{"id":"https://openalex.org/W4309673999","doi":"https://doi.org/10.1186/s13635-022-00133-w","title":"\u201cAlexa, What\u2019s a Phishing Email?\u201d: Training users to spot phishing emails using a voice assistant","display_name":"\u201cAlexa, What\u2019s a Phishing Email?\u201d: Training users to spot phishing emails using a voice assistant","publication_year":2022,"publication_date":"2022-11-22","ids":{"openalex":"https://openalex.org/W4309673999","doi":"https://doi.org/10.1186/s13635-022-00133-w","pmid":"https://pubmed.ncbi.nlm.nih.gov/36466991"},"language":"en","primary_location":{"id":"doi:10.1186/s13635-022-00133-w","is_oa":true,"landing_page_url":"https://doi.org/10.1186/s13635-022-00133-w","pdf_url":"https://jis-eurasipjournals.springeropen.com/counter/pdf/10.1186/s13635-022-00133-w","source":{"id":"https://openalex.org/S4210195102","display_name":"EURASIP Journal on Information Security","issn_l":"2510-523X","issn":["2510-523X"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"EURASIP Journal on Information Security","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj","pubmed"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://jis-eurasipjournals.springeropen.com/counter/pdf/10.1186/s13635-022-00133-w","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5089811277","display_name":"Filipo Sharevski","orcid":"https://orcid.org/0000-0003-3058-7255"},"institutions":[{"id":"https://openalex.org/I118353179","display_name":"DePaul University","ror":"https://ror.org/04xtx5t16","country_code":"US","type":"education","lineage":["https://openalex.org/I118353179"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Filipo Sharevski","raw_affiliation_strings":["School of Computing, DePaul University, Chicago, IL USA","School of Computing, DePaul University, Chicago, IL, USA"],"affiliations":[{"raw_affiliation_string":"School of Computing, DePaul University, Chicago, IL USA","institution_ids":[]},{"raw_affiliation_string":"School of Computing, DePaul University, Chicago, IL, USA","institution_ids":["https://openalex.org/I118353179"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5075383234","display_name":"Peter Jachim","orcid":"https://orcid.org/0000-0001-9238-6710"},"institutions":[{"id":"https://openalex.org/I118353179","display_name":"DePaul University","ror":"https://ror.org/04xtx5t16","country_code":"US","type":"education","lineage":["https://openalex.org/I118353179"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Peter Jachim","raw_affiliation_strings":["School of Computing, DePaul University, Chicago, IL USA","School of Computing, DePaul University, Chicago, IL, USA"],"affiliations":[{"raw_affiliation_string":"School of Computing, DePaul University, Chicago, IL USA","institution_ids":[]},{"raw_affiliation_string":"School of Computing, DePaul University, Chicago, IL, USA","institution_ids":["https://openalex.org/I118353179"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5089811277"],"corresponding_institution_ids":["https://openalex.org/I118353179"],"apc_list":{"value":660,"currency":"GBP","value_usd":809},"apc_paid":{"value":660,"currency":"GBP","value_usd":809},"fwci":1.5777,"has_fulltext":true,"cited_by_count":4,"citation_normalized_percentile":{"value":0.87339321,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":94,"max":96},"biblio":{"volume":"2022","issue":"1","first_page":"7","last_page":"7"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11147","display_name":"Misinformation and Its Impacts","score":0.9973999857902527,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},"topics":[{"id":"https://openalex.org/T11147","display_name":"Misinformation and Its Impacts","score":0.9973999857902527,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T12128","display_name":"AI in Service Interactions","score":0.9973000288009644,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":0.9965999722480774,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/phishing","display_name":"Phishing","score":0.905124306678772},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7497351765632629},{"id":"https://openalex.org/keywords/persuasion","display_name":"Persuasion","score":0.6461800336837769},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.44430410861968994},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.4330655038356781},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.33973756432533264},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.16336694359779358},{"id":"https://openalex.org/keywords/psychology","display_name":"Psychology","score":0.13242653012275696}],"concepts":[{"id":"https://openalex.org/C83860907","wikidata":"https://www.wikidata.org/wiki/Q135005","display_name":"Phishing","level":3,"score":0.905124306678772},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7497351765632629},{"id":"https://openalex.org/C2781310500","wikidata":"https://www.wikidata.org/wiki/Q1231428","display_name":"Persuasion","level":2,"score":0.6461800336837769},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.44430410861968994},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.4330655038356781},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.33973756432533264},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.16336694359779358},{"id":"https://openalex.org/C15744967","wikidata":"https://www.wikidata.org/wiki/Q9418","display_name":"Psychology","level":0,"score":0.13242653012275696},{"id":"https://openalex.org/C77805123","wikidata":"https://www.wikidata.org/wiki/Q161272","display_name":"Social psychology","level":1,"score":0.0}],"mesh":[],"locations_count":4,"locations":[{"id":"doi:10.1186/s13635-022-00133-w","is_oa":true,"landing_page_url":"https://doi.org/10.1186/s13635-022-00133-w","pdf_url":"https://jis-eurasipjournals.springeropen.com/counter/pdf/10.1186/s13635-022-00133-w","source":{"id":"https://openalex.org/S4210195102","display_name":"EURASIP Journal on Information Security","issn_l":"2510-523X","issn":["2510-523X"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"EURASIP Journal on Information Security","raw_type":"journal-article"},{"id":"pmid:36466991","is_oa":false,"landing_page_url":"https://pubmed.ncbi.nlm.nih.gov/36466991","pdf_url":null,"source":{"id":"https://openalex.org/S4306525036","display_name":"PubMed","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I1299303238","host_organization_name":"National Institutes of Health","host_organization_lineage":["https://openalex.org/I1299303238"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"EURASIP journal on information security","raw_type":null},{"id":"pmh:oai:doaj.org/article:95afdd4d6d844b18b7e4a1bffb3c710d","is_oa":true,"landing_page_url":"https://doaj.org/article/95afdd4d6d844b18b7e4a1bffb3c710d","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"EURASIP Journal on Information Security, Vol 2022, Iss 1, Pp 1-13 (2022)","raw_type":"article"},{"id":"pmh:oai:pubmedcentral.nih.gov:9685029","is_oa":true,"landing_page_url":"https://www.ncbi.nlm.nih.gov/pmc/articles/9685029","pdf_url":null,"source":{"id":"https://openalex.org/S2764455111","display_name":"PubMed Central","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I1299303238","host_organization_name":"National Institutes of Health","host_organization_lineage":["https://openalex.org/I1299303238"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"EURASIP J Inf Secur","raw_type":"Text"}],"best_oa_location":{"id":"doi:10.1186/s13635-022-00133-w","is_oa":true,"landing_page_url":"https://doi.org/10.1186/s13635-022-00133-w","pdf_url":"https://jis-eurasipjournals.springeropen.com/counter/pdf/10.1186/s13635-022-00133-w","source":{"id":"https://openalex.org/S4210195102","display_name":"EURASIP Journal on Information Security","issn_l":"2510-523X","issn":["2510-523X"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"EURASIP Journal on Information Security","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4309673999.pdf","grobid_xml":"https://content.openalex.org/works/W4309673999.grobid-xml"},"referenced_works_count":27,"referenced_works":["https://openalex.org/W165008582","https://openalex.org/W1955603680","https://openalex.org/W1974464813","https://openalex.org/W1996523416","https://openalex.org/W2052176706","https://openalex.org/W2099889974","https://openalex.org/W2135572749","https://openalex.org/W2136136174","https://openalex.org/W2157337727","https://openalex.org/W2256695479","https://openalex.org/W2258698957","https://openalex.org/W2278316643","https://openalex.org/W2339187094","https://openalex.org/W2599060790","https://openalex.org/W2610728795","https://openalex.org/W2611817064","https://openalex.org/W2759491482","https://openalex.org/W2796098074","https://openalex.org/W2883464778","https://openalex.org/W2891807831","https://openalex.org/W2933426098","https://openalex.org/W2941796164","https://openalex.org/W2966397528","https://openalex.org/W2996107505","https://openalex.org/W3010992235","https://openalex.org/W3029052565","https://openalex.org/W3127827332"],"related_works":["https://openalex.org/W2748952813","https://openalex.org/W1193337282","https://openalex.org/W1662240627","https://openalex.org/W2161303371","https://openalex.org/W3169835994","https://openalex.org/W1546646725","https://openalex.org/W1974065322","https://openalex.org/W1536610849","https://openalex.org/W1480504010","https://openalex.org/W1602857440"],"abstract_inverted_index":{"This":[0],"paper":[1,140],"reports":[2],"the":[3,10,53,70,110,113,118,126,142],"findings":[4],"from":[5],"an":[6,47],"empirical":[7],"study":[8,79],"investigating":[9],"effectiveness":[11,71],"of":[12,55,72,103,144],"using":[13],"intelligent":[14,30],"voice":[15,31],"assistants,":[16],"Amazon":[17],"Alexa":[18],"in":[19,65,86,112],"our":[20],"case,":[21],"to":[22,27,61],"deliver":[23],"a":[24,77,96,101],"phishing":[25,49,66,122,149],"training":[26,92,98,150],"users.":[28],"Because":[29],"assistants":[32],"can":[33],"hardly":[34],"utilize":[35],"visual":[36],"cues":[37],"but":[38],"provide":[39],"for":[40,63,147],"convenient":[41],"interaction":[42],"with":[43,57,93],"users,":[44],"we":[45,75],"developed":[46],"<i>interaction-based":[48],"training</i>":[50],"focused":[51],"on":[52,59],"principles":[54,129],"persuasion":[56,128],"examples":[58],"how":[60],"look":[62],"them":[64],"emails.":[67,105],"To":[68],"test":[69],"this":[73,145],"training,":[74,90],"conducted":[76],"between-subject":[78],"where":[80],"120":[81],"participants":[82,111],"were":[83],"randomly":[84],"assigned":[85],"three":[87],"groups:":[88],"no":[89],"interaction-based":[91,114],"Alexa,":[94],"and":[95,99,137,151],"facts-and-advice":[97],"assessed":[100],"vignette":[102],"28":[104],"The":[106,139],"results":[107],"show":[108],"that":[109,124],"group":[115],"statistically":[116],"outperformed":[117],"others":[119],"when":[120],"detecting":[121],"emails":[123],"employed":[125],"following":[127],"(and/or":[130],"combinations":[131],"of):":[132],"authority,":[133],"authority/scarcity,":[134],"commitment,":[135],"commitment/liking,":[136],"scarcity/liking.":[138],"discusses":[141],"implication":[143],"result":[146],"future":[148],"anti-phishing":[152],"efforts.":[153]},"counts_by_year":[{"year":2025,"cited_by_count":2},{"year":2023,"cited_by_count":2}],"updated_date":"2026-03-20T23:20:44.827607","created_date":"2025-10-10T00:00:00"}
