{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T01:44:58Z","timestamp":1740102298089,"version":"3.37.3"},"publisher-location":"New York, NY, USA","reference-count":55,"publisher":"ACM","content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,10,16]]},"DOI":"10.1145\/3617072.3617121","type":"proceedings-article","created":{"date-parts":[[2023,10,13]],"date-time":"2023-10-13T17:47:04Z","timestamp":1697219224000},"page":"334-343","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["Phishing to improve detection"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-4915-1163","authenticated-orcid":false,"given":"Sarah Ying","family":"Zheng","sequence":"first","affiliation":[{"name":"UCL, United Kingdom"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3963-4743","authenticated-orcid":false,"given":"Ingolf","family":"Becker","sequence":"additional","affiliation":[{"name":"UCL, United Kingdom"}]}],"member":"320","published-online":{"date-parts":[[2023,10,16]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1146\/annurev.psych.60.110707.163514"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/3313831.3376168"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0224216"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.tics.2007.05.005"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/ecrime.2016.7487946"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1146\/annurev-neuro-062111-150536"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/1943403.1943449"},{"key":"e_1_3_2_1_8_1","volume-title":"Fraud Cost Americans $5.8 Billion","author":"Brook Chris","year":"2021","unstructured":"Chris Brook. 2022. Fraud Cost Americans $5.8 Billion in 2021. https:\/\/digitalguardian.com\/blog\/fraud-cost-americans-58-billion-2021"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.tics.2006.11.004"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1080\/10919392.2019.1552745"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.14722\/usec.2015.23009"},{"key":"e_1_3_2_1_12_1","unstructured":"Team R\u00a0Development Core. 2018. A Language and Environment for Statistical Computing. https:\/\/www.R-project.org"},{"key":"e_1_3_2_1_13_1","volume-title":"The many faces of lies. The social psychology of good and evil","author":"DePaulo M","year":"2004","unstructured":"Bella\u00a0M DePaulo. 2004. The many faces of lies. The social psychology of good and evil (2004), 303\u2013326."},{"key":"e_1_3_2_1_14_1","volume-title":"Seventeenth Symposium on Usable Privacy and Security (SOUPS 2021","author":"Franz Anjuli","year":"2021","unstructured":"Anjuli Franz, Verena Zimmermann, Gregor Albrecht, Katrin Hartwig, Christian Reuter, Alexander Benlian, and Joachim Vogt. 2021. SoK: Still Plenty of Phish in the Sea \u2014 A Taxonomy of User-Oriented Phishing Interventions and Avenues for Future Research. In Seventeenth Symposium on Usable Privacy and Security (SOUPS 2021). USENIX Association, 339\u2013358. https:\/\/www.usenix.org\/conference\/soups2021\/presentation\/franz"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/3270316.3273042"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","unstructured":"B.\u00a0B. Gupta Nalin A.\u00a0G. Arachchilage and Kostas\u00a0E. Psannis. [n. d.]. Defending against Phishing Attacks: Taxonomy of Methods Current Issues and Future Directions. 67 2 ([n. d.]) 247\u2013267. https:\/\/doi.org\/10.1007\/s11235-017-0334-z","DOI":"10.1007\/s11235-017-0334-z"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/hicss.2015.670"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1073\/pnas.2208839120"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1186\/s13673-020-00237-7"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijhcs.2018.10.004"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1080\/07421222.2017.1334499"},{"key":"e_1_3_2_1_22_1","volume-title":"More than \u00a32.3bn lost in a year as scams surge during pandemic. The Guardian (7","author":"Jones Rupert","year":"2021","unstructured":"Rupert Jones. 2021. More than \u00a32.3bn lost in a year as scams surge during pandemic. The Guardian (7 2021). https:\/\/www.theguardian.com\/money\/2021\/jul\/15\/more-than-23bn-lost-in-a-year-as-scams-surge-during-pandemic"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.tics.2004.09.005"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/msp.2011.179"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/1240624.1240760"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/ecrime.2008.4696970"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/1754393.1754396"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP46214.2022.9833766"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2021.102248"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.neuroimage.2010.10.014"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1146\/annurev-psych-120709-145406"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","unstructured":"Seumas Miller and Michael\u00a0J. Selgelid. [n. d.]. Ethical and Philosophical Consideration of the Dual-use Dilemma in the Biological Sciences. 13 4 ([n. d.]) 523\u2013580. https:\/\/doi.org\/10.1007\/s11948-007-9043-4","DOI":"10.1007\/s11948-007-9043-4"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSPW51379.2020.00026"},{"key":"e_1_3_2_1_34_1","volume-title":"Advisory: COVID-19 exploited by malicious cyber actors. https:\/\/www.ncsc.gov.uk\/news\/covid-19-exploited-by-cyber-actors-advisory","author":"Cybersecurity National Cyber Security Centre\u00a0(NCSC) and Infrastructure Security\u00a0Agency (CISA).","year":"2020","unstructured":"Cybersecurity National Cyber Security Centre\u00a0(NCSC) and Infrastructure Security\u00a0Agency (CISA). 2020. Advisory: COVID-19 exploited by malicious cyber actors. https:\/\/www.ncsc.gov.uk\/news\/covid-19-exploited-by-cyber-actors-advisory"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1073\/pnas.2120481119"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/2998551.2998553"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/3320269.3384765"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/3290605.3300520"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.3389\/fpsyg.2018.00135"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1038\/s44159-022-00037-z"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.5555\/3489212.3489218"},{"key":"e_1_3_2_1_42_1","volume-title":"Proceedings of the 16th Symposium on Usable Privacy and Security (SOUPS 2020)","author":"Reinheimer Benjamin","year":"2020","unstructured":"Benjamin Reinheimer, Lukas Aldag, Peter Mayer, Mattia Mossano, Reyhan Duezguen, Bettina Lofthouse, Tatiana von Landesberger, and Melanie Volkamer. 2020. An investigation of phishing awareness and education over time: When and how to best remind users. Proceedings of the 16th Symposium on Usable Privacy and Security (SOUPS 2020) (2020), 259\u2013284. https:\/\/www.usenix.org\/conference\/soups2020\/presentation\/reinheimer"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-658-25652-4_8"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1080\/07421222.2020.1790187"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1038\/s41598-020-72255-5"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1080\/07421222.2019.1705512"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1108\/978-1-83982-848-520211049"},{"key":"e_1_3_2_1_48_1","volume-title":"Darktrace warns of rise in AI-enhanced scams since ChatGPT release. The Guardian","author":"Sweney Mark","year":"2023","unstructured":"Mark Sweney. 2023. Darktrace warns of rise in AI-enhanced scams since ChatGPT release. The Guardian (2023). https:\/\/www.theguardian.com\/technology\/2023\/mar\/08\/darktrace-warns-of-rise-in-ai-enhanced-scams-since-chatgpt-release"},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-66504-3_19"},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1145\/3415231"},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1145\/3173574.3174066"},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1145\/3290605.3300338"},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1145\/3055305.3055310"},{"key":"e_1_3_2_1_54_1","volume-title":"Presenting Suspicious Details in User-Facing E-mail Headers Does Not Improve Phishing Detection. In Eighteenth Symposium on Usable Privacy and Security (SOUPS 2022","author":"Y.","year":"2022","unstructured":"Sarah\u00a0Y. Zheng and Ingolf Becker. 2022. Presenting Suspicious Details in User-Facing E-mail Headers Does Not Improve Phishing Detection. In Eighteenth Symposium on Usable Privacy and Security (SOUPS 2022). USENIX Association, Boston, MA, 253\u2013271. https:\/\/www.usenix.org\/conference\/soups2022\/presentation\/zheng"},{"key":"e_1_3_2_1_55_1","volume-title":"Nineteenth Symposium on Usable Privacy and Security (SOUPS 2023","author":"Y.","year":"2023","unstructured":"Sarah\u00a0Y. Zheng and Ingolf Becker. 2023. Checking, nudging or scoring? Evaluating e-mail user security tools. In Nineteenth Symposium on Usable Privacy and Security (SOUPS 2023). USENIX Association, Anaheim, CA, 57\u201376. https:\/\/www.usenix.org\/conference\/soups2023\/presentation\/zheng"}],"event":{"name":"EuroUSEC 2023: The 2023 European Symposium on Usable Security","acronym":"EuroUSEC 2023","location":"Copenhagen Denmark"},"container-title":["Proceedings of the 2023 European Symposium on Usable Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3617072.3617121","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,10,16]],"date-time":"2024-10-16T10:28:23Z","timestamp":1729074503000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3617072.3617121"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,10,16]]},"references-count":55,"alternative-id":["10.1145\/3617072.3617121","10.1145\/3617072"],"URL":"https:\/\/doi.org\/10.1145\/3617072.3617121","relation":{},"subject":[],"published":{"date-parts":[[2023,10,16]]},"assertion":[{"value":"2023-10-16","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}