{"id":"https://openalex.org/W4206473706","doi":"https://doi.org/10.1108/ics-12-2020-0204","title":"Evaluating user susceptibility to phishing attacks","display_name":"Evaluating user susceptibility to phishing attacks","publication_year":2022,"publication_date":"2022-01-04","ids":{"openalex":"https://openalex.org/W4206473706","doi":"https://doi.org/10.1108/ics-12-2020-0204"},"language":"en","primary_location":{"id":"doi:10.1108/ics-12-2020-0204","is_oa":false,"landing_page_url":"https://doi.org/10.1108/ics-12-2020-0204","pdf_url":null,"source":{"id":"https://openalex.org/S4210195545","display_name":"Information and Computer Security","issn_l":"2056-4961","issn":["2056-4961","2056-497X"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319811","host_organization_name":"Emerald Publishing Limited","host_organization_lineage":["https://openalex.org/P4310319811"],"host_organization_lineage_names":["Emerald Publishing Limited"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Information &amp; Computer Security","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5059400253","display_name":"Sanchari Das","orcid":"https://orcid.org/0000-0003-1299-7867"},"institutions":[{"id":"https://openalex.org/I131651094","display_name":"University of Denver","ror":"https://ror.org/04w7skc03","country_code":"US","type":"education","lineage":["https://openalex.org/I131651094"]},{"id":"https://openalex.org/I4210119109","display_name":"Indiana University Bloomington","ror":"https://ror.org/02k40bc56","country_code":"US","type":"education","lineage":["https://openalex.org/I4210119109","https://openalex.org/I592451"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Sanchari Das","raw_affiliation_strings":["Department of Computer Science, University of Denver, Denver, Colorado, USA and Department of Informatics, Indiana University Bloomington, Bloomington, Indiana, USA"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, University of Denver, Denver, Colorado, USA and Department of Informatics, Indiana University Bloomington, Bloomington, Indiana, USA","institution_ids":["https://openalex.org/I4210119109","https://openalex.org/I131651094"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5070786186","display_name":"Christena Nippert\u2010Eng","orcid":"https://orcid.org/0000-0002-1212-3628"},"institutions":[{"id":"https://openalex.org/I4210119109","display_name":"Indiana University Bloomington","ror":"https://ror.org/02k40bc56","country_code":"US","type":"education","lineage":["https://openalex.org/I4210119109","https://openalex.org/I592451"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Christena Nippert-Eng","raw_affiliation_strings":["Department of Informatics, Indiana University Bloomington, Bloomington, Indiana, USA"],"affiliations":[{"raw_affiliation_string":"Department of Informatics, Indiana University Bloomington, Bloomington, Indiana, USA","institution_ids":["https://openalex.org/I4210119109"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5057479145","display_name":"L. Jean Camp","orcid":"https://orcid.org/0000-0001-8731-7884"},"institutions":[{"id":"https://openalex.org/I4210119109","display_name":"Indiana University Bloomington","ror":"https://ror.org/02k40bc56","country_code":"US","type":"education","lineage":["https://openalex.org/I4210119109","https://openalex.org/I592451"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"L. Jean Camp","raw_affiliation_strings":["School of Computing and Informatics, Indiana University Bloomington, Bloomington, Indiana, USA"],"affiliations":[{"raw_affiliation_string":"School of Computing and Informatics, Indiana University Bloomington, Bloomington, Indiana, USA","institution_ids":["https://openalex.org/I4210119109"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5059400253"],"corresponding_institution_ids":["https://openalex.org/I131651094","https://openalex.org/I4210119109"],"apc_list":null,"apc_paid":null,"fwci":8.7913,"has_fulltext":false,"cited_by_count":29,"citation_normalized_percentile":{"value":0.97790238,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":98,"max":99},"biblio":{"volume":"30","issue":"1","first_page":"1","last_page":"18"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9987000226974487,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9962000250816345,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/phishing","display_name":"Phishing","score":0.8457292914390564},{"id":"https://openalex.org/keywords/originality","display_name":"Originality","score":0.5572839975357056},{"id":"https://openalex.org/keywords/overconfidence-effect","display_name":"Overconfidence effect","score":0.5075486898422241},{"id":"https://openalex.org/keywords/government","display_name":"Government (linguistics)","score":0.4672740697860718},{"id":"https://openalex.org/keywords/desk","display_name":"Desk","score":0.44179320335388184},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.40360772609710693},{"id":"https://openalex.org/keywords/psychology","display_name":"Psychology","score":0.38652801513671875},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.3589848279953003},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.3393288850784302},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.1445365846157074},{"id":"https://openalex.org/keywords/social-psychology","display_name":"Social psychology","score":0.14111697673797607}],"concepts":[{"id":"https://openalex.org/C83860907","wikidata":"https://www.wikidata.org/wiki/Q135005","display_name":"Phishing","level":3,"score":0.8457292914390564},{"id":"https://openalex.org/C2776950860","wikidata":"https://www.wikidata.org/wiki/Q2914681","display_name":"Originality","level":3,"score":0.5572839975357056},{"id":"https://openalex.org/C51110983","wikidata":"https://www.wikidata.org/wiki/Q16503490","display_name":"Overconfidence effect","level":2,"score":0.5075486898422241},{"id":"https://openalex.org/C2778137410","wikidata":"https://www.wikidata.org/wiki/Q2732820","display_name":"Government (linguistics)","level":2,"score":0.4672740697860718},{"id":"https://openalex.org/C2776545233","wikidata":"https://www.wikidata.org/wiki/Q1064858","display_name":"Desk","level":2,"score":0.44179320335388184},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.40360772609710693},{"id":"https://openalex.org/C15744967","wikidata":"https://www.wikidata.org/wiki/Q9418","display_name":"Psychology","level":0,"score":0.38652801513671875},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.3589848279953003},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.3393288850784302},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.1445365846157074},{"id":"https://openalex.org/C77805123","wikidata":"https://www.wikidata.org/wiki/Q161272","display_name":"Social psychology","level":1,"score":0.14111697673797607},{"id":"https://openalex.org/C11012388","wikidata":"https://www.wikidata.org/wiki/Q170658","display_name":"Creativity","level":2,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C41895202","wikidata":"https://www.wikidata.org/wiki/Q8162","display_name":"Linguistics","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1108/ics-12-2020-0204","is_oa":false,"landing_page_url":"https://doi.org/10.1108/ics-12-2020-0204","pdf_url":null,"source":{"id":"https://openalex.org/S4210195545","display_name":"Information and Computer Security","issn_l":"2056-4961","issn":["2056-4961","2056-497X"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319811","host_organization_name":"Emerald Publishing Limited","host_organization_lineage":["https://openalex.org/P4310319811"],"host_organization_lineage_names":["Emerald Publishing Limited"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Information &amp; Computer Security","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":43,"referenced_works":["https://openalex.org/W192036632","https://openalex.org/W1535174579","https://openalex.org/W1545244370","https://openalex.org/W1974464813","https://openalex.org/W1985920648","https://openalex.org/W1986089039","https://openalex.org/W1990188874","https://openalex.org/W1991205127","https://openalex.org/W2022259081","https://openalex.org/W2026843999","https://openalex.org/W2029591949","https://openalex.org/W2029827226","https://openalex.org/W2090259188","https://openalex.org/W2100566540","https://openalex.org/W2101848789","https://openalex.org/W2125288693","https://openalex.org/W2131906261","https://openalex.org/W2165267130","https://openalex.org/W2221203134","https://openalex.org/W2396938716","https://openalex.org/W2510870740","https://openalex.org/W2563010877","https://openalex.org/W2599566598","https://openalex.org/W2741872938","https://openalex.org/W2766373534","https://openalex.org/W2784017372","https://openalex.org/W2786981667","https://openalex.org/W2788827950","https://openalex.org/W2885410498","https://openalex.org/W2898084372","https://openalex.org/W2898143198","https://openalex.org/W2910405595","https://openalex.org/W2950405799","https://openalex.org/W2966998009","https://openalex.org/W2968970907","https://openalex.org/W2969054107","https://openalex.org/W2970454902","https://openalex.org/W3005179962","https://openalex.org/W3038432520","https://openalex.org/W3046883821","https://openalex.org/W3087776919","https://openalex.org/W3196660774","https://openalex.org/W4254325038"],"related_works":["https://openalex.org/W2593155302","https://openalex.org/W2041415459","https://openalex.org/W2072812638","https://openalex.org/W2991634017","https://openalex.org/W4253467046","https://openalex.org/W3126095231","https://openalex.org/W4251085376","https://openalex.org/W2775388773","https://openalex.org/W1980773669","https://openalex.org/W2066240519"],"abstract_inverted_index":{"Purpose":[0],"Phishing":[1],"is":[2,194,222],"a":[3,43,57,68,92,184,188,195,209],"well-known":[4],"cybersecurity":[5],"attack":[6],"that":[7,138],"has":[8],"rapidly":[9],"increased":[10],"in":[11,80,115,170,197],"recent":[12],"years.":[13],"It":[14],"poses":[15],"risks":[16],"to":[17,25,41,130],"businesses,":[18],"government":[19],"agencies":[20],"and":[21,29,46,103,217,227],"all":[22],"users":[23],"due":[24],"sensitive":[26],"data":[27],"breaches":[28],"subsequent":[30],"financial":[31],"losses.":[32],"To":[33,50],"study":[34,192,212],"the":[35,54,85,124,135,148,173,202,206],"user":[36,47,145,149,191,211],"side,":[37],"this":[38,198],"paper":[39],"aims":[40],"conduct":[42],"literature":[44,70,125,185],"review":[45,71,126,186],"study.":[48],"Design/methodology/approach":[49],"investigate":[51],"phishing":[52,64,159],"attacks,":[53],"authors":[55,86,97,136,182,203,207],"provide":[56],"detailed":[58,210],"overview":[59],"of":[60,72,91,141,176],"previous":[61],"research":[62,116],"on":[63,88,144,190],"techniques":[65],"by":[66],"conducting":[67],"systematic":[69],"n":[73],"=":[74],"367":[75],"peer-reviewed":[76],"academic":[77],"papers":[78,142],"published":[79],"ACM":[81],"Digital":[82],"Library.":[83],"Also,":[84],"report":[87],"an":[89,167,224],"evaluation":[90],"high":[93,100,107,214],"school":[94,101,108,215],"community.":[95],"The":[96,164,181],"engaged":[98],"57":[99],"students":[102,216],"faculty":[104,218],"members":[105],"(12":[106],"students,":[109],"45":[110],"staff":[111],"members)":[112],"as":[113,131,133,200],"participants":[114,154],"using":[117,219],"signal":[118],"detection":[119],"theory":[120],"(SDT).":[121],"Findings":[122],"Through":[123],"which":[127,193,221],"goes":[128],"back":[129],"early":[132],"2004,":[134],"found":[137],"only":[139],"13.9%":[140],"focused":[143],"studies.":[146],"In":[147],"study,":[150],"through":[151],"scenario-based":[152],"analysis,":[153],"were":[155],"tasked":[156],"with":[157,187,213],"distinguishing":[158],"e-mails":[160],"from":[161,172],"authentic":[162],"e-mails.":[163],"results":[165],"revealed":[166],"overconfidence":[168],"bias":[169],"self-detection":[171],"participants,":[174],"regardless":[175],"their":[177],"technical":[178],"background.":[179],"Originality/value":[180],"conducted":[183,208],"focus":[189],"first":[196],"field":[199],"far":[201],"know.":[204],"Additionally,":[205],"SDT":[220],"also":[223],"understudied":[225],"area":[226],"population.":[228]},"counts_by_year":[{"year":2025,"cited_by_count":5},{"year":2024,"cited_by_count":9},{"year":2023,"cited_by_count":6},{"year":2022,"cited_by_count":9}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
