Cognition in social engineering empirical research: a systematic literature review
The interdisciplinarity of the Social Engineering (SE) domain creates crucial challenges for
the development and advancement of empirical SE research, making it particularly difficult to …
the development and advancement of empirical SE research, making it particularly difficult to …
An investigation of phishing awareness and education over time: When and how to best remind users
Security awareness and education programmes are rolled out in more and more
organisations. However, their effectiveness over time and, correspondingly, appropriate …
organisations. However, their effectiveness over time and, correspondingly, appropriate …
Ethical guidelines for nudging in information security & privacy
K Renaud, V Zimmermann - International Journal of Human-Computer …, 2018 - Elsevier
There has recently been an upsurge of interest in the deployment of behavioural economics
techniques in the information security and privacy domain. In this paper, we consider the …
techniques in the information security and privacy domain. In this paper, we consider the …
[HTML][HTML] Taking 5 minutes protects you for 5 months: Evaluating an anti-phishing awareness video
Phishing is one of the biggest security threats to organizations. Anti-phishing awareness
measures can improve phishing email detection rates. These measures need to be efficient …
measures can improve phishing email detection rates. These measures need to be efficient …
Measuring identity confusion with uniform resource locators
Uniform Resource Locators (URLs) unambiguously specify host identity on the web. URLs
are syntactically complex, and although software can accurately parse identity from URLs …
are syntactically complex, and although software can accurately parse identity from URLs …
Restricting the Link: Effects of Focused Attention and Time Delay on Phishing Warning Effectiveness
Phishing warning researchers have proposed two forms of hyperlink restrictions for reducing
phishing click-through rates: focused attention, which prevents users from proceeding to a …
phishing click-through rates: focused attention, which prevents users from proceeding to a …
Developing and evaluating a five minute phishing awareness video
Confidence tricksters have always defrauded the unwary. The computer era has merely
extended their range and made it possible for them to target anyone in the world who has an …
extended their range and made it possible for them to target anyone in the world who has an …
[PDF][PDF] Exploring Phishing Threats through QR Codes in Naturalistic Settings
QR codes, designed for convenient access to links, have recently been appropriated as
phishing attack vectors. As this type of phishing is relatively and many aspects of the threat …
phishing attack vectors. As this type of phishing is relatively and many aspects of the threat …
Influence of URL Formatting on Users' Phishing URL Detection
Despite technical advances in anti-phishing protection, in many cases the detection of
phishing URLs largely depends on users manually inspecting the links found in suspicious …
phishing URLs largely depends on users manually inspecting the links found in suspicious …
Literature Review: Misconceptions About Phishing
M Mossano, M Volkamer - International Symposium on Human Aspects of …, 2025 - Springer
Phishing is a danger to both private users and businesses. Industry and academia have
proposed several approaches to deal with this threat, many of which developed with a …
proposed several approaches to deal with this threat, many of which developed with a …