{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,21]],"date-time":"2026-03-21T17:45:57Z","timestamp":1774115157944,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":17,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,6,3]],"date-time":"2024-06-03T00:00:00Z","timestamp":1717372800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"This work has been supported by the Italian Ministry of University and Research (MUR) under grant PRIN 2022 PNRR DAMOCLES: Detection And Mitigation Of Cyber attacks that exploit human vuLnerabilitiES","award":["Grant P2022FXP5B"],"award-info":[{"award-number":["Grant P2022FXP5B"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,6,3]]},"DOI":"10.1145\/3656650.3660540","type":"proceedings-article","created":{"date-parts":[[2024,5,31]],"date-time":"2024-05-31T18:27:17Z","timestamp":1717180037000},"page":"1-4","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Detection And Mitigation Of Cyber attacks that exploit human vuLnerabilitiES (DAMOCLES 2024)"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-3898-7512","authenticated-orcid":false,"given":"Bernardo","family":"Breve","sequence":"first","affiliation":[{"name":"Department of Computer Science, University of Salerno, Italy"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9894-2116","authenticated-orcid":false,"given":"Giuseppe","family":"Desolda","sequence":"additional","affiliation":[{"name":"Dipartimento di Informatica - University of Bari, Italy"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6711-3590","authenticated-orcid":false,"given":"Vincenzo","family":"Deufemia","sequence":"additional","affiliation":[{"name":"Department of Computer Science, University of Salerno, Italy"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7106-0463","authenticated-orcid":false,"given":"Lucio Davide","family":"Spano","sequence":"additional","affiliation":[{"name":"University of Cagliari, Italy"}]}],"member":"320","published-online":{"date-parts":[[2024,6,3]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1108\/K-12-2014-0283"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.3390\/bdcc5020023"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/NCG.2018.8592978"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","unstructured":"Carmelo Ardito Paolo Bottoni Maria\u00a0Francesca Costabile Giuseppe Desolda Maristella Matera Antonio Piccinno and Matteo Picozzi. 2013. Enabling end users to create annotate and share personal information spaces. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) 7897 LNCS (2013) 40 \u2013 55. https:\/\/doi.org\/10.1007\/978-3-642-38706-7_5","DOI":"10.1007\/978-3-642-38706-7_5"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-18425-8_22"},{"key":"e_1_3_2_1_6_1","volume-title":"6th International Conference on Applied Human Factors and Ergonomics. 9","author":"Berre T.","year":"2015","unstructured":"Tor\u00a0T. Berre, Vemund Eggemoen, Thomas\u00a0D. Haugrud, William\u00a0H. Le, and Martin Sandnes. 2015. Phishing awareness among students at NTNU. 6th International Conference on Applied Human Factors and Ergonomics. 9 (2015), 1117\u20131124."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/3544549.3585802"},{"key":"e_1_3_2_1_8_1","unstructured":"European Commission. 2022. Italy in the Digital Economy and Society Index. https:\/\/digital-strategy.ec.europa.eu\/en\/policies\/desi-italy. [Accessed 24-04-2024]."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-019-7230-3"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2009.09.002"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-19830-9_9"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijhcs.2023.103056"},{"key":"e_1_3_2_1_13_1","unstructured":"IBM. 2014. IBM Security Services 2014 Cyber Security Intelligence Index. https:\/\/i.crn.com\/sites\/default\/files\/ckfinderimages\/userfiles\/images\/crn\/custom\/IBMSecurityServices2014.PDF. [Accessed 24-04-2024]."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1093\/iwcomp\/iwab007"},{"key":"e_1_3_2_1_15_1","unstructured":"Pasquale Mancino. 2024. Piano triennale per l\u2019informatica nella PA tra AI e cyber security: principi ruoli monitoraggio. https:\/\/www.cybersecurity360.it\/legal\/piano-triennale-per-linformatica-nella-pa-tra-ai-e-cyber-security-principi-ruoli-monitoraggio\/. [Accessed 24-04-2024]."},{"key":"e_1_3_2_1_16_1","volume-title":"Cybercrime To Cost The World $10.5 Trillion Annually By","author":"Morgan Steve","year":"2025","unstructured":"Steve Morgan. 2015. Cybercrime To Cost The World $10.5 Trillion Annually By 2025. https:\/\/cybersecurityventures.com\/cybercrime-damage-costs-10-trillion-by-2025\/. [Accessed 24-04-2024]."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"crossref","unstructured":"Verizon. 2022. Data Breach Investigations Report. https:\/\/www.verizon.com\/business\/en-gb\/resources\/2022-data-breach-investigations-report-dbir.pdf. [Accessed 24-04-2024].","DOI":"10.12968\/S1361-3723(22)70578-7"}],"event":{"name":"AVI 2024: International Conference on Advanced Visual Interfaces 2024","location":"Arenzano, Genoa Italy","acronym":"AVI 2024"},"container-title":["Proceedings of the 2024 International Conference on Advanced Visual Interfaces"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3656650.3660540","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3656650.3660540","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,21]],"date-time":"2025-08-21T14:56:39Z","timestamp":1755788199000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3656650.3660540"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,6,3]]},"references-count":17,"alternative-id":["10.1145\/3656650.3660540","10.1145\/3656650"],"URL":"https:\/\/doi.org\/10.1145\/3656650.3660540","relation":{},"subject":[],"published":{"date-parts":[[2024,6,3]]},"assertion":[{"value":"2024-06-03","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}