{"id":"https://openalex.org/W2890835985","doi":"https://doi.org/10.1080/0144929x.2018.1519599","title":"How persuasive is phishing email? The role of authentic design, influence and current events in email judgements","display_name":"How persuasive is phishing email? The role of authentic design, influence and current events in email judgements","publication_year":2018,"publication_date":"2018-09-07","ids":{"openalex":"https://openalex.org/W2890835985","doi":"https://doi.org/10.1080/0144929x.2018.1519599","mag":"2890835985"},"language":"en","primary_location":{"id":"doi:10.1080/0144929x.2018.1519599","is_oa":false,"landing_page_url":"https://doi.org/10.1080/0144929x.2018.1519599","pdf_url":null,"source":{"id":"https://openalex.org/S123849098","display_name":"Behaviour and Information Technology","issn_l":"0144-929X","issn":["0144-929X","1362-3001"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320547","host_organization_name":"Taylor & Francis","host_organization_lineage":["https://openalex.org/P4310320547"],"host_organization_lineage_names":["Taylor & Francis"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Behaviour &amp; Information Technology","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://research-information.bris.ac.uk/files/186672683/Full_text_PDF_accepted_author_manuscript_.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5002544772","display_name":"Emma Williams","orcid":"https://orcid.org/0000-0002-8581-6214"},"institutions":[{"id":"https://openalex.org/I51601045","display_name":"University of Bath","ror":"https://ror.org/002h8g185","country_code":"GB","type":"education","lineage":["https://openalex.org/I51601045"]},{"id":"https://openalex.org/I36234482","display_name":"University of Bristol","ror":"https://ror.org/0524sp257","country_code":"GB","type":"education","lineage":["https://openalex.org/I36234482"]}],"countries":["GB"],"is_corresponding":true,"raw_author_name":"Emma J. Williams","raw_affiliation_strings":["School of Experimental Psychology, University of Bristol, Bristol, UK","School of Management, University of Bath, Bath, UK"],"affiliations":[{"raw_affiliation_string":"School of Experimental Psychology, University of Bristol, Bristol, UK","institution_ids":["https://openalex.org/I36234482"]},{"raw_affiliation_string":"School of Management, University of Bath, Bath, UK","institution_ids":["https://openalex.org/I51601045"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5050732272","display_name":"Danielle Polage","orcid":"https://orcid.org/0000-0002-7662-195X"},"institutions":[{"id":"https://openalex.org/I29867402","display_name":"Central Washington University","ror":"https://ror.org/049c8eh51","country_code":"US","type":"education","lineage":["https://openalex.org/I29867402"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Danielle Polage","raw_affiliation_strings":["School of Psychology, Central Washington University, Ellensburg, USA"],"affiliations":[{"raw_affiliation_string":"School of Psychology, Central Washington University, Ellensburg, USA","institution_ids":["https://openalex.org/I29867402"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5002544772"],"corresponding_institution_ids":["https://openalex.org/I36234482","https://openalex.org/I51601045"],"apc_list":null,"apc_paid":null,"fwci":7.8014,"has_fulltext":true,"cited_by_count":67,"citation_normalized_percentile":{"value":0.97506163,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":96,"max":100},"biblio":{"volume":"38","issue":"2","first_page":"184","last_page":"197"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11147","display_name":"Misinformation and Its Impacts","score":0.9944999814033508,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T12519","display_name":"Cybercrime and Law Enforcement Studies","score":0.9918000102043152,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/phishing","display_name":"Phishing","score":0.7556771039962769},{"id":"https://openalex.org/keywords/trustworthiness","display_name":"Trustworthiness","score":0.6677371859550476},{"id":"https://openalex.org/keywords/psychology","display_name":"Psychology","score":0.6323364973068237},{"id":"https://openalex.org/keywords/salient","display_name":"Salient","score":0.49797630310058594},{"id":"https://openalex.org/keywords/social-psychology","display_name":"Social psychology","score":0.48264747858047485},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.4377380609512329},{"id":"https://openalex.org/keywords/applied-psychology","display_name":"Applied psychology","score":0.3234502077102661},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.3016677498817444},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.29580891132354736},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.2845195531845093},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.07490131258964539}],"concepts":[{"id":"https://openalex.org/C83860907","wikidata":"https://www.wikidata.org/wiki/Q135005","display_name":"Phishing","level":3,"score":0.7556771039962769},{"id":"https://openalex.org/C153701036","wikidata":"https://www.wikidata.org/wiki/Q659974","display_name":"Trustworthiness","level":2,"score":0.6677371859550476},{"id":"https://openalex.org/C15744967","wikidata":"https://www.wikidata.org/wiki/Q9418","display_name":"Psychology","level":0,"score":0.6323364973068237},{"id":"https://openalex.org/C2780719617","wikidata":"https://www.wikidata.org/wiki/Q1030752","display_name":"Salient","level":2,"score":0.49797630310058594},{"id":"https://openalex.org/C77805123","wikidata":"https://www.wikidata.org/wiki/Q161272","display_name":"Social psychology","level":1,"score":0.48264747858047485},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.4377380609512329},{"id":"https://openalex.org/C75630572","wikidata":"https://www.wikidata.org/wiki/Q538904","display_name":"Applied psychology","level":1,"score":0.3234502077102661},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.3016677498817444},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.29580891132354736},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.2845195531845093},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.07490131258964539}],"mesh":[],"locations_count":6,"locations":[{"id":"doi:10.1080/0144929x.2018.1519599","is_oa":false,"landing_page_url":"https://doi.org/10.1080/0144929x.2018.1519599","pdf_url":null,"source":{"id":"https://openalex.org/S123849098","display_name":"Behaviour and Information Technology","issn_l":"0144-929X","issn":["0144-929X","1362-3001"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320547","host_organization_name":"Taylor & Francis","host_organization_lineage":["https://openalex.org/P4310320547"],"host_organization_lineage_names":["Taylor & Francis"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Behaviour &amp; Information Technology","raw_type":"journal-article"},{"id":"pmh:oai:research-information.bris.ac.uk:openaire_cris_publications/b555820f-3d91-4292-a4d4-7ffc0bddf537","is_oa":true,"landing_page_url":"https://research-information.bris.ac.uk/en/publications/b555820f-3d91-4292-a4d4-7ffc0bddf537","pdf_url":"https://research-information.bris.ac.uk/files/186672683/Full_text_PDF_accepted_author_manuscript_.pdf","source":{"id":"https://openalex.org/S7407055359","display_name":"Explore Bristol Research","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Williams, E J & Polage, D 2019, 'How persuasive is phishing email? The role of authentic design, influence and current events in email judgements', Behaviour and Information Technology, vol. 38, no. 2, pp. 184-197. https://doi.org/10.1080/0144929X.2018.1519599","raw_type":"info:eu-repo/semantics/publishedVersion"},{"id":"pmh:oai:digitalcommons.cwu.edu:cotsfac-1573","is_oa":false,"landing_page_url":"https://digitalcommons.cwu.edu/cotsfac/573","pdf_url":null,"source":{"id":"https://openalex.org/S4377196478","display_name":"ScholarWorks (Central Washington University)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I29867402","host_organization_name":"Central Washington University","host_organization_lineage":["https://openalex.org/I29867402"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"All Faculty Scholarship for the College of the Sciences","raw_type":"text"},{"id":"pmh:oai:RePEc:taf:tbitxx:v:38:y:2019:i:2:p:184-197","is_oa":false,"landing_page_url":"http://hdl.handle.net/10.1080/0144929X.2018.1519599","pdf_url":null,"source":{"id":"https://openalex.org/S4306401271","display_name":"RePEc: Research Papers in Economics","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I77793887","host_organization_name":"Federal Reserve Bank of St. Louis","host_organization_lineage":["https://openalex.org/I77793887"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"article"},{"id":"pmh:oai:research-information.bris.ac.uk:Publications/b555820f-3d91-4292-a4d4-7ffc0bddf537","is_oa":false,"landing_page_url":null,"pdf_url":null,"source":{"id":"https://openalex.org/S4306400895","display_name":"Bristol Research (University of Bristol)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I36234482","host_organization_name":"University of Bristol","host_organization_lineage":["https://openalex.org/I36234482"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":""},{"id":"pmh:oai:research-information.bris.ac.uk:publications/b555820f-3d91-4292-a4d4-7ffc0bddf537","is_oa":false,"landing_page_url":"http://www.scopus.com/inward/record.url?scp=85053346034&partnerID=8YFLogxK","pdf_url":null,"source":{"id":"https://openalex.org/S4306400895","display_name":"Bristol Research (University of Bristol)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I36234482","host_organization_name":"University of Bristol","host_organization_lineage":["https://openalex.org/I36234482"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":""}],"best_oa_location":{"id":"pmh:oai:research-information.bris.ac.uk:openaire_cris_publications/b555820f-3d91-4292-a4d4-7ffc0bddf537","is_oa":true,"landing_page_url":"https://research-information.bris.ac.uk/en/publications/b555820f-3d91-4292-a4d4-7ffc0bddf537","pdf_url":"https://research-information.bris.ac.uk/files/186672683/Full_text_PDF_accepted_author_manuscript_.pdf","source":{"id":"https://openalex.org/S7407055359","display_name":"Explore Bristol Research","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Williams, E J & Polage, D 2019, 'How persuasive is phishing email? The role of authentic design, influence and current events in email judgements', Behaviour and Information Technology, vol. 38, no. 2, pp. 184-197. https://doi.org/10.1080/0144929X.2018.1519599","raw_type":"info:eu-repo/semantics/publishedVersion"},"sustainable_development_goals":[{"score":0.5199999809265137,"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16"}],"awards":[{"id":"https://openalex.org/G3576637205","display_name":null,"funder_award_id":"EP/P011454/1","funder_id":"https://openalex.org/F4320334627","funder_display_name":"Engineering and Physical Sciences Research Council"},{"id":"https://openalex.org/G4579349297","display_name":"Cyber-Security across the Life Span (cSaLSA)","funder_award_id":"EP/P011454/1","funder_id":"https://openalex.org/F4320334627","funder_display_name":"Engineering and Physical Sciences Research Council"}],"funders":[{"id":"https://openalex.org/F4320334627","display_name":"Engineering and Physical Sciences Research Council","ror":"https://ror.org/0439y7842"}],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W2890835985.pdf","grobid_xml":"https://content.openalex.org/works/W2890835985.grobid-xml"},"referenced_works_count":42,"referenced_works":["https://openalex.org/W66554464","https://openalex.org/W1512366833","https://openalex.org/W1969119488","https://openalex.org/W1970174926","https://openalex.org/W1977049125","https://openalex.org/W1990948551","https://openalex.org/W1993246901","https://openalex.org/W2004082677","https://openalex.org/W2019865016","https://openalex.org/W2040174723","https://openalex.org/W2061592058","https://openalex.org/W2069181680","https://openalex.org/W2069578835","https://openalex.org/W2083112004","https://openalex.org/W2085463891","https://openalex.org/W2099222119","https://openalex.org/W2129939055","https://openalex.org/W2133469585","https://openalex.org/W2136136174","https://openalex.org/W2136978983","https://openalex.org/W2142175015","https://openalex.org/W2142287040","https://openalex.org/W2147329770","https://openalex.org/W2162532690","https://openalex.org/W2163176562","https://openalex.org/W2164346415","https://openalex.org/W2252446659","https://openalex.org/W2294577423","https://openalex.org/W2313695998","https://openalex.org/W2341963764","https://openalex.org/W2417503639","https://openalex.org/W2508079283","https://openalex.org/W2510870740","https://openalex.org/W2551763599","https://openalex.org/W2560330854","https://openalex.org/W2585421820","https://openalex.org/W2593526178","https://openalex.org/W2611817064","https://openalex.org/W3011865677","https://openalex.org/W3123340585","https://openalex.org/W4237771706","https://openalex.org/W4242386856"],"related_works":["https://openalex.org/W2149202530","https://openalex.org/W2807822918","https://openalex.org/W2921723332","https://openalex.org/W4391093354","https://openalex.org/W2482950156","https://openalex.org/W4396966040","https://openalex.org/W2305322260","https://openalex.org/W3139248031","https://openalex.org/W3042334625","https://openalex.org/W4200017362"],"abstract_inverted_index":{"Fraudulent":[0],"emails,":[1,6],"otherwise":[2],"known":[3],"as":[4,19],"phishing":[5,131],"use":[7],"a":[8,21,26,34,80],"range":[9],"of":[10,28,36,45,51,107,114,130],"influence":[11,66,115],"techniques":[12],"to":[13,16,58,95,127],"persuade":[14],"individuals":[15],"respond,":[17],"such":[18],"promising":[20],"monetary":[22],"reward":[23],"or":[24,64],"invoking":[25],"sense":[27],"urgency.":[29],"The":[30],"current":[31,82],"study":[32],"explored":[33],"number":[35],"factors":[37],"that":[38,55,104],"may":[39],"impact":[40],"the":[41,105,112],"persuasiveness":[42],"and":[43,87,111],"trustworthiness":[44],"emails":[46,54],"by":[47],"examining":[48],"participant":[49,120],"judgements":[50],"20":[52],"pre-designed":[53],"varied":[56],"according":[57],"(a)":[59],"whether":[60,69,77,89],"they":[61,70,78],"used":[62,117],"loss":[63],"reward-based":[65],"techniques,":[67],"(b)":[68],"contained":[71],"particular":[72],"authentic":[73,108],"design":[74,109],"cues,":[75],"(c)":[76],"referenced":[79],"salient":[81],"event":[83],"(the":[84],"Rio":[85],"Olympics),":[86],"(d)":[88],"participants":[90],"had":[91],"been":[92],"previously":[93],"exposed":[94],"information":[96],"regarding":[97],"online":[98],"scams":[99],"in":[100,125],"general.":[101],"Results":[102],"suggest":[103],"presence":[106],"cues":[110],"type":[113],"technique":[116],"significantly":[118],"impacted":[119],"judgements.":[121],"Findings":[122],"are":[123],"discussed":[124],"relation":[126],"theoretical":[128],"models":[129],"susceptibility.":[132]},"counts_by_year":[{"year":2026,"cited_by_count":3},{"year":2025,"cited_by_count":17},{"year":2024,"cited_by_count":12},{"year":2023,"cited_by_count":6},{"year":2022,"cited_by_count":10},{"year":2021,"cited_by_count":6},{"year":2020,"cited_by_count":10},{"year":2019,"cited_by_count":3}],"updated_date":"2026-03-20T23:20:44.827607","created_date":"2025-10-10T00:00:00"}
