{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,15]],"date-time":"2026-03-15T02:49:06Z","timestamp":1773542946836,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":30,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,11,13]],"date-time":"2024-11-13T00:00:00Z","timestamp":1731456000000},"content-version":"vor","delay-in-days":2,"URL":"http:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"US Department of Defense","award":["W52P1J2093009"],"award-info":[{"award-number":["W52P1J2093009"]}]},{"DOI":"10.13039\/501100006374","name":"U.S. Department of Homeland Security","doi-asserted-by":"publisher","award":["17STQAC00001-07-00"],"award-info":[{"award-number":["17STQAC00001-07-00"]}],"id":[{"id":"10.13039\/501100006374","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100006374","name":"National Science Foundation","doi-asserted-by":"publisher","award":["CNS 1565375"],"award-info":[{"award-number":["CNS 1565375"]}],"id":[{"id":"10.13039\/501100006374","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,11,11]]},"DOI":"10.1145\/3678884.3681864","type":"proceedings-article","created":{"date-parts":[[2024,11,13]],"date-time":"2024-11-13T18:38:08Z","timestamp":1731523088000},"page":"283-287","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["User-Centered Phishing Detection through Personalized Edge Computing"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-1299-7867","authenticated-orcid":false,"given":"Sanchari","family":"Das","sequence":"first","affiliation":[{"name":"Ritchie School of Engineering and Computer Science, University of Denver, Denver, Colorado, USA"}]},{"ORCID":"https:\/\/orcid.org\/0009-0005-2571-0492","authenticated-orcid":false,"given":"DongInn","family":"Kim","sequence":"additional","affiliation":[{"name":"Luddy School of Informatics, Computing, and Engineering, Indiana University Bloomington, Bloomington, Indiana, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7173-6643","authenticated-orcid":false,"given":"Jacob","family":"Abbott","sequence":"additional","affiliation":[{"name":"Luddy School of Informatics, Computing, and Engineering, Indiana University Bloomington, Bloomington, Indiana, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8731-7884","authenticated-orcid":false,"given":"L. Jean","family":"Camp","sequence":"additional","affiliation":[{"name":"Luddy School of Informatics, Computing, and Engineering, Indiana University Bloomington, Bloomington, Indiana, USA"}]}],"member":"320","published-online":{"date-parts":[[2024,11,13]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Anti-Phishing Working Group Inc. 2023. APWG | Unifying The Global Response To Cybercrime. https:\/\/apwg.org Accessed: 2023--11--22."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/2435349.2435362"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/PerComW.2013.6529497"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/MILCOM.2016.7795416"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/1180405.1180442"},{"key":"e_1_3_2_1_6_1","volume-title":"A risk-reduction-based incentivization model for humancentered multi-factor authentication","author":"Das Sanchari","unstructured":"Sanchari Das. 2020. A risk-reduction-based incentivization model for humancentered multi-factor authentication. Indiana University, Bloomington, Indiana."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-54455-3_2"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-64331-0_21"},{"key":"e_1_3_2_1_9_1","volume-title":"Proceedings of the Thirteenth International Symposium on Human Aspects of Information Security & Assurance (HAISA","author":"Das Sanchari","year":"2019","unstructured":"Sanchari Das, Andrew Kim, Zachary Tingle, and Christena Nippert-Eng. 2019. All About Phishing Exploring User Research through a Systematic Literature Review. In Proceedings of the Thirteenth International Symposium on Human Aspects of Information Security & Assurance (HAISA 2019). Springer, Nicosia, Cyprus, 1-- 10."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1108\/ICS-12-2020-0204"},{"key":"e_1_3_2_1_11_1","unstructured":"Sanchari Das Bingxing Wang Andrew Kim and L Jean Camp. 2020. MFA is A Necessary Chore!: Exploring User Mental Models of Multi-Factor Authentication Technologies.. In HICSS. AIS eLibrary Virtual 1--10."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"crossref","unstructured":"C. Evans C. Palmer and R. Sleevi. 2015. Public Key Pinning Extension for HTTP. RFC 7469. Internet Engineering Task Force.","DOI":"10.17487\/RFC7469"},{"key":"e_1_3_2_1_13_1","volume-title":"Proceedings of the 2nd Conference on Symposium on Networked Systems Design & Implementation -","volume":"2","author":"Feamster Nick","year":"2005","unstructured":"Nick Feamster and Hari Balakrishnan. 2005. Detecting BGP Configuration Faults with Static Analysis. In Proceedings of the 2nd Conference on Symposium on Networked Systems Design & Implementation - Volume 2 (NSDI'05). USENIX Association, USA, 43--56."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-31680-7_15"},{"key":"e_1_3_2_1_15_1","volume-title":"Proceedings of the Workshop on Usable Security and Privacy (USEC). Network and Distributed System Security (NDSS), Virtual, 1--11","author":"Gopavaram Shakthidhar","year":"2021","unstructured":"Shakthidhar Gopavaram, Jayati Dev, Marthie Grobler, DongInn Kim, Sanchari Das, and L Jean Camp. 2021. Cross-national study on phishing resilience. In Proceedings of the Workshop on Usable Security and Privacy (USEC). Network and Distributed System Security (NDSS), Virtual, 1--11."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-94-007-6738-6_69"},{"key":"e_1_3_2_1_17_1","volume-title":"Statistical models for predicting threat detection from human behavior. Frontiers in psychology 9","author":"Kelley Timothy","year":"2018","unstructured":"Timothy Kelley, Mary J Amon, and Bennett I Bertenthal. 2018. Statistical models for predicting threat detection from human behavior. Frontiers in psychology 9 (2018), 466."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"crossref","unstructured":"B. Laurie A. Langley and E. Kasper. 2013. Certificate Transparency. RFC 6962. IETF.","DOI":"10.17487\/rfc6962"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/CCNC.2018.8319297"},{"key":"e_1_3_2_1_20_1","volume-title":"Proceedings of the Human Factors and Ergonomics Society Annual Meeting","volume":"66","author":"Noah Naheem","year":"2022","unstructured":"Naheem Noah, Abebe Tayachew, Stuart Ryan, and Sanchari Das. 2022. Phisher- Cop: Developing an NLP-Based Automated Tool for Phishing Detection. In Proceedings of the Human Factors and Ergonomics Society Annual Meeting, Vol. 66. SAGE Publications Sage CA: Los Angeles, CA, IEEE, San Francisco, CA, & Online, 2093--2097."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1108\/ICS-04--2017-0020"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/2479957.2479959"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/3579547"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/3544548.3580650"},{"key":"e_1_3_2_1_25_1","unstructured":"The Spamhaus Project SLU. 2023. The Spamhaus Project. https:\/\/www. spamhaus.org Accessed: 2023--11--22."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1287\/isre.1090.0260"},{"key":"e_1_3_2_1_27_1","first-page":"5","article-title":"Privacy-aware architecture for sharing web histories","volume":"3","author":"Tsow Alex","year":"2007","unstructured":"Alex Tsow, Camilo Viecco, and L Jean Camp. 2007. Privacy-aware architecture for sharing web histories. IBM Systems Journal 3 (2007), 5--13.","journal-title":"IBM Systems Journal"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-57404-8_9"},{"key":"e_1_3_2_1_29_1","unstructured":"MDN Webdocs. 2024. HTTP Public Key Pinning (HPKP). https:\/\/developer.mozilla.org\/en-US\/docs\/Web\/HTTP\/Public_Key_Pinning."},{"key":"e_1_3_2_1_30_1","unstructured":"Leah Zhang-Kennedy and Sonia Chiasson. 2014. Using Comics to Teach Users About Mobile Online Privacy. Technical Report. Technical Report TR-14-02 School of Computer Science Carleton University Ottawa Canada."}],"event":{"name":"CSCW '24: The 27th ACM Conference on Computer-Supported Cooperative Work and Social Computing","location":"San Jose Costa Rica","acronym":"CSCW '24","sponsor":["SIGCHI ACM Special Interest Group on Computer-Human Interaction"]},"container-title":["Companion Publication of the 2024 Conference on Computer-Supported Cooperative Work and Social Computing"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3678884.3681864","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3678884.3681864","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3678884.3681864","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,15]],"date-time":"2026-03-15T01:57:43Z","timestamp":1773539863000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3678884.3681864"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,11,11]]},"references-count":30,"alternative-id":["10.1145\/3678884.3681864","10.1145\/3678884"],"URL":"https:\/\/doi.org\/10.1145\/3678884.3681864","relation":{},"subject":[],"published":{"date-parts":[[2024,11,11]]},"assertion":[{"value":"2024-11-13","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}