<?xml version="1.0" encoding="UTF-8"?>
<TEI xml:space="preserve" xmlns="http://www.tei-c.org/ns/1.0" 
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" 
xsi:schemaLocation="http://www.tei-c.org/ns/1.0 https://raw.githubusercontent.com/kermitt2/grobid/master/grobid-home/schemas/xsd/Grobid.xsd"
 xmlns:xlink="http://www.w3.org/1999/xlink">
	<teiHeader xml:lang="en">
		<fileDesc>
			<titleStmt>
				<title level="a" type="main">Unlocking the Potential of Simulated Phishing Campaigns: Measuring the Impact of Interaction among Different Human Factors</title>
			</titleStmt>
			<publicationStmt>
				<publisher/>
				<availability status="unknown"><licence/></availability>
			</publicationStmt>
			<sourceDesc>
				<biblStruct>
					<analytic>
						<author>
							<persName><forename type="first">Francesco</forename><surname>Greco</surname></persName>
							<email>francesco.greco@uniba.it</email>
							<affiliation key="aff0">
								<orgName type="institution">University of Bari &quot;Aldo Moro&quot;</orgName>
								<address>
									<addrLine>Via E. Orabona, 4</addrLine>
									<postCode>70125</postCode>
									<settlement>Bari</settlement>
									<country key="IT">Italy</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Paolo</forename><surname>Buono</surname></persName>
							<email>paolo.buono@uniba.it</email>
							<affiliation key="aff0">
								<orgName type="institution">University of Bari &quot;Aldo Moro&quot;</orgName>
								<address>
									<addrLine>Via E. Orabona, 4</addrLine>
									<postCode>70125</postCode>
									<settlement>Bari</settlement>
									<country key="IT">Italy</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Domenico</forename><surname>Desiato</surname></persName>
							<email>domenico.desiato@uniba.it</email>
							<affiliation key="aff0">
								<orgName type="institution">University of Bari &quot;Aldo Moro&quot;</orgName>
								<address>
									<addrLine>Via E. Orabona, 4</addrLine>
									<postCode>70125</postCode>
									<settlement>Bari</settlement>
									<country key="IT">Italy</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Giuseppe</forename><surname>Desolda</surname></persName>
							<email>giuseppe.desolda@uniba.it</email>
							<affiliation key="aff0">
								<orgName type="institution">University of Bari &quot;Aldo Moro&quot;</orgName>
								<address>
									<addrLine>Via E. Orabona, 4</addrLine>
									<postCode>70125</postCode>
									<settlement>Bari</settlement>
									<country key="IT">Italy</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Rosa</forename><surname>Lanzilotti</surname></persName>
							<email>rosa.lanzilotti@uniba.it</email>
							<affiliation key="aff0">
								<orgName type="institution">University of Bari &quot;Aldo Moro&quot;</orgName>
								<address>
									<addrLine>Via E. Orabona, 4</addrLine>
									<postCode>70125</postCode>
									<settlement>Bari</settlement>
									<country key="IT">Italy</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Grazia</forename><surname>Ragone</surname></persName>
							<email>grazia.ragone@uniba.it</email>
							<affiliation key="aff0">
								<orgName type="institution">University of Bari &quot;Aldo Moro&quot;</orgName>
								<address>
									<addrLine>Via E. Orabona, 4</addrLine>
									<postCode>70125</postCode>
									<settlement>Bari</settlement>
									<country key="IT">Italy</country>
								</address>
							</affiliation>
						</author>
						<title level="a" type="main">Unlocking the Potential of Simulated Phishing Campaigns: Measuring the Impact of Interaction among Different Human Factors</title>
					</analytic>
					<monogr>
						<idno type="ISSN">1613-0073</idno>
					</monogr>
					<idno type="MD5">AD2295D74811F75C9272981DC7027563</idno>
				</biblStruct>
			</sourceDesc>
		</fileDesc>
		<encodingDesc>
			<appInfo>
				<application version="0.7.2" ident="GROBID" when="2025-04-23T17:25+0000">
					<desc>GROBID - A machine learning software for extracting information from scholarly documents</desc>
					<ref target="https://github.com/kermitt2/grobid"/>
				</application>
			</appInfo>
		</encodingDesc>
		<profileDesc>
			<textClass>
				<keywords>
					<term>phishing, human factors, persuasion principles, simulated phishing campaigns, big five personality traits 2730-7697 (F. Greco)</term>
					<term>0000-0002-1421-3686 (P. Buono)</term>
					<term>0000-0001-9894-2116 (G. Desolda)</term>
					<term>0000-0002-2039-8162 (R. Lanzilotti)</term>
					<term>0000-0002-8853-8950 (G. Ragone)</term>
				</keywords>
			</textClass>
			<abstract>
<div xmlns="http://www.tei-c.org/ns/1.0"><p>Phishing poses a significant threat to companies and public administrations. Mostly, this attack is perpetrated by exploiting social engineering techniques, such as persuasion principles and emotional triggers. Moreover, technical defenses alone are insufficient to protect organizations from these socially engineered attacks. Therefore, countermeasures that address human vulnerabilities are essential. To this end, we present a framework dedicated to assess human vulnerabilities of employees within an organization by using simulated phishing campaigns. In detail, the proposed work consists of two activities. The first activity explores the interaction between persuasion principles, emotional triggers, and user profiles. Such aspect has not yet been investigated in the literature and it may provide more information on the human factors to which users are most exposed during a phishing attack. The second activity will focus on designing phishing campaigns in which we will measure the effectiveness of emails considering the emotional triggers and persuasion principles used to scam the users, as well as the interaction between these two dimensions and the user personality traits.</p></div>
			</abstract>
		</profileDesc>
	</teiHeader>
	<text xml:lang="en">
		<body>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="1.">Introduction</head><p>Phishing is one of the major cyber threats in our society, being one of the top initial access vectors for cyber criminals <ref type="bibr" target="#b0">[1]</ref>. It affects companies and public administrations (PAs) on a daily basis, with employees receiving malicious emails that appear to have been sent legitimately by colleagues, managers, or the IT department asking them to take immediate action such as clicking on a link or opening an attachment. In these attacks, criminals exploit users' human factors, which increase their susceptibility to falling victim <ref type="bibr" target="#b1">[2]</ref>.</p><p>Given the important role that human factors play in the success of these attacks, phishing cannot be addressed solely on a technological level (e.g., by implementing automated phishing detection mechanisms). For this reason, organizations typically conduct "white hat" phishing campaigns to assess the company's susceptibility to phishing attacks. By sending fake emails, companies can estimate their exposure to attacks in terms of how many employees clicked on the phishing links in these emails <ref type="bibr" target="#b2">[3,</ref><ref type="bibr" target="#b3">4,</ref><ref type="bibr" target="#b4">5]</ref>.</p><p>While simulated phishing campaigns provide organizations with a tool to quantitatively assess their vulnerability to phishing attacks, they fall short in assessing the human factors at play when these attacks are successful <ref type="bibr" target="#b5">[6]</ref>. For example, personality traits of an employee strongly impact their susceptibility to phishing <ref type="bibr" target="#b6">[7]</ref>. Furthermore, the effectiveness of a phishing campaign can be significantly influenced by the nature of emails it comprises. Persuasion principles <ref type="bibr" target="#b7">[8]</ref> are psychological techniques often used in phishing attacks, which can increase the user's susceptibility <ref type="bibr" target="#b8">[9,</ref><ref type="bibr" target="#b9">10,</ref><ref type="bibr" target="#b10">11]</ref>. Phishing emails also often leverage emotional drivers, such as creating a sense of urgency or fear, to increase the likelihood of users falling victim <ref type="bibr" target="#b11">[12,</ref><ref type="bibr" target="#b3">4,</ref><ref type="bibr" target="#b12">13]</ref>.</p><p>Although previous work has explored how individual user differences <ref type="bibr" target="#b13">[14,</ref><ref type="bibr" target="#b14">15,</ref><ref type="bibr" target="#b2">3,</ref><ref type="bibr" target="#b15">16]</ref> or the use of social engineering techniques <ref type="bibr" target="#b11">[12,</ref><ref type="bibr" target="#b3">4,</ref><ref type="bibr" target="#b12">13,</ref><ref type="bibr" target="#b8">9,</ref><ref type="bibr" target="#b9">10,</ref><ref type="bibr" target="#b10">11]</ref> may affect the susceptibility to phishing attacks, to date no approach comprehensively measures the interaction between (i) the users' profile (in terms of personality traits), (ii) the use of persuasion principles and (iii) adoption of emotional triggers in phishing emails.</p><p>Our research proposes a new defensive solution in the context of the Italian national project DAMOCLES (Detection And Mitigation Of Cyber attacks that expLoit human vulnerabilitiES), which aims to develop a framework for the Italian Public Administration to assess human factors in cyber incidents and mitigate their impact through security awareness and customized user training. The ongoing work presented in this paper includes two main contributions. The first part provides insight into the relationships between persuasion principles, emotional triggers, and personality traits. To achieve this, a large-scale study will be conducted with over 1000 participants exposed to various emails that correspond to different combinations of persuasion principles and emotional triggers. The study results will reveal the most critical combinations of &lt;persuasion principle, emotional trigger, personality trait&gt; that make phishing emails most effective for certain users. The second part of our research will build on the knowledge gained in the first study to create more precise simulated phishing campaigns. These campaigns will enable companies and organizations to evaluate the susceptibility of their employees to emails that include (or exclude) the most effective phishing techniques for their profiles.</p><p>Understanding the individual vulnerabilities of the employees can lead to take more effective decisions from an organizational perspective, such as providing them with specific support in the form of personalized training material to address their vulnerabilities <ref type="bibr" target="#b16">[17,</ref><ref type="bibr" target="#b17">18]</ref>. Furthermore, with the right support and training, employees can become a valuable asset to the organization and an effective line of defense against phishing (i.e., also known as crowd-sourced phishing detection) <ref type="bibr" target="#b2">[3]</ref>.</p><p>The paper continues as following: Section 2 presents the related work on social engineering techniques commonly used in phishing email and user's assessment; Section 3 discusses the 2-phase approach we propose to measure the effectiveness of phishing emails and to assess employees with a simulated phishing campaign; Section 4 draws conclusions and presents future work of the project.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.">Related Work</head><p>The causes of a phishing email's effectiveness can be boiled down to two main factors: the characteristics of the email itself and the characteristics of the recipient.</p><p>Phishing emails often use Persuasion Principles to deceive users into clicking on phishing links or disclosing personal information <ref type="bibr" target="#b7">[8,</ref><ref type="bibr" target="#b10">11]</ref>. Cialdini <ref type="bibr" target="#b7">[8]</ref> identifies 6 persuasion principles that are widely explored in the social engineering literature: authority, scarcity, liking, social proof, reciprocation, and consistency. The use of persuasion principles can ultimately affect the effectiveness of a phishing email, making it generally more deceptive to users <ref type="bibr" target="#b8">[9,</ref><ref type="bibr" target="#b9">10,</ref><ref type="bibr" target="#b10">11,</ref><ref type="bibr" target="#b18">19,</ref><ref type="bibr" target="#b13">14]</ref>. Ferreira and Teles <ref type="bibr" target="#b10">[11]</ref> identified a list of persuasion principles that are most prominent in phishing attacks, which include, in addition to authority and reciprocation, integrity and strong affect.</p><p>Phishing emails often exploit core emotions: curiosity (or anticipation), fear (or anxiety), greed (or desire), anger (or annoyance), joy (or excitement), confusion (surprise), and empathy (or compassion) <ref type="bibr" target="#b11">[12,</ref><ref type="bibr" target="#b3">4,</ref><ref type="bibr" target="#b12">13]</ref>. This is usually accomplished by including emotional drivers (or triggers) that manipulate users and cause them to make irrational decisions <ref type="bibr" target="#b19">[20,</ref><ref type="bibr" target="#b20">21]</ref>. For instance, when experiencing sadness, individuals tend to gravitate toward high-risk/high-reward options, whereas those in anxious states prefer low-risk/low-reward choices <ref type="bibr" target="#b21">[22]</ref>. In general, individuals who are under the influence of "visceral influences" do not consider the ramifications of their actions and seek immediate satisfaction of their visceral desires <ref type="bibr" target="#b22">[23,</ref><ref type="bibr" target="#b23">24]</ref>.</p><p>Emails that employ these social engineering techniques (either alone or in combination) are typically more deceptive and can more easily lead users to become victims <ref type="bibr" target="#b8">[9,</ref><ref type="bibr" target="#b9">10,</ref><ref type="bibr" target="#b10">11]</ref>. The quality of a phishing email can be measured using the Phish Scale developed by NIST <ref type="bibr" target="#b24">[25]</ref>. This tool can help assess the difficulty of an email, in average, to be detected. This scale considers two main aspects: the email cues (i.e., the observable characteristics of an email such as language, presentation, correctness, etc.) and the alignment with the user premises (i.e., how closely an email matches the work roles or responsibilities of the recipient). The stronger an email's premise alignment and the fewer cues it has, the more difficult it is to detect it as a phish. The difficulty of a phishing email can be classified in three categories, based on the number of cues: many cues (less difficult), some cues (medium), few cues (more difficult).</p><p>Regarding the characteristics of the recipient (i.e., the user), there are a number of human factors that play a critical role in influencing the susceptibility of users to phishing attacks <ref type="bibr" target="#b1">[2,</ref><ref type="bibr" target="#b25">26]</ref>, including lack of knowledge, lack of resources, lack of awareness, norms, and complacency. Another important factor that affects an employee's susceptibility to phishing is their personality <ref type="bibr" target="#b26">[27,</ref><ref type="bibr" target="#b27">28,</ref><ref type="bibr" target="#b28">29]</ref>. Personality is undoubtedly a very complex factor to model; in the literature, the most widely adopted model in the literature is the Big Five Personality Traits <ref type="bibr" target="#b29">[30]</ref>, which describes an individual personality according to 5 traits: Openness, Agreeableness, Conscientiousness, Extraversion, and Neuroticism. These traits have been shown to be stable over time, and universally identifiable regardless of language, race, culture, or gender <ref type="bibr" target="#b30">[31]</ref>. Other human factors, such as gender and age may play a role in influencing a user's phishing susceptibility, but findings in literature are often contrasting <ref type="bibr" target="#b1">[2]</ref>. Finally, emotions also play an important role in the susceptibility of users to fall for phishing attacks <ref type="bibr" target="#b31">[32,</ref><ref type="bibr" target="#b32">33]</ref>. The effectiveness of persuasion principles can be traced back to specific human factors. For example, extroverted individuals are particularly susceptible to the liking and scarcity persuasion principles, while agreeable individuals are particularly susceptible to the authority principle <ref type="bibr" target="#b33">[34,</ref><ref type="bibr" target="#b28">29,</ref><ref type="bibr" target="#b34">35]</ref>.</p><p>Simulated phishing campaigns are typically used to deliver embedded training material <ref type="bibr" target="#b35">[36,</ref><ref type="bibr" target="#b36">37,</ref><ref type="bibr" target="#b37">38,</ref><ref type="bibr" target="#b2">3]</ref>: employees who fall victim to a fake phishing email are redirected to a training page that explains to them the risks of phishing attacks and why they should not trust the phishing email they received <ref type="bibr" target="#b35">[36,</ref><ref type="bibr" target="#b36">37]</ref>. This approach has proved to be much more effective than traditional frontal lessons, especially when the training material is embedded in warnings <ref type="bibr" target="#b37">[38]</ref>. However, Lain et al. <ref type="bibr" target="#b2">[3]</ref> conducted a large-scale long-term simulated phishing campaign in a company and gathered evidence that embedded training does not make employees more resilient to phishing, but rather may actually make them more susceptible.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.">Assessing users' phishing vulnerabilities with simulated campaigns</head><p>The solution we propose in this paper will be carried out in two different and sequential activities:</p><p>1. Design of a user study to measure the three factors that may influence users' susceptibility to phishing, i.e. personality traits, persuasion principles and emotional triggers; 2. Design of a simulated phishing campaign based on the results of Activity 1, i.e., the correlations between the three factors and users' phishing susceptibility. A web platform will make it possible to apply the most effective combinations of these factors to test users with challenging fake phishing emails.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.1.">Activity 1: User study to discover correlations between user profiles and persuasion techniques</head><p>To discover correlations between users' profiles, persuasion principles, and emotional triggers, we need to construct a knowledge base with data about the phishing susceptibility of users (each with their own personality traits) to different phishing techniques. Therefore, a user study serves as a means for gathering the data. This will be done by firstly collecting data about the users to profile them according to the Big Five personality traits model by administering the NEO Five-Factor Inventory-3 <ref type="bibr" target="#b38">[39]</ref>, a 60-item questionnaire to measure their personality traits according to the Big 5 model. After a user profile of the employee is generated, the users will be exposed to a set of safe and phishing emails. The phishing emails included in the study will be crafted by applying different combinations of &lt;persuasion principle, emotional trigger&gt;. The persuasion principle will be one of the 6 persuasion principles (i.e., authority, scarcity, reciprocation, social proof, liking, consistency), while the emotional trigger will be one of the 7 emotional triggers (i.e., curiosity, fear, greed, anger, joy, confusion, empathy), leading to a total of 6 × 7 unique combinations.</p><p>In addition, to improve the external validity of the study, the topic of the phishing email is also varied, as done in <ref type="bibr" target="#b3">[4]</ref>. The fake emails can be crafted by, e.g., following the modus operandi of Gallo et al. <ref type="bibr" target="#b13">[14]</ref>, starting from real phishing emails to include a unique combination of persuasion principle and emotional trigger.</p><p>For each of the 42 combinations, 3 variants are generated to have a more solid knowledge base. The variants are crafted to be of different levels of difficulty to include an additional dimension in the measurements. To objectively rate the overall level of difficulty for an average employee to detect an email, the Phish Scale <ref type="bibr" target="#b24">[25]</ref> is used with the following scores: (1) low level of difficulty (cues category = "Many"), (2) medium level of difficulty (cues category = "Some"), and (3) high level of difficulty (cues category = "Few"). This results in 42 × 3 = 126 fake emails that will be sent during the study; a fake phishing email contains a link that, when clicked, redirects an employee to a landing page where they are debriefed about the fake phishing email. At this point, the information about which employee clicked on the phishing link is saved. To avoid overloading users with too many emails, each of them will be exposed to a subset of the emails (e.g., 10 safe emails, 10 phishing emails). Eventually, each of the 42 combinations will be administered to an equal number of users.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.2.">Activity 2: Design of a simulated phishing campaign to measure more in-depth human factors</head><p>The findings from the previous study will highlight the most important interactions between &lt;persuasion principle, emotional trigger, personality trait&gt; that, for particular users, maximize the effectiveness of phishing emails. Building on the insights from the first study, the second activity of the research presented in this paper will develop more accurate simulated phishing campaigns. Through these campaigns, companies and organizations will be able to assess how vulnerable their staff members are to emails that contain (or don't contain) the most successful phishing techniques specific to their profiles. To better illustrate this activity, we introduce a scenario that describes how this approach could be practically applied in a PA. The scenario is described below:</p><p>1. The National Institute for Social Security ("INPS", in Italian) is a PA with about 20,000 employees; faced with the ever-increasing risk of cyber-attacks, its IT director decided to improve the organization's defenses against phishing attacks by assessing the specific human factors to which its employees are more susceptible to, with the subsequent goal of addressing the specific deficiencies of employees through customized training programs. 2. 7 days in advance, employees are informed about the simulated phishing campaign that will be conducted and its objective. They are also informed of the need to collect data that can be used to create a profile, assuring them that their digital profile won't be directly traceable to them. These measures limit the extent of the ethical implications that naturally come with a similar approach. 3. An initial model of the PA's employees is created by administering the NEO Five-Factor Inventory-3 <ref type="bibr" target="#b38">[39]</ref>, a 60-item questionnaire to measure their personality traits according to the Big 5 model. To assess the employees' initial ability to correctly recognize and respond to phishing attacks, the survey-based Phishing Awareness Questionnaire <ref type="bibr" target="#b39">[40]</ref> is also administered. Finally, the employees' risk-taking behavior is measured with the Balloon Analogue Risk Task test <ref type="bibr" target="#b40">[41]</ref>, as higher risk-taking behaviours can negatively influence phishing susceptibility <ref type="bibr" target="#b31">[32]</ref>. The questionnaires are administered to the employees in the workplace to ensure a more controlled environment.</p><p>4. A simulated phishing campaign has been designed to assess the long-term susceptibility of employees to phishing attacks, spanning a duration of 3 months. In this context, personalized phishing emails will be utilized, with a comprehensive approach tailored to each user. Specifically, a total of 30 emails will be meticulously crafted for every personality trait, drawing upon the top 10 combinations of persuasion principles and emotional triggers associated with that trait. Each of these combinations will generate 3 distinct emails varying in complexity. Consequently, throughout the campaign period, users will encounter the 30 emails tailored to the personality trait identified as most influential for them. This approach ensures a targeted exposure to a spectrum of psychological tactics employed in phishing attempts, facilitating a robust evaluation of susceptibility over time. 5. The simulated phishing campaign is launched. On Day 1, the first email is sent. The phishing link in the email redirects any employee who falls victim to a page where they are debriefed about the fake phishing email. Here they are reassured that no consequences will be taken against them, and that the data they will submit will be kept anonymous (in line with what is done in <ref type="bibr" target="#b3">[4]</ref>). The causes that led them to click on the links are investigated by asking open-ended questions about (i) how did the email made them feel, to qualitatively collect their self-reported emotions (as in <ref type="bibr" target="#b3">[4]</ref>]), and (ii) what led them to click on the phishing link (as in <ref type="bibr" target="#b41">[42]</ref>). 6. After Day 1, the remaining emails are sent at intervals of 3 days to avoid predictability (with an average of one email every 10 days). Furthermore, the minimum delay between one phishing email and another is necessary to avoid priming the employees to more secure behavior after exposure to a debriefing message (i.e., to reduce the expectancy effect <ref type="bibr" target="#b42">[43]</ref>). 7. A dashboard can show the current situation for all employees by reporting, for each fake email sent, the percentage of employees who clicked on the phishing link. The employees' personality traits are also displayed to highlight the correlation between them and the phishing susceptibility. 8. At the end of the simulated campaign, the company can address the individual vulnerabilities of each employee (whose identity remains undisclosed) by automatically delivering customized training/security awareness materials. For example, if an employee is found to be particularly vulnerable to the Authority principle used in IT communication emails, they are provided with examples of fake emails that include that specific persuasion technique; training material additionally suggests security measures to double check the sender's identity (e.g., the address of legit communications). Moreover, they are provided with vital information such as some of the company norms (e.g., that the IT department will never ask employees to provide their passwords) and useful contacts to consult when they feel a communication is suspicious, so that they do not resort to alternative, less secure, sources.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4.">Conclusions and Future Work</head><p>This work is part of the research conducted within the Italian national project DAMOCLES. The main project ultimately aims to develop a framework for the Italian PAs to assess and mitigate human factors in cyber incidents. This would make it possible to uncover factors that may be overlooked in current cybersecurity training approaches and ultimately lead to better protection in these organizations. One line of action to enhance user protection is customized training that addresses the employees' individual vulnerabilities. This paper contributes to the first step of assessing the user vulnerability by proposing a methodology based on simulated phishing campaigns. This phase is only a part of a broader, iterative approach, that involves a continuous assessment-training process to progressively reduce an organization's vulnerability to phishing (this methodology is also referred to as "Agile Phishing" by <ref type="bibr" target="#b3">[4]</ref>).</p><p>Future work will include testing the proposed approach with user studies in a controlled setting. Moreover, much effort will be put in studying how to craft customized training material to specifically address one or more vulnerabilities. Another interest aspect to be investigated is the expectancy effect, i.e., the extent to which an employee is primed towards a safer behavior when they are aware that a phishing campaign is being conducted in the organization; analyses to assess this bias may involve comparing the click-rate in emails with similar difficulty sent with different delay from each other. While the proposed approach can certainly bring many benefits to organizations in their fight against phishing, there is a major ethical problem with collecting employees data in a safety critical context. Being able to identify each user and their actions with phishing emails could put their jobs at risk. Therefore, future works must include the development an anonymization mechanism to protect the user's identity, while allowing targeted interventions to improve their susceptibility to phishing attacks.</p></div>		</body>
		<back>

			<div type="acknowledgement">
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Acknowledgments</head><p>This work has been supported by the Italian Ministry of University and Research (MUR) and by the European Union -NextGenerationEU, under grant PRIN 2022 PNRR "DAMOCLES: Detection And Mitigation Of Cyber attacks that exploit human vuLnerabilitiES" (Grant P2022FXP5B) -CUP: H53D23008140001. The research of Francesco Greco is funded by a PhD fellowship within the framework of the Italian "D.M. n. 352, April 9, 2022" -under the National Recovery and Resilience Plan, Mission 4, Component 2, Investment 3.3 -PhD Project "Investigating XAI techniques to help user defend from phishing attacks", co-supported by "Auriga S.p.A." (CUP H91I22000410007).</p></div>
			</div>

			<div type="references">

				<listBibl>

<biblStruct xml:id="b0">
	<monogr>
		<title level="m" type="main">Ibm x-force threat intelligence index 2024</title>
		<ptr target="https://www.ibm.com/reports/threat-intelligence" />
		<imprint>
			<date type="published" when="2024">2024</date>
		</imprint>
		<respStmt>
			<orgName>IBM</orgName>
		</respStmt>
	</monogr>
</biblStruct>

<biblStruct xml:id="b1">
	<analytic>
		<title level="a" type="main">Human factors in phishing attacks: A systematic literature review</title>
		<author>
			<persName><forename type="first">G</forename><surname>Desolda</surname></persName>
		</author>
		<author>
			<persName><forename type="first">L</forename><forename type="middle">S</forename><surname>Ferro</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Marrella</surname></persName>
		</author>
		<author>
			<persName><forename type="first">T</forename><surname>Catarci</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><forename type="middle">F</forename><surname>Costabile</surname></persName>
		</author>
		<idno type="DOI">10.1145/3469886</idno>
		<ptr target="https://doi.org/10.1145/3469886.doi:10.1145/3469886" />
	</analytic>
	<monogr>
		<title level="j">ACM Comput. Surv</title>
		<imprint>
			<biblScope unit="volume">54</biblScope>
			<date type="published" when="2021">2021</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b2">
	<analytic>
		<title level="a" type="main">Phishing in organizations: Findings from a large-scale and long-term study</title>
		<author>
			<persName><forename type="first">D</forename><surname>Lain</surname></persName>
		</author>
		<author>
			<persName><forename type="first">K</forename><surname>Kostiainen</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Capkun</surname></persName>
		</author>
		<idno type="DOI">10.1109/SP46214.2022.9833766</idno>
		<ptr target="https://doi.org/10.1109/SP46214.2022.9833766" />
	</analytic>
	<monogr>
		<title level="j">IEEE Symposium on Security and Privacy</title>
		<imprint>
			<biblScope unit="page" from="842" to="859" />
			<date type="published" when="2021">2022. 2021</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b3">
	<monogr>
		<author>
			<persName><surname>Cybsafe</surname></persName>
		</author>
		<ptr target="https://www.cybsafe.com/value/simulated-phishing/" />
		<title level="m">The ultimate people-centric guide to simulated phishing</title>
				<imprint>
			<date type="published" when="2023">2023</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b4">
	<analytic>
		<title level="a" type="main">Social phishing</title>
		<author>
			<persName><forename type="first">T</forename><forename type="middle">N</forename><surname>Jagatic</surname></persName>
		</author>
		<author>
			<persName><forename type="first">N</forename><forename type="middle">A</forename><surname>Johnson</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Jakobsson</surname></persName>
		</author>
		<author>
			<persName><forename type="first">F</forename><surname>Menczer</surname></persName>
		</author>
		<idno type="DOI">10.1145/1290958.1290968</idno>
		<ptr target="https://doi.org/10.1145/1290958.1290968.doi:10.1145/1290958.1290968" />
	</analytic>
	<monogr>
		<title level="j">Commun. ACM</title>
		<imprint>
			<biblScope unit="volume">50</biblScope>
			<biblScope unit="page" from="94" to="100" />
			<date type="published" when="2007">2007</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b5">
	<analytic>
		<title level="a" type="main">Threat or coping appraisal: determinants of smb executives&apos; decision to adopt anti-malware software</title>
		<author>
			<persName><forename type="first">Y</forename><surname>Lee</surname></persName>
		</author>
		<author>
			<persName><forename type="first">K</forename><forename type="middle">R</forename><surname>Larsen</surname></persName>
		</author>
		<idno type="DOI">10.1057/ejis.2009.11</idno>
		<ptr target="https://doi.org/10.1057/ejis.2009.11.doi:10.1057/ejis.2009.11" />
	</analytic>
	<monogr>
		<title level="j">European Journal of Information Systems</title>
		<imprint>
			<biblScope unit="volume">18</biblScope>
			<biblScope unit="page" from="177" to="187" />
			<date type="published" when="2009">2009</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b6">
	<analytic>
		<title level="a" type="main">Susceptibility to phishing on social network sites: A personality information processing model</title>
		<author>
			<persName><forename type="first">E</forename><forename type="middle">D</forename><surname>Frauenstein</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Flowerday</surname></persName>
		</author>
		<idno type="DOI">10.1016/j.cose.2020.101862</idno>
		<ptr target="https://www.sciencedirect.com/science/article/pii/S0167404820301346.doi:10.1016/j.cose.2020.101862" />
	</analytic>
	<monogr>
		<title level="j">Computers &amp; Security</title>
		<imprint>
			<biblScope unit="volume">94</biblScope>
			<biblScope unit="page">101862</biblScope>
			<date type="published" when="2020">2020</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b7">
	<monogr>
		<title level="m" type="main">Influence: The Psychology of Persuasion</title>
		<author>
			<persName><forename type="first">R</forename><forename type="middle">B</forename><surname>Cialdini</surname></persName>
		</author>
		<imprint>
			<date type="published" when="2007">2007</date>
			<publisher>Harper Collins</publisher>
			<pubPlace>New York, NY</pubPlace>
		</imprint>
	</monogr>
	<note>1st. ed</note>
</biblStruct>

<biblStruct xml:id="b8">
	<analytic>
		<title level="a" type="main">Predicting susceptibility to social influence in phishing emails</title>
		<author>
			<persName><forename type="first">K</forename><surname>Parsons</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Butavicius</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><surname>Delfabbro</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Lillie</surname></persName>
		</author>
		<idno type="DOI">10.1016/j.ijhcs.2019.02.007</idno>
		<ptr target="https://doi.org/10.1016/j.ijhcs.2019.02.007.doi:10.1016/j.ijhcs.2019.02.007" />
	</analytic>
	<monogr>
		<title level="j">International Journal of Human-Computer Studies</title>
		<imprint>
			<biblScope unit="volume">128</biblScope>
			<biblScope unit="page" from="17" to="26" />
			<date type="published" when="2019">2019</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b9">
	<analytic>
		<title level="a" type="main">Social engineering and organisational dependencies in phishing attacks</title>
		<author>
			<persName><forename type="first">R</forename><surname>Taib</surname></persName>
		</author>
		<author>
			<persName><forename type="first">K</forename><surname>Yu</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Berkovsky</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><surname>Bayl-Smith</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Wiggins</surname></persName>
		</author>
		<idno type="DOI">10.1007/978-3-030-29381-9_35</idno>
		<ptr target="TC.13" />
	</analytic>
	<monogr>
		<title level="m">International Conference on Human-Computer Interaction -INTERACT 2019, INTERACT 2019 ; Conference date</title>
		<title level="s">Lecture Notes in Computer Science</title>
		<editor>
			<persName><forename type="first">D</forename><surname>Lamas</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">F</forename><surname>Loizides</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">L</forename><surname>Nacke</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">H</forename><surname>Petrie</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">M</forename><surname>Winckler</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">P</forename><surname>Zaphiris</surname></persName>
		</editor>
		<meeting><address><addrLine>United States</addrLine></address></meeting>
		<imprint>
			<publisher>Springer Nature</publisher>
			<date type="published" when="2019">2019</date>
			<biblScope unit="volume">11746</biblScope>
			<biblScope unit="page" from="6" to="09" />
		</imprint>
	</monogr>
	<note>Human-Computer Interaction -INTERACT 2019</note>
</biblStruct>

<biblStruct xml:id="b10">
	<analytic>
		<title level="a" type="main">Persuasion: How phishing emails can influence users and bypass security measures</title>
		<author>
			<persName><forename type="first">A</forename><surname>Ferreira</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Teles</surname></persName>
		</author>
		<idno type="DOI">10.1016/j.ijhcs.2018.12.004</idno>
		<ptr target="https://www.sciencedirect.com/science/article/pii/S1071581918306827.doi:10.1016/j.ijhcs.2018.12.004" />
	</analytic>
	<monogr>
		<title level="j">International Journal of Human-Computer Studies</title>
		<imprint>
			<biblScope unit="volume">125</biblScope>
			<biblScope unit="page" from="19" to="31" />
			<date type="published" when="2019">2019</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b11">
	<monogr>
		<title level="m" type="main">Phishing dark waters: The offensive and defensive sides of malicious Emails</title>
		<author>
			<persName><forename type="first">C</forename><surname>Hadnagy</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Fincher</surname></persName>
		</author>
		<imprint>
			<date type="published" when="2015">2015</date>
			<publisher>John Wiley &amp; Sons</publisher>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b12">
	<monogr>
		<title level="m" type="main">Phishing defense guide 2017</title>
		<author>
			<persName><forename type="first">A</forename><surname>Higbee</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Greaux</surname></persName>
		</author>
		<idno type="DOI">10.13140/RG.2.2.33730.50889</idno>
		<idno>doi:</idno>
		<ptr target="10.13140/RG.2.2.33730.50889" />
		<imprint>
			<date type="published" when="2022">2022</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b13">
	<analytic>
		<title level="a" type="main">The human factor in phishing: Collecting and analyzing user behavior when reading emails</title>
		<author>
			<persName><forename type="first">L</forename><surname>Gallo</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><surname>Gentile</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Ruggiero</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Botta</surname></persName>
		</author>
		<author>
			<persName><forename type="first">G</forename><surname>Ventre</surname></persName>
		</author>
		<idno type="DOI">10.1016/j.cose.2023.103671</idno>
		<ptr target="https://doi.org/10.1016/j.cose.2023.103671.doi:10.1016/j.cose.2023.103671" />
	</analytic>
	<monogr>
		<title level="j">Computers &amp; Security</title>
		<imprint>
			<biblScope unit="volume">139</biblScope>
			<biblScope unit="page">103671</biblScope>
			<date type="published" when="2024">2024</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b14">
	<analytic>
		<title level="a" type="main">Phishing suspiciousness in older and younger adults: The role of executive functioning</title>
		<author>
			<persName><forename type="first">B</forename><forename type="middle">E</forename><surname>Gavett</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Zhao</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><forename type="middle">E</forename><surname>John</surname></persName>
		</author>
		<author>
			<persName><forename type="first">C</forename><forename type="middle">A</forename><surname>Bussell</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><forename type="middle">R</forename><surname>Roberts</surname></persName>
		</author>
		<author>
			<persName><forename type="first">C</forename><surname>Yue</surname></persName>
		</author>
		<idno type="DOI">10.1371/journal.pone.0171620</idno>
		<ptr target="https://doi.org/10.1371/journal.pone.0171620.doi:10.1371/journal.pone.0171620" />
	</analytic>
	<monogr>
		<title level="j">PLOS ONE</title>
		<imprint>
			<biblScope unit="volume">12</biblScope>
			<biblScope unit="page" from="1" to="16" />
			<date type="published" when="2017">2017</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b15">
	<analytic>
		<title level="a" type="main">Which phish is on the hook? phishing vulnerability for older versus younger adults</title>
		<author>
			<persName><forename type="first">D</forename><forename type="middle">M</forename><surname>Sarno</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><forename type="middle">E</forename><surname>Lewis</surname></persName>
		</author>
		<author>
			<persName><forename type="first">C</forename><forename type="middle">J</forename><surname>Bohil</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><forename type="middle">B</forename><surname>Neider</surname></persName>
		</author>
		<idno type="DOI">10.1177/0018720819855570</idno>
		<ptr target="pMID:31237787" />
	</analytic>
	<monogr>
		<title level="j">Human Factors</title>
		<imprint>
			<biblScope unit="volume">62</biblScope>
			<biblScope unit="page" from="704" to="717" />
			<date type="published" when="2020">2020</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b16">
	<analytic>
		<title level="a" type="main">Phishing for phishing awareness</title>
		<author>
			<persName><forename type="first">K</forename><surname>Jansson</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Solms</surname></persName>
		</author>
		<idno type="DOI">10.1080/0144929X.2011.632650</idno>
		<idno>doi:</idno>
		<ptr target="10.1080/0144929X.2011.632650" />
	</analytic>
	<monogr>
		<title level="j">Behaviour &amp; Information Technology</title>
		<imprint>
			<biblScope unit="volume">32</biblScope>
			<biblScope unit="page" from="584" to="593" />
			<date type="published" when="2013">2013</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b17">
	<analytic>
		<title level="a" type="main">Influencing outcomes and behaviors in simulated phishing exercises</title>
		<author>
			<persName><forename type="first">S</forename><surname>Mcelwee</surname></persName>
		</author>
		<author>
			<persName><forename type="first">G</forename><surname>Murphy</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><surname>Shelton</surname></persName>
		</author>
		<idno type="DOI">10.1109/SECON.2018.8479109</idno>
		<ptr target="https://doi.org/10.1109/SECON.2018.8479109.doi:10.1109/SECON.2018.8479109" />
	</analytic>
	<monogr>
		<title level="j">SoutheastCon</title>
		<imprint>
			<biblScope unit="volume">2018</biblScope>
			<biblScope unit="page" from="1" to="6" />
			<date type="published" when="2018">2018</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b18">
	<analytic>
		<title level="a" type="main">Testing the effectiveness of tailored phishing techniques in industry and academia: a field experiment</title>
		<author>
			<persName><forename type="first">P</forename><surname>Burda</surname></persName>
		</author>
		<author>
			<persName><forename type="first">T</forename><surname>Chotza</surname></persName>
		</author>
		<author>
			<persName><forename type="first">L</forename><surname>Allodi</surname></persName>
		</author>
		<author>
			<persName><forename type="first">N</forename><surname>Zannone</surname></persName>
		</author>
		<idno type="DOI">10.1145/3407023.3409178</idno>
		<idno>doi:10.1145/3407023.3409178</idno>
		<ptr target="https://doi.org/10.1145/3407023.3409178" />
	</analytic>
	<monogr>
		<title level="m">Proceedings of the 15th International Conference on Availability, Reliability and Security, ARES &apos;20</title>
				<meeting>the 15th International Conference on Availability, Reliability and Security, ARES &apos;20<address><addrLine>New York, NY, USA</addrLine></address></meeting>
		<imprint>
			<publisher>Association for Computing Machinery</publisher>
			<date type="published" when="2020">2020</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b19">
	<analytic>
		<title level="a" type="main">Social engineering in cybersecurity: Effect mechanisms, human vulnerabilities and attack methods</title>
		<author>
			<persName><forename type="first">Z</forename><surname>Wang</surname></persName>
		</author>
		<author>
			<persName><forename type="first">H</forename><surname>Zhu</surname></persName>
		</author>
		<author>
			<persName><forename type="first">L</forename><surname>Sun</surname></persName>
		</author>
		<idno type="DOI">10.1109/ACCESS.2021.3051633</idno>
		<ptr target="https://ieeexplore.ieee.org/document/9323026.doi:10.1109/ACCESS.2021.3051633" />
	</analytic>
	<monogr>
		<title level="j">IEEE Access</title>
		<imprint>
			<biblScope unit="volume">9</biblScope>
			<biblScope unit="page" from="11895" to="11910" />
			<date type="published" when="2021">2021</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b20">
	<analytic>
		<title level="a" type="main">Emotion and decision making: multiple modulatory neural circuits</title>
		<author>
			<persName><forename type="first">E</forename><forename type="middle">A</forename><surname>Phelps</surname></persName>
		</author>
		<author>
			<persName><forename type="first">K</forename><forename type="middle">M</forename><surname>Lempert</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><surname>Sokol-Hessner</surname></persName>
		</author>
		<ptr target="https://pubmed.ncbi.nlm.nih.gov/24905597" />
	</analytic>
	<monogr>
		<title level="j">Annu Rev Neurosci</title>
		<imprint>
			<biblScope unit="volume">37</biblScope>
			<biblScope unit="page" from="263" to="287" />
			<date type="published" when="2014">2014</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b21">
	<analytic>
		<title level="a" type="main">All negative moods are not equal: Motivational influences of anxiety and sadness on decision making</title>
		<author>
			<persName><forename type="first">R</forename><surname>Raghunathan</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><forename type="middle">T</forename><surname>Pham</surname></persName>
		</author>
		<idno type="DOI">10.1006/obhd.1999.2838</idno>
		<ptr target="https://www.sciencedirect.com/science/article/pii/S0749597899928388.doi:10.1006/obhd.1999.2838" />
	</analytic>
	<monogr>
		<title level="j">Organizational Behavior and Human Decision Processes</title>
		<imprint>
			<biblScope unit="volume">79</biblScope>
			<biblScope unit="page" from="56" to="77" />
			<date type="published" when="1999">1999</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b22">
	<analytic>
		<title level="a" type="main">Consumer vulnerability to scams, swindles, and fraud: A new theory of visceral influences on persuasion</title>
		<author>
			<persName><forename type="first">J</forename><surname>Langenderfer</surname></persName>
		</author>
		<author>
			<persName><forename type="first">T</forename><forename type="middle">A</forename><surname>Shimp</surname></persName>
		</author>
		<idno type="DOI">10.1002/mar.1029</idno>
		<ptr target="https://onlinelibrary.wiley.com/doi/abs/10.1002/mar.1029.doi:10.1002/mar.1029" />
	</analytic>
	<monogr>
		<title level="j">Psychology &amp; Marketing</title>
		<imprint>
			<biblScope unit="volume">18</biblScope>
			<biblScope unit="page" from="763" to="783" />
			<date type="published" when="2001">2001</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b23">
	<analytic>
		<title level="a" type="main">Research article phishing susceptibility: An investigation into the processing of a targeted spear phishing email</title>
		<author>
			<persName><forename type="first">J</forename><surname>Wang</surname></persName>
		</author>
		<author>
			<persName><forename type="first">T</forename><surname>Herath</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Chen</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Vishwanath</surname></persName>
		</author>
		<author>
			<persName><forename type="first">H</forename><forename type="middle">R</forename><surname>Rao</surname></persName>
		</author>
		<idno type="DOI">10.1109/TPC.2012.2208392</idno>
		<ptr target="https://ieeexplore.ieee.org/abstract/document/6289402.doi:10.1109/TPC.2012.2208392" />
	</analytic>
	<monogr>
		<title level="j">IEEE Transactions on Professional Communication</title>
		<imprint>
			<biblScope unit="volume">55</biblScope>
			<biblScope unit="page" from="345" to="362" />
			<date type="published" when="2012">2012</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b24">
	<analytic>
		<title level="a" type="main">Categorizing human phishing difficulty: a Phish Scale</title>
		<author>
			<persName><forename type="first">M</forename><surname>Steves</surname></persName>
		</author>
		<author>
			<persName><forename type="first">K</forename><surname>Greene</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Theofanos</surname></persName>
		</author>
		<idno type="DOI">10.1093/cybsec/tyaa009</idno>
		<ptr target="https://doi.org/10.1093/cybsec/tyaa009.doi:10.1093/cybsec/tyaa009" />
	</analytic>
	<monogr>
		<title level="j">Journal of Cybersecurity</title>
		<imprint>
			<biblScope unit="volume">6</biblScope>
			<biblScope unit="page">9</biblScope>
			<date type="published" when="2020">2020</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b25">
	<analytic>
		<title level="a" type="main">The influence of context on response to spear-phishing attacks: an in-situ deception study</title>
		<author>
			<persName><forename type="first">V</forename><surname>Distler</surname></persName>
		</author>
		<idno type="DOI">10.1145/3544548.3581170</idno>
		<idno>doi:10.1145/3544548.3581170</idno>
		<ptr target="https://doi.org/10.1145/3544548.3581170" />
	</analytic>
	<monogr>
		<title level="m">Proceedings of the 2023 CHI Conference on Human Factors in Computing Systems, CHI &apos;23</title>
				<meeting>the 2023 CHI Conference on Human Factors in Computing Systems, CHI &apos;23<address><addrLine>New York, NY, USA</addrLine></address></meeting>
		<imprint>
			<publisher>Association for Computing Machinery</publisher>
			<date type="published" when="2023">2023</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b26">
	<analytic>
		<title level="a" type="main">Effect of personality traits on trust and risk to phishing vulnerability: Modeling and analysis</title>
		<author>
			<persName><forename type="first">J.-H</forename><surname>Cho</surname></persName>
		</author>
		<author>
			<persName><forename type="first">H</forename><surname>Cam</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Oltramari</surname></persName>
		</author>
		<idno type="DOI">10.1109/COGSIMA.2016.7497779</idno>
		<ptr target="https://doi.org/10.1109/COGSIMA.2016.7497779.doi:10.1109/COGSIMA.2016.7497779" />
	</analytic>
	<monogr>
		<title level="m">IEEE International Multi-Disciplinary Conference on Cognitive Methods in Situation Awareness and Decision Support (CogSIMA)</title>
				<imprint>
			<date type="published" when="2016">2016. 2016</date>
			<biblScope unit="page" from="7" to="13" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b27">
	<analytic>
		<title level="a" type="main">Spear-phishing susceptibility stemming from personality traits</title>
		<author>
			<persName><forename type="first">S</forename><surname>Eftimie</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Moinescu</surname></persName>
		</author>
		<author>
			<persName><forename type="first">C</forename><surname>Răcuciu</surname></persName>
		</author>
		<idno type="DOI">10.1109/ACCESS.2022.3190009</idno>
		<ptr target="https://doi.org/10.1109/ACCESS.2022.3190009.doi:10.1109/ACCESS.2022.3190009" />
	</analytic>
	<monogr>
		<title level="j">IEEE Access</title>
		<imprint>
			<biblScope unit="volume">10</biblScope>
			<biblScope unit="page" from="73548" to="73561" />
			<date type="published" when="2022">2022</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b28">
	<analytic>
		<title level="a" type="main">Email phishing and signal detection: How persuasion principles and personality influence response patterns and accuracy</title>
		<author>
			<persName><forename type="first">P</forename><surname>Lawson</surname></persName>
		</author>
		<author>
			<persName><forename type="first">C</forename><forename type="middle">J</forename><surname>Pearson</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Crowson</surname></persName>
		</author>
		<author>
			<persName><forename type="first">C</forename><forename type="middle">B</forename><surname>Mayhorn</surname></persName>
		</author>
		<idno type="DOI">10.1016/j.apergo.2020.103084</idno>
		<ptr target="https://doi.org/10.1016/j.apergo.2020.103084" />
	</analytic>
	<monogr>
		<title level="j">Applied Ergonomics</title>
		<imprint>
			<biblScope unit="volume">86</biblScope>
			<biblScope unit="page">103084</biblScope>
			<date type="published" when="2020">2020</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b29">
	<analytic>
		<title level="a" type="main">The five-factor theory of personality</title>
		<author>
			<persName><forename type="first">R</forename><forename type="middle">R</forename><surname>Mccrae</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><forename type="middle">T</forename><surname>Costa</surname><genName>Jr</genName></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Handbook of personality: Theory and research</title>
				<meeting><address><addrLine>New York, NY, US</addrLine></address></meeting>
		<imprint>
			<publisher>The Guilford Press</publisher>
			<date type="published" when="2008">2008</date>
			<biblScope unit="page" from="159" to="181" />
		</imprint>
	</monogr>
	<note>3rd ed</note>
</biblStruct>

<biblStruct xml:id="b30">
	<analytic>
		<title level="a" type="main">Four ways five factors are basic</title>
		<author>
			<persName><forename type="first">P</forename><forename type="middle">T</forename><surname>Costa</surname><genName>Jr</genName></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><forename type="middle">R</forename><surname>Mccrae</surname></persName>
		</author>
		<idno type="DOI">10.1016/0191-8869(92)90236-I</idno>
		<ptr target="https://www.sciencedirect.com/science/article/pii/019188699290236I.doi:10.1016/0191-8869(92)90236-I" />
	</analytic>
	<monogr>
		<title level="j">Personality and Individual Differences</title>
		<imprint>
			<biblScope unit="volume">13</biblScope>
			<biblScope unit="page" from="653" to="665" />
			<date type="published" when="1992">1992</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b31">
	<analytic>
		<title level="a" type="main">Covid-19 and phishing: Effects of human emotions, behavior, and demographics on the success of phishing attempts during the pandemic</title>
		<author>
			<persName><forename type="first">H</forename><surname>Abroshan</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Devos</surname></persName>
		</author>
		<author>
			<persName><forename type="first">G</forename><surname>Poels</surname></persName>
		</author>
		<author>
			<persName><forename type="first">E</forename><surname>Laermans</surname></persName>
		</author>
		<idno type="DOI">10.1109/ACCESS.2021.3109091</idno>
		<ptr target="https://doi.org/10.1109/ACCESS.2021.3109091.doi:10.1109/ACCESS.2021.3109091" />
	</analytic>
	<monogr>
		<title level="j">IEEE Access</title>
		<imprint>
			<biblScope unit="volume">9</biblScope>
			<biblScope unit="page" from="121916" to="121929" />
			<date type="published" when="2021">2021</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b32">
	<analytic>
		<title level="a" type="main">Effects of emotional appeals on phishing susceptibility</title>
		<author>
			<persName><forename type="first">C</forename><forename type="middle">A</forename><surname>Tian</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><forename type="middle">L</forename><surname>Jensen</surname></persName>
		</author>
		<ptr target="https://aisel.aisnet.org/wisp2019/16" />
	</analytic>
	<monogr>
		<title level="m">Pre-ICIS Workshop on Information Security and Privacy (WISP) 2019 Proceedings</title>
				<imprint>
			<date type="published" when="2019">2019</date>
			<biblScope unit="volume">16</biblScope>
			<biblScope unit="page" from="1" to="16" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b33">
	<analytic>
		<title level="a" type="main">The social engineering personality framework</title>
		<author>
			<persName><forename type="first">S</forename><surname>Uebelacker</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Quiel</surname></persName>
		</author>
		<idno type="DOI">10.1109/STAST.2014.12</idno>
		<ptr target="https://doi.org/10.1109/STAST.2014.12.doi:10.1109/STAST.2014.12" />
	</analytic>
	<monogr>
		<title level="m">Workshop on Socio-Technical Aspects in Security and Trust</title>
				<imprint>
			<date type="published" when="2014">2014. 2014</date>
			<biblScope unit="page" from="24" to="30" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b34">
	<analytic>
		<title level="a" type="main">Research note: Influence techniques in phishing attacks: An examination of vulnerability and resistance</title>
		<author>
			<persName><forename type="first">R</forename><forename type="middle">T</forename><surname>Wright</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><forename type="middle">L</forename><surname>Jensen</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><forename type="middle">B</forename><surname>Thatcher</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Dinger</surname></persName>
		</author>
		<author>
			<persName><forename type="first">K</forename><surname>Marett</surname></persName>
		</author>
		<ptr target="http://www.jstor.org/stable/24700179" />
	</analytic>
	<monogr>
		<title level="j">Information Systems Research</title>
		<imprint>
			<biblScope unit="volume">25</biblScope>
			<biblScope unit="page" from="385" to="400" />
			<date type="published" when="2014">2014</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b35">
	<analytic>
		<title level="a" type="main">School of phish: a real-world evaluation of anti-phishing training</title>
		<author>
			<persName><forename type="first">P</forename><surname>Kumaraguru</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Cranshaw</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Acquisti</surname></persName>
		</author>
		<author>
			<persName><forename type="first">L</forename><surname>Cranor</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Hong</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><forename type="middle">A</forename><surname>Blair</surname></persName>
		</author>
		<author>
			<persName><forename type="first">T</forename><surname>Pham</surname></persName>
		</author>
		<idno type="DOI">10.1145/1572532.1572536</idno>
		<idno>doi:10.1145/1572532.1572536</idno>
		<ptr target="https://doi.org/10.1145/1572532.1572536" />
	</analytic>
	<monogr>
		<title level="m">Proceedings of the 5th Symposium on Usable Privacy and Security, SOUPS &apos;09</title>
				<meeting>the 5th Symposium on Usable Privacy and Security, SOUPS &apos;09<address><addrLine>New York, NY, USA</addrLine></address></meeting>
		<imprint>
			<publisher>Association for Computing Machinery</publisher>
			<date type="published" when="2009">2009</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b36">
	<analytic>
		<title level="a" type="main">Going spear phishing: Exploring embedded training and awareness</title>
		<author>
			<persName><forename type="first">D</forename><forename type="middle">D</forename><surname>Caputo</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><forename type="middle">L</forename><surname>Pfleeger</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><forename type="middle">D</forename><surname>Freeman</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><forename type="middle">E</forename><surname>Johnson</surname></persName>
		</author>
		<idno type="DOI">10.1109/MSP.2013.106</idno>
		<ptr target="https://doi.org/10.1109/MSP.2013.106.doi:10.1109/MSP.2013.106" />
	</analytic>
	<monogr>
		<title level="j">IEEE Security &amp; Privacy</title>
		<imprint>
			<biblScope unit="volume">12</biblScope>
			<biblScope unit="page" from="28" to="38" />
			<date type="published" when="2014">2014</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b37">
	<analytic>
		<title level="a" type="main">Embedding training within warnings improves skills of identifying phishing webpages</title>
		<author>
			<persName><forename type="first">A</forename><surname>Xiong</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><forename type="middle">W</forename><surname>Proctor</surname></persName>
		</author>
		<author>
			<persName><forename type="first">W</forename><surname>Yang</surname></persName>
		</author>
		<author>
			<persName><forename type="first">N</forename><surname>Li</surname></persName>
		</author>
		<idno type="DOI">10.1177/0018720818810942</idno>
		<ptr target="pMID:30526089" />
	</analytic>
	<monogr>
		<title level="j">Human Factors</title>
		<imprint>
			<biblScope unit="volume">61</biblScope>
			<biblScope unit="page" from="577" to="595" />
			<date type="published" when="2019">2019</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b38">
	<monogr>
		<author>
			<persName><forename type="first">P</forename><forename type="middle">T</forename><surname>Costa</surname><genName>Jr</genName></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><forename type="middle">R</forename><surname>Mccrae</surname></persName>
		</author>
		<idno type="DOI">10.4135/9781849200479.n9</idno>
		<ptr target="https://doi.org/10.4135/9781849200479.n9.doi:10.4135/9781849200479.n9" />
		<title level="m">The SAGE handbook of personality theory and assessment</title>
				<editor>
			<persName><surname>Neo-</surname></persName>
		</editor>
		<meeting><address><addrLine>Thousand Oaks, CA, US</addrLine></address></meeting>
		<imprint>
			<publisher>Sage Publications, Inc</publisher>
			<date type="published" when="2008">2008</date>
			<biblScope unit="volume">2</biblScope>
			<biblScope unit="page" from="179" to="198" />
		</imprint>
	</monogr>
	<note>Personality measurement and testing</note>
</biblStruct>

<biblStruct xml:id="b39">
	<monogr>
		<title level="m" type="main">Phishing awareness among students at ntnu</title>
		<author>
			<persName><forename type="first">B</forename><forename type="middle">T T</forename></persName>
		</author>
		<author>
			<persName><forename type="first">E</forename><forename type="middle">V</forename></persName>
		</author>
		<author>
			<persName><forename type="first">H</forename><forename type="middle">T D</forename></persName>
		</author>
		<author>
			<persName><forename type="first">L</forename><forename type="middle">W H</forename></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><forename type="middle">M</forename></persName>
		</author>
		<ptr target="https://folk.idi.ntnu.no/baf/eremcis/2022/Group17.pdf" />
		<imprint>
			<date type="published" when="2022">2022</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b40">
	<analytic>
		<title level="a" type="main">Evaluation of a behavioral measure of risk taking: The balloon analogue risk task (bart)</title>
		<author>
			<persName><forename type="first">C</forename><forename type="middle">W</forename><surname>Lejuez</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><forename type="middle">P</forename><surname>Read</surname></persName>
		</author>
		<author>
			<persName><forename type="first">C</forename><forename type="middle">W</forename><surname>Kahler</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><forename type="middle">B</forename><surname>Richards</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><forename type="middle">E</forename><surname>Ramsey</surname></persName>
		</author>
		<author>
			<persName><forename type="first">G</forename><forename type="middle">L</forename><surname>Stuart</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><forename type="middle">R</forename><surname>Strong</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><forename type="middle">A</forename><surname>Brown</surname></persName>
		</author>
		<idno type="DOI">10.1037/1076-898X.8.2.75</idno>
		<idno>doi:</idno>
		<ptr target="10.1037/1076-898X.8.2.75" />
	</analytic>
	<monogr>
		<title level="j">Journal of Experimental Psychology: Applied</title>
		<imprint>
			<biblScope unit="volume">8</biblScope>
			<biblScope unit="page" from="75" to="84" />
			<date type="published" when="2002">2002</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b41">
	<analytic>
		<title level="a" type="main">Fostering e-mail security awareness: The west point carronade</title>
		<author>
			<persName><forename type="first">A</forename><forename type="middle">J</forename><surname>Ferguson</surname></persName>
		</author>
		<ptr target="https://www.educause.edu/ir/library/pdf/EQM0517.pdf" />
	</analytic>
	<monogr>
		<title level="j">Educause Quarterly</title>
		<imprint>
			<biblScope unit="volume">28</biblScope>
			<biblScope unit="page" from="54" to="57" />
			<date type="published" when="2005">2005</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b42">
	<analytic>
		<title level="a" type="main">Phishing iq tests measure fear, not ability</title>
		<author>
			<persName><forename type="first">V</forename><surname>Anandpara</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Dingman</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Jakobsson</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><surname>Liu</surname></persName>
		</author>
		<author>
			<persName><forename type="first">H</forename><surname>Roinestad</surname></persName>
		</author>
		<idno type="DOI">10.1007/978-3-540-77366-5_33</idno>
		<ptr target="https://link.springer.com/chapter/10.1007/978-3-540-77366-5_33" />
	</analytic>
	<monogr>
		<title level="m">Financial Cryptography and Data Security</title>
				<editor>
			<persName><forename type="first">S</forename><surname>Dietrich</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">R</forename><surname>Dhamija</surname></persName>
		</editor>
		<meeting><address><addrLine>Berlin Heidelberg; Berlin, Heidelberg</addrLine></address></meeting>
		<imprint>
			<publisher>Springer</publisher>
			<date type="published" when="2007">2007</date>
			<biblScope unit="page" from="362" to="366" />
		</imprint>
	</monogr>
</biblStruct>

				</listBibl>
			</div>
		</back>
	</text>
</TEI>
