{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T14:10:04Z","timestamp":1755871804348,"version":"3.44.0"},"publisher-location":"New York, NY, USA","reference-count":25,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,12,2]],"date-time":"2023-12-02T00:00:00Z","timestamp":1701475200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,12,2]]},"DOI":"10.1145\/3638380.3638434","type":"proceedings-article","created":{"date-parts":[[2024,5,10]],"date-time":"2024-05-10T21:40:11Z","timestamp":1715377211000},"page":"78-85","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["A Large-Scale Study of Device and Link Presentation in Email Phishing Susceptibility"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-7741-0022","authenticated-orcid":false,"given":"Sijie","family":"Zhuo","sequence":"first","affiliation":[{"name":"School of Computer Science, University of Auckland, New Zealand"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5971-2705","authenticated-orcid":false,"given":"Robert","family":"Biddle","sequence":"additional","affiliation":[{"name":"School of Computer Science, University of Auckland, New Zealand and School of Computer Science, Carleton University, Canada"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7806-7481","authenticated-orcid":false,"given":"Lucas","family":"Betts","sequence":"additional","affiliation":[{"name":"School of Computer Science, University of Auckland, New Zealand"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9192-0993","authenticated-orcid":false,"given":"Nalin","family":"Arachchilage","sequence":"additional","affiliation":[{"name":"The School of Computer Science, University of Auckland, New Zealand"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7256-4049","authenticated-orcid":false,"given":"Yun Sing","family":"Koh","sequence":"additional","affiliation":[{"name":"School of Computer Science, University of Auckland, New Zealand"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5541-4425","authenticated-orcid":false,"given":"Danielle","family":"Lottridge","sequence":"additional","affiliation":[{"name":"Computer Science, University of Auckland, New Zealand"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6987-0803","authenticated-orcid":false,"given":"Giovanni","family":"Russello","sequence":"additional","affiliation":[{"name":"School of Computer Science, University of Auckland, New Zealand"}]}],"member":"320","published-online":{"date-parts":[[2024,5,10]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/3411764.3445574"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/3373017.3373020"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2017.10.015"},{"key":"e_1_3_2_1_4_1","unstructured":"Email Blaster. [n. d.]. Desktop vs Mobile - Which is best for your email marketing campaign?= https:\/\/www.emailblasteruk.com\/blog\/desktop-vs-mobile-which-is-best\/."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/1978942.1979459"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2019.101647"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSPW54576.2021.00024"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/1124772.1124861"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/3546730"},{"key":"e_1_3_2_1_10_1","unstructured":"Adrienne\u00a0Porter Felt and David Wagner. 2011. Phishing on mobile devices. (2011)."},{"key":"e_1_3_2_1_11_1","volume-title":"Seventeenth Symposium on Usable Privacy and Security ({ SOUPS}","author":"Franz Anjuli","year":"2021","unstructured":"Anjuli Franz, Verena Zimmermann, Gregor Albrecht, Katrin Hartwig, Christian Reuter, Alexander Benlian, and Joachim Vogt. 2021. SoK: Still Plenty of Phish in the Sea\u2014A Taxonomy of User-Oriented Phishing Interventions and Avenues for Future Research. In Seventeenth Symposium on Usable Privacy and Security ({ SOUPS} 2021). 339\u2013358."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/1314389.1314391"},{"key":"e_1_3_2_1_13_1","volume-title":"Security awareness level of smartphone users: An exploratory case study. Mobile Information Systems 2019","author":"Koyuncu Murat","year":"2019","unstructured":"Murat Koyuncu and Tolga Pusatli. 2019. Security awareness level of smartphone users: An exploratory case study. Mobile Information Systems 2019 (2019)."},{"key":"e_1_3_2_1_14_1","volume-title":"Proceedings of the Eleventh Australasian Information Security Conference-Volume 138","author":"Le Van\u00a0Lam","year":"2013","unstructured":"Van\u00a0Lam Le, Ian Welch, Xiaoying Gao, and Peter Komisarczuk. 2013. Anatomy of drive-by download attack. In Proceedings of the Eleventh Australasian Information Security Conference-Volume 138. 49\u201358."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1080\/0144929X.2017.1352028"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11896-019-09334-5"},{"key":"e_1_3_2_1_17_1","volume-title":"29th USENIX Security Symposium.","author":"Oest Adam","year":"2020","unstructured":"Adam Oest, Penghui Zhang, Brad Wardman, Eric Nunes, Jakub Burgis, Ali Zand, Kurt Thomas, Adam Doup\u00e9, and Gail-Joon Ahn. 2020. Sunrise to sunset: Analyzing the end-to-end life cycle and effectiveness of phishing attacks at scale. In 29th USENIX Security Symposium."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/3290605.3300748"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1093\/cybsec\/tyaa009"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2019.07.034"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2017.02.004"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/3415231"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/3361331.3361332"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1080\/0144929X.2018.1519599"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/3575797"}],"event":{"name":"OzCHI 2023: OzCHI 2023","acronym":"OzCHI 2023","location":"Wellington New Zealand"},"container-title":["Proceedings of the 35th Australian Computer-Human Interaction Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3638380.3638434","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3638380.3638434","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T13:40:01Z","timestamp":1755870001000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3638380.3638434"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,12,2]]},"references-count":25,"alternative-id":["10.1145\/3638380.3638434","10.1145\/3638380"],"URL":"https:\/\/doi.org\/10.1145\/3638380.3638434","relation":{},"subject":[],"published":{"date-parts":[[2023,12,2]]},"assertion":[{"value":"2024-05-10","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}