{"id":"https://openalex.org/W4366526587","doi":"https://doi.org/10.1145/3544549.3585658","title":"Towards an Empirical Study to Determine the Effectiveness of Support Systems against E-Mail Phishing Attacks","display_name":"Towards an Empirical Study to Determine the Effectiveness of Support Systems against E-Mail Phishing Attacks","publication_year":2023,"publication_date":"2023-04-19","ids":{"openalex":"https://openalex.org/W4366526587","doi":"https://doi.org/10.1145/3544549.3585658"},"language":"en","primary_location":{"id":"doi:10.1145/3544549.3585658","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3544549.3585658","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Extended Abstracts of the 2023 CHI Conference on Human Factors in Computing Systems","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5031204427","display_name":"Katharina Schiller","orcid":"https://orcid.org/0009-0004-5128-0257"},"institutions":[{"id":"https://openalex.org/I4210138088","display_name":"Hof University of Applied Sciences","ror":"https://ror.org/04q5vv384","country_code":"DE","type":"education","lineage":["https://openalex.org/I4210138088"]}],"countries":["DE"],"is_corresponding":true,"raw_author_name":"Katharina Schiller","raw_affiliation_strings":["Institute of Information Systems (iisys), Hof University of Applied Sciences, Germany"],"affiliations":[{"raw_affiliation_string":"Institute of Information Systems (iisys), Hof University of Applied Sciences, Germany","institution_ids":["https://openalex.org/I4210138088"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5082075731","display_name":"Florian Adamsky","orcid":"https://orcid.org/0009-0002-6642-6904"},"institutions":[{"id":"https://openalex.org/I4210138088","display_name":"Hof University of Applied Sciences","ror":"https://ror.org/04q5vv384","country_code":"DE","type":"education","lineage":["https://openalex.org/I4210138088"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Florian Adamsky","raw_affiliation_strings":["Institute of Information Systems (iisys), Hof University of Applied Sciences, Germany"],"affiliations":[{"raw_affiliation_string":"Institute of Information Systems (iisys), Hof University of Applied Sciences, Germany","institution_ids":["https://openalex.org/I4210138088"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5040519207","display_name":"Zinaida Benenson","orcid":"https://orcid.org/0009-0006-7158-0219"},"institutions":[{"id":"https://openalex.org/I181369854","display_name":"Friedrich-Alexander-Universit\u00e4t Erlangen-N\u00fcrnberg","ror":"https://ror.org/00f7hpc57","country_code":"DE","type":"education","lineage":["https://openalex.org/I181369854"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Zinaida Benenson","raw_affiliation_strings":["Friedrich-Alexander-Universit\u00e4t Erlangen-N\u00fcrnberg (FAU), Germany"],"affiliations":[{"raw_affiliation_string":"Friedrich-Alexander-Universit\u00e4t Erlangen-N\u00fcrnberg (FAU), Germany","institution_ids":["https://openalex.org/I181369854"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5031204427"],"corresponding_institution_ids":["https://openalex.org/I4210138088"],"apc_list":null,"apc_paid":null,"fwci":0.4589,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.63781304,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"15"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9965000152587891,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9959999918937683,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/phishing","display_name":"Phishing","score":0.9698348045349121},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7249392867088318},{"id":"https://openalex.org/keywords/malware","display_name":"Malware","score":0.6590073108673096},{"id":"https://openalex.org/keywords/gateway","display_name":"Gateway (web page)","score":0.6029742360115051},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.5038065314292908},{"id":"https://openalex.org/keywords/test","display_name":"Test (biology)","score":0.4787977635860443},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4634862244129181},{"id":"https://openalex.org/keywords/electronic-mail","display_name":"Electronic mail","score":0.43236857652664185},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.3942296504974365},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.3263496458530426}],"concepts":[{"id":"https://openalex.org/C83860907","wikidata":"https://www.wikidata.org/wiki/Q135005","display_name":"Phishing","level":3,"score":0.9698348045349121},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7249392867088318},{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.6590073108673096},{"id":"https://openalex.org/C2777710495","wikidata":"https://www.wikidata.org/wiki/Q5527195","display_name":"Gateway (web page)","level":2,"score":0.6029742360115051},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.5038065314292908},{"id":"https://openalex.org/C2777267654","wikidata":"https://www.wikidata.org/wiki/Q3519023","display_name":"Test (biology)","level":2,"score":0.4787977635860443},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4634862244129181},{"id":"https://openalex.org/C3020028006","wikidata":"https://www.wikidata.org/wiki/Q9158","display_name":"Electronic mail","level":2,"score":0.43236857652664185},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.3942296504974365},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.3263496458530426},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C151730666","wikidata":"https://www.wikidata.org/wiki/Q7205","display_name":"Paleontology","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3544549.3585658","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3544549.3585658","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Extended Abstracts of the 2023 CHI Conference on Human Factors in Computing Systems","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":23,"referenced_works":["https://openalex.org/W1774758602","https://openalex.org/W1995554356","https://openalex.org/W2019176237","https://openalex.org/W2029827226","https://openalex.org/W2040174723","https://openalex.org/W2052176706","https://openalex.org/W2071869991","https://openalex.org/W2099889974","https://openalex.org/W2131906261","https://openalex.org/W2136136174","https://openalex.org/W2153245338","https://openalex.org/W2290364176","https://openalex.org/W2586631747","https://openalex.org/W2784207743","https://openalex.org/W2901847728","https://openalex.org/W2916445389","https://openalex.org/W2941796164","https://openalex.org/W2942101457","https://openalex.org/W2969254881","https://openalex.org/W3016472551","https://openalex.org/W3116444269","https://openalex.org/W3136956311","https://openalex.org/W6759940100"],"related_works":["https://openalex.org/W2149202530","https://openalex.org/W2807822918","https://openalex.org/W2921723332","https://openalex.org/W2482950156","https://openalex.org/W4396966040","https://openalex.org/W2305322260","https://openalex.org/W3139248031","https://openalex.org/W3042334625","https://openalex.org/W2034179494","https://openalex.org/W4221100201"],"abstract_inverted_index":{"E-mail":[0],"phishing":[1,32,65],"attacks":[2],"are":[3],"still":[4],"the":[5,13,45,88,117],"number":[6],"one":[7,24],"gateway":[8],"for":[9,133],"attackers.":[10],"Even":[11],"when":[12],"patch":[14],"level":[15],"of":[16,57,90],"a":[17,28,31,39,99,131],"network":[18],"is":[19,69],"up":[20],"to":[21,60,63,77,86,106,120],"date,":[22],"if":[23],"employee":[25],"clicks":[26],"on":[27,38],"link":[29],"in":[30,75,124],"e-mail":[33,59],"and":[34,102],"enters":[35],"their":[36,72],"credentials":[37],"malicious":[40],"website":[41],"or":[42],"downloads":[43],"malware,":[44],"whole":[46],"organization":[47],"might":[48],"get":[49],"compromised.":[50],"Anti-phishing":[51],"support":[52,92],"systems":[53],"highlight":[54],"different":[55,125],"aspects":[56],"an":[58,103],"help":[61],"users":[62],"detect":[64],"e-mails.":[66,108],"However,":[67],"little":[68],"known":[70],"about":[71],"effectiveness,":[73],"especially":[74],"comparison":[76],"each":[78],"other.":[79],"This":[80],"paper":[81],"presents":[82],"our":[83,113,134],"experimental":[84],"design":[85],"investigate":[87],"efficacy":[89],"various":[91],"systems.":[93],"For":[94],"this":[95],"purpose,":[96],"we":[97,111],"created":[98],"fictional":[100],"scenario":[101],"interactive":[104],"tool":[105],"display":[107],"In":[109],"addition,":[110],"present":[112],"preliminary":[114],"study":[115],"with":[116],"first":[118],"results":[119],"classify":[121],"test":[122],"e-mails":[123],"difficulty":[126],"levels":[127],"that":[128],"serve":[129],"as":[130],"basis":[132],"main":[135],"study.":[136]},"counts_by_year":[{"year":2023,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
