{"id":"https://openalex.org/W2103854406","doi":"https://doi.org/10.1145/1772690.1772719","title":"Malicious interface design","display_name":"Malicious interface design","publication_year":2010,"publication_date":"2010-04-26","ids":{"openalex":"https://openalex.org/W2103854406","doi":"https://doi.org/10.1145/1772690.1772719","mag":"2103854406"},"language":"en","primary_location":{"id":"doi:10.1145/1772690.1772719","is_oa":false,"landing_page_url":"https://doi.org/10.1145/1772690.1772719","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 19th international conference on World wide web","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5037393131","display_name":"Gregory Conti","orcid":"https://orcid.org/0000-0001-5099-7636"},"institutions":[{"id":"https://openalex.org/I192545095","display_name":"United States Military Academy","ror":"https://ror.org/01jepya76","country_code":"US","type":"education","lineage":["https://openalex.org/I1304082316","https://openalex.org/I1330347796","https://openalex.org/I192545095","https://openalex.org/I4210088792"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Gregory Conti","raw_affiliation_strings":["United States Military Academy, West Point, NY, USA"],"affiliations":[{"raw_affiliation_string":"United States Military Academy, West Point, NY, USA","institution_ids":["https://openalex.org/I192545095"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5071075492","display_name":"Edward Sobiesk","orcid":"https://orcid.org/0000-0002-0866-7745"},"institutions":[{"id":"https://openalex.org/I192545095","display_name":"United States Military Academy","ror":"https://ror.org/01jepya76","country_code":"US","type":"education","lineage":["https://openalex.org/I1304082316","https://openalex.org/I1330347796","https://openalex.org/I192545095","https://openalex.org/I4210088792"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Edward Sobiesk","raw_affiliation_strings":["United States Military Academy, West Point, NY, USA"],"affiliations":[{"raw_affiliation_string":"United States Military Academy, West Point, NY, USA","institution_ids":["https://openalex.org/I192545095"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5037393131"],"corresponding_institution_ids":["https://openalex.org/I192545095"],"apc_list":null,"apc_paid":null,"fwci":4.2852,"has_fulltext":false,"cited_by_count":131,"citation_normalized_percentile":{"value":0.95018569,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":94,"max":100},"biblio":{"volume":null,"issue":null,"first_page":"271","last_page":"280"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9976000189781189,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9973999857902527,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7533645629882812},{"id":"https://openalex.org/keywords/usability","display_name":"Usability","score":0.7530309557914734},{"id":"https://openalex.org/keywords/user-interface","display_name":"User interface","score":0.5698795318603516},{"id":"https://openalex.org/keywords/interface","display_name":"Interface (matter)","score":0.5182971358299255},{"id":"https://openalex.org/keywords/human\u2013computer-interaction","display_name":"Human\u2013computer interaction","score":0.4544147253036499},{"id":"https://openalex.org/keywords/population","display_name":"Population","score":0.4475581645965576},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.42879602313041687},{"id":"https://openalex.org/keywords/domain","display_name":"Domain (mathematical analysis)","score":0.41760197281837463},{"id":"https://openalex.org/keywords/interface-design","display_name":"Interface design","score":0.41685089468955994},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.39717185497283936}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7533645629882812},{"id":"https://openalex.org/C170130773","wikidata":"https://www.wikidata.org/wiki/Q216378","display_name":"Usability","level":2,"score":0.7530309557914734},{"id":"https://openalex.org/C89505385","wikidata":"https://www.wikidata.org/wiki/Q47146","display_name":"User interface","level":2,"score":0.5698795318603516},{"id":"https://openalex.org/C113843644","wikidata":"https://www.wikidata.org/wiki/Q901882","display_name":"Interface (matter)","level":4,"score":0.5182971358299255},{"id":"https://openalex.org/C107457646","wikidata":"https://www.wikidata.org/wiki/Q207434","display_name":"Human\u2013computer interaction","level":1,"score":0.4544147253036499},{"id":"https://openalex.org/C2908647359","wikidata":"https://www.wikidata.org/wiki/Q2625603","display_name":"Population","level":2,"score":0.4475581645965576},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.42879602313041687},{"id":"https://openalex.org/C36503486","wikidata":"https://www.wikidata.org/wiki/Q11235244","display_name":"Domain (mathematical analysis)","level":2,"score":0.41760197281837463},{"id":"https://openalex.org/C139366241","wikidata":"https://www.wikidata.org/wiki/Q135707","display_name":"Interface design","level":2,"score":0.41685089468955994},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.39717185497283936},{"id":"https://openalex.org/C173608175","wikidata":"https://www.wikidata.org/wiki/Q232661","display_name":"Parallel computing","level":1,"score":0.0},{"id":"https://openalex.org/C129307140","wikidata":"https://www.wikidata.org/wiki/Q6795880","display_name":"Maximum bubble pressure method","level":3,"score":0.0},{"id":"https://openalex.org/C157915830","wikidata":"https://www.wikidata.org/wiki/Q2928001","display_name":"Bubble","level":2,"score":0.0},{"id":"https://openalex.org/C149923435","wikidata":"https://www.wikidata.org/wiki/Q37732","display_name":"Demography","level":1,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C144024400","wikidata":"https://www.wikidata.org/wiki/Q21201","display_name":"Sociology","level":0,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/1772690.1772719","is_oa":false,"landing_page_url":"https://doi.org/10.1145/1772690.1772719","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 19th international conference on World wide web","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16","score":0.46000000834465027}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":27,"referenced_works":["https://openalex.org/W166322005","https://openalex.org/W1494794527","https://openalex.org/W1517465997","https://openalex.org/W1528027857","https://openalex.org/W1563352526","https://openalex.org/W1780765560","https://openalex.org/W1982551950","https://openalex.org/W1991482923","https://openalex.org/W2063464793","https://openalex.org/W2105155792","https://openalex.org/W2131664240","https://openalex.org/W2134707915","https://openalex.org/W2136136174","https://openalex.org/W2146024551","https://openalex.org/W2153958417","https://openalex.org/W2157858807","https://openalex.org/W2335888457","https://openalex.org/W2612435456","https://openalex.org/W2752491485","https://openalex.org/W2798545073","https://openalex.org/W2802358813","https://openalex.org/W2885161099","https://openalex.org/W4234222179","https://openalex.org/W4250337847","https://openalex.org/W6601052344","https://openalex.org/W6679703351","https://openalex.org/W6812308581"],"related_works":["https://openalex.org/W2384579589","https://openalex.org/W2159792411","https://openalex.org/W4386430151","https://openalex.org/W1649706580","https://openalex.org/W2320752477","https://openalex.org/W3195608031","https://openalex.org/W1507026888","https://openalex.org/W1996034866","https://openalex.org/W4321064135","https://openalex.org/W2377990930"],"abstract_inverted_index":{"In":[0],"an":[1],"ideal":[2],"world,":[3],"interface":[4,88,167],"design":[5,39],"is":[6,75,135],"the":[7,26,29,51,63,67,104,120,156,197,208,212],"art":[8],"and":[9,20,61,90,107,122,140,177,199],"science":[10],"of":[11,32,50,72,83,86,94,110,124,126,132,155,165,172,174],"helping":[12],"users":[13,111],"accomplish":[14,45],"tasks":[15],"in":[16,42,142,204],"a":[17,56,84,91,143,190],"timely,":[18],"efficient,":[19],"pleasurable":[21],"manner.":[22],"This":[23,53],"paper":[24,74,134,184],"studies":[25],"inverse":[27],"situation,":[28],"vast":[30],"emergence":[31],"deliberately":[33],"constructed":[34],"malicious":[35,87,115,166,187],"interfaces":[36,116,188],"that":[37,102,145,186,193],"violate":[38],"best":[40],"practices":[41],"order":[43,205],"to":[44,48,76,114,136,152,206],"goals":[46],"counter":[47],"those":[49],"user.":[52],"has":[54],"become":[55],"commonplace":[57],"occurrence":[58],"both":[59],"on":[60,66,97,170,211],"off":[62],"desktop,":[64],"particularly":[65],"web.":[68],"A":[69,129],"primary":[70],"objective":[71,131],"this":[73,79,133,183],"formally":[77],"define":[78],"problem,":[80],"including":[81],"construction":[82],"taxonomy":[85],"techniques":[89,168],"preliminary":[92],"analysis":[93],"their":[95],"impact":[96,210],"users.":[98],"Findings":[99],"are":[100,189],"presented":[101],"gauge":[103],"self-reported":[105],"tolerance":[106],"expectation":[108],"levels":[109],"with":[112],"regard":[113],"as":[117,119],"well":[118],"effectiveness":[121],"ease":[123],"use":[125],"existing":[127],"countermeasures.":[128],"second":[130],"increase":[137],"awareness,":[138],"dialogue,":[139],"research":[141],"domain":[144],"we":[146],"consider":[147],"largely":[148],"unexplored":[149],"but":[150],"critical":[151],"future":[153],"usability":[154],"WWW.":[157],"Our":[158],"results":[159],"were":[160],"accomplished":[161],"through":[162],"significant":[163],"compilation":[164],"based":[169],"review":[171],"thousands":[173],"web":[175],"sites":[176],"by":[178,196],"conducting":[179],"three":[180],"surveys.":[181],"Ultimately,":[182],"concludes":[185],"ubiquitous":[191],"problem":[192],"demands":[194],"intervention":[195],"security":[198],"human":[200],"computer":[201],"interaction":[202],"communities":[203],"reduce":[207],"negative":[209],"global":[213],"user":[214],"population.":[215]},"counts_by_year":[{"year":2026,"cited_by_count":4},{"year":2025,"cited_by_count":22},{"year":2024,"cited_by_count":27},{"year":2023,"cited_by_count":15},{"year":2022,"cited_by_count":16},{"year":2021,"cited_by_count":13},{"year":2020,"cited_by_count":5},{"year":2019,"cited_by_count":5},{"year":2018,"cited_by_count":4},{"year":2017,"cited_by_count":4},{"year":2016,"cited_by_count":5},{"year":2015,"cited_by_count":2},{"year":2014,"cited_by_count":3},{"year":2013,"cited_by_count":3},{"year":2012,"cited_by_count":2}],"updated_date":"2026-04-14T08:04:32.555800","created_date":"2025-10-10T00:00:00"}
