{"id":"https://openalex.org/W4414515724","doi":"https://doi.org/10.32604/cmc.2025.065059","title":"The Psychological Manipulation of Phishing Emails: A Cognitive Bias Approach","display_name":"The Psychological Manipulation of Phishing Emails: A Cognitive Bias Approach","publication_year":2025,"publication_date":"2025-01-01","ids":{"openalex":"https://openalex.org/W4414515724","doi":"https://doi.org/10.32604/cmc.2025.065059"},"language":"en","primary_location":{"id":"doi:10.32604/cmc.2025.065059","is_oa":true,"landing_page_url":"https://doi.org/10.32604/cmc.2025.065059","pdf_url":null,"source":{"id":"https://openalex.org/S4210191605","display_name":"Computers, materials & continua/Computers, materials & continua (Print)","issn_l":"1546-2218","issn":["1546-2218","1546-2226"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Computers, Materials &amp; Continua","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"diamond","oa_url":"https://doi.org/10.32604/cmc.2025.065059","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":null,"display_name":"Yulin Yao","orcid":null},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Yulin Yao","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101644259","display_name":"Kangfeng Zheng","orcid":"https://orcid.org/0000-0001-8405-1726"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Kangfeng Zheng","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101512417","display_name":"Bin Wu","orcid":"https://orcid.org/0000-0003-0657-3427"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Bin Wu","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5047996469","display_name":"Chunhua Wu","orcid":"https://orcid.org/0000-0003-0535-6236"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Chunhua Wu","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5103024650","display_name":"Jiaqi Gao","orcid":"https://orcid.org/0000-0003-1162-8269"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Jiaqi Gao","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":null,"display_name":"Jvjie Wang","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Jvjie Wang","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"last","author":{"id":"https://openalex.org/A5103076748","display_name":"Minjiao Yang","orcid":"https://orcid.org/0000-0002-5062-3121"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Minjiao Yang","raw_affiliation_strings":[],"affiliations":[]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":7,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.33857676,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"85","issue":"3","first_page":"4753","last_page":"4776"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11147","display_name":"Misinformation and Its Impacts","score":0.9864000082015991,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},"topics":[{"id":"https://openalex.org/T11147","display_name":"Misinformation and Its Impacts","score":0.9864000082015991,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":0.9760000109672546,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/phishing","display_name":"Phishing","score":0.901199996471405},{"id":"https://openalex.org/keywords/cognitive-bias","display_name":"Cognitive bias","score":0.7269999980926514},{"id":"https://openalex.org/keywords/cognition","display_name":"Cognition","score":0.6959999799728394},{"id":"https://openalex.org/keywords/cognitive-bias-modification","display_name":"Cognitive bias modification","score":0.44179999828338623},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.3700000047683716}],"concepts":[{"id":"https://openalex.org/C83860907","wikidata":"https://www.wikidata.org/wiki/Q135005","display_name":"Phishing","level":3,"score":0.901199996471405},{"id":"https://openalex.org/C189216375","wikidata":"https://www.wikidata.org/wiki/Q1127759","display_name":"Cognitive bias","level":3,"score":0.7269999980926514},{"id":"https://openalex.org/C169900460","wikidata":"https://www.wikidata.org/wiki/Q2200417","display_name":"Cognition","level":2,"score":0.6959999799728394},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5333999991416931},{"id":"https://openalex.org/C2776231130","wikidata":"https://www.wikidata.org/wiki/Q17008148","display_name":"Cognitive bias modification","level":4,"score":0.44179999828338623},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.3700000047683716},{"id":"https://openalex.org/C15744967","wikidata":"https://www.wikidata.org/wiki/Q9418","display_name":"Psychology","level":0,"score":0.3628999888896942},{"id":"https://openalex.org/C161407221","wikidata":"https://www.wikidata.org/wiki/Q4382939","display_name":"Cognitive model","level":3,"score":0.3296000063419342},{"id":"https://openalex.org/C180747234","wikidata":"https://www.wikidata.org/wiki/Q23373","display_name":"Cognitive psychology","level":1,"score":0.3285999894142151},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.30140000581741333}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.32604/cmc.2025.065059","is_oa":true,"landing_page_url":"https://doi.org/10.32604/cmc.2025.065059","pdf_url":null,"source":{"id":"https://openalex.org/S4210191605","display_name":"Computers, materials & continua/Computers, materials & continua (Print)","issn_l":"1546-2218","issn":["1546-2218","1546-2226"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Computers, Materials &amp; Continua","raw_type":"journal-article"}],"best_oa_location":{"id":"doi:10.32604/cmc.2025.065059","is_oa":true,"landing_page_url":"https://doi.org/10.32604/cmc.2025.065059","pdf_url":null,"source":{"id":"https://openalex.org/S4210191605","display_name":"Computers, materials & continua/Computers, materials & continua (Print)","issn_l":"1546-2218","issn":["1546-2218","1546-2226"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Computers, Materials &amp; Continua","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":35,"referenced_works":["https://openalex.org/W1530385573","https://openalex.org/W1956666414","https://openalex.org/W1969900674","https://openalex.org/W1970794815","https://openalex.org/W1983484926","https://openalex.org/W1993246901","https://openalex.org/W2072981546","https://openalex.org/W2084976085","https://openalex.org/W2089159695","https://openalex.org/W2102770351","https://openalex.org/W2142287040","https://openalex.org/W2147961775","https://openalex.org/W2151870473","https://openalex.org/W2156807207","https://openalex.org/W2160269795","https://openalex.org/W2418966180","https://openalex.org/W2788827950","https://openalex.org/W2800391419","https://openalex.org/W2883464778","https://openalex.org/W2905450671","https://openalex.org/W2964789038","https://openalex.org/W2965082101","https://openalex.org/W2991305957","https://openalex.org/W3010992235","https://openalex.org/W3033013607","https://openalex.org/W3033635579","https://openalex.org/W3164828995","https://openalex.org/W3165340574","https://openalex.org/W3184796286","https://openalex.org/W3204452949","https://openalex.org/W3208089014","https://openalex.org/W4206428177","https://openalex.org/W4285049582","https://openalex.org/W4297141066","https://openalex.org/W4362719792"],"related_works":[],"abstract_inverted_index":{"Cognitive":[0],"biases":[1,22,34,45,68,94,112,167],"are":[2,35,43,53],"commonly":[3],"used":[4],"by":[5,91],"attackers":[6,88],"to":[7,118],"manipulate":[8,89],"users\u2019":[9],"psychology":[10],"in":[11,23,38,47,57,69,126,143],"phishing":[12,24,39,48,59,70,102,127],"emails.":[13],"This":[14,151],"study":[15,79,105,152],"systematically":[16],"analyzes":[17],"the":[18,28,64,120],"exploitation":[19,65],"of":[20,66,110,122,145,165],"cognitive":[21,33,44,54,67,82,93,97,111,136,166],"emails":[25,71],"and":[26,113,148,176],"addresses":[27],"following":[29],"questions:":[30],"(1)":[31],"Which":[32],"frequently":[36],"exploited":[37,46],"emails?":[40,49,60],"(2)":[41],"How":[42,51,62],"(3)":[50],"effective":[52,174],"bias":[55,124,137],"features":[56,125,138],"detecting":[58],"(4)":[61],"can":[63],"be":[72],"modelled?":[73],"To":[74],"address":[75],"these":[76,123],"questions,":[77],"this":[78,104],"constructed":[80],"a":[81,162],"processing":[83],"model":[84],"that":[85,133],"explains":[86],"how":[87],"users":[90],"leveraging":[92],"at":[95],"different":[96],"stages.":[98],"By":[99],"annotating":[100],"482":[101],"emails,":[103],"identified":[106],"10":[107],"common":[108],"types":[109],"developed":[114],"corresponding":[115],"detection":[116,175],"models":[117,134,142],"evaluate":[119],"effectiveness":[121],"email":[128],"detection.":[129],"The":[130],"results":[131],"show":[132],"incorporating":[135],"significantly":[139],"outperform":[140],"baseline":[141],"terms":[144],"accuracy,":[146],"recall,":[147],"F1":[149],"score.":[150],"provides":[153],"crucial":[154],"theoretical":[155],"support":[156],"for":[157,171],"future":[158],"anti-phishing":[159],"methods,":[160],"as":[161],"deeper":[163],"understanding":[164],"offers":[168],"key":[169],"insights":[170],"designing":[172],"more":[173],"prevention":[177],"strategies.":[178]},"counts_by_year":[],"updated_date":"2026-04-21T08:09:41.155169","created_date":"2025-10-10T00:00:00"}
