Human factors in phishing attacks: a systematic literature review
Phishing is the fraudulent attempt to obtain sensitive information by disguising oneself as a
trustworthy entity in digital communication. It is a type of cyber attack often successful …
trustworthy entity in digital communication. It is a type of cyber attack often successful …
Nudges for privacy and security: Understanding and assisting users' choices online
Advancements in information technology often task users with complex and consequential
privacy and security decisions. A growing body of research has investigated individuals' …
privacy and security decisions. A growing body of research has investigated individuals' …
An enhanced fear appeal rhetorical framework
Fear appeals, which are used widely in information security campaigns, have become
common tools in motivating individual compliance with information security policies and …
common tools in motivating individual compliance with information security policies and …
[HTML][HTML] Exploring susceptibility to phishing in the workplace
EJ Williams, J Hinds, AN Joinson - International Journal of Human …, 2018 - Elsevier
Phishing emails provide a means to infiltrate the technical systems of organisations by
encouraging employees to click on malicious links or attachments. Despite the use of …
encouraging employees to click on malicious links or attachments. Despite the use of …
Future directions for behavioral information security research
Information Security (InfoSec) research is far reaching and includes many approaches to
deal with protecting and mitigating threats to the information assets and technical resources …
deal with protecting and mitigating threats to the information assets and technical resources …
Understanding information systems security policy compliance: An integration of the theory of planned behavior and the protection motivation theory
P Ifinedo - Computers & Security, 2012 - Elsevier
This research investigated information systems security policy (ISSP) compliance by
drawing upon two relevant theories ie the theory of planned behavior (TPB) and the …
drawing upon two relevant theories ie the theory of planned behavior (TPB) and the …
Information systems security policy compliance: An empirical study of the effects of socialisation, influence, and cognition
P Ifinedo - Information & Management, 2014 - Elsevier
This study investigated employees' information systems security policy (ISSP) compliance
behavioural intentions in organisations from the theoretical lenses of social bonding, social …
behavioural intentions in organisations from the theoretical lenses of social bonding, social …
A usability study of five {two-factor} authentication methods
K Reese, T Smith, J Dutson, J Armknecht… - … Symposium on Usable …, 2019 - usenix.org
Two-factor authentication (2FA) defends against account compromise. An account secured
with 2FA typically requires an individual to authenticate using something they know …
with 2FA typically requires an individual to authenticate using something they know …
Beyond deterrence: An expanded view of employee computer abuse
R Willison, M Warkentin - MIS quarterly, 2013 - JSTOR
Recent academic investigations of computer security policy violations have largely focused
on non-malicious noncompliance due to poor training, low employee motivation, weak …
on non-malicious noncompliance due to poor training, low employee motivation, weak …
Moving from a 'human-as-problem” to a 'human-as-solution” cybersecurity mindset
V Zimmermann, K Renaud - International Journal of Human-Computer …, 2019 - Elsevier
Cybersecurity has gained prominence, with a number of widely publicised security incidents,
hacking attacks and data breaches reaching the news over the last few years. The …
hacking attacks and data breaches reaching the news over the last few years. The …