{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,6]],"date-time":"2024-09-06T00:26:23Z","timestamp":1725582383736},"publisher-location":"Berlin, Heidelberg","reference-count":40,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642206320"},{"type":"electronic","value":"9783642206337"}],"license":[{"start":{"date-parts":[[2011,1,1]],"date-time":"2011-01-01T00:00:00Z","timestamp":1293840000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011]]},"DOI":"10.1007\/978-3-642-20633-7_18","type":"book-chapter","created":{"date-parts":[[2011,4,27]],"date-time":"2011-04-27T07:55:43Z","timestamp":1303890943000},"page":"253-265","source":"Crossref","is-referenced-by-count":11,"title":["Interface Design Elements for Anti-phishing Systems"],"prefix":"10.1007","author":[{"given":"Yan","family":"Chen","sequence":"first","affiliation":[]},{"given":"Fatemeh","family":"Zahedi","sequence":"additional","affiliation":[]},{"given":"Ahmed","family":"Abbasi","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"10","key":"18_CR1","doi-asserted-by":"publisher","first-page":"78","DOI":"10.1109\/MC.2009.306","volume":"42","author":"A. Abbasi","year":"2009","unstructured":"Abbasi, A., Chen, H.: A Comparison of Tools for Detecting Fake Websites. IEEE Computer\u00a042(10), 78\u201386 (2009)","journal-title":"IEEE Computer"},{"issue":"3","key":"18_CR2","doi-asserted-by":"crossref","first-page":"435","DOI":"10.2307\/25750686","volume":"34","author":"A. Abbasi","year":"2010","unstructured":"Abbasi, A., Zhang, Z., Zimbra, D., Chen, H., Nunamaker Jr., J.F.: Detecting Fake Websites: The Contribution of Statistical Learning Theory. MIS Quarterly\u00a034(3), 435\u2013461 (2010)","journal-title":"MIS Quarterly"},{"issue":"2","key":"18_CR3","doi-asserted-by":"publisher","first-page":"1","DOI":"10.2308\/jis.2007.21.2.1","volume":"21","author":"T.S. Amer","year":"2007","unstructured":"Amer, T.S., Maris, J.B.: Signal Words and Signal Icons in Application Control and Information Technology Exception Messages\u2014Hazard Matching and Habituation Effects. Journal of Information Systems\u00a021(2), 1\u201326 (2007)","journal-title":"Journal of Information Systems"},{"key":"18_CR4","first-page":"1","volume-title":"Proc. of 1st Con. on Usability, Psychology, and Security","author":"L.F. Cranor","year":"2008","unstructured":"Cranor, L.F.: A framework for Reasoning about the Human in the Loop. In: Proc. of 1st Con. on Usability, Psychology, and Security, pp. 1\u201315. USENIX Association, Berkeley (2008)"},{"key":"18_CR5","volume-title":"Finding Flow: The Psychology of Engagement in Everyday Life","author":"M. Csikszentmihalyi","year":"1997","unstructured":"Csikszentmihalyi, M.: Finding Flow: The Psychology of Engagement in Everyday Life. Basic Book, New York (1997)"},{"key":"18_CR6","doi-asserted-by":"crossref","unstructured":"Desaulniers, D.R.: Layout, Organization, and the Effectiveness of Consumer Product Warnings. In: Proc. Human Factors Society 31st Annual Meeting, Santa Monica, CA, pp. 50\u201360 (1987)","DOI":"10.1177\/154193128703100112"},{"key":"18_CR7","doi-asserted-by":"crossref","unstructured":"Dhamija, R., Tygar, J.D., Hearst, M.: Why Phishing Works. In: Proceedings of the ACM Conference on Computer Human Interaction, Montreal, Quebec, pp. 581\u2013590 (2006)","DOI":"10.1145\/1124772.1124861"},{"issue":"4","key":"18_CR8","doi-asserted-by":"publisher","first-page":"202","DOI":"10.1016\/0003-6870(94)90001-9","volume":"25","author":"J. Edworthy","year":"1994","unstructured":"Edworthy, J.: The Design and Implementation of Non-Verbal Auditory Warnings. Applied Ergonomics\u00a025(4), 202\u2013210 (1994)","journal-title":"Applied Ergonomics"},{"issue":"1\/2","key":"18_CR9","first-page":"3","volume":"2","author":"J. Edworthy","year":"1998","unstructured":"Edworthy, J.: Warnings and Hazards: An Integrative Approach to Warnings Research. International Journal of Cognitive Ergonomics\u00a02(1\/2), 3\u201318 (1998)","journal-title":"International Journal of Cognitive Ergonomics"},{"issue":"10","key":"18_CR10","doi-asserted-by":"publisher","first-page":"28","DOI":"10.1109\/MC.2005.352","volume":"389","author":"Z. Gyongyi","year":"2005","unstructured":"Gyongyi, Z., Garcia-Molina, H.: Spam: It\u2019s not Just for Inboxes Anymore. IEEE Computer\u00a0389(10), 28\u201334 (2005)","journal-title":"IEEE Computer"},{"key":"18_CR11","doi-asserted-by":"crossref","unstructured":"Herzberg, A., Jbara, A.: Security and Identification Indicators for Browsers Against Spoofing and Phishing Attacks. ACM Transactions on Internet Technology\u00a08(4), article #16 (2008)","DOI":"10.1145\/1391949.1391950"},{"issue":"1","key":"18_CR12","doi-asserted-by":"crossref","first-page":"75","DOI":"10.2307\/25148625","volume":"28","author":"A.R. Hevner","year":"2004","unstructured":"Hevner, A.R., March, S.T., Park, J., Ram, S.: Design Science in Information Systems Research. MIS Quarterly\u00a028(1), 75\u2013105 (2004)","journal-title":"MIS Quarterly"},{"key":"18_CR13","first-page":"1698","volume":"27","author":"M. Iwasaki","year":"1986","unstructured":"Iwasaki, M., Inomara, H.: Relation between Superficial Capillaries and Foveal Structures in the Human Retina. Investigative Ophthalmology & Visual Science\u00a027, 1698\u20131705 (1986)","journal-title":"Investigative Ophthalmology & Visual Science"},{"key":"18_CR14","unstructured":"Jacobs, S., Nathans, J.: The Evolution of Primate Color Vision. Scientific America, 32\u201339 (April 2009)"},{"key":"18_CR15","volume-title":"Designing with the Mind in Mind","author":"J. Johnson","year":"2010","unstructured":"Johnson, J.: Designing with the Mind in Mind. Morgan Kaufmann Publishers, Burlington (2010)"},{"volume-title":"Selected Writings of Herman Von Hemlholtz","year":"1971","key":"18_CR16","unstructured":"Kahl, R. (ed.): Selected Writings of Herman Von Hemlholtz. Wesleyan University Press, Middleton (1971)"},{"issue":"2","key":"18_CR17","doi-asserted-by":"publisher","first-page":"163","DOI":"10.1007\/s11416-007-0050-4","volume":"3","author":"L. Li","year":"2007","unstructured":"Li, L., Helenius, M.: Usability Evaluation of Anti-Phishing Toolbars. Journal in Computer Virology\u00a03(2), 163\u2013184 (2007)","journal-title":"Journal in Computer Virology"},{"issue":"4","key":"18_CR18","doi-asserted-by":"publisher","first-page":"251","DOI":"10.1016\/0167-9236(94)00041-2","volume":"15","author":"S.T. March","year":"1995","unstructured":"March, S.T., Smith, G.: Design and Natural Science Research on Information Technology. Decision Support Systems\u00a015(4), 251\u2013266 (1995)","journal-title":"Decision Support Systems"},{"issue":"3","key":"18_CR19","first-page":"179","volume":"26","author":"M.L. Markus","year":"2002","unstructured":"Markus, M.L., Majchrzak, A., Gasser, L.: A Design Theory for Systems that Support Emergent Knowledge Processes. MIS Quarterly\u00a026(3), 179\u2013212 (2002)","journal-title":"MIS Quarterly"},{"issue":"4","key":"18_CR20","first-page":"312","volume":"10","author":"D.S. McCrickard","year":"2003","unstructured":"McCrickard, D.S., Chewar, C.M., Somervell, J.P., Ndiwalana, A.: A Model for Notification Systems Evaluation\u2014Assessing User Goals for Multitasking Activity. ACM Transactions on CHI\u00a010(4), 312\u2013338 (2003)","journal-title":"ACM Transactions on CHI"},{"issue":"1","key":"18_CR21","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1207\/S15327051HCI1701_1","volume":"17","author":"D.C. McFarlane","year":"2002","unstructured":"McFarlane, D.C., Latorella, K.A.: The Scope and Importance of Human Interruption in Human\u2013Computer Interaction Design. Human-Computer Interaction\u00a017(1), 1\u201361 (2002)","journal-title":"Human-Computer Interaction"},{"issue":"1","key":"18_CR22","doi-asserted-by":"publisher","first-page":"83","DOI":"10.1080\/00223980903356081","volume":"144","author":"S. Monaghan","year":"2010","unstructured":"Monaghan, S., Blaszczynski, A.: Electronic Gaming Machine Warning Messages: Information versus Self-Evaluation. The Journal of Psychology\u00a0144(1), 83\u201396 (2010)","journal-title":"The Journal of Psychology"},{"key":"18_CR23","doi-asserted-by":"crossref","unstructured":"Obermayer, R.W., Nugent, W.A.: Human-Computer Interaction for Alert Warning and Attention Allocation Systems of the Multi-Modal Watchstation. In: Proceedings of the International Society for Optical Engineering (SPIE), Bellingham, WA, pp. 14\u201322 (2000)","DOI":"10.1117\/12.407536"},{"issue":"6","key":"18_CR24","first-page":"1","volume":"13","author":"G. Osterberg","year":"1935","unstructured":"Osterberg, G.: Topography of the Layer of Rods and Cones in the Human Retina. Acta Ophthalmoogica Supplement\u00a013(6), 1\u2013102 (1935)","journal-title":"Acta Ophthalmoogica Supplement"},{"issue":"1241","key":"18_CR25","doi-asserted-by":"publisher","first-page":"485","DOI":"10.1098\/rstb.1990.0091","volume":"327","author":"R.D. Patterson","year":"1990","unstructured":"Patterson, R.D., Mayfield, T.F.: Auditory Warning Sounds in the Work Environment [and Discussion]. Philosophical Transactions of the Royal Society of London. Series B, Biological Sciences\u00a0327(1241), 485\u2013492 (1990)","journal-title":"Philosophical Transactions of the Royal Society of London. Series B, Biological Sciences"},{"issue":"1","key":"18_CR26","doi-asserted-by":"publisher","first-page":"102","DOI":"10.1518\/001872000779656624","volume":"42","author":"W.A. Rogers","year":"2000","unstructured":"Rogers, W.A., Lamson, N., Rousseau, G.K.: Warning Research: An Integrative Perspective. Human Factors: J. Human Factors and Ergonomics Society\u00a042(1), 102\u2013139 (2000)","journal-title":"Human Factors: J. Human Factors and Ergonomics Society"},{"key":"18_CR27","doi-asserted-by":"publisher","first-page":"520","DOI":"10.1038\/17383","volume":"397","author":"A. Roorda","year":"1999","unstructured":"Roorda, A., Williams, D.R.: The Arrangement of the three Cone Classes in the Living Human Eye. Nature\u00a0397, 520\u2013522 (1999)","journal-title":"Nature"},{"key":"18_CR28","first-page":"17","volume":"4","author":"N.C. Silver","year":"1991","unstructured":"Silver, N.C., Leonard, D.C., Ponsi, K.A., Wogalter, M.S.: Warnings and Purchase Intention for Pre-Control Products. Forensic Reports\u00a04, 17\u201333 (1991)","journal-title":"Forensic Reports"},{"issue":"7","key":"18_CR29","doi-asserted-by":"publisher","first-page":"948","DOI":"10.1177\/0146167207301012","volume":"33","author":"S.M. Smith","year":"2007","unstructured":"Smith, S.M., Fabrigar, L.R., Powell, D.M., Estrada, M.-J.: The Role of Information-Processing Capacity and Goals in Attitude-Congruent Selective Exposure Effects. Pers. Soc. Psychol. Bull.\u00a033(7), 948\u2013960 (2007)","journal-title":"Pers. Soc. Psychol. Bull."},{"issue":"8","key":"18_CR30","doi-asserted-by":"publisher","first-page":"1219","DOI":"10.1287\/mnsc.1050.0427","volume":"51","author":"J. Song","year":"2005","unstructured":"Song, J., Zahedi, F.M.: A Theoretical Approach to Web Design in E-Commerce: A Belief Reinforcement Model. Management Science\u00a051(8), 1219\u20131235 (2005)","journal-title":"Management Science"},{"issue":"4","key":"18_CR31","doi-asserted-by":"crossref","first-page":"865","DOI":"10.2307\/25148757","volume":"30","author":"K.Y. Tam","year":"2006","unstructured":"Tam, K.Y., Ho, S.Y.: Understanding the Impact of Web Personalization on User Information Processing and Decision Outcomes. MIS Quarterly\u00a030(4), 865\u2013890 (2006)","journal-title":"MIS Quarterly"},{"issue":"1","key":"18_CR32","doi-asserted-by":"publisher","first-page":"36","DOI":"10.1287\/isre.3.1.36","volume":"3","author":"J.G. Walls","year":"1992","unstructured":"Walls, J.G., Widmeyer, G.R., El Sawy, O.A.: Building an Information System Design Theory for Vigilant EIS. Information Systems Research\u00a03(1), 36\u201359 (1992)","journal-title":"Information Systems Research"},{"key":"18_CR33","volume-title":"Foundations of Vision","author":"B.A. Wandell","year":"1995","unstructured":"Wandell, B.A.: Foundations of Vision. Sinauer Associates, Sunderland (1995)"},{"issue":"2","key":"18_CR34","doi-asserted-by":"publisher","first-page":"243","DOI":"10.1109\/TIP.2003.809015","volume":"12","author":"Z. Wang","year":"2003","unstructured":"Wang, Z., Lu, L., Bovik, A.C.: Foveation Scalable Video Coding with Automatic Fixation Selection. IEEE Transactions on Image Processing\u00a012(2), 243\u2013254 (2003)","journal-title":"IEEE Transactions on Image Processing"},{"volume-title":"Handbook of Warnings","year":"2006","key":"18_CR35","unstructured":"Wogalter, M.S. (ed.): Handbook of Warnings. Lawrence Erlbaum Associates, Mahwah (2006)"},{"issue":"3","key":"18_CR36","doi-asserted-by":"publisher","first-page":"219","DOI":"10.1016\/S0003-6870(02)00009-1","volume":"33","author":"M.S. Wogalter","year":"2002","unstructured":"Wogalter, M.S., Conzola, V.C., Smith-Jackson, T.L.: Research-Based Guidelines for Warning Design and Evaluation. Applied Ergonomics\u00a033(3), 219\u2013230 (2002)","journal-title":"Applied Ergonomics"},{"key":"18_CR37","unstructured":"Wyszecki, G., Stiles, W.S.: Color Science: Concepts and Methods, Quantitative Data and Formulae, New York, NY. Wiley Series in Pure and Applied Optics (1982)"},{"key":"18_CR38","doi-asserted-by":"crossref","unstructured":"Wu, M., Miller, R.C., Garfunkel, S.L.: Do Security Toolbars Actually Prevent Phishing Attacks? In: Proceedings of the Conference on Human Factors in Computing Systems, Montreal, Canada, pp. 601\u2013610 (2006)","DOI":"10.1145\/1124772.1124863"},{"key":"18_CR39","doi-asserted-by":"crossref","unstructured":"Zahedi, F.M., Bansal, G.: Cultural Signifiers of Web Images. Journal of Management Information Systems (2011) (forthcoming)","DOI":"10.2753\/MIS0742-1222280106"},{"key":"18_CR40","unstructured":"Zhang, Y., Egelman, S., Cranor, L., Hong, J.: Phinding Phish: Evaluating Anti-phishing Tools. In: Proc. 14th Network and Distributed System Security Symposium, San Diego, CA (2007)"}],"container-title":["Lecture Notes in Computer Science","Service-Oriented Perspectives in Design Science Research"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-20633-7_18","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,23]],"date-time":"2019-05-23T05:15:16Z","timestamp":1558588516000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-20633-7_18"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011]]},"ISBN":["9783642206320","9783642206337"],"references-count":40,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-20633-7_18","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2011]]}}}