{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T05:05:55Z","timestamp":1750309555463,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":61,"publisher":"ACM","license":[{"start":{"date-parts":[[2025,4,25]],"date-time":"2025-04-25T00:00:00Z","timestamp":1745539200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2025,4,26]]},"DOI":"10.1145\/3706599.3720272","type":"proceedings-article","created":{"date-parts":[[2025,4,23]],"date-time":"2025-04-23T20:07:11Z","timestamp":1745438831000},"page":"1-10","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["The Role of Auditory Environments and Anxiety in Detecting Phishing Emails"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-2405-3695","authenticated-orcid":false,"given":"Reza","family":"Ghaiumy Anaraky","sequence":"first","affiliation":[{"name":"School of Electrical Engineering and Computer Science, Louisiana State University, Baton Rouge, Louisiana, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5908-390X","authenticated-orcid":false,"given":"Mark","family":"Cartwright","sequence":"additional","affiliation":[{"name":"New Jersey Institute of Technology, Newark, New Jersey, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6410-2995","authenticated-orcid":false,"given":"Oded","family":"Nov","sequence":"additional","affiliation":[{"name":"Tandon School of Engineering, New York University, New York, New York, USA"}]}],"member":"320","published-online":{"date-parts":[[2025,4,25]]},"reference":[{"volume-title":"The Latest Phishing Statistics (updated February 2023) | AAG IT Support","key":"e_1_3_3_2_2_2","unstructured":"[n. d.]. The Latest Phishing Statistics (updated February 2023) | AAG IT Support. https:\/\/aag-it.com\/the-latest-phishing-statistics\/ Section: Business."},{"volume-title":"Phishing: Number of Victims in the United States","key":"e_1_3_3_2_3_2","unstructured":"[n. d.]. Phishing: Number of Victims in the United States. https:\/\/www.statista.com\/statistics\/1390362\/phishing-victim-number-us\/ Accessed: May 25, 2024."},{"key":"e_1_3_3_2_4_2","doi-asserted-by":"crossref","unstructured":"Hossein Abroshan Jan Devos Geert Poels and Eric Laermans. 2021. Covid-19 and phishing: Effects of human emotions behavior and demographics on the success of phishing attempts during the pandemic. Ieee Access 9 (2021) 121916\u2013121929.","DOI":"10.1109\/ACCESS.2021.3109091"},{"key":"e_1_3_3_2_5_2","doi-asserted-by":"publisher","unstructured":"Jesper\u00a0J. Alvarsson Stefan Wiens and Mats\u00a0E. Nilsson. 2010. Stress Recovery during Exposure to Nature Sound and Environmental Noise. International Journal of Environmental Research and Public Health 7 3 (March 2010) 1036\u20131046. 10.3390\/ijerph7031036","DOI":"10.3390\/ijerph7031036"},{"key":"e_1_3_3_2_6_2","doi-asserted-by":"crossref","unstructured":"Hyejin An and Shaofeng Li. 2024. Anxiety in task-based language teaching. Individual differences and task-based language teaching 16 (2024) 52.","DOI":"10.1075\/tblt.16.02anh"},{"key":"e_1_3_3_2_7_2","doi-asserted-by":"crossref","unstructured":"Reza\u00a0Ghaiumy Anaraky Bart\u00a0P Knijnenburg and Marten Risius. 2020. Exacerbating mindless compliance: The danger of justifications during privacy decision making in the context of Facebook applications. AIS Transactions on Human-Computer Interaction 12 2 (2020) 70\u201395.","DOI":"10.17705\/1thci.00129"},{"key":"e_1_3_3_2_8_2","unstructured":"Reza\u00a0Ghaiumy Anaraky Tahereh Nabizadeh Bart\u00a0P Knijnenburg and Marten Risius. 2018. Reducing default and framing effects in privacy decision-making. (2018)."},{"key":"e_1_3_3_2_9_2","doi-asserted-by":"publisher","DOI":"10.1109\/i-Society18435.2011.5978543"},{"key":"e_1_3_3_2_10_2","doi-asserted-by":"crossref","unstructured":"Aylin Ayd\u0131n\u00a0Say\u0131lan Nur\u015fen Kulaka\u00e7 and Samet Say\u0131lan. 2021. The effects of noise levels on pain anxiety and sleep in patients. Nursing in Critical Care 26 2 (2021) 79\u201385.","DOI":"10.1111\/nicc.12525"},{"key":"e_1_3_3_2_11_2","doi-asserted-by":"crossref","unstructured":"Simon\u00a0P Banbury and Dianne\u00a0C Berry. 2005. Office noise and employee concentration: Identifying causes of disruption and potential improvements. Ergonomics 48 1 (2005) 25\u201337.","DOI":"10.1080\/00140130412331311390"},{"key":"e_1_3_3_2_12_2","volume-title":"Workshop on Usable Security and Privacy (USEC)","author":"Berens Benjamin","year":"2022","unstructured":"Benjamin Berens, Katerina Dimitrova, Mattia Mossano, and Melanie Volkamer. 2022. Phishing awareness and education\u2013When to best remind. In Workshop on Usable Security and Privacy (USEC)."},{"key":"e_1_3_3_2_13_2","doi-asserted-by":"publisher","DOI":"10.1145\/3613904.3642843"},{"key":"e_1_3_3_2_14_2","doi-asserted-by":"crossref","unstructured":"Andr\u00e9 Bergholz Jan De\u00a0Beer Sebastian Glahn Marie-Francine Moens Gerhard Paa\u00df and Siehyun Strobel. 2010. New filtering approaches for phishing email. Journal of computer security 18 1 (2010) 7\u201335.","DOI":"10.3233\/JCS-2010-0371"},{"key":"e_1_3_3_2_15_2","first-page":"4105","volume-title":"32nd USENIX Security Symposium (USENIX Security 23)","author":"Brunken Lina","year":"2023","unstructured":"Lina Brunken, Annalina Buckmann, Jonas Hielscher, and M\u00a0Angela Sasse. 2023. { \u201cTo} Do This Properly, You Need More { Resources\u201d} : The Hidden Costs of Introducing Simulated Phishing Campaigns. In 32nd USENIX Security Symposium (USENIX Security 23). 4105\u20134122."},{"key":"e_1_3_3_2_16_2","doi-asserted-by":"crossref","unstructured":"Duane\u00a0C Button David\u00a0G Behm Michael Holmes and Scott\u00a0N Mackinnon. 2004. Noise and muscle contraction affecting vigilance task performance. Occupational ergonomics 4 3 (2004) 157\u2013171.","DOI":"10.3233\/OER-2004-4302"},{"key":"e_1_3_3_2_17_2","doi-asserted-by":"crossref","unstructured":"Gianna Cassidy and Raymond\u00a0AR MacDonald. 2007. The effect of background music and background noise on the task performance of introverts and extraverts. Psychology of Music 35 3 (2007) 517\u2013537.","DOI":"10.1177\/0305735607076444"},{"key":"e_1_3_3_2_18_2","doi-asserted-by":"publisher","DOI":"10.1145\/3613904.3641943"},{"volume-title":"Top Phishing Statistics and Facts for 2019\u20132023","author":"Cook Sam","key":"e_1_3_3_2_19_2","unstructured":"Sam Cook. [n. d.]. Top Phishing Statistics and Facts for 2019\u20132023. https:\/\/www.comparitech.com\/blog\/vpn-privacy\/phishing-statistics-facts\/"},{"key":"e_1_3_3_2_20_2","doi-asserted-by":"crossref","unstructured":"Brian\u00a0H Dalton David\u00a0G Behm and Armin Kibele. 2007. Effects of sound types and volumes on simulated driving vigilance tasks and heart rate. Occupational Ergonomics 7 3 (2007) 153\u2013168.","DOI":"10.3233\/OER-2007-7302"},{"key":"e_1_3_3_2_21_2","doi-asserted-by":"crossref","unstructured":"Nguyet\u00a0Quang Do Ali Selamat Ondrej Krejcar Enrique Herrera-Viedma and Hamido Fujita. 2022. Deep learning for phishing detection: Taxonomy current challenges and future directions. Ieee Access 10 (2022) 36429\u201336463.","DOI":"10.1109\/ACCESS.2022.3151903"},{"key":"e_1_3_3_2_22_2","doi-asserted-by":"crossref","unstructured":"Richard\u00a0D Edsell. 1976. Anxiety as a function of environmental noise and social interaction. The Journal of psychology 92 2 (1976) 219\u2013226.","DOI":"10.1080\/00223980.1976.9921359"},{"key":"e_1_3_3_2_23_2","doi-asserted-by":"publisher","DOI":"10.1145\/2702123.2702249"},{"key":"e_1_3_3_2_24_2","doi-asserted-by":"publisher","unstructured":"Mercede Erfanian Andrew\u00a0J. Mitchell Jian Kang and Francesco Aletta. 2019. The Psychophysiological Implications of Soundscape: A Systematic Review of Empirical Literature and a Research Agenda. International Journal of Environmental Research and Public Health 16 19 (Jan. 2019) 3533. 10.3390\/ijerph16193533","DOI":"10.3390\/ijerph16193533"},{"key":"e_1_3_3_2_25_2","doi-asserted-by":"crossref","unstructured":"Michael\u00a0W Eysenck and Manuel\u00a0G Calvo. 1992. Anxiety and performance: The processing efficiency theory. Cognition & emotion 6 6 (1992) 409\u2013434.","DOI":"10.1080\/02699939208409696"},{"key":"e_1_3_3_2_26_2","unstructured":"Annastasia Falkenberg. 2019. The Role of Cue Utilisation and Anxiety on Phishing Email Susceptibility. Ph.\u00a0D. Dissertation."},{"key":"e_1_3_3_2_27_2","doi-asserted-by":"crossref","unstructured":"Tzipora Halevi Nasir Memon and Oded Nov. 2015. Spear-phishing in the wild: A real-world study of personality phishing self-efficacy and vulnerability to spear-phishing attacks. Phishing Self-Efficacy and Vulnerability to Spear-Phishing Attacks (January 2 2015) (2015).","DOI":"10.2139\/ssrn.2544742"},{"key":"e_1_3_3_2_28_2","doi-asserted-by":"crossref","unstructured":"Michael\u00a0S Humphreys and William Revelle. 1984. Personality motivation and performance: a theory of the relationship between individual differences and information processing. Psychological review 91 2 (1984) 153.","DOI":"10.1037\/\/0033-295X.91.2.153"},{"key":"e_1_3_3_2_29_2","doi-asserted-by":"publisher","DOI":"10.1145\/3613905.3651076"},{"key":"e_1_3_3_2_30_2","doi-asserted-by":"publisher","DOI":"10.1145\/1572532.1572536"},{"key":"e_1_3_3_2_31_2","doi-asserted-by":"publisher","DOI":"10.1109\/SP46214.2022.9833766"},{"key":"e_1_3_3_2_32_2","doi-asserted-by":"crossref","unstructured":"Yuliang Lan Hannah Roberts Mei-Po Kwan and Marco Helbich. 2020. Transportation noise exposure and anxiety: A systematic review and meta-analysis. Environmental research 191 (2020) 110118.","DOI":"10.1016\/j.envres.2020.110118"},{"key":"e_1_3_3_2_33_2","doi-asserted-by":"crossref","unstructured":"Gavin\u00a0P Lawrence Michael\u00a0A Khan and Lew Hardy. 2013. The effect of state anxiety on the online and offline control of fast target-directed movements. Psychological Research 77 (2013) 422\u2013433.","DOI":"10.1007\/s00426-012-0440-1"},{"key":"e_1_3_3_2_34_2","doi-asserted-by":"crossref","unstructured":"Delila Lisica Maida Koso-Drljevi\u0107 Birgit St\u00fcrmer and Christian Valt. 2024. Reduction of anxiety symptoms during systemic family therapy results in a concurrent improvement of cognitive performance: a study on people with high anxiety. Cognition and Emotion 38 2 (2024) 245\u2013255.","DOI":"10.1080\/02699931.2023.2285822"},{"key":"e_1_3_3_2_35_2","doi-asserted-by":"publisher","unstructured":"Guangli Lu Ruiying Jia Dandan Liang Jingfen Yu Zhen Wu and Chaoran Chen. 2021. Effects of Music Therapy on Anxiety: A Meta-Analysis of Randomized Controlled Trials. Psychiatry Research 304 (Oct. 2021) 114137. 10.1016\/j.psychres.2021.114137","DOI":"10.1016\/j.psychres.2021.114137"},{"key":"e_1_3_3_2_36_2","doi-asserted-by":"publisher","unstructured":"Oleg Medvedev Daniel Shepherd and Michael\u00a0J. Hautus. 2015. The Restorative Potential of Soundscapes: A Physiological Investigation. Applied Acoustics 96 (Sept. 2015) 20\u201326. 10.1016\/j.apacoust.2015.03.004","DOI":"10.1016\/j.apacoust.2015.03.004"},{"key":"e_1_3_3_2_37_2","doi-asserted-by":"publisher","unstructured":"Y. Meier and N.\u00a0C. Kr\u00e4mer. 2022. The privacy calculus revisited: an empirical investigation of online privacy decisions on between- and within-person levels. Communication Research 51 (2022) 178\u2013202. Issue 2. 10.1177\/00936502221102101","DOI":"10.1177\/00936502221102101"},{"key":"e_1_3_3_2_38_2","doi-asserted-by":"publisher","DOI":"10.1145\/3544548.3581183"},{"volume-title":"Chi-Square Difference Testing Using the Satorra-Bentler Scaled Chi-Square","year":"2023","key":"e_1_3_3_2_39_2","unstructured":"Mplus. 2023. Chi-Square Difference Testing Using the Satorra-Bentler Scaled Chi-Square. Accessed: 2023-11-18."},{"key":"e_1_3_3_2_40_2","doi-asserted-by":"publisher","DOI":"10.1109\/CCWC51732.2021.9375997"},{"key":"e_1_3_3_2_41_2","doi-asserted-by":"publisher","DOI":"10.1145\/3025453.3025831"},{"key":"e_1_3_3_2_42_2","doi-asserted-by":"publisher","DOI":"10.1201\/9781003408307-7"},{"key":"e_1_3_3_2_43_2","doi-asserted-by":"crossref","unstructured":"Salvi\u00a0Siddhi Ravindra Shah\u00a0Juhi Sanjay Shaikh Nausheenbanu\u00a0Ahmed Gulzar and Khodke Pallavi. 2021. Phishing Website Detection Based on URL. International Journal of Scientific Research in Computer Science Engineering and Information Technology (USRCSEIT) 7 3 (2021) 589\u2013594.","DOI":"10.32628\/CSEIT2173124"},{"key":"e_1_3_3_2_44_2","first-page":"259","volume-title":"Sixteenth Symposium on Usable Privacy and Security (SOUPS 2020)","author":"Reinheimer Benjamin","year":"2020","unstructured":"Benjamin Reinheimer, Lukas Aldag, Peter Mayer, Mattia Mossano, Reyhan Duezguen, Bettina Lofthouse, Tatiana Von\u00a0Landesberger, and Melanie Volkamer. 2020. An investigation of phishing awareness and education over time: When and how to best remind users. In Sixteenth Symposium on Usable Privacy and Security (SOUPS 2020). 259\u2013284."},{"key":"e_1_3_3_2_45_2","doi-asserted-by":"crossref","unstructured":"James Reynolds Alastair McClelland and Adrian Furnham. 2014. An investigation of cognitive test performance across conditions of silence background noise and music as a function of neuroticism. Anxiety Stress & Coping 27 4 (2014) 410\u2013421.","DOI":"10.1080\/10615806.2013.864388"},{"key":"e_1_3_3_2_46_2","unstructured":"Elliott Salamon Steven\u00a0R. Bernstein Minsun Kim and George\u00a0B. Stefano. 2003. The Effects of Auditory Perception and Musical Preference on Anxiety in Naive Human Subjects. (2003)."},{"key":"e_1_3_3_2_47_2","doi-asserted-by":"crossref","unstructured":"Irwin\u00a0G Sarason. 1988. Anxiety self-preoccupation and attention. Anxiety research 1 1 (1988) 3\u20137.","DOI":"10.1080\/10615808808248215"},{"key":"e_1_3_3_2_48_2","doi-asserted-by":"publisher","DOI":"10.1145\/3544548.3581163"},{"key":"e_1_3_3_2_49_2","doi-asserted-by":"crossref","unstructured":"Andrew Smith. 1990. Noise performance efficiency and safety. International archives of occupational and environmental health 62 (1990) 1\u20135.","DOI":"10.1007\/BF00397841"},{"key":"e_1_3_3_2_50_2","doi-asserted-by":"crossref","unstructured":"Charles\u00a0D Spielberger Duncan\u00a0N Hansen et\u00a0al. 1969. Effects of state anxiety and task difficulty on computer-assisted learning. Journal of Educational Psychology 60 5 (1969) 343.","DOI":"10.1037\/h0028323"},{"key":"e_1_3_3_2_51_2","doi-asserted-by":"publisher","unstructured":"Lionel Standing and Greg Stace. 1980. The Effects of Environmental Noise on Anxiety Level. The Journal of General Psychology 103 2 (Oct. 1980) 263\u2013272. 10.1080\/00221309.1980.9921007","DOI":"10.1080\/00221309.1980.9921007"},{"key":"e_1_3_3_2_52_2","doi-asserted-by":"crossref","unstructured":"Emil Stobbe Josefine Sundermann Leonie Ascone and Simone K\u00fchn. 2022. Birdsongs Alleviate Anxiety and Paranoia in Healthy Participants. Scientific Reports 12 1 (2022) 16414.","DOI":"10.1038\/s41598-022-20841-0"},{"key":"e_1_3_3_2_53_2","doi-asserted-by":"crossref","unstructured":"David\u00a0L Strayer Jonna Turrill Joel\u00a0M Cooper James\u00a0R Coleman Nathan Medeiros-Ward and Francesco Biondi. 2015. Assessing cognitive distraction in the automobile. Human factors 57 8 (2015) 1300\u20131324.","DOI":"10.1177\/0018720815575149"},{"key":"e_1_3_3_2_54_2","doi-asserted-by":"crossref","unstructured":"Keith\u00a0S Taber. 2018. The use of Cronbach\u2019s alpha when developing and reporting research instruments in science education. Research in science education 48 (2018) 1273\u20131296.","DOI":"10.1007\/s11165-016-9602-2"},{"key":"e_1_3_3_2_55_2","doi-asserted-by":"publisher","unstructured":"Stephen\u00a0C. Van\u00a0Hedger Howard\u00a0C. Nusbaum Luke Clohisy Susanne\u00a0M. Jaeggi Martin Buschkuehl and Marc\u00a0G. Berman. 2019. Of Cricket Chirps and Car Horns: The Effect of Nature Sounds on Cognitive Performance. Psychonomic Bulletin & Review 26 2 (April 2019) 522\u2013530. 10.3758\/s13423-018-1539-1","DOI":"10.3758\/s13423-018-1539-1"},{"volume-title":"Phishing attacks are increasing and getting more sophisticated. Here\u2019s how to avoid them","author":"Violino Bob","key":"e_1_3_3_2_56_2","unstructured":"Bob Violino. [n. d.]. Phishing attacks are increasing and getting more sophisticated. Here\u2019s how to avoid them. https:\/\/www.cnbc.com\/2023\/01\/07\/phishing-attacks-are-increasing-and-getting-more-sophisticated.html"},{"key":"e_1_3_3_2_57_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-66504-3_19"},{"key":"e_1_3_3_2_58_2","doi-asserted-by":"crossref","unstructured":"Bradley\u00a0W Weaver Adam\u00a0M Braly and David\u00a0M Lane. 2021. Training users to identify phishing emails. Journal of Educational Computing Research 59 6 (2021) 1169\u20131183.","DOI":"10.1177\/0735633121992516"},{"key":"e_1_3_3_2_59_2","doi-asserted-by":"crossref","unstructured":"Muriel\u00a0M Woodhead. 1958. The effects of bursts of loud noise on a continuous visual task. British Journal of Industrial Medicine 15 2 (1958) 120.","DOI":"10.1136\/oem.15.2.120"},{"key":"e_1_3_3_2_60_2","doi-asserted-by":"publisher","DOI":"10.3389\/feduc.2024.1323843"},{"key":"e_1_3_3_2_61_2","doi-asserted-by":"crossref","unstructured":"Adriana\u00a0A Zekveld Sophia\u00a0E Kramer and Joost\u00a0M Festen. 2011. Cognitive load during speech perception in noise: The influence of age hearing loss and cognition on the pupil response. Ear and hearing 32 4 (2011) 498\u2013510.","DOI":"10.1097\/AUD.0b013e31820512bb"},{"key":"e_1_3_3_2_62_2","doi-asserted-by":"crossref","unstructured":"Andras\u00a0N Zsido Szidalisz\u00a0A Teleki Krisztina Csokasi Sandor Rozsa and Szabolcs\u00a0A Bandi. 2020. Development of the short version of the spielberger state\u2014trait anxiety inventory. Psychiatry research 291 (2020) 113223.","DOI":"10.1016\/j.psychres.2020.113223"}],"event":{"name":"CHI EA '25: Extended Abstracts of the CHI Conference on Human Factors in Computing Systems","sponsor":["SIGCHI ACM Special Interest Group on Computer-Human Interaction"],"location":"Yokohama Japan","acronym":"CHI EA '25"},"container-title":["Proceedings of the Extended Abstracts of the CHI Conference on Human Factors in Computing Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3706599.3720272","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3706599.3720272","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T01:18:51Z","timestamp":1750295931000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3706599.3720272"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,4,25]]},"references-count":61,"alternative-id":["10.1145\/3706599.3720272","10.1145\/3706599"],"URL":"https:\/\/doi.org\/10.1145\/3706599.3720272","relation":{},"subject":[],"published":{"date-parts":[[2025,4,25]]},"assertion":[{"value":"2025-04-25","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}