{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,13]],"date-time":"2026-04-13T20:58:42Z","timestamp":1776113922882,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":105,"publisher":"ACM","license":[{"start":{"date-parts":[[2025,4,25]],"date-time":"2025-04-25T00:00:00Z","timestamp":1745539200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"Office f\u00e9d\u00e9ral de l'armement armasuisse"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2025,4,26]]},"DOI":"10.1145\/3706598.3714023","type":"proceedings-article","created":{"date-parts":[[2025,4,24]],"date-time":"2025-04-24T03:30:09Z","timestamp":1745465409000},"page":"1-23","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Stop the Clock - Counteracting Bias Exploited by Attackers through an Interactive Augmented Reality Phishing Training"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-9483-617X","authenticated-orcid":false,"given":"Lorin","family":"Sch\u00f6ni","sequence":"first","affiliation":[{"name":"Security, Privacy &amp; Society, ETH Zurich, Zurich, Switzerland"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1936-0933","authenticated-orcid":false,"given":"Martin","family":"Strohmeier","sequence":"additional","affiliation":[{"name":"Cyber-Defence Campus, armasuisse, Thun, Switzerland"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2483-7932","authenticated-orcid":false,"given":"Ivo","family":"Sluganovic","sequence":"additional","affiliation":[{"name":"PhishAR, Oxford, United Kingdom"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6873-8146","authenticated-orcid":false,"given":"Verena","family":"Zimmermann","sequence":"additional","affiliation":[{"name":"Department of Humanities, Social and Political Sciences, ETH Z\u00fcrich, Z\u00fcrich, Switzerland"}],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"320","published-online":{"date-parts":[[2025,4,25]]},"reference":[{"key":"e_1_3_3_3_2_2","doi-asserted-by":"publisher","DOI":"10.1145\/3369457.3369515"},{"key":"e_1_3_3_3_3_2","unstructured":"Nurul Akbar. 2014. Analysing persuasion principles in phishing emails. Master\u2019s thesis. University of Twente."},{"key":"e_1_3_3_3_4_2","doi-asserted-by":"publisher","DOI":"10.1145\/3384613.3384629"},{"key":"e_1_3_3_3_5_2","unstructured":"APWG. 2022. Phishing Activity Trends Report 3rd Quarter 2022. https:\/\/docs.apwg.org\/reports\/apwg_trends_report_q3_2022.pdf"},{"key":"e_1_3_3_3_6_2","unstructured":"American\u00a0Psychological Association. 2023. Ethical Principles of Psychologists and Code of Conduct. https:\/\/www.apa.org\/ethics\/code Accessed 30th August 2023."},{"key":"e_1_3_3_3_7_2","doi-asserted-by":"publisher","unstructured":"E.\u00a0Z. Barsom M. Graafland and M.\u00a0P. Schijven. 2016. Systematic review on the effectiveness of augmented reality applications in medical training. Surgical Endoscopy 30 10 (2016) 4174\u20134183. 10.1007\/s00464-016-4800-6","DOI":"10.1007\/s00464-016-4800-6"},{"key":"e_1_3_3_3_8_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-81635-337"},{"key":"e_1_3_3_3_9_2","first-page":"3757","volume-title":"30th USENIX Security Symposium (USENIX Security 21)","author":"Bijmans Hugo","year":"2021","unstructured":"Hugo Bijmans, Tim Booij, Anneke Schwedersky, Aria Nedgabat, and Rolf van Wegberg. 2021. Catching Phishers By Their Bait: Investigating the Dutch Phishing Landscape through Phishing Kit Detection. In 30th USENIX Security Symposium (USENIX Security 21). USENIX Association, California, USA, 3757\u20133774. https:\/\/www.usenix.org\/conference\/usenixsecurity21\/presentation\/bijmans"},{"key":"e_1_3_3_3_10_2","doi-asserted-by":"publisher","unstructured":"David Birchfield Harvey Thornburg M.\u00a0Colleen Megowan-Romanowicz Sarah Hatton Brandon Mechtley Igor Dolgov and Winslow Burleson. 2008. Embodiment Multimodality and Composition: Convergent Themes across HCI and Education for Mixed-Reality Learning Environments. Advances in Human-Computer Interaction 2008 1 (2008) 874563. 10.1155\/2008\/874563 _eprint: https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1155\/2008\/874563.","DOI":"10.1155\/2008\/874563"},{"key":"e_1_3_3_3_11_2","unstructured":"John Brooke. 1996. SUS: A \u2019Quick and Dirty\u2019 Usability Scale. Usability evaluation in industry 189 194 (1996) 4\u20137."},{"key":"e_1_3_3_3_12_2","doi-asserted-by":"publisher","unstructured":"Marcus Butavicius Kathryn Parsons Malcolm Pattinson and Agata McCormac. 2016. Breaching the Human Firewall: Social engineering in Phishing and Spear-Phishing Emails. 10.48550\/arXiv.1606.00887 arxiv:https:\/\/arXiv.org\/abs\/1606.00887 [cs]","DOI":"10.48550\/arXiv.1606.00887"},{"key":"e_1_3_3_3_13_2","doi-asserted-by":"publisher","unstructured":"Casey\u00a0Inez Canfield Baruch Fischhoff and Alex Davis. 2016. Quantifying Phishing Susceptibility for Detection and Behavior Decisions. Human Factors 58 8 (Dec. 2016) 1158\u20131172. 10.1177\/0018720816665025 Publisher: SAGE Publications Inc.","DOI":"10.1177\/0018720816665025"},{"key":"e_1_3_3_3_14_2","doi-asserted-by":"publisher","unstructured":"Deanna\u00a0D. Caputo Shari\u00a0Lawrence Pfleeger Jesse\u00a0D. Freeman and M.\u00a0Eric Johnson. 2014. Going Spear Phishing: Exploring Embedded Training and Awareness. IEEE Security & Privacy 12 1 (2014) 28\u201338. 10.1109\/MSP.2013.106 Conference Name: IEEE Security & Privacy.","DOI":"10.1109\/MSP.2013.106"},{"key":"e_1_3_3_3_15_2","doi-asserted-by":"publisher","unstructured":"Hsin-Yi Chang Theerapong Binali Jyh-Chong Liang Guo-Li Chiou Kun-Hung Cheng Silvia Wen-Yu Lee and Chin-Chung Tsai. 2022. Ten years of augmented reality in education: A meta-analysis of (quasi-) experimental studies to investigate the impact. Computers & Education 191 (2022) 104641. 10.1016\/j.compedu.2022.104641","DOI":"10.1016\/j.compedu.2022.104641"},{"key":"e_1_3_3_3_16_2","doi-asserted-by":"publisher","DOI":"10.1109\/AIVR52153.2021.00052"},{"key":"e_1_3_3_3_17_2","doi-asserted-by":"publisher","DOI":"10.1145\/3613904.3642863"},{"key":"e_1_3_3_3_18_2","doi-asserted-by":"publisher","unstructured":"Amir Dirin and Teemu\u00a0H. Laine. 2018. User Experience in Mobile Augmented Reality: Emotions Challenges Opportunities and Best Practices. Computers 7 2 (2018) 33. 10.3390\/computers7020033","DOI":"10.3390\/computers7020033"},{"key":"e_1_3_3_3_19_2","doi-asserted-by":"publisher","DOI":"10.1145\/2702123.2702249"},{"key":"e_1_3_3_3_20_2","doi-asserted-by":"publisher","unstructured":"Franz Faul Edgar Erdfelder Axel Buchner and Albert-Georg Lang. 2009. Statistical power analyses using G*Power 3.1: Tests for correlation and regression analyses. Behavior Research Methods 41 4 (2009) 1149\u20131160. 10.3758\/BRM.41.4.1149","DOI":"10.3758\/BRM.41.4.1149"},{"key":"e_1_3_3_3_21_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-20376-8_4"},{"key":"e_1_3_3_3_22_2","doi-asserted-by":"publisher","DOI":"10.1109\/STAST.2015.10"},{"key":"e_1_3_3_3_23_2","unstructured":"OpenJS Foundation. 2023. Node.js JavaScript runtime environment. https:\/\/nodejs.org\/"},{"key":"e_1_3_3_3_24_2","unstructured":"Sender\u00a0Policy Framework. 2006. Sender Policy Framework. http:\/\/www.openspf.org\/"},{"key":"e_1_3_3_3_25_2","doi-asserted-by":"publisher","unstructured":"Thomas Franke Christiane Attig and Daniel Wessel. 2019. A Personal Resource for Technology Interaction: Development and Validation of the Affinity for Technology Interaction (ATI) Scale. International Journal of Human\u2013Computer Interaction 35 6 (2019) 456\u2013467. 10.1080\/10447318.2018.1456150 Publisher: Taylor & Francis _eprint: https:\/\/doi.org\/10.1080\/10447318.2018.1456150.","DOI":"10.1080\/10447318.2018.1456150"},{"key":"e_1_3_3_3_26_2","doi-asserted-by":"publisher","unstructured":"Edwin\u00a0Donald Frauenstein and Stephen Flowerday. 2020. Susceptibility to phishing on social network sites: A personality information processing model. Computers & Security 94 (2020) 101862. 10.1016\/j.cose.2020.101862","DOI":"10.1016\/j.cose.2020.101862"},{"key":"e_1_3_3_3_27_2","doi-asserted-by":"publisher","unstructured":"Juan Garz\u00f3n Juan Pav\u00f3n and Silvia Baldiris. 2019. Systematic review and meta-analysis of augmented reality in educational settings. Virtual Reality 23 4 (2019) 447\u2013459. 10.1007\/s10055-019-00379-9","DOI":"10.1007\/s10055-019-00379-9"},{"key":"e_1_3_3_3_28_2","doi-asserted-by":"publisher","unstructured":"Nirit Gavish Teresa Guti\u00e9rrez Sabine Webel Jorge Rodr\u00edguez Matteo Peveri Uli Bockholt and Franco Tecchia. 2015. Evaluating virtual reality and augmented reality training for industrial maintenance and assembly tasks. Interactive Learning Environments 23 6 (2015) 778\u2013798. 10.1080\/10494820.2013.815221 Publisher: Routledge _eprint: https:\/\/doi.org\/10.1080\/10494820.2013.815221.","DOI":"10.1080\/10494820.2013.815221"},{"key":"e_1_3_3_3_29_2","doi-asserted-by":"publisher","unstructured":"Agostino Gibaldi Mauricio Vanegas Peter\u00a0J. Bex and Guido Maiello. 2017. Evaluation of the Tobii EyeX Eye tracking controller and Matlab toolkit for research. Behavior Research Methods 49 3 (June 2017) 923\u2013946. 10.3758\/s13428-016-0762-9","DOI":"10.3758\/s13428-016-0762-9"},{"key":"e_1_3_3_3_30_2","doi-asserted-by":"publisher","unstructured":"John\u00a0F. Golding Aisha Rafiq and Behrang Keshavarz. 2021. Predicting Individual Susceptibility to Visually Induced Motion Sickness by Questionnaire. Frontiers in Virtual Reality 2 (2021) 11\u00a0pages. 10.3389\/frvir.2021.576871","DOI":"10.3389\/frvir.2021.576871"},{"key":"e_1_3_3_3_31_2","doi-asserted-by":"crossref","unstructured":"Eric\u00a0H. Goldman. 2019. Push the Button: Making Security Training Fun and Interactive. International Journal of Information Security and Cybercrime (IJISC) 8 1 (2019) 30\u201334. https:\/\/www.ceeol.com\/search\/article-detail?id=833997 Publisher: Asociatia Romana pentru Asigurarea Securitatii Informatiei.","DOI":"10.19107\/IJISC.2019.01.03"},{"key":"e_1_3_3_3_32_2","doi-asserted-by":"publisher","unstructured":"William\u00a0J Gordon Adam Wright Robert\u00a0J Glynn Jigar Kadakia Christina Mazzone Elizabeth Leinbach and Adam Landman. 2019. Evaluation of a mandatory phishing training program for high-risk employees at a US healthcare system. Journal of the American Medical Informatics Association 26 6 (2019) 547\u2013552. 10.1093\/jamia\/ocz005","DOI":"10.1093\/jamia\/ocz005"},{"key":"e_1_3_3_3_33_2","unstructured":"David Gragg. 2003. A multi-level defense against social engineering. SANS Reading Room 13 (2003) 1\u201321."},{"key":"e_1_3_3_3_34_2","doi-asserted-by":"publisher","unstructured":"Jens Grubert Tobias Langlotz Stefanie Zollmann and Holger Regenbrecht. 2017. Towards Pervasive Augmented Reality: Context-Awareness in Augmented Reality. IEEE Transactions on Visualization and Computer Graphics 23 6 (June 2017) 1706\u20131724. 10.1109\/TVCG.2016.2543720 Conference Name: IEEE Transactions on Visualization and Computer Graphics.","DOI":"10.1109\/TVCG.2016.2543720"},{"key":"e_1_3_3_3_35_2","doi-asserted-by":"publisher","DOI":"10.1016\/S0166-4115(08)62386-9"},{"key":"e_1_3_3_3_36_2","doi-asserted-by":"publisher","DOI":"10.1145\/3544549.3585823"},{"key":"e_1_3_3_3_37_2","volume-title":"Eye Tracking","author":"Holmqvist Kenneth","year":"2015","unstructured":"Kenneth Holmqvist, Marcus Nystrom, Richard Andersson, Richard Dewhurst, Halszka Jarodzka, and Joost Van De\u00a0Weijer. 2015. Eye Tracking. Oxford University Press, London, UK."},{"key":"e_1_3_3_3_38_2","doi-asserted-by":"publisher","DOI":"10.1109\/SecDev.2018.00020"},{"key":"e_1_3_3_3_39_2","doi-asserted-by":"publisher","DOI":"10.1145\/3411764.3445283"},{"key":"e_1_3_3_3_40_2","doi-asserted-by":"publisher","unstructured":"Claire\u00a0L. Hughes Cali Fidopiastis Kay\u00a0M. Stanney Peyton\u00a0S. Bailey and Ernesto Ruiz. 2020. The Psychometrics of Cybersickness in Augmented Reality. Frontiers in Virtual Reality 1 (2020) 12\u00a0pages. 10.3389\/frvir.2020.602954","DOI":"10.3389\/frvir.2020.602954"},{"key":"e_1_3_3_3_41_2","doi-asserted-by":"crossref","unstructured":"IBM. 2022. Cost of a Data Breach Report 2022. https:\/\/www.ibm.com\/downloads\/cas\/3R8N1DZJ","DOI":"10.12968\/S1353-4858(22)70049-9"},{"key":"e_1_3_3_3_42_2","doi-asserted-by":"publisher","unstructured":"Daniel Jampen G\u00fcrkan G\u00fcr Thomas Sutter and Bernhard Tellenbach. 2020. Don\u2019t click: towards an effective anti-phishing training. A comparative literature review. Human-centric Computing and Information Sciences 10 1 (2020) 33. 10.1186\/s13673-020-00237-7","DOI":"10.1186\/s13673-020-00237-7"},{"key":"e_1_3_3_3_43_2","doi-asserted-by":"publisher","DOI":"10.1145\/3543758.3549884"},{"key":"e_1_3_3_3_44_2","unstructured":"Friedemann Kammler Jonas Brinker Jannis Vogel Tahany Hmaid and Oliver Thomas. 2019. How Do We Support Technical Tasks in the Age of Augmented Reality? Some Evidence from Prototyping in Mechanical Engineering. ICIS 2019 Proceedings 1 (Nov. 2019) 1\u201318. https:\/\/aisel.aisnet.org\/icis2019\/future_of_work\/future_work\/1"},{"key":"e_1_3_3_3_45_2","doi-asserted-by":"publisher","unstructured":"B.\u00a0Price Kerfoot and Nicole Kissane. 2014. The Use of Gamification to Boost Residents\u2019 Engagement in Simulation Training. JAMA Surgery 149 11 (2014) 1208. 10.1001\/jamasurg.2014.1779","DOI":"10.1001\/jamasurg.2014.1779"},{"key":"e_1_3_3_3_46_2","doi-asserted-by":"publisher","DOI":"10.1145\/1240624.1240760"},{"key":"e_1_3_3_3_47_2","doi-asserted-by":"publisher","unstructured":"Ponnurangam Kumaraguru Steve Sheng Alessandro Acquisti Lorrie\u00a0Faith Cranor and Jason Hong. 2010. Teaching Johnny not to fall for phish. ACM Transactions on Internet Technology 10 2 (2010) 1\u201331. 10.1145\/1754393.1754396","DOI":"10.1145\/1754393.1754396"},{"key":"e_1_3_3_3_48_2","doi-asserted-by":"publisher","DOI":"10.1145\/1978942.1979244"},{"key":"e_1_3_3_3_49_2","doi-asserted-by":"publisher","unstructured":"Xin Luo Richard Brody Alessandro Seazzu and Stephen Burd. 2011. Social Engineering: The Neglected Human Factor for Information Security Management. Information Resources Management Journal (IRMJ) 24 3 (2011) 1\u20138. 10.4018\/irmj.2011070101 Publisher: IGI Global.","DOI":"10.4018\/irmj.2011070101"},{"key":"e_1_3_3_3_50_2","volume-title":"Qualitative content analysis: theoretical foundation, basic procedures and software solution","author":"Mayring Philipp","year":"2014","unstructured":"Philipp Mayring. 2014. Qualitative content analysis: theoretical foundation, basic procedures and software solution. SSOAR, Mannheim, Germany."},{"key":"e_1_3_3_3_51_2","doi-asserted-by":"crossref","unstructured":"Joseph\u00a0E McGrath. 1981. Dilemmatics: The study of research choices and dilemmas. American Behavioral Scientist 25 2 (1981) 179\u2013210.","DOI":"10.1177\/000276428102500205"},{"key":"e_1_3_3_3_52_2","unstructured":"Microsoft. 2023. HoloLens2 - Overview Features and Specs. https:\/\/www.microsoft.com\/en-us\/hololens\/hardware#document-experiences"},{"key":"e_1_3_3_3_53_2","unstructured":"Microsoft. 2023. Mixed Reality Toolkit - Unity. https:\/\/github.com\/microsoft\/MixedRealityToolkit-Unity"},{"key":"e_1_3_3_3_54_2","doi-asserted-by":"publisher","DOI":"10.1145\/3617072.3617111"},{"key":"e_1_3_3_3_55_2","doi-asserted-by":"publisher","DOI":"10.15439\/2019F136"},{"key":"e_1_3_3_3_56_2","doi-asserted-by":"publisher","DOI":"10.1109\/ECRIME.2018.8376206"},{"key":"e_1_3_3_3_57_2","doi-asserted-by":"publisher","DOI":"10.1145\/3025453.3025831"},{"key":"e_1_3_3_3_58_2","doi-asserted-by":"publisher","DOI":"10.1016\/B978-0-12-408138-3.00003-0"},{"key":"e_1_3_3_3_59_2","doi-asserted-by":"publisher","unstructured":"Heather\u00a0L. O\u2019Brien Paul Cairns and Mark Hall. 2018. A practical approach to measuring user engagement with the refined user engagement scale (UES) and new UES short form. International Journal of Human-Computer Studies 112 (2018) 28\u201339. 10.1016\/j.ijhcs.2018.01.004","DOI":"10.1016\/j.ijhcs.2018.01.004"},{"key":"e_1_3_3_3_60_2","doi-asserted-by":"publisher","unstructured":"Christos Papakostas Christos Troussas Akrivi Krouska and Cleo Sgouropoulou. 2021. Measuring User Experience Usability and Interactivity of a Personalized Mobile Augmented Reality Training System. Sensors 21 11 (2021) 3888. 10.3390\/s21113888 Number: 11 Publisher: Multidisciplinary Digital Publishing Institute.","DOI":"10.3390\/s21113888"},{"key":"e_1_3_3_3_61_2","doi-asserted-by":"publisher","unstructured":"Sangwon Park and Brigitte Stangl. 2020. Augmented reality experiences and sensation seeking. Tourism Management 77 (April 2020) 104023. 10.1016\/j.tourman.2019.104023","DOI":"10.1016\/j.tourman.2019.104023"},{"key":"e_1_3_3_3_62_2","doi-asserted-by":"publisher","unstructured":"Kathryn Parsons Dragana Calic Malcolm Pattinson Marcus Butavicius Agata McCormac and Tara Zwaans. 2017. The Human Aspects of Information Security Questionnaire (HAIS-Q): Two further validation studies. Computers & Security 66 (2017) 40\u201351. 10.1016\/j.cose.2017.01.004","DOI":"10.1016\/j.cose.2017.01.004"},{"key":"e_1_3_3_3_63_2","doi-asserted-by":"publisher","unstructured":"Iulian Radu. 2014. Augmented reality in education: a meta-review and cross-media analysis. Personal and Ubiquitous Computing 18 6 (Aug. 2014) 1533\u20131543. 10.1007\/s00779-013-0747-y","DOI":"10.1007\/s00779-013-0747-y"},{"key":"e_1_3_3_3_64_2","doi-asserted-by":"publisher","unstructured":"Prashanth Rajivan and Cleotilde Gonzalez. 2018. Creative Persuasion: A Study on Adversarial Behaviors and Strategies in Phishing Attacks. Frontiers in Psychology 9 (2018) 14\u00a0pages. 10.3389\/fpsyg.2018.00135","DOI":"10.3389\/fpsyg.2018.00135"},{"key":"e_1_3_3_3_65_2","first-page":"259","volume-title":"Sixteenth Symposium on Usable Privacy and Security (SOUPS 2020)","author":"Reinheimer Benjamin","year":"2020","unstructured":"Benjamin Reinheimer, Lukas Aldag, Peter Mayer, Mattia Mossano, Reyhan Duezguen, Bettina Lofthouse, Tatiana\u00a0von Landesberger, and Melanie Volkamer. 2020. An investigation of phishing awareness and education over time: When and how to best remind users. In Sixteenth Symposium on Usable Privacy and Security (SOUPS 2020). Usenix, Berkeley, CA, USA, 259\u2013284. https:\/\/www.usenix.org\/conference\/soups2020\/presentation\/reinheimer"},{"key":"e_1_3_3_3_66_2","doi-asserted-by":"publisher","unstructured":"Karen Renaud and Marc Dupuis. 2023. Cybersecurity Insights Gleaned from World Religions. Computers & Security 132 (Sept. 2023) 103326. 10.1016\/j.cose.2023.103326","DOI":"10.1016\/j.cose.2023.103326"},{"key":"e_1_3_3_3_67_2","doi-asserted-by":"publisher","DOI":"10.1145\/3313831.3376298"},{"key":"e_1_3_3_3_68_2","doi-asserted-by":"publisher","unstructured":"Giuseppe Riva Rosa\u00a0M. Ba\u00f1os Cristina Botella Fabrizia Mantovani and Andrea Gaggioli. 2016. Transforming Experience: The Potential of Augmented Reality and Virtual Reality for Enhancing Personal and Clinical Change. Frontiers in Psychiatry 7 (2016) 14\u00a0pages. 10.3389\/fpsyt.2016.00164","DOI":"10.3389\/fpsyt.2016.00164"},{"key":"e_1_3_3_3_69_2","doi-asserted-by":"publisher","unstructured":"Chandan\u00a0K. Sahu Crystal Young and Rahul Rai. 2021. Artificial intelligence (AI) in augmented reality (AR)-assisted manufacturing applications: a review. International Journal of Production Research 59 16 (2021) 4903\u20134959. 10.1080\/00207543.2020.1859636","DOI":"10.1080\/00207543.2020.1859636"},{"key":"e_1_3_3_3_70_2","doi-asserted-by":"publisher","unstructured":"M.\u00a0A. Sasse S. Brostoff and D. Weirich. 2001. Transforming the \u2018Weakest Link\u2019 \u2014 a Human\/Computer Interaction Approach to Usable and Effective Security. BT Technology Journal 19 3 (2001) 122\u2013131. 10.1023\/A:1011902718709","DOI":"10.1023\/A:1011902718709"},{"key":"e_1_3_3_3_71_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-25460-414"},{"key":"e_1_3_3_3_72_2","doi-asserted-by":"publisher","unstructured":"Ryan Shandler and Miguel\u00a0Alberto Gomez. 2022. The hidden threat of cyber-attacks \u2013 undermining public confidence in government. Journal of Information Technology & Politics 0 0 (2022) 1\u201316. 10.1080\/19331681.2022.2112796 Publisher: Routledge _eprint: https:\/\/doi.org\/10.1080\/19331681.2022.2112796.","DOI":"10.1080\/19331681.2022.2112796"},{"key":"e_1_3_3_3_73_2","doi-asserted-by":"publisher","unstructured":"Filipo Sharevski Jennifer\u00a0Vander Loop and Sarah Ferguson. 2024. \"Oh sh*t! I actually opened the document!\": An Empirical Study of the Experiences with Suspicious Emails in Virtual Reality Headsets. 10.48550\/arXiv.2412.01474 arXiv:https:\/\/arXiv.org\/abs\/2412.01474.","DOI":"10.48550\/arXiv.2412.01474"},{"key":"e_1_3_3_3_74_2","doi-asserted-by":"publisher","DOI":"10.1145\/1753326.1753383"},{"key":"e_1_3_3_3_75_2","doi-asserted-by":"crossref","unstructured":"Steve Sheng Bryant Magnien Ponnurangam Kumaraguru Alessandro Acquisti Lorrie\u00a0Faith Cranor Jason\u00a0I. Hong and Elizabeth Nunge. 2007. Anti-Phishing Phil: The Design and Evaluation of a Game that Teaches People Not to Fall for Phish. https:\/\/papers.ssrn.com\/abstract=4248296","DOI":"10.1145\/1280680.1280692"},{"key":"e_1_3_3_3_76_2","doi-asserted-by":"publisher","DOI":"10.1184\/R1\/6469805.v1"},{"key":"e_1_3_3_3_77_2","doi-asserted-by":"publisher","DOI":"10.1109\/eCrime47957.2019.9037502"},{"key":"e_1_3_3_3_78_2","unstructured":"Statista. 2023. AR hardware B2C market users 2020-2027. https:\/\/www.statista.com\/forecasts\/1337381\/ar-hardware-b2c-market-users-worldwide"},{"key":"e_1_3_3_3_79_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-05457-09"},{"key":"e_1_3_3_3_80_2","doi-asserted-by":"crossref","unstructured":"Jason Thomas. 2018. Individual Cyber Security: Empowering Employees to Resist Spear Phishing to Prevent Identity Theft and Ransomware Attacks. https:\/\/papers.ssrn.com\/abstract=3171727","DOI":"10.5539\/ijbm.v13n6p1"},{"key":"e_1_3_3_3_81_2","unstructured":"Tobii. 2018. Tobii 4C."},{"key":"e_1_3_3_3_82_2","unstructured":"Unity. 2023. Unity Real-time Development Platform. https:\/\/unity.com\/"},{"key":"e_1_3_3_3_83_2","doi-asserted-by":"publisher","unstructured":"Tommy van Steen and Julia\u00a0R.A. Deeleman. 2021. Successful Gamification of Cybersecurity Training. Cyberpsychology Behavior and Social Networking 24 9 (2021) 593\u2013598. 10.1089\/cyber.2020.0526 Publisher: Mary Ann Liebert Inc. publishers.","DOI":"10.1089\/cyber.2020.0526"},{"key":"e_1_3_3_3_84_2","doi-asserted-by":"publisher","unstructured":"Arun Vishwanath Brynne Harrison and Yu\u00a0Jie Ng. 2018. Suspicion Cognition and Automaticity Model of Phishing Susceptibility. Communication Research 45 8 (2018) 1146\u20131166. 10.1177\/0093650215627483 Publisher: SAGE Publications Inc.","DOI":"10.1177\/0093650215627483"},{"key":"e_1_3_3_3_85_2","doi-asserted-by":"publisher","unstructured":"Arun Vishwanath Tejaswini Herath Rui Chen Jingguo Wang and H.\u00a0Raghav Rao. 2011. Why do people get phished? Testing individual differences in phishing vulnerability within an integrated information processing model. Decision Support Systems 51 3 (2011) 576\u2013586. 10.1016\/j.dss.2011.03.002","DOI":"10.1016\/j.dss.2011.03.002"},{"key":"e_1_3_3_3_86_2","doi-asserted-by":"publisher","unstructured":"Melanie Volkamer Karen Renaud and Paul Gerber. 2016. Spot the phish by checking the pruned URL. Information & Computer Security 24 4 (Jan. 2016) 372\u2013385. 10.1108\/ICS-07-2015-0032 Publisher: Emerald Group Publishing Limited.","DOI":"10.1108\/ICS-07-2015-0032"},{"key":"e_1_3_3_3_87_2","doi-asserted-by":"publisher","DOI":"10.1145\/3173574.3173783"},{"key":"e_1_3_3_3_88_2","unstructured":"Vue. 2023. Vue.js - The Progressive JavaScript Framework. https:\/\/vuejs.org\/"},{"key":"e_1_3_3_3_89_2","doi-asserted-by":"publisher","unstructured":"Zhuo Wang Xiaoliang Bai Shusheng Zhang Mark Billinghurst Weiping He Peng Wang Weiqi Lan Haitao Min and Yu Chen. 2022. A comprehensive review of augmented reality-based instruction in manual assembly training and repair. Robotics and Computer-Integrated Manufacturing 78 (2022) 102407. 10.1016\/j.rcim.2022.102407","DOI":"10.1016\/j.rcim.2022.102407"},{"key":"e_1_3_3_3_90_2","doi-asserted-by":"publisher","unstructured":"Rick Wash. 2020. How Experts Detect Phishing Scam Emails. Proceedings of the ACM on Human-Computer Interaction 4 (2020) 160:1\u2013160:28. Issue CSCW2. 10.1145\/3415231","DOI":"10.1145\/3415231"},{"key":"e_1_3_3_3_91_2","doi-asserted-by":"publisher","DOI":"10.1145\/3173574.3174066"},{"key":"e_1_3_3_3_92_2","doi-asserted-by":"publisher","unstructured":"Yun Wen. 2021. Augmented reality enhanced cognitive engagement: designing classroom-based collaborative learning activities for young language learners. Educational Technology Research and Development 69 2 (2021) 843\u2013860. 10.1007\/s11423-020-09893-z","DOI":"10.1007\/s11423-020-09893-z"},{"key":"e_1_3_3_3_93_2","doi-asserted-by":"publisher","DOI":"10.1145\/3290605.3300338"},{"key":"e_1_3_3_3_94_2","doi-asserted-by":"publisher","unstructured":"Brenda\u00a0K. Wiederhold. 2021. Increasing Cybersecurity Through Emotional Engagement. Cyberpsychology Behavior and Social Networking 24 9 (2021) 579\u2013580. 10.1089\/cyber.2021.29224.editorial","DOI":"10.1089\/cyber.2021.29224.editorial"},{"key":"e_1_3_3_3_95_2","doi-asserted-by":"publisher","unstructured":"Christina\u00a0Meilee Williams Rahul Chaturvedi and Krishnan Chakravarthy. 2020. Cybersecurity Risks in a Pandemic. Journal of Medical Internet Research 22 9 (2020) e23692. 10.2196\/23692","DOI":"10.2196\/23692"},{"key":"e_1_3_3_3_96_2","doi-asserted-by":"publisher","unstructured":"Emma\u00a0J. Williams Amy Beardmore and Adam\u00a0N. Joinson. 2017. Individual differences in susceptibility to online influence: A theoretical review. Computers in Human Behavior 72 (July 2017) 412\u2013421. 10.1016\/j.chb.2017.03.002","DOI":"10.1016\/j.chb.2017.03.002"},{"key":"e_1_3_3_3_97_2","doi-asserted-by":"publisher","unstructured":"Emma\u00a0J. Williams Joanne Hinds and Adam\u00a0N. Joinson. 2018. Exploring susceptibility to phishing in the workplace. International Journal of Human-Computer Studies 120 (Dec. 2018) 1\u201313. 10.1016\/j.ijhcs.2018.06.004","DOI":"10.1016\/j.ijhcs.2018.06.004"},{"key":"e_1_3_3_3_98_2","doi-asserted-by":"publisher","unstructured":"Emma\u00a0J. Williams and Danielle Polage. 2019. How persuasive is phishing email? The role of authentic design influence and current events in email judgements. Behaviour & Information Technology 38 2 (Feb. 2019) 184\u2013197. 10.1080\/0144929X.2018.1519599","DOI":"10.1080\/0144929X.2018.1519599"},{"key":"e_1_3_3_3_99_2","unstructured":"Eva Wolfangel. 2023. The Human Element in Cybercrime and Cybersecurity. CHI 2023 Opening Keynote. https:\/\/www.youtube.com\/watch?v=LKUMRTLV49g"},{"key":"e_1_3_3_3_100_2","doi-asserted-by":"publisher","unstructured":"Julia Woodward and Jaime Ruiz. 2023. Analytic Review of Using Augmented Reality for Situational Awareness. IEEE transactions on visualization and computer graphics 29 4 (2023) 2166\u20132183. 10.1109\/TVCG.2022.3141585","DOI":"10.1109\/TVCG.2022.3141585"},{"key":"e_1_3_3_3_101_2","doi-asserted-by":"publisher","unstructured":"Aiping Xiong Robert\u00a0W. Proctor Weining Yang and Ninghui Li. 2017. Is Domain Highlighting Actually Helpful in Identifying Phishing Web Pages? Human Factors 59 4 (June 2017) 640\u2013660. 10.1177\/0018720816684064","DOI":"10.1177\/0018720816684064"},{"key":"e_1_3_3_3_102_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-10597-61"},{"key":"e_1_3_3_3_103_2","doi-asserted-by":"publisher","DOI":"10.1145\/3055305.3055310"},{"key":"e_1_3_3_3_104_2","doi-asserted-by":"publisher","DOI":"10.1145\/3613905.3650907"},{"key":"e_1_3_3_3_105_2","doi-asserted-by":"publisher","DOI":"10.1145\/2898375.2898382"},{"key":"e_1_3_3_3_106_2","doi-asserted-by":"publisher","unstructured":"Verena Zimmermann and Karen Renaud. 2019. Moving from a \u2018human-as-problem\u201d to a \u2018human-as-solution\u201d cybersecurity mindset. International Journal of Human-Computer Studies 131 (2019) 169\u2013187. 10.1016\/j.ijhcs.2019.05.005","DOI":"10.1016\/j.ijhcs.2019.05.005"}],"event":{"name":"CHI 2025: CHI Conference on Human Factors in Computing Systems","location":"Yokohama Japan","acronym":"CHI '25","sponsor":["SIGCHI ACM Special Interest Group on Computer-Human Interaction"]},"container-title":["Proceedings of the 2025 CHI Conference on Human Factors in Computing Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3706598.3714023","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3706598.3714023","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,4]],"date-time":"2025-07-04T04:56:04Z","timestamp":1751604964000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3706598.3714023"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,4,25]]},"references-count":105,"alternative-id":["10.1145\/3706598.3714023","10.1145\/3706598"],"URL":"https:\/\/doi.org\/10.1145\/3706598.3714023","relation":{},"subject":[],"published":{"date-parts":[[2025,4,25]]},"assertion":[{"value":"2025-04-25","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}