Cognition in social engineering empirical research: a systematic literature review

P Burda, L Allodi, N Zannone - ACM Transactions on Computer-Human …, 2024 - dl.acm.org
The interdisciplinarity of the Social Engineering (SE) domain creates crucial challenges for
the development and advancement of empirical SE research, making it particularly difficult to …

An investigation of phishing awareness and education over time: When and how to best remind users

B Reinheimer, L Aldag, P Mayer, M Mossano… - … Symposium on Usable …, 2020 - usenix.org
Security awareness and education programmes are rolled out in more and more
organisations. However, their effectiveness over time and, correspondingly, appropriate …

Ethical guidelines for nudging in information security & privacy

K Renaud, V Zimmermann - International Journal of Human-Computer …, 2018 - Elsevier
There has recently been an upsurge of interest in the deployment of behavioural economics
techniques in the information security and privacy domain. In this paper, we consider the …

[HTML][HTML] Taking 5 minutes protects you for 5 months: Evaluating an anti-phishing awareness video

BM Berens, M Mossano, M Volkamer - Computers & Security, 2024 - Elsevier
Phishing is one of the biggest security threats to organizations. Anti-phishing awareness
measures can improve phishing email detection rates. These measures need to be efficient …

Measuring identity confusion with uniform resource locators

J Reynolds, D Kumar, Z Ma, R Subramanian… - Proceedings of the …, 2020 - dl.acm.org
Uniform Resource Locators (URLs) unambiguously specify host identity on the web. URLs
are syntactically complex, and although software can accurately parse identity from URLs …

Restricting the Link: Effects of Focused Attention and Time Delay on Phishing Warning Effectiveness

J Petelka, B Berens, C Sugatan, M Volkamer… - 2025 IEEE Symposium …, 2024 - computer.org
Phishing warning researchers have proposed two forms of hyperlink restrictions for reducing
phishing click-through rates: focused attention, which prevents users from proceeding to a …

Developing and evaluating a five minute phishing awareness video

M Volkamer, K Renaud, B Reinheimer, P Rack… - Trust, Privacy and …, 2018 - Springer
Confidence tricksters have always defrauded the unwary. The computer era has merely
extended their range and made it possible for them to target anyone in the world who has an …

[PDF][PDF] Exploring Phishing Threats through QR Codes in Naturalistic Settings

F Sharevski, M Mossano, MF Veit… - … on Usable Security …, 2024 - ndss-symposium.org
QR codes, designed for convenient access to links, have recently been appropriated as
phishing attack vectors. As this type of phishing is relatively and many aspects of the threat …

Influence of URL Formatting on Users' Phishing URL Detection

M Mossano, O Kulyk, BM Berens, EM Häußler… - Proceedings of the …, 2023 - dl.acm.org
Despite technical advances in anti-phishing protection, in many cases the detection of
phishing URLs largely depends on users manually inspecting the links found in suspicious …

Literature Review: Misconceptions About Phishing

M Mossano, M Volkamer - International Symposium on Human Aspects of …, 2025 - Springer
Phishing is a danger to both private users and businesses. Industry and academia have
proposed several approaches to deal with this threat, many of which developed with a …