Phishing attacks: A recent comprehensive study and a new anatomy

Z Alkhalil, C Hewage, L Nawaf, I Khan - Frontiers in Computer Science, 2021 - frontiersin.org
With the significant growth of internet usage, people increasingly share their personal
information online. As a result, an enormous amount of personal information and financial …

A study on the psychology of social engineering-based cyberattacks and existing countermeasures

MA Siddiqi, W Pak, MA Siddiqi - Applied Sciences, 2022 - mdpi.com
As cybersecurity strategies become more robust and challenging, cybercriminals are
mutating cyberattacks to be more evasive. Recent studies have highlighted the use of social …

A survey of phishing attack techniques, defence mechanisms and open research challenges

AK Jain, BB Gupta - Enterprise Information Systems, 2022 - Taylor & Francis
Phishing is an identity theft, which deceives Internet users into revealing their sensitive data,
eg, login information, credit/debit card details, and so on. Researchers have developed …

Digital inequalities 2.0: Legacy inequalities in the information age

L Robinson, J Schulz, G Blank, M Ragnedda, H Ono… - First Monday, 2020 - ora.ox.ac.uk
2020 marks the 25th anniversary of the “digital divide.” Although a quarter century has
passed, legacy digital inequalities continue, and emergent digital inequalities are …

Information security policy compliance model in organizations

NS Safa, R Von Solms, S Furnell - computers & security, 2016 - Elsevier
The Internet and information technology have influenced human life significantly. However,
information security is still an important concern for both users and organizations …

The human aspects of information security questionnaire (HAIS-Q): two further validation studies

K Parsons, D Calic, M Pattinson, M Butavicius… - Computers & …, 2017 - Elsevier
Abstract Information security awareness (ISA) is integral to protecting an organisation from
cyber threats. The aim of this paper is to further establish the validity of the Human Aspects …

Defending against phishing attacks: taxonomy of methods, current issues and future directions

BB Gupta, NAG Arachchilage, KE Psannis - Telecommunication Systems, 2018 - Springer
Internet technology is so pervasive today, for example, from online social networking to
online banking, it has made people's lives more comfortable. Due the growth of Internet …

An exploratory study of cyber hygiene behaviors and knowledge

AA Cain, ME Edwards, JD Still - Journal of information security and …, 2018 - Elsevier
End users' cyber hygiene often plays a large role in cybersecurity breaches. Therefore, we
need a deeper understanding of the user differences that are associated with either good or …

Educating and raising awareness on cyber security social engineering: A literature review

H Aldawood, G Skinner - 2018 IEEE international conference …, 2018 - ieeexplore.ieee.org
Social engineering, due in part to the increasing popularity and advancements in
information technology and ubiquity of devices, has emerged as one of the most challenging …

Fighting against phishing attacks: state of the art and future challenges

BB Gupta, A Tewari, AK Jain, DP Agrawal - Neural Computing and …, 2017 - Springer
In the last few years, phishing scams have rapidly grown posing huge threat to global
Internet security. Today, phishing attack is one of the most common and serious threats over …