{"id":"https://openalex.org/W3112335709","doi":"https://doi.org/10.1109/isi49825.2020.9280478","title":"An Ordinal Approach to Modeling and Visualizing Phishing Susceptibility","display_name":"An Ordinal Approach to Modeling and Visualizing Phishing Susceptibility","publication_year":2020,"publication_date":"2020-11-09","ids":{"openalex":"https://openalex.org/W3112335709","doi":"https://doi.org/10.1109/isi49825.2020.9280478","mag":"3112335709"},"language":"en","primary_location":{"id":"doi:10.1109/isi49825.2020.9280478","is_oa":false,"landing_page_url":"https://doi.org/10.1109/isi49825.2020.9280478","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2020 IEEE International Conference on Intelligence and Security Informatics (ISI)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5006686080","display_name":"David G. Dobolyi","orcid":"https://orcid.org/0000-0002-9493-3447"},"institutions":[{"id":"https://openalex.org/I107639228","display_name":"University of Notre Dame","ror":"https://ror.org/00mkhxb43","country_code":"US","type":"education","lineage":["https://openalex.org/I107639228"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"David G. Dobolyi","raw_affiliation_strings":["Mendoza College of Business, University of Notre Dame, Notre Dame, IN, USA"],"affiliations":[{"raw_affiliation_string":"Mendoza College of Business, University of Notre Dame, Notre Dame, IN, USA","institution_ids":["https://openalex.org/I107639228"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5016943900","display_name":"Ahmed Abbasi","orcid":"https://orcid.org/0000-0001-7698-7794"},"institutions":[{"id":"https://openalex.org/I107639228","display_name":"University of Notre Dame","ror":"https://ror.org/00mkhxb43","country_code":"US","type":"education","lineage":["https://openalex.org/I107639228"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Ahmed Abbasi","raw_affiliation_strings":["Mendoza College of Business, University of Notre Dame, Notre Dame, IN, USA"],"affiliations":[{"raw_affiliation_string":"Mendoza College of Business, University of Notre Dame, Notre Dame, IN, USA","institution_ids":["https://openalex.org/I107639228"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5078359298","display_name":"Fatemeh Zahedi","orcid":"https://orcid.org/0000-0002-8716-618X"},"institutions":[{"id":"https://openalex.org/I43579087","display_name":"University of Wisconsin\u2013Milwaukee","ror":"https://ror.org/031q21x57","country_code":"US","type":"education","lineage":["https://openalex.org/I43579087"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"F. Mariam Zahedi","raw_affiliation_strings":["Lubar School of Business, University of Wisconsin-Milwaukee, Milwaukee, WI, USA"],"affiliations":[{"raw_affiliation_string":"Lubar School of Business, University of Wisconsin-Milwaukee, Milwaukee, WI, USA","institution_ids":["https://openalex.org/I43579087"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5048663930","display_name":"Anthony Vance","orcid":"https://orcid.org/0000-0002-4554-6176"},"institutions":[{"id":"https://openalex.org/I84392919","display_name":"Temple University","ror":"https://ror.org/00kx1jb78","country_code":"US","type":"education","lineage":["https://openalex.org/I84392919"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Anthony Vance","raw_affiliation_strings":["Fox School of Business, Temple University, Philadelphia, PA, USA"],"affiliations":[{"raw_affiliation_string":"Fox School of Business, Temple University, Philadelphia, PA, USA","institution_ids":["https://openalex.org/I84392919"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5006686080"],"corresponding_institution_ids":["https://openalex.org/I107639228"],"apc_list":null,"apc_paid":null,"fwci":0.5338,"has_fulltext":false,"cited_by_count":5,"citation_normalized_percentile":{"value":0.7649547,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11147","display_name":"Misinformation and Its Impacts","score":0.9819999933242798,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T12519","display_name":"Cybercrime and Law Enforcement Studies","score":0.9751999974250793,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/phishing","display_name":"Phishing","score":0.9731320142745972},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6300464868545532},{"id":"https://openalex.org/keywords/tree-traversal","display_name":"Tree traversal","score":0.6224826574325562},{"id":"https://openalex.org/keywords/task","display_name":"Task (project management)","score":0.4527474045753479},{"id":"https://openalex.org/keywords/process","display_name":"Process (computing)","score":0.43241047859191895},{"id":"https://openalex.org/keywords/sample","display_name":"Sample (material)","score":0.41440141201019287},{"id":"https://openalex.org/keywords/information-sensitivity","display_name":"Information sensitivity","score":0.41112220287323},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.3713269829750061},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.3678475618362427},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.29148069024086},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.29014793038368225},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.11447250843048096}],"concepts":[{"id":"https://openalex.org/C83860907","wikidata":"https://www.wikidata.org/wiki/Q135005","display_name":"Phishing","level":3,"score":0.9731320142745972},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6300464868545532},{"id":"https://openalex.org/C140745168","wikidata":"https://www.wikidata.org/wiki/Q1210082","display_name":"Tree traversal","level":2,"score":0.6224826574325562},{"id":"https://openalex.org/C2780451532","wikidata":"https://www.wikidata.org/wiki/Q759676","display_name":"Task (project management)","level":2,"score":0.4527474045753479},{"id":"https://openalex.org/C98045186","wikidata":"https://www.wikidata.org/wiki/Q205663","display_name":"Process (computing)","level":2,"score":0.43241047859191895},{"id":"https://openalex.org/C198531522","wikidata":"https://www.wikidata.org/wiki/Q485146","display_name":"Sample (material)","level":2,"score":0.41440141201019287},{"id":"https://openalex.org/C137822555","wikidata":"https://www.wikidata.org/wiki/Q2587068","display_name":"Information sensitivity","level":2,"score":0.41112220287323},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.3713269829750061},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.3678475618362427},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.29148069024086},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.29014793038368225},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.11447250843048096},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0},{"id":"https://openalex.org/C43617362","wikidata":"https://www.wikidata.org/wiki/Q170050","display_name":"Chromatography","level":1,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C201995342","wikidata":"https://www.wikidata.org/wiki/Q682496","display_name":"Systems engineering","level":1,"score":0.0},{"id":"https://openalex.org/C185592680","wikidata":"https://www.wikidata.org/wiki/Q2329","display_name":"Chemistry","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/isi49825.2020.9280478","is_oa":false,"landing_page_url":"https://doi.org/10.1109/isi49825.2020.9280478","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2020 IEEE International Conference on Intelligence and Security Informatics (ISI)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.5,"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":40,"referenced_works":["https://openalex.org/W82733688","https://openalex.org/W118121016","https://openalex.org/W176201993","https://openalex.org/W192036632","https://openalex.org/W613065787","https://openalex.org/W1529733883","https://openalex.org/W1590702148","https://openalex.org/W1975580288","https://openalex.org/W1981745473","https://openalex.org/W2009408190","https://openalex.org/W2026843999","https://openalex.org/W2033778079","https://openalex.org/W2039986066","https://openalex.org/W2071869991","https://openalex.org/W2081721100","https://openalex.org/W2126823585","https://openalex.org/W2131906261","https://openalex.org/W2135746613","https://openalex.org/W2136136174","https://openalex.org/W2150326939","https://openalex.org/W2158196600","https://openalex.org/W2159710624","https://openalex.org/W2162532690","https://openalex.org/W2164422986","https://openalex.org/W2200488194","https://openalex.org/W2335888457","https://openalex.org/W2552151107","https://openalex.org/W2555759095","https://openalex.org/W2951936974","https://openalex.org/W3121452939","https://openalex.org/W3129519361","https://openalex.org/W3150796314","https://openalex.org/W4243325401","https://openalex.org/W4255703762","https://openalex.org/W6604802258","https://openalex.org/W6607076485","https://openalex.org/W6607781535","https://openalex.org/W6618880948","https://openalex.org/W6631525190","https://openalex.org/W6790276271"],"related_works":["https://openalex.org/W170547082","https://openalex.org/W2136735429","https://openalex.org/W2149202530","https://openalex.org/W2587876411","https://openalex.org/W2790026742","https://openalex.org/W2185625238","https://openalex.org/W2339483600","https://openalex.org/W2906698902","https://openalex.org/W3172100151","https://openalex.org/W4378570479"],"abstract_inverted_index":{"Phishing":[0],"is":[1],"a":[2,69,89,102,110,132,137,150,162,208,227],"significant,":[3],"ongoing":[4],"cybersecurity":[5],"threat":[6],"facing":[7],"both":[8,170],"individuals":[9],"and":[10,12,112,159,172,182,233],"organizations,":[11],"the":[13,43,56,64,84,95,105,123,193,220],"consequences":[14],"of":[15,26,45,49,58,66,75,91,140,164,214],"falling":[16],"victim":[17],"to":[18,40,97,107,196,203,226,237],"phishing":[19,41,70,127,173,205],"can":[20,224],"be":[21,73],"dire,":[22],"particularly":[23],"in":[24,198,240],"terms":[25],"financial":[27,118],"loss.":[28],"While":[29],"much":[30],"research":[31,51],"has":[32,52],"focused":[33,53],"on":[34,54,219],"understanding":[35],"or":[36,82,117],"predicting":[37],"user":[38],"susceptibility":[39],"with":[42,68,109,136,161,179],"aim":[44],"preventing":[46],"it,":[47],"little":[48],"this":[50,144],"modeling":[55],"process":[57,86],"being":[59,231],"phished":[60,81,232],"holistically.":[61],"Specifically,":[62],"while":[63],"outcome":[65],"interacting":[67],"website":[71,111,128],"may":[72,234],"thought":[74],"as":[76,153],"binary":[77],"(e.g.,":[78],"\"Were":[79],"you":[80],"not?\"),":[83],"actual":[85],"typically":[87],"involves":[88],"sequence":[90],"stages":[92],"spanning":[93],"from":[94],"choice":[96],"visit":[98],"(or":[99],"not":[100],"visit)":[101],"link":[103],"all":[104],"way":[106],"transacting":[108],"giving":[113],"away":[114],"valuable":[115],"personal":[116],"information.":[119],"To":[120],"better":[121],"understand":[122],"variables":[124,191,222],"that":[125,168,200,223],"influence":[126],"traversal,":[129],"we":[130,188],"conducted":[131],"controlled":[133],"lab":[134],"experiment":[135],"large":[138],"sample":[139],"908":[141],"participants.":[142],"In":[143],"experiment,":[145],"each":[146],"participant":[147],"was":[148],"given":[149],"task":[151],"such":[152],"opening":[154],"an":[155],"online":[156],"checking":[157],"account":[158],"presented":[160],"series":[163],"simulated":[165],"search":[166],"results":[167,213],"included":[169],"legitimate":[171],"websites.":[174],"By":[175],"monitoring":[176],"participants'":[177],"interactions":[178],"these":[180],"websites":[181],"collecting":[183],"additional":[184],"information":[185],"via":[186],"surveys,":[187],"evaluated":[189],"which":[190],"were":[192],"most":[194],"likely":[195],"result":[197],"behavior":[199],"could":[201],"lead":[202,225],"greater":[204,228],"exposure":[206],"using":[207],"multi-model":[209],"comparison":[210],"approach.":[211],"The":[212],"our":[215],"analyses":[216],"shed":[217],"light":[218],"key":[221],"propensity":[229],"for":[230],"prove":[235],"invaluable":[236],"researchers":[238],"interested":[239],"designing":[241],"new":[242],"interventions.":[243]},"counts_by_year":[{"year":2025,"cited_by_count":2},{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":1},{"year":2022,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
