TY - JOUR AB - Purpose Phishing is still a very popular and effective security threat, and it takes, on average, more than a day to detect new phish websites. Protection by purely technical means is hampered by this vulnerability window. During this window, users need to act to protect themselves. To support users in doing so, the paper aims to propose to first make users aware of the need to consult the address bar. Moreover, the authors propose to prune URL displayed in the address bar. The authors report on an evaluation of this proposal.Design/methodology/approach The paper opted for an online study with 411 participants, judging 16 websites – all with authentic design: half with legitimate and half with phish URLs. The authors applied four popular widely used types of URL manipulation techniques. The authors conducted a within-subject and between-subject study with participants randomly assigned to one of two groups (domain highlighting or pruning). The authors then tested both proposals using a repeated-measures multivariate analysis of variance.Findings The analysis shows a significant improvement in terms of phish detection after providing the hint to check the address bar. Furthermore, the analysis shows a significant improvement in terms of phish detection after the hint to check the address bar for uninitiated participants in the pruning group, as compared to those in the highlighting group.Research limitations/implications Because of the chosen research approach, the research results may lack generalisability. Therefore, researchers are encouraged to test the proposed propositions further.Practical implications This paper confirms the efficacy of URL pruning and of prompting users to consult the address bar for phish detection.Originality/value This paper introduces a classification for URL manipulation techniques used by phishers. We also provide evidence that drawing people’s attention to the address bar makes them more likely to spot phish websites, but does not impair their ability to identify authentic websites. VL - 24 IS - 4 SN - 2056-4961 DO - 10.1108/ICS-07-2015-0032 UR - https://doi.org/10.1108/ICS-07-2015-0032 AU - Volkamer Melanie AU - Renaud Karen AU - Gerber Paul PY - 2016 Y1 - 2016/01/01 TI - Spot the phish by checking the pruned URL T2 - Information & Computer Security PB - Emerald Group Publishing Limited SP - 372 EP - 385 Y2 - 2024/04/19 ER -