{"id":"https://openalex.org/W1424873903","doi":"https://doi.org/10.4018/ijcbpl.2015070102","title":"Susceptibility to Email Fraud","display_name":"Susceptibility to Email Fraud","publication_year":2015,"publication_date":"2015-07-01","ids":{"openalex":"https://openalex.org/W1424873903","doi":"https://doi.org/10.4018/ijcbpl.2015070102","mag":"1424873903"},"language":"en","primary_location":{"id":"doi:10.4018/ijcbpl.2015070102","is_oa":false,"landing_page_url":"https://doi.org/10.4018/ijcbpl.2015070102","pdf_url":null,"source":{"id":"https://openalex.org/S4210203261","display_name":"International Journal of Cyber Behavior Psychology and Learning","issn_l":"2155-7136","issn":["2155-7136","2155-7144"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320424","host_organization_name":"IGI Global","host_organization_lineage":["https://openalex.org/P4310320424"],"host_organization_lineage_names":["IGI Global"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Cyber Behavior, Psychology and Learning","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5028231228","display_name":"Helen S. Jones","orcid":"https://orcid.org/0000-0002-2716-051X"},"institutions":[{"id":"https://openalex.org/I67415387","display_name":"Lancaster University","ror":"https://ror.org/04f2nsd36","country_code":"GB","type":"education","lineage":["https://openalex.org/I67415387"]}],"countries":["GB"],"is_corresponding":true,"raw_author_name":"Helen S. Jones","raw_affiliation_strings":["Department of Psychology, Lancaster University, Lancaster, UK","(Department of Psychology, Lancaster University, Lancaster, UK)"],"affiliations":[{"raw_affiliation_string":"Department of Psychology, Lancaster University, Lancaster, UK","institution_ids":["https://openalex.org/I67415387"]},{"raw_affiliation_string":"(Department of Psychology, Lancaster University, Lancaster, UK)","institution_ids":["https://openalex.org/I67415387"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5004352015","display_name":"John N. Towse","orcid":"https://orcid.org/0000-0003-1183-5508"},"institutions":[{"id":"https://openalex.org/I67415387","display_name":"Lancaster University","ror":"https://ror.org/04f2nsd36","country_code":"GB","type":"education","lineage":["https://openalex.org/I67415387"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"John N. Towse","raw_affiliation_strings":["Department of Psychology, Lancaster University, Lancaster, UK","(Department of Psychology, Lancaster University, Lancaster, UK)"],"affiliations":[{"raw_affiliation_string":"Department of Psychology, Lancaster University, Lancaster, UK","institution_ids":["https://openalex.org/I67415387"]},{"raw_affiliation_string":"(Department of Psychology, Lancaster University, Lancaster, UK)","institution_ids":["https://openalex.org/I67415387"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5013891693","display_name":"Nicholas Race","orcid":"https://orcid.org/0000-0002-6870-8078"},"institutions":[{"id":"https://openalex.org/I67415387","display_name":"Lancaster University","ror":"https://ror.org/04f2nsd36","country_code":"GB","type":"education","lineage":["https://openalex.org/I67415387"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Nicholas Race","raw_affiliation_strings":["School of Computing and Communications, Lancaster University, Lancaster, UK","School of Computing & Communications, Lancaster University , Lancaster , UK"],"affiliations":[{"raw_affiliation_string":"School of Computing and Communications, Lancaster University, Lancaster, UK","institution_ids":["https://openalex.org/I67415387"]},{"raw_affiliation_string":"School of Computing & Communications, Lancaster University , Lancaster , UK","institution_ids":["https://openalex.org/I67415387"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5028231228"],"corresponding_institution_ids":["https://openalex.org/I67415387"],"apc_list":null,"apc_paid":null,"fwci":6.3568,"has_fulltext":false,"cited_by_count":42,"citation_normalized_percentile":{"value":0.96133674,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":94,"max":99},"biblio":{"volume":"5","issue":"3","first_page":"13","last_page":"29"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12519","display_name":"Cybercrime and Law Enforcement Studies","score":0.9991999864578247,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11838","display_name":"Crime, Illicit Activities, and Governance","score":0.9822999835014343,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/variety","display_name":"Variety (cybernetics)","score":0.7655012607574463},{"id":"https://openalex.org/keywords/point","display_name":"Point (geometry)","score":0.5762250423431396},{"id":"https://openalex.org/keywords/set","display_name":"Set (abstract data type)","score":0.5656626224517822},{"id":"https://openalex.org/keywords/field","display_name":"Field (mathematics)","score":0.5580045580863953},{"id":"https://openalex.org/keywords/cognition","display_name":"Cognition","score":0.5517973303794861},{"id":"https://openalex.org/keywords/data-science","display_name":"Data science","score":0.48984572291374207},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.4522368311882019},{"id":"https://openalex.org/keywords/psychology","display_name":"Psychology","score":0.4127048850059509},{"id":"https://openalex.org/keywords/management-science","display_name":"Management science","score":0.3715643286705017},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.3210453689098358},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.13985106348991394},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.1384565234184265}],"concepts":[{"id":"https://openalex.org/C136197465","wikidata":"https://www.wikidata.org/wiki/Q1729295","display_name":"Variety (cybernetics)","level":2,"score":0.7655012607574463},{"id":"https://openalex.org/C28719098","wikidata":"https://www.wikidata.org/wiki/Q44946","display_name":"Point (geometry)","level":2,"score":0.5762250423431396},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.5656626224517822},{"id":"https://openalex.org/C9652623","wikidata":"https://www.wikidata.org/wiki/Q190109","display_name":"Field (mathematics)","level":2,"score":0.5580045580863953},{"id":"https://openalex.org/C169900460","wikidata":"https://www.wikidata.org/wiki/Q2200417","display_name":"Cognition","level":2,"score":0.5517973303794861},{"id":"https://openalex.org/C2522767166","wikidata":"https://www.wikidata.org/wiki/Q2374463","display_name":"Data science","level":1,"score":0.48984572291374207},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.4522368311882019},{"id":"https://openalex.org/C15744967","wikidata":"https://www.wikidata.org/wiki/Q9418","display_name":"Psychology","level":0,"score":0.4127048850059509},{"id":"https://openalex.org/C539667460","wikidata":"https://www.wikidata.org/wiki/Q2414942","display_name":"Management science","level":1,"score":0.3715643286705017},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.3210453689098358},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.13985106348991394},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.1384565234184265},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0},{"id":"https://openalex.org/C202444582","wikidata":"https://www.wikidata.org/wiki/Q837863","display_name":"Pure mathematics","level":1,"score":0.0},{"id":"https://openalex.org/C2524010","wikidata":"https://www.wikidata.org/wiki/Q8087","display_name":"Geometry","level":1,"score":0.0},{"id":"https://openalex.org/C169760540","wikidata":"https://www.wikidata.org/wiki/Q207011","display_name":"Neuroscience","level":1,"score":0.0}],"mesh":[],"locations_count":3,"locations":[{"id":"doi:10.4018/ijcbpl.2015070102","is_oa":false,"landing_page_url":"https://doi.org/10.4018/ijcbpl.2015070102","pdf_url":null,"source":{"id":"https://openalex.org/S4210203261","display_name":"International Journal of Cyber Behavior Psychology and Learning","issn_l":"2155-7136","issn":["2155-7136","2155-7144"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320424","host_organization_name":"IGI Global","host_organization_lineage":["https://openalex.org/P4310320424"],"host_organization_lineage_names":["IGI Global"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Cyber Behavior, Psychology and Learning","raw_type":"journal-article"},{"id":"pmh:oai:discovery.dundee.ac.uk:openaire_cris_publications/46b20722-f4ee-4021-9085-d214bf6b8a28","is_oa":false,"landing_page_url":"https://discovery.dundee.ac.uk/en/publications/46b20722-f4ee-4021-9085-d214bf6b8a28","pdf_url":null,"source":{"id":"https://openalex.org/S4306400523","display_name":"Discovery Research Portal (University of Dundee)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I177639307","host_organization_name":"University of Dundee","host_organization_lineage":["https://openalex.org/I177639307"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Jones, H S, Towse, J N & Race, N 2015, 'Susceptibility to Email Fraud : A Review of Psychological Perspectives, Data-Collection Methods, and Ethical Considerations', International Journal of Cyber Behavior, Psychology and Learning, vol. 5, no. 3, 2. https://doi.org/10.4018/IJCBPL.2015070102","raw_type":"info:eu-repo/semantics/publishedVersion"},{"id":"pmh:oai:RePEc:igg:jcbpl0:v:5:y:2015:i:3:p:13-29","is_oa":false,"landing_page_url":"https://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/IJCBPL.2015070102","pdf_url":null,"source":{"id":"https://openalex.org/S4306401271","display_name":"RePEc: Research Papers in Economics","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I77793887","host_organization_name":"Federal Reserve Bank of St. Louis","host_organization_lineage":["https://openalex.org/I77793887"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","score":0.8299999833106995,"display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[{"id":"https://openalex.org/F4320335334","display_name":"Defence Science and Technology Group","ror":null}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":43,"referenced_works":["https://openalex.org/W77016269","https://openalex.org/W325608785","https://openalex.org/W1512366833","https://openalex.org/W1698199421","https://openalex.org/W1956666414","https://openalex.org/W1983484926","https://openalex.org/W1988466242","https://openalex.org/W1989832143","https://openalex.org/W2002964284","https://openalex.org/W2010373152","https://openalex.org/W2017304613","https://openalex.org/W2021109237","https://openalex.org/W2022667221","https://openalex.org/W2023834570","https://openalex.org/W2024042356","https://openalex.org/W2026285994","https://openalex.org/W2026843999","https://openalex.org/W2033101906","https://openalex.org/W2038641504","https://openalex.org/W2047074192","https://openalex.org/W2047574247","https://openalex.org/W2053179522","https://openalex.org/W2053774863","https://openalex.org/W2072981546","https://openalex.org/W2075780421","https://openalex.org/W2083920084","https://openalex.org/W2085463891","https://openalex.org/W2094631741","https://openalex.org/W2097052578","https://openalex.org/W2099889974","https://openalex.org/W2127699214","https://openalex.org/W2134077691","https://openalex.org/W2134750673","https://openalex.org/W2136105590","https://openalex.org/W2140379305","https://openalex.org/W2162365572","https://openalex.org/W2162532690","https://openalex.org/W2163569877","https://openalex.org/W2164740960","https://openalex.org/W2167079436","https://openalex.org/W2335888457","https://openalex.org/W2468531372","https://openalex.org/W3120669575"],"related_works":["https://openalex.org/W2032233321","https://openalex.org/W3121970507","https://openalex.org/W2110028391","https://openalex.org/W54497855","https://openalex.org/W217960748","https://openalex.org/W3125814499","https://openalex.org/W2090827041","https://openalex.org/W2565703248","https://openalex.org/W187246281","https://openalex.org/W2143548620"],"abstract_inverted_index":{"The":[0,91],"authors":[1],"review":[2],"the":[3,7,16,42,60,67,77,83,107],"existing":[4],"literature":[5],"on":[6,47],"psychology":[8,74],"of":[9,21,32,38,93],"email":[10,94],"fraud,":[11],"and":[12,34,72,79,85],"attempt":[13,43,80],"to":[14,44,66,75,81,109],"integrate":[15],"small":[17],"but":[18,104],"burgeoning":[19],"set":[20],"research":[22,27],"findings.":[23],"They":[24,64],"show":[25],"that":[26,51],"has":[28,106],"adopted":[29],"a":[30,36],"variety":[31],"methodologies":[33],"taken":[35],"number":[37],"conceptual":[39],"positions":[40],"in":[41,54,59,100],"throw":[45],"light":[46],"decisions":[48],"about":[49,111],"emails":[50],"may":[52],"be":[53],"best-case":[55],"scenarios,":[56,62],"sub-optimal,":[57],"or":[58],"worst-case":[61],"catastrophic.":[63],"point":[65],"potential":[68,108],"from":[69,87],"cognitive":[70,113],"science":[71],"social":[73],"inform":[76,110],"field,":[78],"identify":[82],"opportunities":[84],"limitations":[86],"researcher's":[88],"design":[89],"decisions.":[90],"study":[92],"decision-making":[95],"is":[96],"an":[97],"important":[98],"topic":[99],"its":[101],"own":[102],"right,":[103],"also":[105],"general":[112],"processes":[114],"too.":[115]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":3},{"year":2024,"cited_by_count":2},{"year":2023,"cited_by_count":5},{"year":2022,"cited_by_count":3},{"year":2021,"cited_by_count":3},{"year":2020,"cited_by_count":14},{"year":2019,"cited_by_count":3},{"year":2018,"cited_by_count":6},{"year":2016,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
