Human factors in phishing attacks: a systematic literature review

G Desolda, LS Ferro, A Marrella, T Catarci… - ACM Computing …, 2021 - dl.acm.org
Phishing is the fraudulent attempt to obtain sensitive information by disguising oneself as a
trustworthy entity in digital communication. It is a type of cyber attack often successful …

Nudges for privacy and security: Understanding and assisting users' choices online

A Acquisti, I Adjerid, R Balebako… - ACM Computing …, 2017 - dl.acm.org
Advancements in information technology often task users with complex and consequential
privacy and security decisions. A growing body of research has investigated individuals' …

An enhanced fear appeal rhetorical framework

AC Johnston, M Warkentin, M Siponen - MIS quarterly, 2015 - JSTOR
Fear appeals, which are used widely in information security campaigns, have become
common tools in motivating individual compliance with information security policies and …

[HTML][HTML] Exploring susceptibility to phishing in the workplace

EJ Williams, J Hinds, AN Joinson - International Journal of Human …, 2018 - Elsevier
Phishing emails provide a means to infiltrate the technical systems of organisations by
encouraging employees to click on malicious links or attachments. Despite the use of …

Future directions for behavioral information security research

RE Crossler, AC Johnston, PB Lowry, Q Hu… - computers & …, 2013 - Elsevier
Information Security (InfoSec) research is far reaching and includes many approaches to
deal with protecting and mitigating threats to the information assets and technical resources …

Understanding information systems security policy compliance: An integration of the theory of planned behavior and the protection motivation theory

P Ifinedo - Computers & Security, 2012 - Elsevier
This research investigated information systems security policy (ISSP) compliance by
drawing upon two relevant theories ie the theory of planned behavior (TPB) and the …

Information systems security policy compliance: An empirical study of the effects of socialisation, influence, and cognition

P Ifinedo - Information & Management, 2014 - Elsevier
This study investigated employees' information systems security policy (ISSP) compliance
behavioural intentions in organisations from the theoretical lenses of social bonding, social …

A usability study of five {two-factor} authentication methods

K Reese, T Smith, J Dutson, J Armknecht… - … Symposium on Usable …, 2019 - usenix.org
Two-factor authentication (2FA) defends against account compromise. An account secured
with 2FA typically requires an individual to authenticate using something they know …

Beyond deterrence: An expanded view of employee computer abuse

R Willison, M Warkentin - MIS quarterly, 2013 - JSTOR
Recent academic investigations of computer security policy violations have largely focused
on non-malicious noncompliance due to poor training, low employee motivation, weak …

Moving from a 'human-as-problem” to a 'human-as-solution” cybersecurity mindset

V Zimmermann, K Renaud - International Journal of Human-Computer …, 2019 - Elsevier
Cybersecurity has gained prominence, with a number of widely publicised security incidents,
hacking attacks and data breaches reaching the news over the last few years. The …