{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,17]],"date-time":"2026-02-17T20:52:07Z","timestamp":1771361527175,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":80,"publisher":"ACM","license":[{"start":{"date-parts":[[2025,4,25]],"date-time":"2025-04-25T00:00:00Z","timestamp":1745539200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"Office f\u00e9d\u00e9ral de l'armement armasuisse"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2025,4,26]]},"DOI":"10.1145\/3706598.3713845","type":"proceedings-article","created":{"date-parts":[[2025,4,24]],"date-time":"2025-04-24T03:24:33Z","timestamp":1745465073000},"page":"1-25","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["It's a Match - Enhancing the Fit between Users and Phishing Training through Personalisation"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-9483-617X","authenticated-orcid":false,"given":"Lorin","family":"Sch\u00f6ni","sequence":"first","affiliation":[{"name":"Security, Privacy &amp; Society, ETH Zurich, Zurich, Switzerland"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0009-0009-2422-6649","authenticated-orcid":false,"given":"Neele","family":"Roch","sequence":"additional","affiliation":[{"name":"Security, Privacy &amp; Society, ETH Zurich, Zurich, Switzerland"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0009-0005-9786-5370","authenticated-orcid":false,"given":"Hannah","family":"Sievers","sequence":"additional","affiliation":[{"name":"Security, Privacy &amp; Society, ETH Zurich, Zurich, Switzerland"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1936-0933","authenticated-orcid":false,"given":"Martin","family":"Strohmeier","sequence":"additional","affiliation":[{"name":"armasuisse, Thun, Switzerland"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6267-4874","authenticated-orcid":false,"given":"Peter","family":"Mayer","sequence":"additional","affiliation":[{"name":"Department of Mathematics and Computer Science, University of Southern Denmark, Odense, Denmark and Institute of Applied Informatics and Formal Description Methods, Karlsruhe Institute of Technology, Karlsruhe, Germany"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6873-8146","authenticated-orcid":false,"given":"Verena","family":"Zimmermann","sequence":"additional","affiliation":[{"name":"Department of Humanities, Social and Political Sciences, ETH Z\u00fcrich, Z\u00fcrich, Switzerland"}],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"320","published-online":{"date-parts":[[2025,4,25]]},"reference":[{"key":"e_1_3_3_3_2_2","doi-asserted-by":"publisher","unstructured":"Hussain Aldawood and Geoffrey Skinner. 2019. Reviewing Cyber Security Social Engineering Training and Awareness Programs\u2014Pitfalls and Ongoing Issues. Future Internet 11 3 (March 2019) 73. 10.3390\/fi11030073","DOI":"10.3390\/fi11030073"},{"key":"e_1_3_3_3_3_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-38530-8_12"},{"key":"e_1_3_3_3_4_2","unstructured":"APA. 2017. Ethical principles of psychologists and code of conduct. https:\/\/www.apa.org\/ethics\/code"},{"key":"e_1_3_3_3_5_2","unstructured":"APWG. 2023. Phishing Activity Trends Report 1st Quarter 2023. https:\/\/docs.apwg.org\/reports\/apwg_trends_report_q1_2023.pdf"},{"key":"e_1_3_3_3_6_2","first-page":"1","volume-title":"Designing Interactive Secure Systems: Workshop at British HCI 2012, University of Birmingham, 11th September 2012","author":"Bartsch Steffen","year":"2012","unstructured":"Steffen Bartsch and Melanie Volkamer. 2012. Towards the Systematic Development of Contextualized Security Interventions. In Designing Interactive Secure Systems: Workshop at British HCI 2012, University of Birmingham, 11th September 2012. University of Birmingham, Birmingham, UK, 1\u20134."},{"key":"e_1_3_3_3_7_2","doi-asserted-by":"publisher","unstructured":"Douglas Bates Martin M\u00e4chler Ben Bolker and Steve Walker. 2015. Fitting Linear Mixed-Effects Models Using lme4. Journal of Statistical Software 67 1 (2015) 1\u201348. 10.18637\/jss.v067.i01","DOI":"10.18637\/jss.v067.i01"},{"key":"e_1_3_3_3_8_2","doi-asserted-by":"publisher","unstructured":"Benjamin\u00a0M. Berens Mattia Mossano and Melanie Volkamer. 2024. Taking 5 minutes protects you for 5 months: Evaluating an anti-phishing awareness video. Computers & Security 137 (Feb. 2024) 103620. 10.1016\/j.cose.2023.103620","DOI":"10.1016\/j.cose.2023.103620"},{"key":"e_1_3_3_3_9_2","doi-asserted-by":"publisher","DOI":"10.1145\/3613904.3642843"},{"key":"e_1_3_3_3_10_2","doi-asserted-by":"crossref","unstructured":"Matthew\u00a0L Bernacki Meghan\u00a0J Greene and Nikki\u00a0G Lobczowski. 2021. A systematic review of research on personalized learning: Personalized by whom to what how and for what purpose (s)? Educational Psychology Review 33 4 (2021) 1675\u20131715.","DOI":"10.1007\/s10648-021-09615-8"},{"key":"e_1_3_3_3_11_2","unstructured":"Marcus Beyer Sarah Ahmed Katja Doerlemann Simon Arnell Simon Parkin Angela Sasse and Neil Passingham. 2016. Awareness is only the first step: A framework for progressive engagement of staff in cyber security."},{"key":"e_1_3_3_3_12_2","doi-asserted-by":"publisher","unstructured":"Aditi Bhutoria. 2022. Personalized education and Artificial Intelligence in the United States China and India: systematicreview using a Human-In-The-Loop model. Computers and Education: Artificial Intelligence 3 (Jan. 2022) 100068. 10.1016\/j.caeai.2022.100068","DOI":"10.1016\/j.caeai.2022.100068"},{"key":"e_1_3_3_3_13_2","doi-asserted-by":"publisher","unstructured":"Marcus Butavicius Kathryn Parsons Malcolm Pattinson and Agata McCormac. 2016. Breaching the Human Firewall: Social engineering in Phishing and Spear-Phishing Emails. 10.48550\/arXiv.1606.00887","DOI":"10.48550\/arXiv.1606.00887"},{"key":"e_1_3_3_3_14_2","doi-asserted-by":"publisher","unstructured":"Deanna\u00a0D. Caputo Shari\u00a0Lawrence Pfleeger Jesse\u00a0D. Freeman and M.\u00a0Eric Johnson. 2014. Going Spear Phishing: Exploring Embedded Training and Awareness. IEEE Security & Privacy 12 1 (Jan. 2014) 28\u201338. 10.1109\/MSP.2013.106","DOI":"10.1109\/MSP.2013.106"},{"key":"e_1_3_3_3_15_2","doi-asserted-by":"publisher","unstructured":"Sherry\u00a0Y. Chen and Jen-Han Wang. 2021. Individual differences and personalized learning: a review and appraisal. Universal Access in the Information Society 20 4 (Nov. 2021) 833\u2013849. 10.1007\/s10209-020-00753-4","DOI":"10.1007\/s10209-020-00753-4"},{"key":"e_1_3_3_3_16_2","doi-asserted-by":"publisher","unstructured":"Nabin Chowdhury and Vasileios Gkioulos. 2021. Cyber security training for critical infrastructure protection: A literature review. Computer Science Review 40 (May 2021) 100361. 10.1016\/j.cosrev.2021.100361","DOI":"10.1016\/j.cosrev.2021.100361"},{"key":"e_1_3_3_3_17_2","doi-asserted-by":"publisher","unstructured":"Clayton\u00a0R. Cook Stephen\u00a0P. Kilgus and Matthew\u00a0K. Burns. 2018. Advancing the science and practice of precision education to enhance student outcomes. Journal of School Psychology 66 (Feb. 2018) 4\u201310. 10.1016\/j.jsp.2017.11.004","DOI":"10.1016\/j.jsp.2017.11.004"},{"key":"e_1_3_3_3_18_2","doi-asserted-by":"publisher","DOI":"10.1109\/FIE.2018.8659291"},{"key":"e_1_3_3_3_19_2","doi-asserted-by":"publisher","DOI":"10.1145\/1357054.1357219"},{"key":"e_1_3_3_3_20_2","doi-asserted-by":"publisher","unstructured":"Cori Faklaris Laura Dabbish and Jason\u00a0I. Hong. 2022. Do They Accept or Resist Cybersecurity Measures? Development and Validation of the 13-Item Security Attitude Inventory (SA-13). 10.48550\/arXiv.2204.03114","DOI":"10.48550\/arXiv.2204.03114"},{"key":"e_1_3_3_3_21_2","doi-asserted-by":"publisher","unstructured":"Rida\u00a0Indah Fariani Kasiyah Junus and Harry\u00a0Budi Santoso. 2023. A Systematic Literature Review on Personalised Learning in the Higher Education Context. Technology Knowledge and Learning 28 2 (June 2023) 449\u2013476. 10.1007\/s10758-022-09628-4","DOI":"10.1007\/s10758-022-09628-4"},{"key":"e_1_3_3_3_22_2","doi-asserted-by":"publisher","unstructured":"Waldo\u00a0Rocha Flores Hannes Holm Marcus Nohlberg and Mathias Ekstedt. 2015. Investigating personal determinants of phishing and the effect of national culture. Information & Computer Security 23 2 (June 2015) 178\u2013199. 10.1108\/ICS-05-2014-0029","DOI":"10.1108\/ICS-05-2014-0029"},{"key":"e_1_3_3_3_23_2","first-page":"358","volume-title":"17th Symposium on Usable Privacy and Security (SOUPS 2021), Online, August 8-10, 2021","author":"Franz Anjuli","year":"2021","unstructured":"Anjuli Franz, Verena Zimmermann, Gregor Albrecht, Katrin Hartwig, Christian Reuter, Alexander Benlian, and Joachim Vogt. 2021. SoK: Still Plenty of Phish in the Sea - A Taxonomy of User-Oriented Phishing Interventions and Avenues for Future Research. In 17th Symposium on Usable Privacy and Security (SOUPS 2021), Online, August 8-10, 2021. USENIX Association, Berkeley, CA, USA, 358. https:\/\/www.usenix.org\/conference\/soups2021\/presentation\/franz"},{"key":"e_1_3_3_3_24_2","doi-asserted-by":"publisher","unstructured":"Edwin\u00a0Donald Frauenstein and Stephen Flowerday. 2020. Susceptibility to phishing on social network sites: A personality information processing model. Computers & Security 94 (2020) 101862. 10.1016\/j.cose.2020.101862","DOI":"10.1016\/j.cose.2020.101862"},{"key":"e_1_3_3_3_25_2","doi-asserted-by":"publisher","DOI":"10.1145\/3544549.3585823"},{"key":"e_1_3_3_3_26_2","doi-asserted-by":"publisher","unstructured":"Wu He and Zuopeng\u00a0(Justin) Zhang. 2019. Enterprise cybersecurity training and awareness programs: Recommendations for success. Journal of Organizational Computing and Electronic Commerce 29 4 (Oct. 2019) 249\u2013257. 10.1080\/10919392.2019.1611528","DOI":"10.1080\/10919392.2019.1611528"},{"key":"e_1_3_3_3_27_2","doi-asserted-by":"publisher","DOI":"10.1145\/3498891.3498902"},{"key":"e_1_3_3_3_28_2","unstructured":"Shiu-Li Huang and Jung-Hung Shiu. 2012. A user-centric adaptive learning system for e-learning 2.0. Journal of Educational Technology & Society 15 3 (2012) 214\u2013225."},{"key":"e_1_3_3_3_29_2","doi-asserted-by":"publisher","DOI":"10.1145\/3544548.3581219"},{"key":"e_1_3_3_3_30_2","doi-asserted-by":"publisher","unstructured":"Daniel Jampen G\u00fcrkan G\u00fcr Thomas Sutter and Bernhard Tellenbach. 2020. Don\u2019t click: towards an effective anti-phishing training. A comparative literature review. Human-centric Computing and Information Sciences 10 1 (Aug. 2020) 33. 10.1186\/s13673-020-00237-7","DOI":"10.1186\/s13673-020-00237-7"},{"key":"e_1_3_3_3_31_2","doi-asserted-by":"publisher","DOI":"10.1145\/3613905.3651076"},{"key":"e_1_3_3_3_32_2","doi-asserted-by":"publisher","unstructured":"Aleksandra Kla\u0161nja-Mili\u0107evi\u0107 Boban Vesin Mirjana Ivanovi\u0107 and Zoran Budimac. 2011. E-Learning personalization based on hybrid recommendation strategy and learning style identification. Computers & Education 56 3 (April 2011) 885\u2013899. 10.1016\/j.compedu.2010.11.001","DOI":"10.1016\/j.compedu.2010.11.001"},{"key":"e_1_3_3_3_33_2","doi-asserted-by":"publisher","DOI":"10.1145\/1572532.1572536"},{"key":"e_1_3_3_3_34_2","doi-asserted-by":"publisher","unstructured":"Ponnurangam Kumaraguru Steve Sheng Alessandro Acquisti Lorrie\u00a0Faith Cranor and Jason Hong. 2010. Teaching Johnny not to fall for phish. ACM Transactions on Internet Technology 10 2 (2010) 1\u201331. 10.1145\/1754393.1754396","DOI":"10.1145\/1754393.1754396"},{"key":"e_1_3_3_3_35_2","doi-asserted-by":"publisher","unstructured":"Daniele Lain Tarek Jost Sinisa Matetic Kari Kostiainen and Srdjan Capkun. 2024. Content Nudges and Incentives: A Study on the Effectiveness and Perception of Embedded Phishing Training. 10.1145\/3658644.3690348","DOI":"10.1145\/3658644.3690348"},{"key":"e_1_3_3_3_36_2","doi-asserted-by":"publisher","DOI":"10.1109\/sp46214.2022.9833766"},{"key":"e_1_3_3_3_37_2","volume-title":"emmeans: Estimated Marginal Means, aka Least-Squares Means","author":"Lenth Russell\u00a0V.","year":"2024","unstructured":"Russell\u00a0V. Lenth. 2024. emmeans: Estimated Marginal Means, aka Least-Squares Means. R Package. https:\/\/CRAN.R-project.org\/package=emmeans"},{"key":"e_1_3_3_3_38_2","doi-asserted-by":"publisher","unstructured":"Daniel Leyzberg Aditi Ramachandran and Brian Scassellati. 2018. The Effect of Personalization in Longer-Term Robot Tutoring. J. Hum.-Robot Interact. 7 3 (Dec. 2018) 19:1\u201319:19. 10.1145\/3283453","DOI":"10.1145\/3283453"},{"key":"e_1_3_3_3_39_2","doi-asserted-by":"publisher","DOI":"10.1109\/COMPSAC51774.2021.00192"},{"key":"e_1_3_3_3_40_2","doi-asserted-by":"publisher","DOI":"10.5281\/zenodo.4556925"},{"key":"e_1_3_3_3_41_2","doi-asserted-by":"publisher","unstructured":"Louis Major Gill\u00a0A. Francis and Maria Tsapali. 2021. The effectiveness of technology-supported personalised learning in low- and middle-income countries: A meta-analysis. British Journal of Educational Technology 52 5 (2021) 1935\u20131964. 10.1111\/bjet.13116","DOI":"10.1111\/bjet.13116"},{"key":"e_1_3_3_3_42_2","doi-asserted-by":"publisher","DOI":"10.1145\/2858036.2858085"},{"key":"e_1_3_3_3_43_2","doi-asserted-by":"publisher","unstructured":"Alexis\u00a0R. Neigel Victoria\u00a0L. Claypoole Grace\u00a0E. Waldfogle Subrata Acharya and Gabriella\u00a0M. Hancock. 2020. Holistic cyber hygiene education: Accounting for the human factors. Computers & Security 92 (May 2020) 101731. 10.1016\/j.cose.2020.101731","DOI":"10.1016\/j.cose.2020.101731"},{"key":"e_1_3_3_3_44_2","doi-asserted-by":"publisher","unstructured":"Kathryn Parsons Dragana Calic Malcolm Pattinson Marcus Butavicius Agata McCormac and Tara Zwaans. 2017. The Human Aspects of Information Security Questionnaire (HAIS-Q): Two further validation studies. Computers & Security 66 (May 2017) 40\u201351. 10.1016\/j.cose.2017.01.004","DOI":"10.1016\/j.cose.2017.01.004"},{"key":"e_1_3_3_3_45_2","doi-asserted-by":"publisher","DOI":"10.1145\/3397482.3450721"},{"key":"e_1_3_3_3_46_2","doi-asserted-by":"crossref","unstructured":"Muh\u00a0Putra Pratama Rigel Sampelolo and Hans Lura. 2023. Revolutionizing education: harnessing the power of artificial intelligence for personalized learning. Klasikal: Journal of education language teaching and science 5 2 (2023) 350\u2013357.","DOI":"10.52208\/klasikal.v5i2.877"},{"key":"e_1_3_3_3_47_2","volume-title":"R: A Language and Environment for Statistical Computing","author":"Team R Core","year":"2023","unstructured":"R Core Team. 2023. R: A Language and Environment for Statistical Computing. R Foundation for Statistical Computing, Vienna, Austria. https:\/\/www.R-project.org\/"},{"key":"e_1_3_3_3_48_2","doi-asserted-by":"publisher","unstructured":"Beatrice Rammstedt Christoph\u00a0J. Kemper Mira\u00a0C\u00e9line Klein Constanze Beierlein and Anastassiya Kovaleva. 2013. A Short Scale for Assessing the Big Five Dimensions of Personality: 10 Item Big Five Inventory (BFI-10). methods data analyses 7 2 (2013) 17. 10.12758\/mda.2013.013Number: 2.","DOI":"10.12758\/mda.2013.013"},{"key":"e_1_3_3_3_49_2","first-page":"259","volume-title":"Sixteenth Symposium on Usable Privacy and Security (SOUPS 2020)","author":"Reinheimer Benjamin","year":"2020","unstructured":"Benjamin Reinheimer, Lukas Aldag, Peter Mayer, Mattia Mossano, Reyhan Duezguen, Bettina Lofthouse, Tatiana\u00a0von Landesberger, and Melanie Volkamer. 2020. An investigation of phishing awareness and education over time: When and how to best remind users. In Sixteenth Symposium on Usable Privacy and Security (SOUPS 2020). Usenix, Berkeley, CA, USA, 259\u2013284. https:\/\/www.usenix.org\/conference\/soups2020\/presentation\/reinheimer"},{"key":"e_1_3_3_3_50_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-08506-7_13"},{"key":"e_1_3_3_3_51_2","doi-asserted-by":"publisher","DOI":"10.5220\/0011042100003182"},{"key":"e_1_3_3_3_52_2","doi-asserted-by":"publisher","unstructured":"Orvila Sarker Asangi Jayatilaka Sherif Haggag Chelsea Liu and M.\u00a0Ali Babar. 2024. A Multi-vocal Literature Review on challenges and critical success factors of phishing education training and awareness. Journal of Systems and Software 208 (2024) 111899. 10.1016\/j.jss.2023.111899","DOI":"10.1016\/j.jss.2023.111899"},{"key":"e_1_3_3_3_53_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-25460-4_14"},{"key":"e_1_3_3_3_54_2","doi-asserted-by":"publisher","unstructured":"M.\u00a0A. Sasse J. Hielscher J. Friedauer and A. Buckmann. 2023. Rebooting IT Security Awareness \u2013 How Organisations Can Encourage and Sustain Secure Behaviours. 10.1007\/978-3-031-25460-4_14 Conference Name: European Symposium on Research in Computer Security ISSN: 0302-9743 Meeting Name: European Symposium on Research in Computer Security Pages: 248-265 Publisher: Springer Cham Volume: 13785.","DOI":"10.1007\/978-3-031-25460-4_14"},{"key":"e_1_3_3_3_55_2","doi-asserted-by":"publisher","DOI":"10.1145\/3688459.3688460"},{"key":"e_1_3_3_3_56_2","doi-asserted-by":"publisher","DOI":"10.1109\/FIE49875.2021.9637252"},{"key":"e_1_3_3_3_57_2","doi-asserted-by":"publisher","DOI":"10.1145\/1753326.1753383"},{"key":"e_1_3_3_3_58_2","doi-asserted-by":"crossref","unstructured":"Ansar Siddique Qaiser\u00a0S Durrani and Husnain\u00a0A Naqvi. 2019. Developing adaptive e-learning environment using cognitive and noncognitive parameters. Journal of Educational Computing Research 57 4 (2019) 811\u2013845.","DOI":"10.1177\/0735633118769433"},{"key":"e_1_3_3_3_59_2","doi-asserted-by":"publisher","unstructured":"Mario Silic and Andrea Back. 2016. The dark side of social networking sites: Understanding phishing risks. Computers in Human Behavior 60 (July 2016) 35\u201343. 10.1016\/j.chb.2016.02.050","DOI":"10.1016\/j.chb.2016.02.050"},{"key":"e_1_3_3_3_60_2","doi-asserted-by":"publisher","DOI":"10.1145\/3419394.3423617"},{"key":"e_1_3_3_3_61_2","doi-asserted-by":"publisher","DOI":"10.1109\/eCrime47957.2019.9037502"},{"key":"e_1_3_3_3_62_2","volume-title":"National Initiative for Cybersecurity Education (NICE) Framework Work Role Capability Indicators: Indicators for Performing Work Roles","author":"Stein Daniel","year":"2017","unstructured":"Daniel Stein, Benjamin Scribner, Noel Kyle, William Newhouse, Clarence Williams, and Baris Yakin. 2017. National Initiative for Cybersecurity Education (NICE) Framework Work Role Capability Indicators: Indicators for Performing Work Roles. Technical Report NIST Internal or Interagency Report (NISTIR) 8193 (Draft). National Institute of Standards and Technology. https:\/\/csrc.nist.gov\/pubs\/ir\/8193\/ipd"},{"key":"e_1_3_3_3_63_2","doi-asserted-by":"publisher","unstructured":"Klaus\u00a0D. Stiller and Rosemarie Jedlicka. 2010. A kind of expertise reversal effect: Personalisation effect can depend on domain-specific prior knowledge. Australasian Journal of Educational Technology 26 1 (March 2010) 133\u2013149. 10.14742\/ajet.1107Number: 1.","DOI":"10.14742\/ajet.1107"},{"key":"e_1_3_3_3_64_2","doi-asserted-by":"publisher","unstructured":"Soni Sweta and Kanhaiya Lal. 2017. Personalized Adaptive Learner Model in E-Learning System Using FCM and Fuzzy Inference System. International Journal of Fuzzy Systems 19 4 (Aug. 2017) 1249\u20131260. 10.1007\/s40815-017-0309-y","DOI":"10.1007\/s40815-017-0309-y"},{"key":"e_1_3_3_3_65_2","doi-asserted-by":"crossref","unstructured":"Olga Tapalova and Nadezhda Zhiyenbayeva. 2022. Artificial intelligence in education: AIEd for personalised learning pathways. Electronic Journal of e-Learning 20 5 (2022) 639\u2013653.","DOI":"10.34190\/ejel.20.5.2597"},{"key":"e_1_3_3_3_66_2","doi-asserted-by":"publisher","DOI":"10.1145\/2600176.2600178"},{"key":"e_1_3_3_3_67_2","doi-asserted-by":"crossref","unstructured":"Rani Van\u00a0Schoors Jan Elen Annelies Raes and Fien Depaepe. 2021. An overview of 25 years of research on digital personalised learning in primary and secondary education: A systematic review of conceptual and methodological trends. British Journal of Educational Technology 52 5 (2021) 1798\u20131822.","DOI":"10.1111\/bjet.13148"},{"key":"e_1_3_3_3_68_2","doi-asserted-by":"publisher","DOI":"10.5220\/0006646203980403"},{"key":"e_1_3_3_3_69_2","doi-asserted-by":"publisher","DOI":"10.1145\/3290605.3300548"},{"key":"e_1_3_3_3_70_2","doi-asserted-by":"publisher","unstructured":"Arun Vishwanath. 2016. Mobile device affordance: Explicating how smartphones influence the outcome of phishing attacks. Computers in Human Behavior 63 (2016) 198\u2013207. 10.1016\/j.chb.2016.05.035","DOI":"10.1016\/j.chb.2016.05.035"},{"key":"e_1_3_3_3_71_2","doi-asserted-by":"publisher","unstructured":"Arun Vishwanath Brynne Harrison and Yu\u00a0Jie Ng. 2018. Suspicion Cognition and Automaticity Model of Phishing Susceptibility. Communication Research 45 8 (2018) 1146\u20131166. 10.1177\/0093650215627483","DOI":"10.1177\/0093650215627483"},{"key":"e_1_3_3_3_72_2","doi-asserted-by":"publisher","unstructured":"Arun Vishwanath Tejaswini Herath Rui Chen Jingguo Wang and H.\u00a0Raghav Rao. 2011. Why do people get phished? Testing individual differences in phishing vulnerability within an integrated information processing model. Decision Support Systems 51 3 (2011) 576\u2013586. 10.1016\/j.dss.2011.03.002","DOI":"10.1016\/j.dss.2011.03.002"},{"key":"e_1_3_3_3_73_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-98385-1_9"},{"key":"e_1_3_3_3_74_2","doi-asserted-by":"publisher","unstructured":"Rick Wash. 2020. How Experts Detect Phishing Scam Emails. Proceedings of the ACM on Human-Computer Interaction 4 (2020) 160:1\u2013160:28. Issue CSCW2. 10.1145\/3415231","DOI":"10.1145\/3415231"},{"key":"e_1_3_3_3_75_2","doi-asserted-by":"publisher","DOI":"10.1145\/3290605.3300338"},{"key":"e_1_3_3_3_76_2","unstructured":"Eva Wolfangel. 2023. The Human Element in Cybercrime and Cybersecurity. https:\/\/www.youtube.com\/watch?v=LKUMRTLV49g"},{"key":"e_1_3_3_3_77_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-10597-6_1"},{"key":"e_1_3_3_3_78_2","doi-asserted-by":"publisher","DOI":"10.1145\/2858036.2858388"},{"key":"e_1_3_3_3_79_2","doi-asserted-by":"publisher","unstructured":"Fatemeh\u00a0Mariam Zahedi Yan Chen and Huimin Zhao. 2023. Ontology-Based Intelligent Interface Personalization for Protection Against Phishing Attacks. Information Systems Research 35 3 (Oct. 2023) 1463\u20131478. 10.1287\/isre.2021.0065","DOI":"10.1287\/isre.2021.0065"},{"key":"e_1_3_3_3_80_2","doi-asserted-by":"publisher","unstructured":"Markus Zanker Laurens Rook and Dietmar Jannach. 2019. Measuring the impact of online personalisation: Past present and future. International Journal of Human-Computer Studies 131 (Nov. 2019) 160\u2013168. 10.1016\/j.ijhcs.2019.06.006","DOI":"10.1016\/j.ijhcs.2019.06.006"},{"key":"e_1_3_3_3_81_2","doi-asserted-by":"publisher","unstructured":"Verena Zimmermann and Karen Renaud. 2019. Moving from a \u2018human-as-problem\u201d to a \u2018human-as-solution\u201d cybersecurity mindset. International Journal of Human-Computer Studies 131 (Nov. 2019) 169\u2013187. 10.1016\/j.ijhcs.2019.05.005","DOI":"10.1016\/j.ijhcs.2019.05.005"}],"event":{"name":"CHI 2025: CHI Conference on Human Factors in Computing Systems","location":"Yokohama Japan","acronym":"CHI '25","sponsor":["SIGCHI ACM Special Interest Group on Computer-Human Interaction"]},"container-title":["Proceedings of the 2025 CHI Conference on Human Factors in Computing Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3706598.3713845","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3706598.3713845","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,4]],"date-time":"2025-07-04T05:10:33Z","timestamp":1751605833000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3706598.3713845"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,4,25]]},"references-count":80,"alternative-id":["10.1145\/3706598.3713845","10.1145\/3706598"],"URL":"https:\/\/doi.org\/10.1145\/3706598.3713845","relation":{},"subject":[],"published":{"date-parts":[[2025,4,25]]},"assertion":[{"value":"2025-04-25","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}