{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,13]],"date-time":"2026-04-13T17:41:06Z","timestamp":1776102066774,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":43,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,10,16]],"date-time":"2023-10-16T00:00:00Z","timestamp":1697414400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0\/"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,10,16]]},"DOI":"10.1145\/3617072.3617111","type":"proceedings-article","created":{"date-parts":[[2023,10,13]],"date-time":"2023-10-13T17:47:04Z","timestamp":1697219224000},"page":"318-333","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":5,"title":["Influence of URL Formatting on Users' Phishing URL Detection"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-9997-3432","authenticated-orcid":false,"given":"Mattia","family":"Mossano","sequence":"first","affiliation":[{"name":"Karlsruhe Institute of Technology, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4218-1658","authenticated-orcid":false,"given":"Oksana","family":"Kulyk","sequence":"additional","affiliation":[{"name":"IT University of Copenhagen, Denmark"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9284-7924","authenticated-orcid":false,"given":"Benjamin Maximillian","family":"Berens","sequence":"additional","affiliation":[{"name":"Karlsruhe Institute of Technology, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0009-0002-2211-4052","authenticated-orcid":false,"given":"Elena Marie","family":"H\u00e4u\u00dfler","sequence":"additional","affiliation":[{"name":"Karlsruhe Institute of Technology, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2674-4043","authenticated-orcid":false,"given":"Melanie","family":"Volkamer","sequence":"additional","affiliation":[{"name":"Karlsruhe Institute of Technology, Germany"}]}],"member":"320","published-online":{"date-parts":[[2023,10,16]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/3313831.3376168"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijhcs.2015.05.005"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.14722\/usec.2022.23075"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.5120\/ijca2018918286"},{"key":"e_1_3_2_1_6_1","volume-title":"11th Symposium on Usable Privacy and Security","author":"Canfield Casey","year":"2015","unstructured":"Casey Canfield, Baruch Fischhoff, and Alex Davis. 2015. Using Signal Detection Theory to Measure Phishing Detection Ability and Behavior. In 11th Symposium on Usable Privacy and Security (Ottawa, ON, CA) (SOUPS \u201815). USENIX, Berkeley, CA, US. https:\/\/cups.cs.cmu.edu\/soups\/2015\/posters\/soups2015_posters-final13.pdf"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1037\/0033-2909.112.1.155"},{"key":"e_1_3_2_1_8_1","volume-title":"Statistical power analysis for the behavioral sciences","author":"Cohen Jacob","unstructured":"Jacob Cohen. 2013. Statistical power analysis for the behavioral sciences. Academic Press, New York, NY, US."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1108\/ICS-12-2020-0204"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.paid.2015.04.034"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/1124772.1124861"},{"key":"e_1_3_2_1_12_1","volume-title":"Discovering Statistics Using IBM SPSS Statistics","author":"Field Andy","unstructured":"Andy Field. 2013. Discovering Statistics Using IBM SPSS Statistics. Sage Publications, Thousand Oaks, CA, US."},{"key":"e_1_3_2_1_13_1","volume-title":"On the Probable Error of a Coefficient of Correlation Deduced from a Small Sample.Metron 1","author":"Fisher A.","year":"1921","unstructured":"Ronald\u00a0A. Fisher. 1921. On the Probable Error of a Coefficient of Correlation Deduced from a Small Sample.Metron 1 (1921), 3\u201332."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","unstructured":"Aditya Jain Ramta1 Bansal Avnish Kumar and KD Singh. 2015. A comparative study of visual and auditory reaction times on the basis of gender and physical activity levels of medical first year students.International Journal of Applied and Basic Medical Research 5 2 (2015) 124\u2013127. https:\/\/doi.org\/10.4103\/2229-516X.157168","DOI":"10.4103\/2229-516X.157168"},{"key":"e_1_3_2_1_15_1","volume-title":"Spam and phishing","year":"2022","unstructured":"Kaspersky. 2023. Spam and phishing in 2022. Kaspersky. Retrieved June 9, 2023 from https:\/\/securelist.com\/spam-phishing-scam-report-2022\/108692\/"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/1978942.1979244"},{"key":"e_1_3_2_1_17_1","volume-title":"Simultaneous Statistical Inference","author":"Miller G.","unstructured":"Rupert\u00a0G. Miller. 1981. Simultaneous Statistical Inference. Springer, New York, NY, US."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-95484-0_23"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSPW51379.2020.00026"},{"key":"e_1_3_2_1_20_1","unstructured":"Mozilla. 2023. Preferences. Mozilla. Retrieved June 9 2023 from https:\/\/firefox-source-docs.mozilla.org\/browser\/urlbar\/preferences.html"},{"key":"e_1_3_2_1_21_1","volume-title":"Google Takes Its First Steps Toward Killing the URL. Wired. Retrieved","author":"Newman H.","year":"2023","unstructured":"Lily\u00a0H. Newman. 2018. Google Takes Its First Steps Toward Killing the URL. Wired. Retrieved June 9, 2023 from https:\/\/www.wired.com\/story\/google-chrome-kill-url-first-steps\/"},{"key":"e_1_3_2_1_22_1","volume-title":"13th Symposium on Usable Privacy and Security","author":"Nicholson James","year":"2017","unstructured":"James Nicholson, Lynne Coventey, and Pam Briggs. 2017. Can we fight social engineering attacks by social means? Assessing social salience as a means to improve phish detection. In 13th Symposium on Usable Privacy and Security (Santa Clara, CA, US) (SOUPS \u201817). USENIX, Berkeley, CA, US, 285\u2013298. https:\/\/www.usenix.org\/conference\/soups2017\/technical-sessions\/presentation\/nicholson"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.5120\/881-1252"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/SMC.2017.8122682"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/3290605.3300748"},{"key":"e_1_3_2_1_26_1","volume-title":"Exploring the Origins and Information Processing Differences Between Men and Women: Implications of Advertisers","author":"Putrevu Sanjay","year":"2001","unstructured":"Sanjay Putrevu. 2001. Exploring the Origins and Information Processing Differences Between Men and Women: Implications of Advertisers. Academy of Marketing Science Review 10 (2001). http:\/\/www.amsreview.org\/articles\/putrevu10-2001.pdf"},{"key":"e_1_3_2_1_27_1","volume-title":"16th Symposium on Usable Privacy and Security (Online) (SOUPS \u201820)","author":"Reinheimer M.","year":"2020","unstructured":"Benjamin\u00a0M. Reinheimer, Lukas Aldag, Peter Mayer, Mattia Mossano, Reyhan D\u00fczg\u00fcn, Bettina Lofthouse, Tatiana von Landesberger, and Melanie Volkamer. 2020. An investigation of phishing awareness and education over time: When and how to best remind users. In 16th Symposium on Usable Privacy and Security (Online) (SOUPS \u201820). USENIX, Berkeley, CA, US, 259\u2013284. https:\/\/www.usenix.org\/conference\/soups2020\/presentation\/reinheimer"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/3313831.3376298"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/mitp.2016.84"},{"key":"e_1_3_2_1_30_1","volume-title":"Comment 16. The Chromium Project. Retrieved","author":"Stark Emily","year":"2023","unstructured":"Emily Stark. 2020. Issue 1090393: Implement simplified domain display in the omnibox, Comment 16. The Chromium Project. Retrieved June 9, 2023 from https:\/\/bugs.chromium.org\/p\/chromium\/issues\/detail?id=1090393#c16"},{"key":"e_1_3_2_1_31_1","volume-title":"Comment 75. The Chromium Project. Retrieved","author":"Stark Emily","year":"2023","unstructured":"Emily Stark. 2021. Issue 1090393: Implement simplified domain display in the omnibox, Comment 75. The Chromium Project. Retrieved June 9, 2023 from https:\/\/bugs.chromium.org\/p\/chromium\/issues\/detail?id=1090393#c75"},{"key":"e_1_3_2_1_32_1","volume-title":"Change Advance settings in Safari on Mac. Apple. Retrieved","author":"Support Apple","year":"2023","unstructured":"Apple Support. 2023. Change Advance settings in Safari on Mac. Apple. Retrieved June 9, 2023 from https:\/\/support.apple.com\/guide\/safari\/advanced-ibrw1075\/16.1\/mac\/13.0"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.2307\/3001913"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-57404-8_9"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1108\/ics-07-2015-0032"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-22846-4_7"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-33630-5_12"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/3415231"},{"key":"e_1_3_2_1_40_1","volume-title":"17th Symposium on Usable Privacy and Security(SOUPS \u201921)","author":"Wash Rick","year":"2021","unstructured":"Rick Wash, Norbert Nthala, and Emilee Rader. 2021. Knowledge and Capabilities that Non-Expert UsersBring to Phishing Detection. In 17th Symposium on Usable Privacy and Security(SOUPS \u201921). USENIX, Berkeley, CA, US, 377\u2013395. https:\/\/www.usenix.org\/conference\/soups2021\/presentation\/wash"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/1124772.1124863"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/1143120.1143133"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1177\/0018720816684064"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/3055305.3055310"},{"key":"e_1_3_2_1_45_1","volume-title":"Presenting Suspicious Details in User-Facing E-mail Headers Does Not Improve Phishing Detection. In 18th Symposium on Usable Privacy and Security","author":"Zheng Sarah","year":"2022","unstructured":"Sarah Zheng and Ingolf Becker. 2022. Presenting Suspicious Details in User-Facing E-mail Headers Does Not Improve Phishing Detection. In 18th Symposium on Usable Privacy and Security (Boston, MA, US) (SOUPS \u201822). USENIX, Berkeley, CA, US. https:\/\/www.usenix.org\/conference\/soups2022\/presentation\/zheng"}],"event":{"name":"EuroUSEC 2023: The 2023 European Symposium on Usable Security","location":"Copenhagen Denmark","acronym":"EuroUSEC 2023"},"container-title":["Proceedings of the 2023 European Symposium on Usable Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3617072.3617111","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3617072.3617111","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T16:36:07Z","timestamp":1750178167000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3617072.3617111"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,10,16]]},"references-count":43,"alternative-id":["10.1145\/3617072.3617111","10.1145\/3617072"],"URL":"https:\/\/doi.org\/10.1145\/3617072.3617111","relation":{},"subject":[],"published":{"date-parts":[[2023,10,16]]},"assertion":[{"value":"2023-10-16","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}