{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,13]],"date-time":"2026-04-13T16:31:52Z","timestamp":1776097912502,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":91,"publisher":"ACM","funder":[{"name":"Federal Ministry of Health","award":["ZMI1-2521FSB801"],"award-info":[{"award-number":["ZMI1-2521FSB801"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2025,11,19]]},"DOI":"10.1145\/3719027.3765164","type":"proceedings-article","created":{"date-parts":[[2025,11,22]],"date-time":"2025-11-22T23:42:02Z","timestamp":1763854922000},"page":"4334-4348","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Phishing Susceptibility and the (In-)Effectiveness of Common Anti-Phishing Interventions in a Large University Hospital"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-1961-100X","authenticated-orcid":false,"given":"Jan","family":"Tolsdorf","sequence":"first","affiliation":[{"name":"The George Washington University, Washington, D.C., USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0644-4799","authenticated-orcid":false,"given":"David","family":"Langer","sequence":"additional","affiliation":[{"name":"H-BRS University of Applied Sciences, Sankt Augustin, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7863-0622","authenticated-orcid":false,"given":"Luigi","family":"Lo Iacono","sequence":"additional","affiliation":[{"name":"Justus Liebig University Giessen, Giessen, Germany"}]}],"member":"320","published-online":{"date-parts":[[2025,11,22]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Holm's sequential Bonferroni procedure. Encyclopedia of research design 1, 8","author":"Abdi Herv\u00e9","year":"2010","unstructured":"Herv\u00e9 Abdi. 2010. Holm's sequential Bonferroni procedure. Encyclopedia of research design 1, 8 (2010), 1--8."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/1299015.1299021"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1136\/bmjopen-2023-079931"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1055\/s-0041-1735527"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"crossref","unstructured":"Eric P. Allman Jon Callas Jim Fenton Miles Libbey Michael Thomas and Mark Delany. 2007. DomainKeys Identified Mail (DKIM) Signatures. RFC 4871. https: \/\/rfc-editor.org\/rfc\/rfc4871.txt","DOI":"10.17487\/rfc4871"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"crossref","unstructured":"Saad Altamimi Karen Renaud and Timothy Storer. 2020. ''I Do It Because They Do It'': Social-Neutralisation in Information Security Practices of Saudi Medical Interns. In Risks and Security of Internet and Systems. 227--243.","DOI":"10.1007\/978-3-030-41568-6_15"},{"key":"e_1_3_2_1_7_1","volume-title":"Work Complexity, and Repeated Alerts on Alert Fatigue in a Clinical Decision Support System. BMC Medical Informatics and Decision Making 17, 1","author":"Ancker Jessica S.","year":"2017","unstructured":"Jessica S. Ancker, Alison Edwards, Sarah Nosal, Diane Hauser, Elizabeth Mauer, and Rainu Kaushal. 2017. Effects of Workload, Work Complexity, and Repeated Alerts on Alert Fatigue in a Clinical Decision Support System. BMC Medical Informatics and Decision Making 17, 1 (2017)."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.leaqua.2010.10.010"},{"key":"e_1_3_2_1_9_1","unstructured":"American Political Science Association (APSA). 2020. Principles and Guidance for Human Subjects Research. https:\/\/connect.apsanet.org\/hsr\/principles-andguidance\/"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.18637\/jss.v111.i09"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2022.3151103"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/3708821.3733905"},{"key":"e_1_3_2_1_13_1","unstructured":"Bianka Breyer and Matthias Bluemke. 2016. Deutsche Version der Positive and Negative Affect Schedule PANAS (GESIS Panel)."},{"key":"e_1_3_2_1_14_1","volume-title":"Proceedings of the 32nd USENIX Security Symposium.","author":"Brunken Lina","year":"2023","unstructured":"Lina Brunken, Annalina Buckmann, Jonas Hielscher, and M Angela Sasse. 2023. ''To Do This Properly, You Need More Resources'': The Hidden Costs of Introducing Simulated Phishing Campaigns. In Proceedings of the 32nd USENIX Security Symposium."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2018.03.050"},{"key":"e_1_3_2_1_16_1","volume-title":"Statistical Power Analysis for the Behavioral Sciences (2 ed.)","author":"Cohen Jacob","unstructured":"Jacob Cohen. 1988. Statistical Power Analysis for the Behavioral Sciences (2 ed.). Academic Press."},{"key":"e_1_3_2_1_17_1","unstructured":"Nicholas Counter. 2025. Health Care Workers Across Germany Go on Strike. https:\/\/www.dw.com\/en\/health-care-workers-across-germany-go-onstrike\/ a-71844915. Accessed: 2025-07--27."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-50309-3_8"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.2345\/0899-8205-46.4.268"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"crossref","unstructured":"Shanee Dawkins and Jody Jacobs. 2023. NIST Phish Scale User Guide. Technical Report NIST TN 2276. National Institute of Standards and Technology (U.S.). NIST TN 2276 pages.","DOI":"10.6028\/NIST.TN.2276"},{"key":"e_1_3_2_1_21_1","article-title":"Human Factors in Phishing Attacks","volume":"54","author":"Desolda Giuseppe","year":"2021","unstructured":"Giuseppe Desolda, Lauren S. Ferro, Andrea Marrella, Tiziana Catarci, and Maria Francesca Costabile. 2021. Human Factors in Phishing Attacks: A Systematic Literature Review. Comput. Surveys 54, 8 (2021), 173:1--173:35.","journal-title":"A Systematic Literature Review. Comput. Surveys"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/1357054.1357219"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijmedinf.2015.09.006"},{"key":"e_1_3_2_1_24_1","volume-title":"OSH Pulse - Occupational Safety and Health in Post- Pandemic Workplaces. Report","author":"Eurobarometer Flash","unstructured":"Flash Eurobarometer. 2022. OSH Pulse - Occupational Safety and Health in Post- Pandemic Workplaces. Report. European Agency for Safety and Health at Work."},{"key":"e_1_3_2_1_25_1","unstructured":"European Commission & European Parliament. 2016. Directive (EU) 2016\/1148 on security of network and information systems."},{"key":"e_1_3_2_1_26_1","volume-title":"Directorate-General for Communication","author":"European Commission","year":"2025","unstructured":"European Commission, Directorate-General for Communication. 2025. European Action Plan on the Cybersecurity of Hospitals and Healthcare Providers. https: \/\/commission.europa.eu\/cybersecurity-healthcare_en."},{"key":"e_1_3_2_1_27_1","unstructured":"European Parliament & Council of the European Union. 2022. Directive (EU) 2022\/2555 on measures for a high common level of cybersecurity across the Union (NIS2)."},{"key":"e_1_3_2_1_28_1","volume-title":"ENISA Threat Landscape","author":"European Union Agency for Cybersecurity. 2024.","year":"2024","unstructured":"European Union Agency for Cybersecurity. 2024. ENISA Threat Landscape 2024. https:\/\/www.enisa.europa.eu\/publications\/enisa-threat-landscape-2024."},{"key":"e_1_3_2_1_29_1","unstructured":"European Union Agency for Cybersecurity (ENISA). 2024. NIS Investments 2024: Cybersecurity Policy Assessment. Technical Report TP-01--24-001-EN-NN. ENISA."},{"key":"e_1_3_2_1_30_1","volume-title":"Proceedings of the 53rd Hawaii International Conference on System Sciences (HICSS). 3871--3880","author":"Fabisiak Luiza","year":"2020","unstructured":"Luiza Fabisiak and Tomasz Hyla. 2020. Measuring Cyber Security Awareness within Groups of Medical Professionals in Poland. In Proceedings of the 53rd Hawaii International Conference on System Sciences (HICSS). 3871--3880."},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijhcs.2018.12.004"},{"key":"e_1_3_2_1_32_1","volume-title":"Proceedings of the 17th Symposium on Usable Privacy and Security (SOUPS). 339--358","author":"Franz Anjuli","year":"2021","unstructured":"Anjuli Franz, Verena Zimmermann, Gregor Albrecht, Katrin Hartwig, Christian Reuter, Alexander Benlian, and Joachim Vogt. 2021. SoK: Still Plenty of Phish in the Sea \u2014 A Taxonomy of User-Oriented Phishing Interventions and Avenues for Future Research. In Proceedings of the 17th Symposium on Usable Privacy and Security (SOUPS). 339--358."},{"key":"e_1_3_2_1_33_1","volume-title":"Ethisches Handeln in der psychologischen Forschung: Empfehlungen der Deutschen Gesellschaft f\u00fcr Psychologie f\u00fcr Forschende und Ethikkommissionen (","author":"\u00fcr Psychologie Deutsche Gesellschaft","unstructured":"Deutsche Gesellschaft f\u00fcr Psychologie. 2018. Ethisches Handeln in der psychologischen Forschung: Empfehlungen der Deutschen Gesellschaft f\u00fcr Psychologie f\u00fcr Forschende und Ethikkommissionen (1. Auflage ed.). Hogrefe.","edition":"1"},{"key":"e_1_3_2_1_34_1","unstructured":"Deutschen Gesellschaft f\u00fcr Soziologie and Berufsverbandes Deutscher Soziologinnen und Soziologen. 2017. Ethik-Kodex der Deutschen Gesellschaft f\u00fcr Soziologie (DGS) und des Berufsverbandes Deutscher Soziologinnen und Soziologen (BDS). https:\/\/soziologie.de\/dgs\/ethik\/ethik-kodex"},{"key":"e_1_3_2_1_35_1","unstructured":"Google. 2025. Advanced phishing and malware protection. https:\/\/web.archive.org\/web\/20250321123725\/https:\/\/support.google.com\/a\/answer\/9157861 Accessed: 2025-03--23."},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1001\/jamanetworkopen.2019.0393"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1093\/jamia\/ocz005"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.2196\/21747"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/1719030.1719050"},{"key":"e_1_3_2_1_40_1","volume-title":"Proceedings of the 2025 IEEE Symposium on Security and Privacy (SP). 76--76","author":"Ho Grant","unstructured":"Grant Ho, Ariana Mirian, Elisa Luo, Khang Tong, Euyhyun Lee, Lin Liu, Christopher A. Longhurst, Christian Dameff, Stefan Savage, and Geoffrey M. Voelker. 2025. Understanding the Efficacy of Phishing Training in Practice. In Proceedings of the 2025 IEEE Symposium on Security and Privacy (SP). 76--76."},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.5555\/3241189.3241227"},{"key":"e_1_3_2_1_42_1","volume-title":"Proceedings of the 27th USENIX Security Symposium. 1095--1112","author":"Hu Hang","year":"2018","unstructured":"Hang Hu and Gang Wang. 2018. End-to-End Measurements of Email Spoofing Attacks. In Proceedings of the 27th USENIX Security Symposium. 1095--1112."},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.2196\/16775"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.2196\/10059"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1186\/s13673-020-00237-7"},{"key":"e_1_3_2_1_46_1","volume-title":"Proceedings of the Human Factors and Ergonomics Society Annual Meeting 53","author":"Kim Soyun","year":"2009","unstructured":"Soyun Kim and Michael S. Wogalter. 2009. Habituation, Dishabituation, and Recovery Effects in Visual Warnings. Proceedings of the Human Factors and Ergonomics Society Annual Meeting 53, 20 (2009), 1612--1616."},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"crossref","unstructured":"D. Scott Kitterman. 2014. Sender Policy Framework (SPF) for Authorizing Use of Domains in Email Version 1. RFC 7208. https:\/\/rfc-editor.org\/rfc\/rfc7208.txt","DOI":"10.17487\/rfc7208"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1145\/3658644.3690348"},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP46214.2022.9833766"},{"key":"e_1_3_2_1_50_1","volume-title":"Proceedings of the Nineteenth USENIX Conference on Usable Privacy and Security. 77--96","author":"Liu Enze","unstructured":"Enze Liu, Lu Sun, Alex Bellon, Grant Ho, Geoffrey M. Voelker, Stefan Savage, and Imani N. S. Munyaka. 2023. Understanding the Viability of Gmail's Origin Indicator for Identifying the Sender. In Proceedings of the Nineteenth USENIX Conference on Usable Privacy and Security. 77--96."},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1038\/s41598-024-52887-7"},{"key":"e_1_3_2_1_52_1","unstructured":"Franck Martin Eliot Lear Tim Draegen Elizabeth Zwicky and Kurt Andersen. 2016. Interoperability Issues between Domain-Based Message Authentication Reporting and Conformance (DMARC) and Indirect Email Flows. RFC 7960. https:\/\/rfc-editor.org\/rfc\/rfc7960.txt"},{"key":"e_1_3_2_1_53_1","unstructured":"Microsoft. 2024. Safe Links in Microsoft Defender for Office 365. https:\/\/web.archive.org\/web\/20240528173533\/https:\/\/learn.microsoft.com\/enus\/ defender-office-365\/safe-links-about Accessed: 2025-04-03."},{"key":"e_1_3_2_1_54_1","unstructured":"Microsoft. 2025. Anti-phishing policies in Microsoft 365. https: \/\/web.archive.org\/web\/20250323024553\/https:\/\/learn.microsoft.com\/enus\/ defender-office-365\/anti-phishing-policies-about Accessed: 2025-03--23."},{"key":"e_1_3_2_1_55_1","unstructured":"Microsoft. 2025. Set-ExternalInOutlook. https:\/\/web.archive.org\/web\/ 20250304002443\/https:\/\/learn.microsoft.com\/en-us\/powershell\/module\/ exchange\/set-externalinoutlook?view=exchange-ps Accessed: 2025-04-03."},{"key":"e_1_3_2_1_56_1","volume-title":"Design and analysis of experiments","author":"Montgomery Douglas C.","unstructured":"Douglas C. Montgomery. 2017. Design and analysis of experiments (9th ed.).","edition":"9"},{"key":"e_1_3_2_1_57_1","unstructured":"Barracuda Networks. 2025. Email Warning Banner Messages - Barracuda Email Gateway Defense. https:\/\/web.archive.org\/web\/20250117190326\/https: \/\/campus.barracuda.com\/product\/emailgatewaydefense\/doc\/167977270\/emailwarning- banner-messages\/ Accessed: 2025-01--17."},{"key":"e_1_3_2_1_58_1","unstructured":"PANACEA Consortium. 2019--2022. PANACEA Research: People-centric Cybersecurity Toolkit for Healthcare Institutions. https:\/\/panacearesearch.eu\/."},{"key":"e_1_3_2_1_59_1","volume-title":"Proceedings of the 2015 Australasian Conference on Information Systems (ACIS).","author":"Parsons Kathryn","year":"2015","unstructured":"Kathryn Parsons, Marcus A. Butavicius, Malcolm Robert Pattinson, Dragana Calic, Agata McCormac, and Cate Jerram. 2015. Do Users Focus on the Correct Cues to Differentiate Between Phishing and Genuine Emails?. In Proceedings of the 2015 Australasian Conference on Information Systems (ACIS)."},{"key":"e_1_3_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.1145\/3290605.3300748"},{"key":"e_1_3_2_1_61_1","doi-asserted-by":"publisher","DOI":"10.1093\/biomet\/33.4.305"},{"key":"e_1_3_2_1_62_1","doi-asserted-by":"publisher","DOI":"10.1136\/bmjhci-2019-100031"},{"key":"e_1_3_2_1_63_1","unstructured":"Proofpoint. 2025. URL Defense FAQ's. https:\/\/help.proofpoint.com\/Proofpoint_ Essentials\/Email_Security\/User_Topics\/Targeted_Attack_Protection\/URL_ Defense_FAQ's Accessed: 2025-04-03."},{"key":"e_1_3_2_1_64_1","doi-asserted-by":"publisher","DOI":"10.1177\/20552076221081716"},{"key":"e_1_3_2_1_65_1","doi-asserted-by":"publisher","DOI":"10.1287\/isre.2020.0941"},{"key":"e_1_3_2_1_66_1","volume-title":"A Multi-vocal Literature Review on Challenges and Critical Success Factors of Phishing Education, Training and Awareness. Journal of Systems and Software","author":"Sarker Orvila","year":"2023","unstructured":"Orvila Sarker, Asangi Jayatilaka, Sherif Haggag, Chelsea Liu, and M. Ali Babar. 2023. A Multi-vocal Literature Review on Challenges and Critical Success Factors of Phishing Education, Training and Awareness. Journal of Systems and Software (2023), 111899."},{"key":"e_1_3_2_1_67_1","doi-asserted-by":"publisher","DOI":"10.1145\/3658644.3690212"},{"key":"e_1_3_2_1_68_1","volume-title":"Proceedings of the 33rd USENIX Security Symposium. 4589--4606","author":"Sch\u00f6ps Markus","unstructured":"Markus Sch\u00f6ps, Marco Gutfleisch, Eric Wolter, and M. Angela Sasse. 2024. Simulated Stress: A Case Study of the Effects of a Simulated Phishing Campaign on Employees' Perception, Stress and Self-Efficacy. In Proceedings of the 33rd USENIX Security Symposium. 4589--4606."},{"key":"e_1_3_2_1_69_1","volume-title":"Campbell","author":"Shadish William R.","year":"2001","unstructured":"William R. Shadish, Thomas D. Cook, and Donald T. Campbell. 2001. Experimental and quasi-experimental designs for generalized causal inference. Houghton, Mifflin and Company."},{"key":"e_1_3_2_1_70_1","doi-asserted-by":"publisher","DOI":"10.1109\/eCrime47957.2019.9037502"},{"key":"e_1_3_2_1_71_1","volume-title":"Proceedings of the Workshop on Usable Security (USEC).","author":"Steves Michelle P.","unstructured":"Michelle P. Steves, Kristen K. Greene, and Mary F. Theofanos. 2019. A Phish Scale: Rating Human Phishing Message Detection Difficulty. In Proceedings of the Workshop on Usable Security (USEC)."},{"key":"e_1_3_2_1_72_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2022.3207272"},{"key":"e_1_3_2_1_73_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-29381-9_35"},{"key":"e_1_3_2_1_74_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2023.103487"},{"key":"e_1_3_2_1_75_1","doi-asserted-by":"publisher","unstructured":"Jan Tolsdorf David Langer and Luigi Lo Iacono. 2025. Supplementary Materials for the Paper ''Phishing Susceptibility and the (In-)Effectiveness of Common Anti-Phishing Interventions in a Large University Hospital''. doi:10.5281\/zenodo. 17014954","DOI":"10.5281\/zenodo"},{"key":"e_1_3_2_1_76_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-61382-1_7"},{"key":"e_1_3_2_1_77_1","volume-title":"Proceedings of the 28th USENIX Conference on Security Symposium. 1309--1326","author":"Der Heijden Amber Van","year":"2019","unstructured":"Amber Van Der Heijden and Luca Allodi. 2019. Cognitive Triaging of Phishing Attacks. In Proceedings of the 28th USENIX Conference on Security Symposium. 1309--1326."},{"key":"e_1_3_2_1_78_1","doi-asserted-by":"publisher","DOI":"10.1145\/3025453.3025896"},{"key":"e_1_3_2_1_79_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2011.03.002"},{"key":"e_1_3_2_1_80_1","doi-asserted-by":"publisher","DOI":"10.1108\/ICS-07-2015-0032"},{"key":"e_1_3_2_1_81_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2017.02.004"},{"key":"e_1_3_2_1_82_1","volume-title":"Martina Angela Sasse, and Franziska Boehm","author":"Volkamer Melanie","year":"2020","unstructured":"Melanie Volkamer, Martina Angela Sasse, and Franziska Boehm. 2020. Analysing Simulated Phishing Campaigns for Staff. In Computer Security. 312--328."},{"key":"e_1_3_2_1_83_1","doi-asserted-by":"publisher","DOI":"10.3758\/BRM.41.2.534"},{"key":"e_1_3_2_1_84_1","volume-title":"Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems. 1--12","author":"Wash Rick","unstructured":"Rick Wash and Molly M. Cooper. 2018. Who Provides Phishing Training? Facts, Stories, and People Like Me. In Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems. 1--12."},{"key":"e_1_3_2_1_85_1","doi-asserted-by":"publisher","DOI":"10.1037\/0022-3514.54.6.1063"},{"key":"e_1_3_2_1_86_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijhcs.2018.06.004"},{"key":"e_1_3_2_1_87_1","volume-title":"Event history analysis","author":"Yamaguchi Kazuo","unstructured":"Kazuo Yamaguchi. 1991. Event history analysis. SAGE Publications, Inc."},{"key":"e_1_3_2_1_88_1","doi-asserted-by":"publisher","DOI":"10.1145\/3055305.3055310"},{"key":"e_1_3_2_1_89_1","first-page":"1i","article-title":"Human Factors in Electronic Health Records Cybersecurity Breach: An Exploratory Analysis","author":"Yeo Liu Hua","year":"2022","unstructured":"Liu Hua Yeo and James Banfield. 2022. Human Factors in Electronic Health Records Cybersecurity Breach: An Exploratory Analysis. Perspectives in Health Information Management 19, Spring (2022), 1i.","journal-title":"Perspectives in Health Information Management 19"},{"key":"e_1_3_2_1_90_1","doi-asserted-by":"publisher","DOI":"10.1145\/3575797"},{"key":"e_1_3_2_1_91_1","doi-asserted-by":"publisher","DOI":"10.1177\/1541931213601175"}],"event":{"name":"CCS '25: ACM SIGSAC Conference on Computer and Communications Security","location":"Taipei Taiwan","acronym":"CCS '25","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 2025 ACM SIGSAC Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3719027.3765164","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,12,22]],"date-time":"2025-12-22T22:27:14Z","timestamp":1766442434000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3719027.3765164"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,11,19]]},"references-count":91,"alternative-id":["10.1145\/3719027.3765164","10.1145\/3719027"],"URL":"https:\/\/doi.org\/10.1145\/3719027.3765164","relation":{},"subject":[],"published":{"date-parts":[[2025,11,19]]},"assertion":[{"value":"2025-11-22","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}