{"id":"https://openalex.org/W2116688660","doi":"https://doi.org/10.1109/icdim.2008.4746717","title":"An evaluation of users&amp;#x2019; tips effectiveness for Phishing websites detection","display_name":"An evaluation of users&amp;#x2019; tips effectiveness for Phishing websites detection","publication_year":2008,"publication_date":"2008-11-01","ids":{"openalex":"https://openalex.org/W2116688660","doi":"https://doi.org/10.1109/icdim.2008.4746717","mag":"2116688660"},"language":"en","primary_location":{"id":"doi:10.1109/icdim.2008.4746717","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icdim.2008.4746717","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2008 Third International Conference on Digital Information Management","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5077724667","display_name":"Abdullah M. Alnajim","orcid":"https://orcid.org/0000-0003-3223-1105"},"institutions":[{"id":"https://openalex.org/I190082696","display_name":"Durham University","ror":"https://ror.org/01v29qb04","country_code":"GB","type":"education","lineage":["https://openalex.org/I190082696"]}],"countries":["GB"],"is_corresponding":true,"raw_author_name":"Abdullah Alnajim","raw_affiliation_strings":["Department of Computer Science, Durham University, UK","Dept. of Comput. Sci., Durham Univ., Durham#TAB#"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, Durham University, UK","institution_ids":["https://openalex.org/I190082696"]},{"raw_affiliation_string":"Dept. of Comput. Sci., Durham Univ., Durham#TAB#","institution_ids":["https://openalex.org/I190082696"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5110604115","display_name":"Malcolm Munro","orcid":null},"institutions":[{"id":"https://openalex.org/I190082696","display_name":"Durham University","ror":"https://ror.org/01v29qb04","country_code":"GB","type":"education","lineage":["https://openalex.org/I190082696"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Malcolm Munro","raw_affiliation_strings":["Department of Computer Science, Durham University, UK","Dept. of Comput. Sci., Durham Univ., Durham#TAB#"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, Durham University, UK","institution_ids":["https://openalex.org/I190082696"]},{"raw_affiliation_string":"Dept. of Comput. Sci., Durham Univ., Durham#TAB#","institution_ids":["https://openalex.org/I190082696"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5077724667"],"corresponding_institution_ids":["https://openalex.org/I190082696"],"apc_list":null,"apc_paid":null,"fwci":7.6134,"has_fulltext":false,"cited_by_count":16,"citation_normalized_percentile":{"value":0.96962022,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"63","last_page":"68"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T13582","display_name":"Stalking, Cyberstalking, and Harassment","score":0.9771999716758728,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T13841","display_name":"Psychology of Social Influence","score":0.9767000079154968,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/phishing","display_name":"Phishing","score":0.9874663352966309},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6619258522987366},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.4554521441459656},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.4413793087005615},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.38998204469680786},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.30173689126968384}],"concepts":[{"id":"https://openalex.org/C83860907","wikidata":"https://www.wikidata.org/wiki/Q135005","display_name":"Phishing","level":3,"score":0.9874663352966309},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6619258522987366},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.4554521441459656},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.4413793087005615},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.38998204469680786},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.30173689126968384}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/icdim.2008.4746717","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icdim.2008.4746717","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2008 Third International Conference on Digital Information Management","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":10,"referenced_works":["https://openalex.org/W192036632","https://openalex.org/W1553004598","https://openalex.org/W1983208818","https://openalex.org/W1983581110","https://openalex.org/W2029827226","https://openalex.org/W2060343533","https://openalex.org/W2106432086","https://openalex.org/W2136136174","https://openalex.org/W4245098842","https://openalex.org/W4256171032"],"related_works":["https://openalex.org/W2748952813","https://openalex.org/W2149202530","https://openalex.org/W2807822918","https://openalex.org/W2921723332","https://openalex.org/W2482950156","https://openalex.org/W3042334625","https://openalex.org/W3139248031","https://openalex.org/W4200017362","https://openalex.org/W2305322260","https://openalex.org/W2118123121"],"abstract_inverted_index":{"Recently,":[0],"Phishing":[1,68,106],"attacks":[2,48],"have":[3,18],"become":[4],"a":[5],"serious":[6],"problem":[7],"for":[8,66],"end-users,":[9],"online":[10],"banking":[11],"and":[12,23,38,45,76,83],"e-commerce":[13],"websites.":[14,69],"Many":[15],"anti-Phishing":[16,32,97],"approaches":[17,29],"been":[19],"proposed":[20,75],"to":[21,41,78,94,104],"detect":[22,44,105],"prevent":[24,46],"Phishing.":[25],"One":[26],"of":[27,61],"the":[28,31,47,59],"is":[30,74],"tips":[33,65,98],"published":[34],"by":[35,49],"many":[36,53],"governmental":[37],"private":[39],"organizations":[40],"help":[42],"users":[43,100],"themselves.":[50],"There":[51],"are":[52],"different":[54],"tips.":[55],"This":[56],"paper":[57,92],"examines":[58],"effectiveness":[60,72,89],"most":[62],"common":[63],"userspsila":[64],"detecting":[67],"A":[70],"novel":[71],"criteria":[73],"used":[77],"examine":[79],"each":[80],"single":[81],"tip":[82],"rank":[84],"it":[85],"based":[86],"on":[87,103],"its":[88],"score.":[90],"The":[91],"tries":[93],"find":[95],"fewer":[96],"that":[99],"can":[101],"focus":[102],"attacks.":[107]},"counts_by_year":[{"year":2022,"cited_by_count":1},{"year":2020,"cited_by_count":1},{"year":2019,"cited_by_count":1},{"year":2017,"cited_by_count":1},{"year":2015,"cited_by_count":1},{"year":2014,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
