{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,8,29]],"date-time":"2024-08-29T21:14:55Z","timestamp":1724966095445},"publisher-location":"New York, NY, USA","reference-count":36,"publisher":"ACM","funder":[{"name":"DEFRAUDIfy","award":["ITEA191010"]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,8,25]]},"DOI":"10.1145\/3407023.3409178","type":"proceedings-article","created":{"date-parts":[[2020,8,25]],"date-time":"2020-08-25T10:24:32Z","timestamp":1598351072000},"update-policy":"http:\/\/dx.doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":13,"title":["Testing the effectiveness of tailored phishing techniques in industry and academia"],"prefix":"10.1145","author":[{"given":"Pavlo","family":"Burda","sequence":"first","affiliation":[{"name":"Eindhoven University of Technology"}]},{"given":"Tzouliano","family":"Chotza","sequence":"additional","affiliation":[{"name":"Eindhoven University of Technology"}]},{"given":"Luca","family":"Allodi","sequence":"additional","affiliation":[{"name":"Eindhoven University of Technology"}]},{"given":"Nicola","family":"Zannone","sequence":"additional","affiliation":[{"name":"Eindhoven University of Technology"}]}],"member":"320","published-online":{"date-parts":[[2020,8,25]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"d.]. 10 Rules for Writing Professional Emails. https:\/\/www.city.ac.uk\/_data\/assets\/pdf_file\/0003\/234354\/Writing-Professional-Emails.pdf. [Online","year":"2019"},{"key":"e_1_3_2_1_2_1","unstructured":"Akamai. 2019. Phishing - Baiting the Hook. Akamai. 2019. Phishing - Baiting the Hook."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2017.04.006"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3133960"},{"key":"e_1_3_2_1_5_1","volume-title":"On the Need for New Antphishing Measures Against Spear Phishing Attacks","author":"Allodi Luca","year":"2019"},{"key":"e_1_3_2_1_6_1","unstructured":"Lisette Altena. 2018. Exploring effective notification mechanisms for infected IoT devices. Master's thesis. TU Delft. Lisette Altena. 2018. Exploring effective notification mechanisms for infected IoT devices. Master's thesis. TU Delft."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382284"},{"key":"e_1_3_2_1_9_1","volume-title":"Breaching the Human Firewall: Social engineering in Phishing and Spear-Phishing Emails. CoRR abs\/1606.00887","author":"Butavicius Marcus A.","year":"2016"},{"key":"e_1_3_2_1_10_1","volume-title":"Euro S&P","author":"Cetin Orcun"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1093\/cybsec\/tyw005"},{"key":"e_1_3_2_1_12_1","volume-title":"Influence: The Psychology of Persuasion","author":"Cialdini Robert","year":"1984"},{"key":"e_1_3_2_1_13_1","volume-title":"Data-Backed Secrets to Successful Push Notifications 2018 Report. https:\/\/clevertap.com\/blog\/2018-push-notification-report\/. [Online","year":"2019"},{"key":"e_1_3_2_1_14_1","volume-title":"Symposium on Usable Privacy and Security. USENIX Association, 115--129","author":"Conway Dan","year":"2017"},{"key":"e_1_3_2_1_15_1","volume-title":"Human Aspects of Information Security, Privacy, and Trust","author":"Ferreira Ana"},{"key":"e_1_3_2_1_16_1","volume-title":"User Context: An Explanatory Variable in Phishing Susceptibility. In Workshop on Usable Security.","author":"Greene Kristen","year":"2018"},{"key":"e_1_3_2_1_17_1","volume-title":"USENIX Security Symposium. 1273--1290","author":"Ho Grant","year":"2019"},{"key":"e_1_3_2_1_18_1","volume-title":"Revisiting Email Spoofing Attacks. CoRR abs\/1801.00853","author":"Hu Hang","year":"2018"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/1290958.1290968"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/1135777.1135853"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.18438\/B8VW27"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1207\/s15327043hup1101_3"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1177\/147078530304500404"},{"key":"e_1_3_2_1_24_1","volume-title":"USENIX Security Symposium. USENIX Association, 543--558","author":"Blond Stevens Le","year":"2014"},{"key":"e_1_3_2_1_25_1","volume-title":"USENIX Security Symposium. USENIX Association, 1033--1050","author":"Li Frank","year":"2016"},{"key":"e_1_3_2_1_26_1","unstructured":"Kim MacPherson. 2001. Permission-based E-mail Marketing that Works! Dearborn Trade Publishing. Kim MacPherson. 2001. Permission-based E-mail Marketing that Works! Dearborn Trade Publishing."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/3025453.3025831"},{"key":"e_1_3_2_1_28_1","volume-title":"Ethics and phishing experiments. Science and engineering ethics 24, 4","author":"Resnik David B","year":"2018"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/eCrime47957.2019.9037502"},{"key":"e_1_3_2_1_30_1","volume-title":"Cognitive Triaging of Phishing Attacks. In USENIX Security Symposium. USENIX Association, 1309--1326","author":"van der Heijden Amber","year":"2019"},{"key":"e_1_3_2_1_31_1","volume-title":"An Experimental Study. In USENIX Conference on Cyber Security Experimentation and Test. USENIX Association.","author":"Vasek Marie","year":"2012"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"crossref","unstructured":"Verizon. 2019. Data Breach Investigations Report. Verizon. 2019. Data Breach Investigations Report.","DOI":"10.1016\/S1361-3723(19)30060-0"},{"key":"e_1_3_2_1_33_1","volume-title":"Trust, Privacy and Security in Digital Business","author":"Volkamer Melanie"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/3173574.3174066"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijhcs.2018.06.004"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.5555\/2895238.2895248"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/3077136.3080782"}],"event":{"name":"ARES 2020: The 15th International Conference on Availability, Reliability and Security","location":"Virtual Event Ireland","acronym":"ARES 2020"},"container-title":["Proceedings of the 15th International Conference on Availability, Reliability and Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3407023.3409178","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,13]],"date-time":"2023-01-13T06:41:43Z","timestamp":1673592103000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3407023.3409178"}},"subtitle":["a field experiment"],"short-title":[],"issued":{"date-parts":[[2020,8,25]]},"references-count":36,"alternative-id":["10.1145\/3407023.3409178","10.1145\/3407023"],"URL":"https:\/\/doi.org\/10.1145\/3407023.3409178","relation":{},"subject":[],"published":{"date-parts":[[2020,8,25]]},"assertion":[{"value":"2020-08-25","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}