{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T20:45:00Z","timestamp":1730321100917,"version":"3.28.0"},"publisher-location":"New York, NY, USA","reference-count":58,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,10,5]],"date-time":"2021-10-05T00:00:00Z","timestamp":1633392000000},"content-version":"vor","delay-in-days":365,"URL":"http:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100007515","name":"National Science Foundation","doi-asserted-by":"publisher","award":["DUE 1241772"],"id":[{"id":"10.13039\/100007515","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100010198","name":"Army Research Laboratory","doi-asserted-by":"publisher","award":["W911NF-16-1-0422"],"id":[{"id":"10.13039\/100010198","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,10,5]]},"DOI":"10.1145\/3320269.3384753","type":"proceedings-article","created":{"date-parts":[[2020,10,5]],"date-time":"2020-10-05T12:33:22Z","timestamp":1601901202000},"page":"236-247","update-policy":"http:\/\/dx.doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["Scam Augmentation and Customization: Identifying Vulnerable Users and Arming Defenders"],"prefix":"10.1145","author":[{"given":"Shahryar","family":"Baki","sequence":"first","affiliation":[{"name":"University of Houston, Houston, TX, USA"}]},{"given":"Rakesh M.","family":"Verma","sequence":"additional","affiliation":[{"name":"University of Houston, Houston, TX, USA"}]},{"given":"Omprakash","family":"Gnawali","sequence":"additional","affiliation":[{"name":"University of Houston, Houston, TX, USA"}]}],"member":"320","published-online":{"date-parts":[[2020,10,5]]},"reference":[{"key":"e_1_3_2_2_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2969780"},{"volume-title":"Proc. of the Int'l Conf. on Security and Management (SAM). The Steering Committee of The World Congress in Computer Science, Computer","year":"2019","author":"Albalawi Tahani","key":"e_1_3_2_2_2_1"},{"key":"e_1_3_2_2_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/SCC.2016.61"},{"key":"e_1_3_2_2_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/3014338"},{"key":"e_1_3_2_2_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/3052973.3053037"},{"key":"e_1_3_2_2_6_1","unstructured":"Shahryar Baki Rakesh M. Verma Arjun Mukherjee and Omprakash Gnawali. 2020. Less is More: Exploiting Social Trust to Increase the Effectiveness of a Deception Attack. arXiv:cs.CR\/2006.13499 Shahryar Baki Rakesh M. Verma Arjun Mukherjee and Omprakash Gnawali. 2020. Less is More: Exploiting Social Trust to Increase the Effectiveness of a Deception Attack. arXiv:cs.CR\/2006.13499"},{"volume-title":"Unpacking Spear Phishing Susceptibility","author":"Benenson Zinaida","key":"e_1_3_2_2_7_1","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-319-70278-0_39"},{"volume-title":"Susceptibility to URL-based Internet attacks: Facebook vs. email. In2014 IEEE Int'l Conf. on Pervasive Computing & Communication Workshops (PERCOM WORKSHOPS)","year":"2014","author":"Benenson Zinaida","key":"e_1_3_2_2_8_1"},{"key":"e_1_3_2_2_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/1526709.1526784"},{"key":"e_1_3_2_2_11_1","unstructured":"Andrew C Bulhak. 2000. The Dada engine. dev.null.org\/dadaengine\/ Andrew C Bulhak. 2000. The Dada engine. dev.null.org\/dadaengine\/"},{"volume-title":"Scam Alert: Employment Scams Target College Students. https:\/\/www.bbb.org\/article\/news-releases\/20710-scam-alert-employment-scams-target-college-students","year":"2019","author":"Better Business Bureau","key":"e_1_3_2_2_12_1"},{"key":"e_1_3_2_2_13_1","unstructured":"Marcus Butavicius Kathryn Parsons Malcolm Pattinson and Agata McCormac. 2016. Breaching the Human Firewall: Social engineering in Phishing and Spear-Phishing Emails. arXiv:cs.CY\/1606.00887 Marcus Butavicius Kathryn Parsons Malcolm Pattinson and Agata McCormac. 2016. Breaching the Human Firewall: Social engineering in Phishing and Spear-Phishing Emails. arXiv:cs.CY\/1606.00887"},{"volume-title":"Better beware:comparing metacognition for phishing and legitimate emails. Metacognition andLearning14, 3","year":"2019","author":"Canfield Casey Inez","key":"e_1_3_2_2_14_1"},{"key":"e_1_3_2_2_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/COGSIMA.2016.7497779"},{"volume-title":"Multilayer hybrid strategy for phishing email zero-day filtering. Concurrency and Computation: Practice and Experience29, 23","year":"2017","author":"Chowdhury Morshed U","key":"e_1_3_2_2_16_1"},{"key":"e_1_3_2_2_17_1","doi-asserted-by":"crossref","unstructured":"A. Das S. Baki A. El Aassal R. Verma and A. Dunbar. 2020. SoK: A Comprehensive Reexamination of Phishing Research From the Security Perspective. IEEE Communications Surveys Tutorials22 1 (2020) 671--708. A. Das S. Baki A. El Aassal R. Verma and A. Dunbar. 2020. SoK: A Comprehensive Reexamination of Phishing Research From the Security Perspective. IEEE Communications Surveys Tutorials22 1 (2020) 671--708.","DOI":"10.1109\/COMST.2019.2957750"},{"key":"e_1_3_2_2_18_1","unstructured":"Avisha Das and Rakesh Verma. 2019. Automated email Generation for Targeted Attacks using Natural Language. arXiv:1908.06893 Avisha Das and Rakesh Verma. 2019. Automated email Generation for Targeted Attacks using Natural Language. arXiv:1908.06893"},{"volume-title":"BERT: Pre-training of deep bidirectional transformers for language understanding. arXiv:cs.CL\/1810.04805","year":"2018","author":"Devlin Jacob","key":"e_1_3_2_2_19_1"},{"key":"e_1_3_2_2_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/1124772.1124861"},{"key":"e_1_3_2_2_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/1143120.1143131"},{"key":"e_1_3_2_2_22_1","doi-asserted-by":"publisher","DOI":"10.1046\/j.1365-2648.2001.01897.x"},{"volume-title":"Phishing Email Detection Using Robust NLP Techniques. In2018 IEEE International Conference on Data Mining Workshops(ICDMW). IEEE","author":"Egozi G.","key":"e_1_3_2_2_23_1"},{"key":"e_1_3_2_2_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/3309182.3309191"},{"key":"e_1_3_2_2_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2913705"},{"key":"e_1_3_2_2_26_1","doi-asserted-by":"publisher","DOI":"10.1257\/089533005775196732"},{"key":"e_1_3_2_2_27_1","doi-asserted-by":"publisher","DOI":"10.1177\/1077800413500926"},{"key":"e_1_3_2_2_28_1","first-page":"238","article-title":"The impact of speeding on data quality in nonprobability and freshly recruited probability-based online panels. John Wiley & Sons, Ltd, Chichester, UK","volume":"11","author":"Greszki Robert","year":"2014","journal-title":"Chapter"},{"key":"e_1_3_2_2_29_1","doi-asserted-by":"crossref","unstructured":"Anti-Phishing Working Group. 2019. Phishing activity trends reports. https:\/\/apwg.org\/trendsreports\/ Anti-Phishing Working Group. 2019. Phishing activity trends reports. https:\/\/apwg.org\/trendsreports\/","DOI":"10.1016\/S1361-3723(19)30025-9"},{"volume-title":"Proc. of 22ndWWW Conf. (WWW '13 Companion). ACM","year":"2013","author":"Halevi Tzipora","key":"e_1_3_2_2_30_1"},{"key":"e_1_3_2_2_31_1","doi-asserted-by":"crossref","unstructured":"Tzipora Halevi Nasir Memon and Oded Nov. 2015. Spear-phishing in the wild:A real-world study of personality phishing self-efficacy and vulnerability to spear-phishing attacks. Phishing Self-Efficacy and Vulnerability to Spear-Phishing Attacks (January 2 2015)(2015). Tzipora Halevi Nasir Memon and Oded Nov. 2015. Spear-phishing in the wild:A real-world study of personality phishing self-efficacy and vulnerability to spear-phishing attacks. Phishing Self-Efficacy and Vulnerability to Spear-Phishing Attacks (January 2 2015)(2015).","DOI":"10.2139\/ssrn.2544742"},{"volume-title":"A defense scheme against identity theft attack based on multiple social networks. Expert Systems with Applications41, 5","year":"2014","author":"He Bing-Zhe","key":"e_1_3_2_2_32_1"},{"volume-title":"Emerging Challenges for Security","author":"Herzberg Amir","key":"e_1_3_2_2_33_1"},{"key":"e_1_3_2_2_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/MIC.2011.24"},{"volume-title":"Detection of Intrusions and Malware","author":"Irani Danesh","key":"e_1_3_2_2_35_1"},{"volume-title":"Proceedings of the First ACM CODASPY. ACM","author":"Jin Lei","key":"e_1_3_2_2_36_1"},{"volume-title":"The Big Five trait taxonomy: History, measurement, and theoretical perspectives. Handbook of personality: Theory andresearch2","year":"1999","author":"John Oliver P","key":"e_1_3_2_2_37_1"},{"volume-title":"Australian Information Warfare and Security Conference. School of Computer and Information Science","year":"2006","author":"Karakasiliotis A","key":"e_1_3_2_2_38_1"},{"volume":"13","volume-title":"13th European Mediterranean and Middle Eastern Conference on Information Systems","year":"2016","author":"Karavaras Eleftherios","key":"e_1_3_2_2_39_1"},{"key":"e_1_3_2_2_40_1","unstructured":"Paul J Lavrakas. 2008.Encyclopedia of survey research methods. Sage Publications Los Angeles London New Delhi Singapore Washington DC. Paul J Lavrakas. 2008.Encyclopedia of survey research methods. Sage Publications Los Angeles London New Delhi Singapore Washington DC."},{"key":"e_1_3_2_2_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/3336141"},{"key":"e_1_3_2_2_42_1","doi-asserted-by":"publisher","DOI":"10.1109\/PerComW.2012.6197512"},{"key":"e_1_3_2_2_43_1","unstructured":"KC Meijdam W Pieters and J van den Berg. 2015. Phishing as a service: Designing an ethical way of mimicking targeted phishing attacks to train employees. TU Delft TU Delft. KC Meijdam W Pieters and J van den Berg. 2015. Phishing as a service: Designing an ethical way of mimicking targeted phishing attacks to train employees. TU Delft TU Delft."},{"key":"e_1_3_2_2_44_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2016.12.044"},{"key":"e_1_3_2_2_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813660"},{"key":"e_1_3_2_2_46_1","unstructured":"Information Security Office. 2019. FBI Alert: Employment Scam Targeting Students. https:\/\/informationsecurity.princeton.edu\/news\/fbi-alert-employment-scam-targeting-students Information Security Office. 2019. FBI Alert: Employment Scam Targeting Students. https:\/\/informationsecurity.princeton.edu\/news\/fbi-alert-employment-scam-targeting-students"},{"key":"e_1_3_2_2_47_1","unstructured":"Information Security Office. 2019. PHISH BOWL\/PHISHING SCAMS. https:\/\/www.it.ucla.edu\/security\/alerts\/phishing-scams Information Security Office. 2019. PHISH BOWL\/PHISHING SCAMS. https:\/\/www.it.ucla.edu\/security\/alerts\/phishing-scams"},{"key":"e_1_3_2_2_48_1","unstructured":"PhishLabs. 2017. Q2 2017 Phishing Trends & Intelligence Report. https:\/\/info.phishlabs.com\/q2_2017_phishing_trends_and_-intelligence_report PhishLabs. 2017. Q2 2017 Phishing Trends & Intelligence Report. https:\/\/info.phishlabs.com\/q2_2017_phishing_trends_and_-intelligence_report"},{"key":"e_1_3_2_2_49_1","unstructured":"Phish Labs. 2018. 2018 Phishing Trends & Intelligence Report. https:\/\/info.phishlabs.com\/2018_phishing_trends_and_-intelligence_report-0 Phish Labs. 2018. 2018 Phishing Trends & Intelligence Report. https:\/\/info.phishlabs.com\/2018_phishing_trends_and_-intelligence_report-0"},{"volume-title":"Language models are unsupervised multitask learners. OpenAI Blog 1, 8","year":"2019","author":"Radford Alec","key":"e_1_3_2_2_50_1"},{"key":"e_1_3_2_2_51_1","doi-asserted-by":"publisher","DOI":"10.1109\/SAP.1969.269909"},{"key":"e_1_3_2_2_52_1","doi-asserted-by":"publisher","DOI":"10.1145\/1753326.1753383"},{"volume-title":"Database Systems for Advanced Applications","author":"Tang Cong","key":"e_1_3_2_2_53_1"},{"volume-title":"Email Statistics Report","year":"2019","author":"Team Radicati","key":"e_1_3_2_2_54_1"},{"volume-title":"Marchette","year":"2019","author":"Verma Rakesh M.","key":"e_1_3_2_2_55_1"},{"volume-title":"Diffusion of deception in social media: Social contagion effects and its antecedents. Information Systems Frontiers17, 6","year":"2015","author":"Vishwanath Arun","key":"e_1_3_2_2_56_1"},{"volume-title":"Habitual Facebook use and its impact on getting deceived on social media. J. of Computer-Mediated Communication20, 1","year":"2015","author":"Vishwanath Arun","key":"e_1_3_2_2_57_1"},{"volume-title":"Le","year":"2019","author":"Yang Zhilin","key":"e_1_3_2_2_58_1"},{"volume-title":"Uncovering social network sybils in the wild. ACM TKDD)8, 1","year":"2014","author":"Yang Zhi","key":"e_1_3_2_2_59_1"}],"event":{"name":"ASIA CCS '20: The 15th ACM Asia Conference on Computer and Communications Security","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Taipei Taiwan","acronym":"ASIA CCS '20"},"container-title":["Proceedings of the 15th ACM Asia Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3320269.3384753","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3320269.3384753","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,5]],"date-time":"2023-01-05T15:47:44Z","timestamp":1672933664000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3320269.3384753"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,10,5]]},"references-count":58,"alternative-id":["10.1145\/3320269.3384753","10.1145\/3320269"],"URL":"https:\/\/doi.org\/10.1145\/3320269.3384753","relation":{},"subject":[],"published":{"date-parts":[[2020,10,5]]},"assertion":[{"value":"2020-10-05","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}