{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,17]],"date-time":"2025-11-17T02:30:39Z","timestamp":1763346639641,"version":"3.45.0"},"reference-count":65,"publisher":"Tech Science Press","issue":"3","license":[{"start":{"date-parts":[[2025,10,26]],"date-time":"2025-10-26T00:00:00Z","timestamp":1761436800000},"content-version":"vor","delay-in-days":298,"URL":"https:\/\/doi.org\/10.32604\/TSP-CROSSMARKPOLICY"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["CMC"],"published-print":{"date-parts":[[2025]]},"DOI":"10.32604\/cmc.2025.065059","type":"journal-article","created":{"date-parts":[[2025,9,25]],"date-time":"2025-09-25T09:39:17Z","timestamp":1758793157000},"page":"4753-4776","update-policy":"https:\/\/doi.org\/10.32604\/tsp-crossmarkpolicy","source":"Crossref","is-referenced-by-count":0,"title":["The Psychological Manipulation of Phishing Emails: A Cognitive Bias Approach"],"prefix":"10.32604","volume":"85","author":[{"given":"Yulin","family":"Yao","sequence":"first","affiliation":[]},{"given":"Kangfeng","family":"Zheng","sequence":"additional","affiliation":[]},{"given":"Bin","family":"Wu","sequence":"additional","affiliation":[]},{"given":"Chunhua","family":"Wu","sequence":"additional","affiliation":[]},{"given":"Jiaqi","family":"Gao","sequence":"additional","affiliation":[]},{"given":"Jvjie","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Minjiao","family":"Yang","sequence":"additional","affiliation":[]}],"member":"17807","published-online":{"date-parts":[[2025]]},"reference":[{"key":"ref1","doi-asserted-by":"crossref","first-page":"113977","DOI":"10.1016\/j.dss.2023.113977","article-title":"Towards a thematic dimensional framework of online fraud: an exploration of fraudulent email attack tactics and intentions","volume":"171","author":"Bera","year":"2023","journal-title":"Decis Support Syst"},{"key":"ref2","unstructured":"Mitnick KD, Simon WL. The art of deception: controlling the human element of security. Hoboken, NJ, USA: John Wiley & Sons; 2003 [cited 2025 Jan 1]. Available from: https:\/\/dl.acm.org\/doi\/book\/10.5555\/579369."},{"key":"ref3","unstructured":"Nasdaq V. 2024 global financial crime report 2024 [Online]. [cited 2025 Jan 1]. Available from: https:\/\/verafin.com\/nasdaq-verafin-global-financial-crime-report\/."},{"key":"ref4","unstructured":"Intelligence S. Social engineering in the era of generative AI: predictions for 2024, security Intelligence 2024 [Online]. [cited 2025 Jan 1]. Available from: https:\/\/www.securityintelligence.com\/articles\/social-engineering-generative-ai-2024."},{"key":"ref5","unstructured":"Coden M, Czumak M. How health care providers can thwart cyber attacks 2021 [Online]. [cited 2025 Jan 1]. Available from: https:\/\/www.bcg.com\/publications\/2021\/cyber-attack-prevention-for-health-care-providers."},{"key":"ref6","doi-asserted-by":"crossref","first-page":"135","DOI":"10.3389\/fpsyg.2018.00135","article-title":"Creative persuasion: a study on adversarial behaviors and strategies in phishing attacks","volume":"9","author":"Rajivan","year":"2018","journal-title":"Front Psychol"},{"key":"ref7","unstructured":"Team R. Email statistics report, 2023\u20132027 [Online]. Palo Alto, CA, USA: Radicati Group, Inc.; 2023 [cited 2025 Jan 1]. Available from: https:\/\/www.radicati.com\/wp\/wp-content\/uploads\/2023\/04\/Email-Statistics-Report-2023-2027-Executive-Summary.pdf."},{"key":"ref8","doi-asserted-by":"crossref","first-page":"1509","DOI":"10.1109\/ACCESS.2021.3137636","article-title":"A deep learning-based framework for phishing website detection","volume":"10","author":"Tang","year":"2021","journal-title":"IEEE Access"},{"key":"ref9","doi-asserted-by":"crossref","first-page":"2015","DOI":"10.1007\/s12652-018-0798-z","article-title":"A machine learning based approach for phishing detection using hyperlinks information","volume":"10","author":"Jain","year":"2019","journal-title":"J Ambient Intell Humaniz Comput"},{"key":"ref10","series-title":"Information Security Applications: 20th International Conference, WISA; 2019 Aug 21\u201324; Jeju Island, Republic of Korea","first-page":"219","article-title":"Catching the phish: detecting phishing attacks using recurrent neural networks (RNNs)","author":"Halga\u0161","year":"2020"},{"key":"ref11","series-title":"Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems; 2019 May 4\u20139; Glasgow, UK","first-page":"1","article-title":"Put your warning where your link is: improving and evaluating email phishing warnings","author":"Petelka","year":"2019"},{"key":"ref12","series-title":"Proceedings of the CHI Conference on Human Factors in Computing Systems; 2024 May 11\u201316; Honolulu, HI, USA","first-page":"1","article-title":"Better together: the interplay between a phishing awareness video and a link-centric phishing support tool","author":"Berens","year":"2024"},{"key":"ref13","unstructured":"Cialdini RB, Cialdini RB. Influence: the psychology of persuasion. New York, NY, USA: Collins; 2007. [cited 2025 Jan 1]. Available from: https:\/\/ouci.dntb.gov.ua\/en\/works\/9GLJxzZ7\/."},{"key":"ref14","doi-asserted-by":"crossref","first-page":"73548","DOI":"10.1109\/ACCESS.2022.3190009","article-title":"Spear-phishing susceptibility stemming from personality traits","volume":"10","author":"Eftimie","year":"2022","journal-title":"IEEE Access"},{"key":"ref15","series-title":"International Conference on Neural Information Processing; 2023 Nov 20\u201323; Changsha, China","first-page":"550","article-title":"How the presence of cognitive biases in phishing emails affects human decision-making?","author":"Sharma","year":"2023"},{"key":"ref16","series-title":"HCI International 2020: 22nd International Conference, HCII; 2020 Jul 19\u201324; Copenhagen, Denmark","first-page":"520","article-title":"Effects of recipient information and urgency cues on phishing detection","author":"Cui","year":"2020"},{"key":"ref17","unstructured":"Modic D. Willing to be scammed: how self-control impacts Internet scam compliance 2012 [Online]. [cited 2025 Jan 1]. Available from: https:\/\/ore.exeter.ac.uk\/repository\/bitstream\/handle\/10871\/8044\/ModicD_fm.pdf?sequence=1."},{"key":"ref18","doi-asserted-by":"crossref","first-page":"1296","DOI":"10.1002\/acp.3594","article-title":"Perceptual representation of spam and phishing emails","volume":"33","author":"Patel","year":"2019","journal-title":"Appl Cogn Psychol"},{"key":"ref19","doi-asserted-by":"crossref","first-page":"70","DOI":"10.1145\/1897852.1897872","article-title":"Understanding scam victims: seven principles for systems security","volume":"54","author":"Stajano","year":"2011","journal-title":"Commun ACM"},{"key":"ref20","doi-asserted-by":"crossref","first-page":"e165","DOI":"10.1002\/spy2.165","article-title":"Phishing email strategies: understanding cybercriminals' strategies of crafting phishing emails","volume":"4","author":"Stojnic","year":"2021","journal-title":"Secur Priv"},{"journal-title":"Thinking, fast and slow","year":"2011","author":"Kahneman","key":"ref21"},{"key":"ref22","first-page":"74","article-title":"Representativeness revisited: attribute substitution in intuitive judgment","volume":"49","author":"Kahneman","year":"2002","journal-title":"Heuristics Biases Psychol Intuitive Judgm"},{"key":"ref23","first-page":"55","article-title":"An intelligent classification model for phishing email detection","volume":"8","author":"Yasin","year":"2016","journal-title":"Int J Netw Secur Appl"},{"key":"ref24","series-title":"2015 9th International Conference on Software, Knowledge, Information Management and Applications (SKIMA)","first-page":"1","article-title":"Detection of phishing emails using data mining algorithms","author":"Smadi","year":"2015 Dec 15\u201317"},{"key":"ref25","first-page":"9","article-title":"An optimised phishing email detection and prevention using classification models","volume":"7","author":"Mohammed","year":"2023","journal-title":"Int J Eng Appl Sci Technol"},{"key":"ref26","series-title":"2017 Computing Conference; 2017 Jul 18\u201320; London, UK","first-page":"149","article-title":"Employing machine learning techniques for detection and classification of phishing emails","author":"Moradpoor"},{"key":"ref27","doi-asserted-by":"crossref","first-page":"23","DOI":"10.1007\/s10115-011-0403-7","article-title":"Highly discriminative statistical features for email classification","volume":"31","author":"Gomez","year":"2012","journal-title":"Knowl Inf Syst"},{"key":"ref28","doi-asserted-by":"crossref","first-page":"324","DOI":"10.1016\/j.jnca.2012.05.009","article-title":"A multi-tier phishing detection and filtering approach","volume":"36","author":"Islam","year":"2013","journal-title":"J Netw Comput Appl"},{"key":"ref29","doi-asserted-by":"crossref","first-page":"747","DOI":"10.1108\/JEIM-01-2020-0036","article-title":"Intelligent phishing detection scheme using deep learning algorithms","volume":"36","author":"Adebowale","year":"2023","journal-title":"J Enterp Inf Manag"},{"key":"ref30","unstructured":"Park G, Taylor JM. Using syntactic features for phishing detection. arXiv:1506.00037. 2015."},{"key":"ref31","doi-asserted-by":"crossref","first-page":"102414","DOI":"10.1016\/j.cose.2021.102414","article-title":"Applying machine learning and natural language processing to detect phishing email","volume":"110","author":"Alhogail","year":"2021","journal-title":"Comput Secur"},{"key":"ref32","doi-asserted-by":"crossref","first-page":"18","DOI":"10.1016\/j.dss.2016.05.005","article-title":"PhishWHO: phishing webpage detection via identity keywords extraction and target domain name finder","volume":"88","author":"Tan","year":"2016","journal-title":"Decis Support Syst"},{"key":"ref33","doi-asserted-by":"crossref","first-page":"191","DOI":"10.1007\/s42979-020-00194-z","article-title":"Phishing email detection based on binary search feature selection","volume":"1","author":"Sonowal","year":"2020","journal-title":"SN Comput Sci"},{"key":"ref34","series-title":"2018 IEEE International Conference on Data Mining Workshops (ICDMW)","first-page":"7","article-title":"Phishing email detection using robust NLP techniques","author":"Egozi","year":"2018 Nov 17\u201320"},{"key":"ref35","doi-asserted-by":"crossref","first-page":"168261","DOI":"10.1109\/ACCESS.2019.2954791","article-title":"A comprehensive survey for intelligent spam email detection","volume":"7","author":"Karim","year":"2019","journal-title":"IEEE Access"},{"key":"ref36","doi-asserted-by":"crossref","first-page":"102328","DOI":"10.1016\/j.cose.2021.102328","article-title":"Adopting automated whitelist approach for detecting phishing attacks","volume":"108","author":"Azeez","year":"2021","journal-title":"Comput Secur"},{"key":"ref37","doi-asserted-by":"crossref","first-page":"7","DOI":"10.3233\/JCS-2010-0371","article-title":"New filtering approaches for phishing email","volume":"18","author":"Bergholz","year":"2010","journal-title":"J Comput Secur"},{"key":"ref38","doi-asserted-by":"crossref","first-page":"215","DOI":"10.1007\/s11235-009-9247-9","article-title":"Defending the weakest link: phishing websites detection byanalysing user behaviours","volume":"45","author":"Dong","year":"2010","journal-title":"Telecommun Syst"},{"key":"ref39","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3469886","article-title":"Human factors in phishing attacks: a systematic literature review","volume":"54","author":"Desolda","year":"2022","journal-title":"ACM Comput Surv"},{"key":"ref40","doi-asserted-by":"crossref","first-page":"76","DOI":"10.1038\/scientificamerican0201-76","article-title":"The science of persuasion","volume":"284","author":"Cialdini","year":"2001","journal-title":"Sci Am"},{"key":"ref41","doi-asserted-by":"crossref","first-page":"103084","DOI":"10.1016\/j.apergo.2020.103084","article-title":"Email phishing and signal detection: how persuasion principles and personality influence response patterns and accuracy","volume":"86","author":"Lawson","year":"2020","journal-title":"Appl Ergon"},{"key":"ref42","first-page":"747","article-title":"Phishing email detection using persuasion cues","volume":"19","author":"Valecha","year":"2022","journal-title":"IEEE Trans Dependable Secure Comput"},{"key":"ref43","doi-asserted-by":"crossref","first-page":"461","DOI":"10.1109\/TAFFC.2019.2931689","article-title":"Psychophysiological reactions to persuasive messages deploying persuasion principles","volume":"13","author":"Spelt","year":"2019","journal-title":"IEEE Trans Affect Comput"},{"key":"ref44","doi-asserted-by":"crossref","first-page":"1173","DOI":"10.1007\/s00779-012-0585-3","article-title":"Adaptive persuasive messaging to increase service retention: using persuasion profiles to increase the effectiveness of email reminders","volume":"17","author":"Kaptein","year":"2013","journal-title":"Pers Ubiquitous Comput"},{"key":"ref45","doi-asserted-by":"crossref","first-page":"102937","DOI":"10.1016\/j.cose.2022.102937","article-title":"Why people keep falling for phishing scams: the effects of time pressure and deception cues on the detection of phishing emails","volume":"123","author":"Butavicius","year":"2022","journal-title":"Comput Secur"},{"key":"ref46","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.ijhcs.2018.06.004","article-title":"Exploring susceptibility to phishing in the workplace","volume":"120","author":"Williams","year":"2018","journal-title":"Int J Hum Comput Stud"},{"key":"ref47","doi-asserted-by":"crossref","first-page":"576","DOI":"10.1016\/j.dss.2011.03.002","article-title":"Why do people get phished? Testing individual differences in phishing vulnerability within an integrated, information processing model","volume":"51","author":"Vishwanath","year":"2011","journal-title":"Decis Support Syst"},{"key":"ref48","doi-asserted-by":"crossref","first-page":"194","DOI":"10.1016\/j.cose.2015.02.008","article-title":"The design of phishing studies: challenges for researchers","volume":"52","author":"Parsons","year":"2015","journal-title":"Comput Secur"},{"key":"ref49","unstructured":"Akbar N. Analysing persuasion principles in phishing emails 2014 [Online]. [cited 2025 Jan 1]. Available from: https:\/\/essay.utwente.nl\/66177\/."},{"key":"ref50","first-page":"759","article-title":"Overconfidence in phishing email detection","volume":"17","author":"Wang","year":"2016","journal-title":"J Assoc Inf Syst"},{"key":"ref51","unstructured":"Cranford EA, Lebiere C, Rajivan P, Aggarwal P, Gonzalez C. Modeling cognitive dynamics in end-user response to phishing emails. Proceedings of the 17th ICCM 2019 [Online]. [cited 2025 Jan 1]. Available from: https:\/\/iccm-conference.neocities.org\/2019\/proceedings\/papers\/ICCM2019_paper_57.pdf."},{"key":"ref52","unstructured":"Tiwari P. Exploring phishing susceptibility attributable to authority, urgency, risk perception and human factors 2020 [Online]. [cited 2025 Jan 1]. Available from: https:\/\/hammer.purdue.edu\/articles\/thesis\/EXPLORING_PHISHING_SUSCEPTIBILITY_ATTRIBUTABLE_TO_AUTHORITY_URGENCY_RISK_PERCEPTION_AND_HUMAN_FACTORS\/12739592."},{"key":"ref53","doi-asserted-by":"crossref","first-page":"19","DOI":"10.1016\/j.ijhcs.2018.12.004","article-title":"Persuasion: how phishing emails can influence users and bypass security measures","volume":"125","author":"Ferreira","year":"2019","journal-title":"Int J Hum Comput Stud"},{"key":"ref54","unstructured":"Gilligan M. This cognitive bias codex categorizes and defines each cognitive bias 2022 [Online]. [cited 2025 Jan 1]. Available from: https:\/\/twistedsifter.com\/2022\/08\/this-cognitive-bias-codex-categorizes-and-defines-each-cognitive-bias\/."},{"key":"ref55","doi-asserted-by":"crossref","first-page":"75","DOI":"10.1037\/0033-2909.116.1.75","article-title":"The psychology of curiosity: a review and reinterpretation","volume":"116","author":"Loewenstein","year":"1994","journal-title":"Psychol Bull"},{"key":"ref56","doi-asserted-by":"crossref","first-page":"296","DOI":"10.1207\/S15327957PSPR0504_2","article-title":"Negativity bias, negativity dominance, and contagion","volume":"5","author":"Rozin","year":"2001","journal-title":"Pers Soc Psychol Rev"},{"key":"ref57","unstructured":"Hinnosaar M, Hinnosaar T. Authority bias [Online]. [cited 2025 Jan 1]. Available from: https:\/\/www.academia.edu\/2108445\/Authority."},{"key":"ref58","doi-asserted-by":"crossref","first-page":"279","DOI":"10.3758\/BF03212593","article-title":"Novelty, complexity, and hedonic value","volume":"8","author":"Berlyne","year":"1970","journal-title":"Percept Psychophys"},{"key":"ref59","unstructured":"The Decision Lab. Survivorship bias 2021 [Online]. [cited 2025 Jan 1]. Available from: https:\/\/thedecisionlab.com\/biases\/survivorship-bias."},{"key":"ref60","doi-asserted-by":"crossref","first-page":"8914","DOI":"10.5688\/ajpe8914","article-title":"The illusion of urgency","volume":"86","author":"Kennedy","year":"2022","journal-title":"Am J Pharm Educ"},{"key":"ref61","doi-asserted-by":"crossref","first-page":"235","DOI":"10.1023\/A:1007740225484","article-title":"Explaining the identifiable victim effect","volume":"14","author":"Jenni","year":"1997","journal-title":"J Risk Uncertain"},{"key":"ref62","unstructured":"Crosby D. The laws of wealth. Mumbai, India: Jaico Publishing House [Internet]; 2021 [cited 2025 Jan 1]. Available from: https:\/\/www.blinkist.com\/en\/books\/the-laws-of-wealth-en."},{"key":"ref63","doi-asserted-by":"crossref","first-page":"261","DOI":"10.1002\/mde.2715","article-title":"The cardinal anomalies that led to behavioral economics: cognitive or motivational?","volume":"37","author":"Ainslie","year":"2016","journal-title":"Manage Decis Econ"},{"key":"ref64","doi-asserted-by":"crossref","first-page":"371","DOI":"10.1037\/h0040525","article-title":"Behavioral study of obedience","volume":"67","author":"Milgram","year":"1963","journal-title":"J Abnorm Soc Psychol"},{"key":"ref65","series-title":"2024 12th International Symposium on Digital Forensics and Security (ISDFS)","first-page":"1","article-title":"Why phishing emails escape detection: a closer look at the failure points","author":"Champa","year":"2024 Apr 29\u201330"}],"container-title":["Computers, Materials &amp; Continua"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/cdn.techscience.cn\/files\/cmc\/2025\/TSP_CMC-85-3\/TSP_CMC_65059\/TSP_CMC_65059.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,17]],"date-time":"2025-11-17T02:27:06Z","timestamp":1763346426000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.techscience.com\/cmc\/v85n3\/64135"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"references-count":65,"journal-issue":{"issue":"3","published-online":{"date-parts":[[2025]]},"published-print":{"date-parts":[[2025]]}},"URL":"https:\/\/doi.org\/10.32604\/cmc.2025.065059","relation":{},"ISSN":["1546-2226"],"issn-type":[{"type":"electronic","value":"1546-2226"}],"subject":[],"published":{"date-parts":[[2025]]},"assertion":[{"value":"2025-03-02","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2025-06-28","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2025-10-23","order":2,"name":"published","label":"Published Online","group":{"name":"publication_history","label":"Publication History"}}]}}