences-patient-portals-among-older-adults."},{"key":"e_1_3_3_3_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/1299015.1299019"},{"key":"e_1_3_3_3_14_1","volume-title":"Proc. of USENIX Security.","author":"Du Changlai","year":"2023","unstructured":"Changlai Du, Hexuan Yu, Yang Xiao, Y.\u00a0Thomas Hou, Angelos\u00a0D. Keromytis, and Wenjing Lou. 2023. UCBlocker: Unwanted Call Blocking Using Anonymous Authentication. In Proc. of USENIX Security."},{"key":"e_1_3_3_3_15_1","volume-title":"Proc. of CHI.","author":"Egelman Serge","year":"2008","unstructured":"Serge Egelman, Lorrie\u00a0Faith Cranor, and Jason Hong. 2008. You\u2019ve been warned: an empirical study of the effectiveness of web browser phishing warnings. In Proc. of CHI."},{"key":"e_1_3_3_3_16_1","unstructured":"Michelle Faverio. 2022. Share of those 65 and older who are tech users has grown in the past decade. https:\/\/www.pewresearch.org\/short-reads\/2022\/01\/13\/share-of-those-65-and-older-who-are-tech-users-has-grown-in-the-past-decade\/."},{"key":"e_1_3_3_3_17_1","unstructured":"FCC. 2023. Combating Spoofed Robocalls with Caller ID Authentication. https:\/\/www.fcc.gov\/call-authentication."},{"key":"e_1_3_3_3_18_1","unstructured":"Federal Trade Commission of the United States government 2022. Consumer Sentinel Network Data Book \u2014 ftc.gov. https:\/\/www.ftc.gov\/system\/files\/ftc_gov\/pdf\/CSN-Data-Book-2022.pdf."},{"key":"e_1_3_3_3_19_1","volume-title":"Technologies US","author":"FEITIAN","year":"2023","unstructured":"FEITIAN Technologies US 2023. Time Based OTP Tokens (MS Azure). https:\/\/shop.ftsafe.us\/collections\/otp-time-based."},{"key":"e_1_3_3_3_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/1242572.1242660"},{"key":"e_1_3_3_3_21_1","volume-title":"Scam Texts Cost Consumers $330 Million","author":"Fowler Bree","year":"2022","unstructured":"Bree Fowler. 2023. Scam Texts Cost Consumers $330 Million in 2022, FTC Says. https:\/\/www.cnet.com\/tech\/services-and-software\/scam-texts-cost-consumers-330-million-in-2022-ftc-says\/."},{"key":"e_1_3_3_3_22_1","unstructured":"Samuel Gibbs. 2016. SS7 hack explained: What can you do about it?https:\/\/www.theguardian.com\/technology\/2016\/apr\/19\/ss7-hack-explained- mobile-phone-vulnerability-snooping-texts-calls."},{"key":"e_1_3_3_3_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978330"},{"key":"e_1_3_3_3_24_1","volume-title":"Proc. of USENIX Security.","author":"Ho Grant","year":"2017","unstructured":"Grant Ho, Aashish Sharma, Mobin Javed, Vern Paxson, and David Wagner. 2017. Detecting Credential Spearphishing in Enterprise Settings. In Proc. of USENIX Security."},{"key":"e_1_3_3_3_25_1","volume-title":"The State of Phishing Attacks. Commun. ACM 55, 1","author":"Hong Jason","year":"2012","unstructured":"Jason Hong. 2012. The State of Phishing Attacks. Commun. ACM 55, 1 (2012)."},{"key":"e_1_3_3_3_26_1","volume-title":"Proc. of USENIX Security.","author":"Hu Hang","year":"2018","unstructured":"Hang Hu and Gang Wang. 2018. End-to-End Measurements of Email Spoofing Attacks. In Proc. of USENIX Security."},{"key":"e_1_3_3_3_27_1","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0170581"},{"key":"e_1_3_3_3_28_1","unstructured":"IRS. 2022. IRS reports significant increase in texting scams; warns taxpayers to remain vigilant. https:\/\/www.irs.gov\/newsroom\/irs-reports-significant-increase-in-texting- scams-warns-taxpayers-to-remain-vigilant."},{"key":"e_1_3_3_3_29_1","doi-asserted-by":"publisher","DOI":"10.1186\/s13673-016-0065-2"},{"key":"e_1_3_3_3_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/1455770.1455774"},{"key":"e_1_3_3_3_31_1","unstructured":"Brian Krebs. 2018. SMS Phishing + Cardless ATM = Profit. https:\/\/krebsonsecurity.com\/2018\/11\/sms-phishing-cardless-atm-profit."},{"key":"e_1_3_3_3_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/1240624.1240760"},{"key":"e_1_3_3_3_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/1299015.1299022"},{"key":"e_1_3_3_3_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/1754393.1754396"},{"key":"e_1_3_3_3_35_1","volume-title":"Proc. of SOUPS.","author":"Lastdrager Elmer","year":"2017","unstructured":"Elmer Lastdrager, In\u00e9s\u00a0Carvajal Gallardo, Pieter Hartel, and Marianne Junger. 2017. How Effective is { Anti-Phishing} Training for Children?. In Proc. of SOUPS."},{"key":"e_1_3_3_3_36_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-15986-3_12"},{"key":"e_1_3_3_3_37_1","doi-asserted-by":"publisher","DOI":"10.1109\/MIC.2014.108"},{"key":"e_1_3_3_3_38_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2018.00034"},{"key":"e_1_3_3_3_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/1978942.1979244"},{"key":"e_1_3_3_3_40_1","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2018.00072"},{"key":"e_1_3_3_3_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/3485832.3488012"},{"key":"e_1_3_3_3_42_1","doi-asserted-by":"publisher","DOI":"10.2196\/mhealth.8873"},{"key":"e_1_3_3_3_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/2858036.2858085"},{"key":"e_1_3_3_3_44_1","volume-title":"Proc. of USENIX Security.","author":"Mayer Peter","year":"2022","unstructured":"Peter Mayer, Collins\u00a0W. Munyendo, Michelle\u00a0L. Mazurek, and Adam\u00a0J. Aviv. 2022. Why Users (Don\u2019t) Use Password Managers at a Large Educational Institution. In Proc. of USENIX Security."},{"key":"e_1_3_3_3_45_1","volume-title":"Proc. of LEET.","author":"D.","unstructured":"D.\u00a0Kevin McGrath and Minaxi Gupta. 2008. Behind Phishing: An Examination of Phisher Modi Operandi. In Proc. of LEET."},{"key":"e_1_3_3_3_46_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00521-021-06305-y"},{"key":"e_1_3_3_3_47_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2016.12.044"},{"key":"e_1_3_3_3_48_1","volume-title":"HOTP: An HMAC-based one-time password algorithm. https:\/\/www.rfc-editor","author":"M\u2019Raihi D.","year":"1970","unstructured":"D. M\u2019Raihi, M. Bellare, F. Hoornaert, D. Naccache, and O. Ranen. 1970. HOTP: An HMAC-based one-time password algorithm. https:\/\/www.rfc-editor.org\/rfc\/rfc4226.html."},{"key":"e_1_3_3_3_49_1","volume-title":"TOTP: Time-based one-time password algorithm. https:\/\/www.rfc-editor","author":"M\u2019Raihi D.","year":"1970","unstructured":"D. M\u2019Raihi, S. Machani, M. Pei, and J. Rydell. 1970. TOTP: Time-based one-time password algorithm. https:\/\/www.rfc-editor.org\/rfc\/rfc6238.html."},{"key":"e_1_3_3_3_50_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2016.2580509"},{"key":"e_1_3_3_3_51_1","unstructured":"Yomna N. 2019. Gotta Catch \u2019Em All: Understanding How IMSI-Catchers Exploit Cell Networks. https:\/\/www.eff.org\/wp\/gotta-catch-em-all-understanding-how-imsi-catchers- exploit-cell-networks."},{"key":"e_1_3_3_3_52_1","volume-title":"Proc. of USENIX Security.","author":"Oest Adam","year":"2020","unstructured":"Adam Oest, Yenganeh Safaei, Penghui Zhang, Brad Wardman, Kevin Tyers, Yan Shoshitaishvili, Adam Doup\u00e9, and Gail-Joon Ahn. 2020. PhishTime: Continuous Longitudinal Measurement of the Effectiveness of Anti-phishing Blacklists. In Proc. of USENIX Security."},{"key":"e_1_3_3_3_53_1","volume-title":"Proc. of USENIX Security.","author":"Oest Adam","year":"2020","unstructured":"Adam Oest, Penghui Zhang, Brad Wardman, Eric Nunes, Jakub Burgis, Ali Zand, Kurt Thomas, Adam Doup\u00e9, and Gail-Joon Ahn. 2020. Sunrise to Sunset: Analyzing the End-to-end Life Cycle and Effectiveness of Phishing Attacks at Scale. In Proc. of USENIX Security."},{"key":"e_1_3_3_3_54_1","doi-asserted-by":"publisher","DOI":"10.1145\/3025453.3025831"},{"key":"e_1_3_3_3_55_1","doi-asserted-by":"publisher","DOI":"10.18267\/j.aip.119"},{"key":"e_1_3_3_3_56_1","volume-title":"Proc. of USENIX Security.","author":"Pandit Sharbani","year":"2023","unstructured":"Sharbani Pandit, Krishanu Sarker, Roberto Perdisci, Mustaque Ahamad, and Diyi Yang. 2023. Combating Robocalls with Phone Virtual Assistant Mediated Interaction. In Proc. of USENIX Security."},{"key":"e_1_3_3_3_57_1","doi-asserted-by":"publisher","DOI":"10.1145\/3411764.3445702"},{"key":"e_1_3_3_3_58_1","volume-title":"Proc. of SOUPS.","author":"Pearman Sarah","year":"2019","unstructured":"Sarah Pearman, Shikun\u00a0Aerin Zhang, Lujo Bauer, Nicolas Christin, and Lorrie\u00a0Faith Cranor. 2019. Why people (don\u2019t) use password managers effectively. In Proc. of SOUPS."},{"key":"e_1_3_3_3_59_1","doi-asserted-by":"publisher","DOI":"10.1145\/3321705.3329818"},{"key":"e_1_3_3_3_60_1","doi-asserted-by":"publisher","DOI":"10.1145\/3355369.3355585"},{"key":"e_1_3_3_3_61_1","doi-asserted-by":"publisher","unstructured":"Jon Peterson Henning Schulzrinne and Hannes Tschofenig. 2014. Secure Telephone Identity Problem Statement and Requirements. RFC 7340. https:\/\/doi.org\/10.17487\/RFC7340","DOI":"10.17487\/RFC7340"},{"key":"e_1_3_3_3_62_1","doi-asserted-by":"publisher","unstructured":"Jon Peterson and Sean Turner. 2018. Secure Telephone Identity Credentials: Certificates. RFC 8226. https:\/\/doi.org\/10.17487\/RFC8226","DOI":"10.17487\/RFC8226"},{"key":"e_1_3_3_3_63_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2010.5462216"},{"key":"e_1_3_3_3_64_1","volume-title":"Proc. of USENIX Security.","author":"Prasad Sathvik","year":"2020","unstructured":"Sathvik Prasad, Elijah Bouma-Sims, Athishay\u00a0Kiran Mylappan, and Bradley Reaves. 2020. Who\u2019s Calling? Characterizing Robocalls through Audio and Metadata Analysis. In Proc. of USENIX Security."},{"key":"e_1_3_3_3_65_1","volume-title":"Proc. of USENIX Security.","author":"Prasad Sathvik","year":"2023","unstructured":"Sathvik Prasad, Trevor Dunlap, Alexander Ross, and Bradley Reaves. 2023. Diving into Robocall Content with SnorCall. In Proc. of USENIX Security."},{"key":"e_1_3_3_3_66_1","unstructured":"Protectimus Limited 2022. Two factor authentication hardware TOTP token. https:\/\/www.protectimus.com\/protectimus-two."},{"key":"e_1_3_3_3_67_1","doi-asserted-by":"publisher","DOI":"10.1097\/QAI.0000000000001474"},{"key":"e_1_3_3_3_68_1","doi-asserted-by":"publisher","DOI":"10.1145\/3313831.3376298"},{"key":"e_1_3_3_3_70_1","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP.2017.40"},{"key":"e_1_3_3_3_71_1","volume-title":"Which phish is on the hook? Phishing vulnerability for older versus younger adults. Human factors 62, 5","author":"Sarno M","year":"2020","unstructured":"Dawn\u00a0M Sarno, Joanna\u00a0E Lewis, Corey\u00a0J Bohil, and Mark\u00a0B Neider. 2020. Which phish is on the hook? Phishing vulnerability for older versus younger adults. Human factors 62, 5 (2020), 704\u2013717."},{"key":"e_1_3_3_3_72_1","volume-title":"Proc. of IEEE S&P.","author":"Schechter E.","year":"2007","unstructured":"Stuart\u00a0E. Schechter, Rachna Dhamija, Andy Ozment, and Ian Fischer. 2007. The Emperor\u2019s New Security Indicators. In Proc. of IEEE S&P."},{"key":"e_1_3_3_3_73_1","volume-title":"Proc. of NDSS.","author":"Shaik A","year":"2017","unstructured":"A Shaik, R Borgaonkar, N Asokan, V Niemi, and J Seifert. 2017. Practical attacks against privacy and availability in 4G\/LTE mobile communication systems. In Proc. of NDSS."},{"key":"e_1_3_3_3_74_1","doi-asserted-by":"publisher","DOI":"10.1089\/pop.2021.0382"},{"key":"e_1_3_3_3_75_1","volume-title":"Proc. of USENIX Security.","author":"Thompson Christopher","year":"2019","unstructured":"Christopher Thompson, Martin Shelton, Emily Stark, Maximilian Walker, Emily Schechter, and Adrienne\u00a0Porter Felt. 2019. The Web\u2019s Identity Crisis: Understanding the Effectiveness of Website Identity Indicators. In Proc. of USENIX Security."},{"key":"e_1_3_3_3_76_1","volume-title":"Proc. of USENIX Security.","author":"Thompson Christopher","year":"2019","unstructured":"Christopher Thompson, Martin Shelton, Emily Stark, Maximilian Walker, Emily Schechter, and Adrienne\u00a0Porter Felt. 2019. The web\u2019s identity crisis: understanding the effectiveness of website identity indicators. In Proc. of USENIX Security."},{"key":"e_1_3_3_3_77_1","volume-title":"Proc. of USENIX Security.","author":"Tu Huahong","year":"2019","unstructured":"Huahong Tu, Adam Doup\u00e9, Ziming Zhao, and Gail-Joon Ahn. 2019. Users Really Do Answer Telephone Scams. In Proc. of USENIX Security."},{"key":"e_1_3_3_3_78_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2016.27"},{"key":"e_1_3_3_3_79_1","unstructured":"Twilio. [n. d.]. Respond to Incoming Phone Calls in Python. https:\/\/www.twilio.com\/docs\/voice\/tutorials\/how-to-respond-to-incoming-phone-calls\/python."},{"key":"e_1_3_3_3_80_1","unstructured":"usability.gov. 2013. System Usability Scale (SUS). https:\/\/www.usability.gov\/how-to-and-tools\/methods\/system-usability-scale.html."},{"key":"e_1_3_3_3_81_1","volume-title":"Proc. of USENIX Security.","author":"van\u00a0der Heijden Amber","year":"2019","unstructured":"Amber van\u00a0der Heijden and Luca Allodi. 2019. Cognitive Triaging of Phishing Attacks. In Proc. of USENIX Security."},{"key":"e_1_3_3_3_82_1","doi-asserted-by":"publisher","DOI":"10.1109\/ECRIME.2016.7487942"},{"key":"e_1_3_3_3_83_1","volume-title":"2020 Mobile Security Index Report.Verizon. https:\/\/enterprise.verizon.com\/resources\/reports\/2020-msi-report.pdf. Accessed","year":"2021","unstructured":"Verizon. 2020. 2020 Mobile Security Index Report.Verizon. https:\/\/enterprise.verizon.com\/resources\/reports\/2020-msi-report.pdf. Accessed: 10 October 2021."},{"key":"e_1_3_3_3_84_1","unstructured":"Verizon. 2022. Call Filter. Verizon. https:\/\/www.verizon.com\/business\/products\/contact-center-cx-solutions\/voice-security\/call-filter\/."},{"key":"e_1_3_3_3_85_1","doi-asserted-by":"publisher","DOI":"10.17705\/1jais.00442"},{"key":"e_1_3_3_3_86_1","doi-asserted-by":"publisher","DOI":"10.1145\/3290605.3300338"},{"key":"e_1_3_3_3_87_1","unstructured":"Wikipedia. 2023. SiteKey. https:\/\/en.wikipedia.org\/wiki\/SiteKey."},{"key":"e_1_3_3_3_88_1","volume-title":"Research Note\u2014Influence Techniques in Phishing Attacks: An Examination of Vulnerability and Resistance. Information systems research 25","author":"Wright T.","year":"2014","unstructured":"Ryan\u00a0T. Wright, Matthew\u00a0L. Jensen, Jason\u00a0Bennett Thatcher, Michael Dinger, and Kent Marett. 2014. Research Note\u2014Influence Techniques in Phishing Attacks: An Examination of Vulnerability and Resistance. Information systems research 25 (2014), 385\u2013400."},{"key":"e_1_3_3_3_89_1","doi-asserted-by":"publisher","DOI":"10.1177\/0018720818810942"},{"key":"e_1_3_3_3_90_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-04342-0_11"},{"key":"e_1_3_3_3_91_1","volume-title":"Fraud Vulnerabilities in SiteKey Security at Bank of America. CR-Labs","author":"Youll Jim","year":"2006","unstructured":"Jim Youll. 2006. Fraud Vulnerabilities in SiteKey Security at Bank of America. CR-Labs (2006). https:\/\/www.cr-labs.com\/publications\/SiteKey-20060718.pdf."},{"key":"e_1_3_3_3_92_1","volume-title":"Proc. of NDSS.","author":"Zhang Yue","year":"2007","unstructured":"Yue Zhang, Serge Egelman, Lorrie Cranor, and Jason Hong. 2007. Phinding Phish: Evaluating Anti-Phishing Tools. In Proc. of NDSS."},{"key":"e_1_3_3_3_93_1","doi-asserted-by":"publisher","DOI":"10.1145\/1242572.1242659"},{"key":"e_1_3_3_3_94_1","doi-asserted-by":"publisher","DOI":"10.1145\/3372297.3417257"},{"key":"e_1_3_3_3_95_1","volume-title":"Proc. of SOUPS.","author":"Zibaei Samira","year":"2022","unstructured":"Samira Zibaei, Dinah\u00a0Rinoa Malapaya, Benjamin Mercier, Amirali Salehi-Abari, and Julie Thorpe. 2022. Do Password Managers Nudge Secure (Random) Passwords?. In Proc. of SOUPS."}],"event":{"name":"CHI '24: CHI Conference on Human Factors in Computing Systems","location":"Honolulu HI USA","acronym":"CHI '24","sponsor":["SIGCHI ACM Special Interest Group on Computer-Human Interaction","SIGACCESS ACM Special Interest Group on Accessible Computing"]},"container-title":["Proceedings of the CHI Conference on Human Factors in Computing Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3613904.3642027","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3613904.3642027","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T23:57:30Z","timestamp":1750291050000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3613904.3642027"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,5,11]]},"references-count":94,"alternative-id":["10.1145\/3613904.3642027","10.1145\/3613904"],"URL":"https:\/\/doi.org\/10.1145\/3613904.3642027","relation":{},"subject":[],"published":{"date-parts":[[2024,5,11]]},"assertion":[{"value":"2024-05-11","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}