{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,23]],"date-time":"2026-04-23T07:55:32Z","timestamp":1776930932551,"version":"3.51.2"},"publisher-location":"New York, NY, USA","reference-count":108,"publisher":"ACM","funder":[{"name":"Deutsche Forschungsgemeinschaft (DFG, German Research Foundation) under Germany\u2019s Excellence Strategy","award":["EXC 2092 CASA - 390781972"],"award-info":[{"award-number":["EXC 2092 CASA - 390781972"]}]},{"name":"NSFC grant","award":["62432008"],"award-info":[{"award-number":["62432008"]}]},{"name":"RGC RIF grant","award":["R6021-20"],"award-info":[{"award-number":["R6021-20"]}]},{"name":"RGC TRS grant","award":["T43-513\/23N-2"],"award-info":[{"award-number":["T43-513\/23N-2"]}]},{"name":"RGC CRF grant","award":["C6015-23G"],"award-info":[{"award-number":["C6015-23G"]}]},{"name":"NSFC\/RGC grant","award":["CRS_HKUST601\/24"],"award-info":[{"award-number":["CRS_HKUST601\/24"]}]},{"name":"RGC GRF grant","award":["16207922"],"award-info":[{"award-number":["16207922"]}]},{"name":"RGC GRF grant","award":["16207423"],"award-info":[{"award-number":["16207423"]}]},{"name":"RGC GRF grant","award":["16203824"],"award-info":[{"award-number":["16203824"]}]},{"name":"Google","award":["Google Academic Research Award on Trust and Safety - 2024 - id: 00029925"],"award-info":[{"award-number":["Google Academic Research Award on Trust and Safety - 2024 - id: 00029925"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2026,4,13]]},"DOI":"10.1145\/3772318.3791003","type":"proceedings-article","created":{"date-parts":[[2026,4,13]],"date-time":"2026-04-13T06:44:11Z","timestamp":1776062651000},"page":"1-27","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Experiencer, Helper, or Observer: Online Fraud Intervention for Older Adults Through a Role-based Simulation Approach"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0008-5339-8792","authenticated-orcid":false,"given":"Yue","family":"Deng","sequence":"first","affiliation":[{"name":"The Hong Kong University of Science and Technology, Hong Kong, China and Max Planck Institute for Security and Privacy, Bochum, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0794-1551","authenticated-orcid":false,"given":"Xiaowei","family":"Chen","sequence":"additional","affiliation":[{"name":"Max Planck Insititute for Security and Privacy, Bochum, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0009-0006-9600-2482","authenticated-orcid":false,"given":"Junxiang","family":"Liao","sequence":"additional","affiliation":[{"name":"Industrial and Systems Engineering, The Hong Kong Polytechnic University, Hong Kong, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2955-750X","authenticated-orcid":false,"given":"Bo","family":"Li","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Engineering, Hong Kong University of Science and Technology, Hong Kong, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9088-705X","authenticated-orcid":false,"given":"Yixin","family":"Zou","sequence":"additional","affiliation":[{"name":"Max Planck Institute for Security and Privacy, Bochum, Germany"}]}],"member":"320","published-online":{"date-parts":[[2026,4,13]]},"reference":[{"key":"e_1_3_3_3_2_2","unstructured":"AARP. 2025. 12.5 Billion Reported Lost to Scams and Fraud in 2024 Older Adults Hit Hard. https:\/\/www.aarp.org\/money\/scams-fraud\/older-adults-ftc-fraud-report.html. Accessed: 2025-08-28."},{"key":"e_1_3_3_3_3_2","doi-asserted-by":"crossref","unstructured":"Ritu Agarwal and Elena Karahanna. 2000. Time flies when you\u2019re having fun: Cognitive absorption and beliefs about information technology usage. MIS quarterly (2000) 665\u2013694.","DOI":"10.2307\/3250951"},{"key":"e_1_3_3_3_4_2","doi-asserted-by":"crossref","unstructured":"Hamed Alqahtani and Manolya Kavakli-Thorne. 2020. Design and evaluation of an augmented reality game for cybersecurity awareness (CybAR). Information 11 2 (2020) 121.","DOI":"10.3390\/info11020121"},{"key":"e_1_3_3_3_5_2","doi-asserted-by":"crossref","unstructured":"Linda\u00a0M Alves and Steve\u00a0R Wilson. 2008. The effects of loneliness on telemarketing fraud vulnerability among older adults. Journal of elder abuse & neglect 20 1 (2008) 63\u201385.","DOI":"10.1300\/J084v20n01_04"},{"key":"e_1_3_3_3_6_2","doi-asserted-by":"crossref","unstructured":"Heba Aly Yizhou Liu Reza\u00a0Ghaiumy Anaraky Sushmita Khan Moses Namara Kaileigh\u00a0Angela Byrne and Bart Knijnenburg. 2024. Tailoring digital privacy education interventions for older adults: A comparative study on modality preferences and effectiveness. Proceedings on Privacy Enhancing Technologies (2024).","DOI":"10.56553\/popets-2024-0036"},{"key":"e_1_3_3_3_7_2","unstructured":"KB Anderson. 2003. Off the hook: Reducing participation in telemarketing fraud. Washington DC: AARP Foundation (2003)."},{"key":"e_1_3_3_3_8_2","doi-asserted-by":"crossref","unstructured":"PPG\u00a0Dinesh Asanka and Thilini\u00a0V Mahanama. 2024. Learning through Simulation: A Role-Based Learning Exercise to Equip Students in Big Data Requirement Elicitation Skills and Challenges. Journal of Computing Theories and Applications 2 1 (2024) 118\u2013130.","DOI":"10.62411\/jcta.10847"},{"key":"e_1_3_3_3_9_2","unstructured":"Experiential Learning\u00a0Hub at Queen\u2019s\u00a0University. 2021. Money Smart for Older Adults. https:\/\/www.queensu.ca\/experientiallearninghub\/sites\/qelhwww\/files\/uploaded_files\/Simulation%20Toolkit\/Simulation%20EL%20Faculty%20Toolkit%20%20Final%20Final%20April%208.pdf. Accessed: 2025-08-28."},{"key":"e_1_3_3_3_10_2","volume-title":"Social learning theory","author":"Bandura Albert","year":"1977","unstructured":"Albert Bandura and Richard\u00a0H Walters. 1977. Social learning theory. Vol.\u00a01. Prentice hall Englewood Cliffs, NJ."},{"key":"e_1_3_3_3_11_2","doi-asserted-by":"crossref","unstructured":"John\u00a0A Bargh and Yaacov Schul. 1980. On the cognitive benefits of teaching. Journal of educational psychology 72 5 (1980) 593.","DOI":"10.1037\/\/0022-0663.72.5.593"},{"key":"e_1_3_3_3_12_2","doi-asserted-by":"crossref","unstructured":"Virginia Braun and Victoria Clarke. 2006. Using thematic analysis in psychology. Qualitative research in psychology 3 2 (2006) 77\u2013101.","DOI":"10.1191\/1478088706qp063oa"},{"key":"e_1_3_3_3_13_2","doi-asserted-by":"publisher","DOI":"10.1108\/S1475-148820150000018004"},{"key":"e_1_3_3_3_14_2","unstructured":"Tom Brown Benjamin Mann Nick Ryder Melanie Subbiah Jared\u00a0D Kaplan Prafulla Dhariwal Arvind Neelakantan Pranav Shyam Girish Sastry Amanda Askell et\u00a0al. 2020. Language models are few-shot learners. Advances in neural information processing systems 33 (2020) 1877\u20131901."},{"key":"e_1_3_3_3_15_2","doi-asserted-by":"crossref","unstructured":"Egon Brunswik. 1955. Representative design and probabilistic theory in a functional psychology. Psychological review 62 3 (1955) 193.","DOI":"10.1037\/h0047470"},{"key":"e_1_3_3_3_16_2","doi-asserted-by":"crossref","unstructured":"Judee\u00a0K Burgoon David\u00a0B Buller Kory Floyd and Joseph Grandpre. 1996. Deceptive realities: Sender receiver and observer perspectives in deceptive conversations. Communication Research 23 6 (1996) 724\u2013748.","DOI":"10.1177\/009365096023006005"},{"key":"e_1_3_3_3_17_2","doi-asserted-by":"crossref","unstructured":"Mark Button Carol\u00a0McNaughton Nicholls Jane Kerr and Rachael Owen. 2014. Online frauds: Learning from victims why they fall for these scams. Australian & New Zealand journal of criminology 47 3 (2014) 391\u2013408.","DOI":"10.1177\/0004865814521224"},{"key":"e_1_3_3_3_18_2","doi-asserted-by":"crossref","unstructured":"Mark Button David Shepherd Chloe Hawkins and Jacki Tapley. 2024. Disseminating fraud awareness and prevention advice to older adults: perspectives on the most effective means of delivery. Crime Prevention and Community Safety 26 4 (2024) 385\u2013400.","DOI":"10.1057\/s41300-024-00218-3"},{"key":"e_1_3_3_3_19_2","doi-asserted-by":"publisher","DOI":"10.1145\/3706599.3719806"},{"key":"e_1_3_3_3_20_2","doi-asserted-by":"publisher","DOI":"10.1145\/3613904.3641943"},{"key":"e_1_3_3_3_21_2","doi-asserted-by":"crossref","unstructured":"Edwin Ka\u00a0Hung Chung and Dannii Yuen-lan Yeung. 2023. Reducing older people\u2019s risk of fraud victimization through an anti-scam board game. Journal of Elder Abuse & Neglect 35 2-3 (2023) 121\u2013138.","DOI":"10.1080\/08946566.2023.2240005"},{"key":"e_1_3_3_3_22_2","doi-asserted-by":"crossref","unstructured":"Benjamin\u00a0D Cone Cynthia\u00a0E Irvine Michael\u00a0F Thompson and Thuy\u00a0D Nguyen. 2007. A video game for cyber security training and awareness. computers & security 26 1 (2007) 63\u201372.","DOI":"10.1016\/j.cose.2006.10.005"},{"key":"e_1_3_3_3_23_2","volume-title":"Practical nonparametric statistics","author":"Conover William\u00a0Jay","year":"1999","unstructured":"William\u00a0Jay Conover. 1999. Practical nonparametric statistics. john wiley & sons."},{"key":"e_1_3_3_3_24_2","volume-title":"Judgment analysis: Theory, methods, and applications.","author":"Cooksey Ray\u00a0W","year":"1996","unstructured":"Ray\u00a0W Cooksey. 1996. Judgment analysis: Theory, methods, and applications.Academic press."},{"key":"e_1_3_3_3_25_2","volume-title":"Basics of qualitative research: Techniques and procedures for developing grounded theory","author":"Corbin Juliet","year":"2014","unstructured":"Juliet Corbin and Anselm Strauss. 2014. Basics of qualitative research: Techniques and procedures for developing grounded theory. Sage publications."},{"key":"e_1_3_3_3_26_2","unstructured":"Federal Deposit\u00a0Insurance Corporation. 2024. Money Smart for Older Adults. https:\/\/www.fdic.gov\/consumer-resource-center\/money-smart-older-adults. Accessed: 2025-08-28."},{"key":"e_1_3_3_3_27_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-91735-7_11"},{"key":"e_1_3_3_3_28_2","doi-asserted-by":"publisher","DOI":"10.1145\/3706598.3713427"},{"key":"e_1_3_3_3_29_2","unstructured":"Beijing Daily. 2025. Scam online investments are targeting the elderly; be wary of claims of guaranteed profits. https:\/\/xinwen.bjd.com.cn\/content\/s67d7c555e4b068c68f111cf4.htmll. Accessed: 2025-11-15."},{"key":"e_1_3_3_3_30_2","doi-asserted-by":"crossref","unstructured":"Amy Debban\u00e9 Ken\u00a0Jen Lee Jarvis Tse and Edith Law. 2023. Learning by teaching: Key challenges and design implications. Proceedings of the ACM on Human-Computer Interaction 7 CSCW1 (2023) 1\u201334.","DOI":"10.1145\/3579501"},{"key":"e_1_3_3_3_31_2","doi-asserted-by":"publisher","DOI":"10.1145\/2207676.2208589"},{"key":"e_1_3_3_3_32_2","doi-asserted-by":"publisher","DOI":"10.1145\/3706598.3714137"},{"key":"e_1_3_3_3_33_2","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516753"},{"key":"e_1_3_3_3_34_2","doi-asserted-by":"publisher","DOI":"10.1145\/3544548.3581170"},{"key":"e_1_3_3_3_35_2","doi-asserted-by":"publisher","DOI":"10.1145\/1143120.1143131"},{"key":"e_1_3_3_3_36_2","doi-asserted-by":"crossref","unstructured":"David Duran. 2017. Learning-by-teaching. Evidence and implications as a pedagogical mechanism. Innovations in education and teaching international 54 5 (2017) 476\u2013484.","DOI":"10.1080\/14703297.2016.1156011"},{"key":"e_1_3_3_3_37_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-39696-5_7"},{"key":"e_1_3_3_3_38_2","doi-asserted-by":"publisher","DOI":"10.1145\/3041021.3053889"},{"key":"e_1_3_3_3_39_2","doi-asserted-by":"publisher","DOI":"10.1145\/3706598.3713115"},{"key":"e_1_3_3_3_40_2","unstructured":"FBI. 2024. Elder Fraud in Focus. https:\/\/www.fbi.gov\/news\/stories\/elder-fraud-in-focus. Accessed: 2025-08-28."},{"key":"e_1_3_3_3_41_2","doi-asserted-by":"publisher","DOI":"10.1145\/3290607.3312846"},{"key":"e_1_3_3_3_42_2","doi-asserted-by":"crossref","unstructured":"Kraig Finstad. 2010. The usability metric for user experience. Interacting with computers 22 5 (2010) 323\u2013327.","DOI":"10.1016\/j.intcom.2010.04.004"},{"key":"e_1_3_3_3_43_2","doi-asserted-by":"crossref","unstructured":"Jonathan Galbraith and Mark Winterbottom. 2011. Peer-tutoring: what\u2019s in it for the tutor? Educational Studies 37 3 (2011) 321\u2013332.","DOI":"10.1080\/03055698.2010.506330"},{"key":"e_1_3_3_3_44_2","doi-asserted-by":"publisher","DOI":"10.1145\/3690624.3709399"},{"key":"e_1_3_3_3_45_2","volume-title":"Proceedings of the Workshop on Usable Security and Privacy (USEC)","author":"Gopavaram Shakthidhar","year":"2021","unstructured":"Shakthidhar Gopavaram, Jayati Dev, Marthie Grobler, DongInn Kim, Sanchari Das, and L\u00a0Jean Camp. 2021. Cross-national study on phishing resilience. In Proceedings of the Workshop on Usable Security and Privacy (USEC)."},{"key":"e_1_3_3_3_46_2","doi-asserted-by":"crossref","unstructured":"Frank\u00a0L Greitzer Wanru Li Kathryn\u00a0B Laskey James Lee and Justin Purl. 2021. Experimental investigation of technical and human factors related to phishing susceptibility. ACM Transactions on Social Computing 4 2 (2021) 1\u201348.","DOI":"10.1145\/3461672"},{"key":"e_1_3_3_3_47_2","doi-asserted-by":"crossref","unstructured":"Changyang He Lu He Zhicong Lu and Bo Li. 2023. \" I Have to Use My Son\u2019s QR Code to Run the Business\": Unpacking Senior Street Vendors\u2019 Challenges in Mobile Money Collection in China. Proceedings of the ACM on Human-Computer Interaction 7 CSCW1 (2023) 1\u201328.","DOI":"10.1145\/3579493"},{"key":"e_1_3_3_3_48_2","first-page":"463","volume-title":"Eighteenth Symposium on Usable Privacy and Security (SOUPS 2022)","author":"Herbert Franziska","year":"2022","unstructured":"Franziska Herbert, Marvin Kowalewski, Theodor Schnitzler, Leona Lassak, and Markus D\u00fcrmuth. 2022. \u201cFast, Easy, Convenient.\u201d Studying Adoption and Perception of Digital Covid Certificates. In Eighteenth Symposium on Usable Privacy and Security (SOUPS 2022). 463\u2013482."},{"key":"e_1_3_3_3_49_2","doi-asserted-by":"publisher","DOI":"10.1109\/CARS61786.2024.10778759"},{"key":"e_1_3_3_3_50_2","doi-asserted-by":"crossref","unstructured":"Vincent Hoogerheide Lian Deijkers Sofie\u00a0MM Loyens Anita Heijltjes and Tamara van Gog. 2016. Gaining from explaining: Learning improves from explaining to fictitious others on video not from writing to them. Contemporary Educational Psychology 44 (2016) 95\u2013106.","DOI":"10.1016\/j.cedpsych.2016.02.005"},{"key":"e_1_3_3_3_51_2","doi-asserted-by":"crossref","unstructured":"Mo Houtti Abhishek Roy Venkata Narsi\u00a0Reddy Gangula and Ashley\u00a0Marie Walker. 2024. A survey of scam exposure victimization types vectors and reporting in 12 countries. arXiv preprint arXiv:https:\/\/arXiv.org\/abs\/2407.12896 (2024).","DOI":"10.54501\/jots.v2i4.204"},{"key":"e_1_3_3_3_52_2","doi-asserted-by":"publisher","DOI":"10.1145\/3706598.3713798"},{"key":"e_1_3_3_3_53_2","doi-asserted-by":"crossref","unstructured":"David\u00a0Michael Hull Sebastian\u00a0Walter Schuetz and Paul\u00a0Benjamin Lowry. 2023. Tell me a story: The effects that narratives exert on meaningful-engagement outcomes in antiphishing training. Computers & Security 129 (2023) 103252.","DOI":"10.1016\/j.cose.2023.103252"},{"key":"e_1_3_3_3_54_2","doi-asserted-by":"crossref","unstructured":"Bryan\u00a0D James Patricia\u00a0A Boyle and David\u00a0A Bennett. 2014. Correlates of susceptibility to scams in older adults without dementia. Journal of elder abuse & neglect 26 2 (2014) 107\u2013122.","DOI":"10.1080\/08946566.2013.821809"},{"key":"e_1_3_3_3_55_2","doi-asserted-by":"crossref","unstructured":"Sarah Janssens Yoriko Kikkawa and Timothy\u00a0J Mavin. 2023. How do maternity teams perform in and perceive a role-based approach to teamwork in maternity emergencies? A qualitative study in simulation. International Journal of Healthcare Simulation (2023).","DOI":"10.54531\/wywv6555"},{"key":"e_1_3_3_3_56_2","doi-asserted-by":"crossref","unstructured":"Rebecca\u00a0A Judges Sara\u00a0N Gallant Lixia Yang and Kang Lee. 2017. The role of cognition personality and trust in fraud victimization in older adults. Frontiers in psychology 8 (2017) 588.","DOI":"10.3389\/fpsyg.2017.00588"},{"key":"e_1_3_3_3_57_2","unstructured":"Shamya Karumbaiah Ryan\u00a0T Wright Alexandra Durcikova and Matthew\u00a0L Jensen. 2016. Phishing training: a preliminary look at the effects of different types of training. (2016)."},{"key":"e_1_3_3_3_58_2","volume-title":"Experiential learning: Experience as the source of learning and development","author":"Kolb David\u00a0A","year":"2014","unstructured":"David\u00a0A Kolb. 2014. Experiential learning: Experience as the source of learning and development. FT press."},{"key":"e_1_3_3_3_59_2","doi-asserted-by":"crossref","unstructured":"William\u00a0H Kruskal and W\u00a0Allen Wallis. 1952. Use of ranks in one-criterion variance analysis. Journal of the American statistical Association 47 260 (1952) 583\u2013621.","DOI":"10.1080\/01621459.1952.10483441"},{"key":"e_1_3_3_3_60_2","doi-asserted-by":"publisher","DOI":"10.1145\/1240624.1240760"},{"key":"e_1_3_3_3_61_2","doi-asserted-by":"publisher","DOI":"10.1109\/ECRIME.2008.4696970"},{"key":"e_1_3_3_3_62_2","doi-asserted-by":"publisher","DOI":"10.1109\/SP46214.2022.9833766"},{"key":"e_1_3_3_3_63_2","doi-asserted-by":"crossref","unstructured":"Fatimah Lateef. 2010. Simulation-based learning: Just like the real thing. Journal of emergencies trauma and shock 3 4 (2010) 348\u2013352.","DOI":"10.4103\/0974-2700.70743"},{"key":"e_1_3_3_3_64_2","doi-asserted-by":"crossref","unstructured":"Claire\u00a0Seungeun Lee. 2021. Online fraud victimization in China: A case study of Baidu Tieba. Victims & Offenders 16 3 (2021) 343\u2013362.","DOI":"10.1080\/15564886.2020.1838372"},{"key":"e_1_3_3_3_65_2","unstructured":"Wanru Li James Lee Justin Purl Frank Greitzer Bahram Yousefi and Kathryn Laskey. 2020. Experimental investigation of demographic factors related to phishing susceptibility. (2020)."},{"key":"e_1_3_3_3_66_2","unstructured":"Xiang Li and Yun Ai. 2025. Cultural Phishing: The Emotional Inducement in Financial Scam in China. (2025)."},{"key":"e_1_3_3_3_67_2","doi-asserted-by":"crossref","unstructured":"Tian Lin Daniel\u00a0E Capecci Donovan\u00a0M Ellis Harold\u00a0A Rocha Sandeep Dommaraju Daniela\u00a0S Oliveira and Natalie\u00a0C Ebner. 2019. Susceptibility to spear-phishing emails: Effects of internet user demographics and email content. ACM Transactions on Computer-Human Interaction (TOCHI) 26 5 (2019) 1\u201328.","DOI":"10.1145\/3336141"},{"key":"e_1_3_3_3_68_2","first-page":"2153","volume-title":"Society for Information Technology & Teacher Education International Conference","author":"Linser Roni","year":"2011","unstructured":"Roni Linser. 2011. What can we learn from the last 20 years of Role Based E-learning? Analysis and critique. In Society for Information Technology & Teacher Education International Conference. Association for the Advancement of Computing in Education (AACE), 2153\u20132158."},{"key":"e_1_3_3_3_69_2","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP57164.2023.00011"},{"key":"e_1_3_3_3_70_2","doi-asserted-by":"crossref","unstructured":"Sophia Lobanov-Rostovsky Qianyu He Yuntao Chen Yuyang Liu Yanjuan Wu Yixuan Liu Tishya Venkatraman Eric French Natasha Curry Nina Hemmings et\u00a0al. 2023. Growing old in China in socioeconomic and epidemiological context: systematic review of social care policy for older people. BMC public health 23 1 (2023) 1272.","DOI":"10.1186\/s12889-023-15583-1"},{"key":"e_1_3_3_3_71_2","doi-asserted-by":"publisher","DOI":"10.1145\/3617072.3617099"},{"key":"e_1_3_3_3_72_2","doi-asserted-by":"crossref","unstructured":"Kylie\u00a0A Molinaro and Matthew\u00a0L Bolton. 2018. Evaluating the applicability of the double system lens model to the analysis of phishing email judgments. computers & security 77 (2018) 128\u2013137.","DOI":"10.1016\/j.cose.2018.03.012"},{"key":"e_1_3_3_3_73_2","doi-asserted-by":"crossref","unstructured":"Mar\u00eda\u00a0M Moreno-Fern\u00e1ndez Fernando Blanco Pablo Garaizar and Helena Matute. 2017. Fishing for phishers. Improving Internet users\u2019 sensitivity to visual deception cues to prevent electronic fraud. Computers in Human Behavior 69 (2017) 421\u2013436.","DOI":"10.1016\/j.chb.2016.12.044"},{"key":"e_1_3_3_3_74_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4939-0378-8_2"},{"key":"e_1_3_3_3_75_2","doi-asserted-by":"crossref","unstructured":"Savanthi Murthy Karthik\u00a0S Bhat Sauvik Das and Neha Kumar. 2021. Individually vulnerable collectively safe: The security and privacy practices of households with older adults. Proceedings of the ACM on Human-Computer Interaction 5 CSCW1 (2021) 1\u201324.","DOI":"10.1145\/3449212"},{"key":"e_1_3_3_3_76_2","doi-asserted-by":"crossref","unstructured":"George Nasser Ben\u00a0W Morrison Piers Bayl-Smith Ronnie Taib Michael Gayed and Mark\u00a0W Wiggins. 2020. The role of cue utilization and cognitive load in the recognition of phishing emails. Frontiers in big data 3 (2020) 546860.","DOI":"10.3389\/fdata.2020.546860"},{"key":"e_1_3_3_3_77_2","unstructured":"Anquan Neican. 2022. How Can We Safeguard the 119 Million Older Adults Using the Internet? https:\/\/www.secrss.com\/articles\/47233. Accessed: 2025-08-28."},{"key":"e_1_3_3_3_78_2","doi-asserted-by":"publisher","DOI":"10.1145\/3025453.3025831"},{"key":"e_1_3_3_3_79_2","unstructured":"National\u00a0Council on Aging. 2020. Seniors Against Scams Financial Education. https:\/\/www.ncoa.org\/article\/seniors-against-scams-financial-education\/. Accessed: 2025-08-28."},{"key":"e_1_3_3_3_80_2","unstructured":"OpenAI. 2024. OpenAI Platform. https:\/\/platform.openai.com\/docs\/api-reference\/chat\/create. Accessed: 2025-08-28."},{"key":"e_1_3_3_3_81_2","doi-asserted-by":"crossref","unstructured":"Dustin Ormond Merrill Warkentin Allen\u00a0C Johnston and Samuel\u00a0C Thompson. 2016. Perceived deception: Evaluating source credibility and self-efficacy. journal of information privacy and security 12 4 (2016) 197\u2013217.","DOI":"10.1080\/15536548.2016.1243857"},{"key":"e_1_3_3_3_82_2","doi-asserted-by":"crossref","unstructured":"Stephanie O\u2019Regan Elizabeth Molloy Leonie Watterson and Debra Nestel. 2016. Observer roles that optimise learning in healthcare simulation education: a systematic review. Advances in Simulation 1 1 (2016) 4.","DOI":"10.1186\/s41077-015-0004-8"},{"key":"e_1_3_3_3_83_2","doi-asserted-by":"crossref","unstructured":"Katalin Parti Thomas Dearden Whytnee Foriest James Hawdon Pekka R\u00e4s\u00e4nen Akos Szigeti and Tibor Kiss. 2025. Cross-country comparison analysis of individual and institutional factors of anomie and online offending. European Journal of Criminology 22 2 (2025) 230\u2013255.","DOI":"10.1177\/14773708241276944"},{"key":"e_1_3_3_3_84_2","doi-asserted-by":"crossref","unstructured":"Katalin Parti and Faika Tahir. 2023. \u201cIf we don\u2019t listen to them we make them lose more than money:\u201d exploring reasons for underreporting and the needs of older scam victims. Social Sciences 12 5 (2023) 264.","DOI":"10.3390\/socsci12050264"},{"key":"e_1_3_3_3_85_2","unstructured":"David\u00a0MW Powers. 2011. Evaluation: from precision recall and F-measure to ROC informedness markedness and correlation. arXiv preprint arXiv:https:\/\/arXiv.org\/abs\/2010.16061 (2011)."},{"key":"e_1_3_3_3_86_2","doi-asserted-by":"publisher","DOI":"10.1145\/3217804.3217907"},{"key":"e_1_3_3_3_87_2","doi-asserted-by":"crossref","unstructured":"Amon Rapp Chiara Di\u00a0Lodovico and Luigi Di\u00a0Caro. 2025. How do people react to ChatGPT\u2019s unpredictable behavior? Anthropomorphism uncanniness and fear of AI: A qualitative study on individuals\u2019 perceptions and understandings of LLMs\u2019 nonsensical hallucinations. International Journal of Human-Computer Studies 198 (2025) 103471.","DOI":"10.1016\/j.ijhcs.2025.103471"},{"key":"e_1_3_3_3_88_2","doi-asserted-by":"crossref","unstructured":"Jingjin Shao Qianhan Zhang Yining Ren Xiying Li and Tian Lin. 2019. Why are older adults victims of fraud? Current knowledge and prospects regarding older adults\u2019 vulnerability to fraud. Journal of elder abuse & neglect 31 3 (2019) 225\u2013243.","DOI":"10.1080\/08946566.2019.1625842"},{"key":"e_1_3_3_3_89_2","doi-asserted-by":"crossref","unstructured":"Carolyn\u00a0M Shaw and Bob Switky. 2018. Designing and using simulations in the international relations classroom. Journal of Political Science Education 14 4 (2018) 523\u2013534.","DOI":"10.1080\/15512169.2018.1433543"},{"key":"e_1_3_3_3_90_2","doi-asserted-by":"publisher","DOI":"10.1145\/3678884.3681894"},{"key":"e_1_3_3_3_91_2","doi-asserted-by":"publisher","DOI":"10.1145\/3706599.3720263"},{"key":"e_1_3_3_3_92_2","doi-asserted-by":"publisher","DOI":"10.1145\/1280680.1280692"},{"key":"e_1_3_3_3_93_2","doi-asserted-by":"crossref","unstructured":"Robert\u00a0E Slavin. 1980. Cooperative learning. Review of educational research 50 2 (1980) 315\u2013342.","DOI":"10.3102\/00346543050002315"},{"key":"e_1_3_3_3_94_2","doi-asserted-by":"crossref","unstructured":"Erika\u00a0P Sparrow Liyana\u00a0T Swirsky Farrah Kudus and Julia Spaniol. 2021. Aging and altruism: A meta-analysis. Psychology and Aging 36 1 (2021) 49.","DOI":"10.1037\/pag0000447"},{"key":"e_1_3_3_3_95_2","doi-asserted-by":"crossref","unstructured":"Daniel Sturman Elliot\u00a0A Bell Jaime\u00a0C Auton Georgia\u00a0R Breakey and Mark\u00a0W Wiggins. 2024. The roles of phishing knowledge cue utilization and decision styles in phishing email detection. Applied Ergonomics 119 (2024) 104309.","DOI":"10.1016\/j.apergo.2024.104309"},{"key":"e_1_3_3_3_96_2","doi-asserted-by":"crossref","unstructured":"Keith\u00a0S Taber. 2018. The use of Cronbach\u2019s alpha when developing and reporting research instruments in science education. Research in science education 48 6 (2018) 1273\u20131296.","DOI":"10.1007\/s11165-016-9602-2"},{"key":"e_1_3_3_3_97_2","unstructured":"UNSW Teaching. 2024. Assessing with Role Plays and Simulations. https:\/\/www.teaching.unsw.edu.au\/assessing-role-play-and-simulation. Accessed: 2025-08-28."},{"key":"e_1_3_3_3_98_2","volume-title":"2014 USENIX Summit on Gaming, Games, and Gamification in Security Education (3GSE 14)","author":"Thompson Michael\u00a0F","year":"2014","unstructured":"Michael\u00a0F Thompson and Cynthia\u00a0E Irvine. 2014. { CyberCIEGE} Scenario Design and Implementation. In 2014 USENIX Summit on Gaming, Games, and Gamification in Security Education (3GSE 14)."},{"key":"e_1_3_3_3_99_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-98385-1_9"},{"key":"e_1_3_3_3_100_2","doi-asserted-by":"crossref","unstructured":"Zhiyuan Wan Lingfeng Bao Debin Gao Eran Toch Xin Xia Tamir Mendel and David Lo. 2019. Appmod: Helping older adults manage mobile security with online social help. Proceedings of the ACM on Interactive Mobile Wearable and Ubiquitous Technologies 3 4 (2019) 1\u201322.","DOI":"10.1145\/3369819"},{"key":"e_1_3_3_3_101_2","doi-asserted-by":"crossref","unstructured":"Yashuang Wang and Yan Ji. 2021. How do they learn: types and characteristics of medical and healthcare student engagement in a simulation-based learning environment. BMC medical education 21 1 (2021) 420.","DOI":"10.1186\/s12909-021-02858-7"},{"key":"e_1_3_3_3_102_2","doi-asserted-by":"publisher","DOI":"10.1145\/3290605.3300338"},{"key":"e_1_3_3_3_103_2","unstructured":"Wikipedia. [n. d.]. Retirement age. https:\/\/en.wikipedia.org\/wiki\/Retirement_age. Accessed: 2024-07-01."},{"key":"e_1_3_3_3_104_2","unstructured":"Wikipedia. 2024. Minimum wage in China. https:\/\/en.wikipedia.org\/wiki\/Minimum_wage_in_China. Accessed: 2024-07-18."},{"key":"e_1_3_3_3_105_2","unstructured":"Wikipedia. 2025. Roleplay simulation. https:\/\/en.wikipedia.org\/wiki\/Roleplay_simulation. Accessed: 2025-08-28."},{"key":"e_1_3_3_3_106_2","unstructured":"Sandra Wills. 2012. Role-based e-learning for university students: A comparison of Australian American British and Singapore designs. (2012)."},{"key":"e_1_3_3_3_107_2","doi-asserted-by":"publisher","DOI":"10.1145\/3706598.3713493"},{"key":"e_1_3_3_3_108_2","doi-asserted-by":"crossref","unstructured":"William Yeoh He Huang Wang-Sheng Lee Fadi Al\u00a0Jafari and Rachel Mansson. 2022. Simulated phishing attack and embedded training campaign. Journal of Computer Information Systems 62 4 (2022) 802\u2013821.","DOI":"10.1080\/08874417.2021.1919941"},{"key":"e_1_3_3_3_109_2","doi-asserted-by":"publisher","DOI":"10.1145\/3706598.3714423"}],"event":{"name":"CHI 2026: CHI Conference on Human Factors in Computing Systems","location":"Barcelona Spain","acronym":"CHI '26","sponsor":["SIGCHI ACM Special Interest Group on Computer-Human Interaction"]},"container-title":["Proceedings of the 2026 CHI Conference on Human Factors in Computing Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3772318.3791003","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,4,13]],"date-time":"2026-04-13T07:13:53Z","timestamp":1776064433000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3772318.3791003"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,4,13]]},"references-count":108,"alternative-id":["10.1145\/3772318.3791003","10.1145\/3772318"],"URL":"https:\/\/doi.org\/10.1145\/3772318.3791003","relation":{},"subject":[],"published":{"date-parts":[[2026,4,13]]},"assertion":[{"value":"2026-04-13","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}