{"id":"https://openalex.org/W3213373055","doi":"https://doi.org/10.1109/ecrime54498.2021.9738786","title":"Evaluating the Effectiveness of Phishing Reports on Twitter","display_name":"Evaluating the Effectiveness of Phishing Reports on Twitter","publication_year":2021,"publication_date":"2021-12-01","ids":{"openalex":"https://openalex.org/W3213373055","doi":"https://doi.org/10.1109/ecrime54498.2021.9738786","mag":"3213373055"},"language":"en","primary_location":{"id":"doi:10.1109/ecrime54498.2021.9738786","is_oa":false,"landing_page_url":"https://doi.org/10.1109/ecrime54498.2021.9738786","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2021 APWG Symposium on Electronic Crime Research (eCrime)","raw_type":"proceedings-article"},"type":"preprint","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5063566608","display_name":"Sayak Saha Roy","orcid":"https://orcid.org/0000-0001-6444-2623"},"institutions":[{"id":"https://openalex.org/I189196454","display_name":"The University of Texas at Arlington","ror":"https://ror.org/019kgqr73","country_code":"US","type":"education","lineage":["https://openalex.org/I189196454"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Sayak Saha Roy","raw_affiliation_strings":["The University of Texas at Arlington"],"affiliations":[{"raw_affiliation_string":"The University of Texas at Arlington","institution_ids":["https://openalex.org/I189196454"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5038142985","display_name":"Unique Karanjit","orcid":"https://orcid.org/0009-0003-4809-7462"},"institutions":[{"id":"https://openalex.org/I189196454","display_name":"The University of Texas at Arlington","ror":"https://ror.org/019kgqr73","country_code":"US","type":"education","lineage":["https://openalex.org/I189196454"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Unique Karanjit","raw_affiliation_strings":["The University of Texas at Arlington"],"affiliations":[{"raw_affiliation_string":"The University of Texas at Arlington","institution_ids":["https://openalex.org/I189196454"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5076332929","display_name":"Shirin Nilizadeh","orcid":"https://orcid.org/0000-0002-0539-3742"},"institutions":[{"id":"https://openalex.org/I189196454","display_name":"The University of Texas at Arlington","ror":"https://ror.org/019kgqr73","country_code":"US","type":"education","lineage":["https://openalex.org/I189196454"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Shirin Nilizadeh","raw_affiliation_strings":["The University of Texas at Arlington"],"affiliations":[{"raw_affiliation_string":"The University of Texas at Arlington","institution_ids":["https://openalex.org/I189196454"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5063566608"],"corresponding_institution_ids":["https://openalex.org/I189196454"],"apc_list":null,"apc_paid":null,"fwci":1.74678081,"has_fulltext":false,"cited_by_count":7,"citation_normalized_percentile":{"value":0.87553707,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":97},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"13"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11147","display_name":"Misinformation and Its Impacts","score":0.9898999929428101,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9807000160217285,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/phishing","display_name":"Phishing","score":0.9829009771347046},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.5973365306854248},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.587955117225647},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.5197543501853943},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.28587889671325684}],"concepts":[{"id":"https://openalex.org/C83860907","wikidata":"https://www.wikidata.org/wiki/Q135005","display_name":"Phishing","level":3,"score":0.9829009771347046},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5973365306854248},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.587955117225647},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.5197543501853943},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.28587889671325684}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/ecrime54498.2021.9738786","is_oa":false,"landing_page_url":"https://doi.org/10.1109/ecrime54498.2021.9738786","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2021 APWG Symposium on Electronic Crime Research (eCrime)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":42,"referenced_works":["https://openalex.org/W185907677","https://openalex.org/W1577581905","https://openalex.org/W1602672676","https://openalex.org/W1883096928","https://openalex.org/W1970174926","https://openalex.org/W2020221730","https://openalex.org/W2080676019","https://openalex.org/W2095610745","https://openalex.org/W2140359328","https://openalex.org/W2160353917","https://openalex.org/W2221203134","https://openalex.org/W2297844173","https://openalex.org/W2321446074","https://openalex.org/W2336566325","https://openalex.org/W2361517492","https://openalex.org/W2418966180","https://openalex.org/W2521132308","https://openalex.org/W2568349553","https://openalex.org/W2612460748","https://openalex.org/W2624744510","https://openalex.org/W2734324974","https://openalex.org/W2739066632","https://openalex.org/W2743990443","https://openalex.org/W2782171552","https://openalex.org/W2788346622","https://openalex.org/W2788827950","https://openalex.org/W2790832404","https://openalex.org/W2794616902","https://openalex.org/W2794956224","https://openalex.org/W2806379428","https://openalex.org/W2890718808","https://openalex.org/W2893894073","https://openalex.org/W2909737018","https://openalex.org/W2953797486","https://openalex.org/W2980720901","https://openalex.org/W3003545752","https://openalex.org/W3012459057","https://openalex.org/W3016127024","https://openalex.org/W3082159171","https://openalex.org/W3087932985","https://openalex.org/W3140511580","https://openalex.org/W3194513570"],"related_works":["https://openalex.org/W2748952813","https://openalex.org/W2149202530","https://openalex.org/W2807822918","https://openalex.org/W2921723332","https://openalex.org/W2482950156","https://openalex.org/W3042334625","https://openalex.org/W3139248031","https://openalex.org/W4200017362","https://openalex.org/W2305322260","https://openalex.org/W2118123121"],"abstract_inverted_index":{"Phishing":[0],"attacks":[1,31],"are":[2],"an":[3,241],"increasingly":[4],"potent":[5],"web-based":[6],"threat,":[7],"with":[8,134],"nearly":[9,184],"1.5":[10],"million":[11],"such":[12,45],"websites":[13,97],"being":[14,198,202],"created":[15],"on":[16,39,138,168,232],"a":[17,81,194,212],"monthly":[18],"basis.":[19],"In":[20],"this":[21,223],"work,":[22],"we":[23,156],"present":[24],"the":[25,95,101,124,127,135,172,180,226,235],"first":[26],"study":[27],"towards":[28],"identifying":[29,104,247],"phishing":[30,86,96,115,229,249],"through":[32],"reports":[33,46,79,129,160,217,230],"shared":[34,231],"by":[35,48,179,204],"security":[36],"conscious":[37],"users":[38,167],"Twitter.":[40],"We":[41,120],"evaluated":[42],"over":[43],"16.4k":[44],"posted":[47],"701":[49],"Twitter":[50,128],"accounts":[51],"between":[52],"June":[53],"to":[54,111],"August":[55],"2021,":[56],"which":[57,176],"contained":[58],"11.1k":[59],"unique":[60],"URLs,":[61,87],"and":[62,69,105,118,140,142,174,220,234],"analyzed":[63],"their":[64],"effectiveness":[65],"using":[66,238],"various":[67],"quantitative":[68],"qualitative":[70],"measures.":[71],"Our":[72],"findings":[73],"indicate":[74],"that":[75,123,158,211],"not":[76],"only":[77],"these":[78,107,154,159,187,216],"share":[80],"high":[82],"volume":[83],"of":[84,103,149,186,196,215,228,237],"legitimate":[85],"but":[88],"they":[89],"also":[90,121,143,201],"contain":[91],"more":[92],"information":[93],"regarding":[94],"(which":[98],"can":[99],"expedite":[100],"process":[102],"removing":[106],"threats),":[108],"when":[109],"compared":[110],"two":[112],"popular":[113],"open-source":[114],"feeds:":[116],"PhishTank":[117,139],"OpenPhish.":[119],"noticed":[122],"URLs":[125,136,188],"in":[126],"had":[130],"very":[131,162,205],"little":[132],"overlap":[133],"found":[137,157],"OpenPhish,":[141],"remained":[144],"active":[145,191],"for":[146,246],"longer":[147],"periods":[148],"time.":[150],"However,":[151],"despite":[152],"having":[153],"attributes,":[155],"have":[161],"low":[163],"interaction":[164],"from":[165,171],"other":[166],"Twitter,":[169,233],"especially":[170],"domains":[173],"organizations":[175],"were":[177,189],"targeted":[178],"reported":[181,199],"URLs.":[182],"Moreover,":[183],"31%":[185],"still":[190],"even":[192],"after":[193],"week":[195],"them":[197,239],"while":[200],"detected":[203],"few":[206],"anti-phishing":[207],"tools.":[208],"This":[209],"suggests":[210],"large":[213],"majority":[214],"remain":[218],"undiscovered":[219],"underutilized.":[221],"Thus,":[222],"work":[224],"highlights":[225],"utility":[227],"benefits":[236],"as":[240],"open":[242],"source":[243],"knowledge":[244],"base":[245],"new":[248],"websites.":[250]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":2},{"year":2023,"cited_by_count":3},{"year":2022,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
