Personalized persuasion: Quantifying susceptibility to information exploitation in spear-phishing attacks

T Xu, K Singh, P Rajivan - Applied Ergonomics, 2023 - Elsevier
Many cyberattacks begin with a malicious email message, known as spear phishing,
targeted at unsuspecting victims. Although security technologies have improved significantly …

Determining psycholinguistic features of deception in phishing messages

T Xu, P Rajivan - Information & Computer Security, 2023 - emerald.com
Purpose Distinguishing phishing emails from legitimate emails continues to be a difficult task
for most individuals. This study aims to investigate the psycholinguistic factors associated …

Employee perspective on information security related human error in healthcare: Proactive use of IS-CHEC in questionnaire form

M Evans, Y He, C Luo, I Yevseyeva, H Janicke… - IEEE …, 2019 - ieeexplore.ieee.org
The objective of the research was to establish data relating to underlying causes of human
error which are the most common cause of information security incidents within a private …

Tips, tricks, and training: Supporting anti-phishing awareness among mid-career office workers based on employees' current practices

AC Tally, J Abbott, AM Bochner, S Das… - Proceedings of the …, 2023 - dl.acm.org
Preventing workplace phishing depends on the actions of every employee, regardless of
cybersecurity expertise. Based on 24 semi-structured interviews with mid-career office …

User-centered risk communication for safer browsing

S Das, J Abbott, S Gopavaram, J Blythe… - … Cryptography and Data …, 2020 - Springer
Solutions to phishing have included training users, stand-alone warnings, and automatic
blocking. We integrated personalized blocking, filtering, and alerts into a single holistic risk …

Development of methodology for modeling the interaction of antagonistic agents in cybersecurity systems

OV Milov, A Voitko, I Husarova, O Domaskin… - 2019 - repository.hneu.edu.ua
Визначено основні концепції, що формують основу інтегрованого моделювання
поведінки антагоністичних агентів в системах кібербезпеки. Показано, що значною …

[图书][B] A risk-reduction-based incentivization model for human-centered multi-factor authentication

S Das - 2020 - search.proquest.com
Online user presence has increased rapidly over the last few years, broadening the user
base. With the rise in digital usage, we have also witnessed a rise in digital crimes, which …

Gamifying cybersecurity knowledge to promote good cybersecurity behaviour

FB Fatokun, ZA Long, S Hamid, JO Fatokun… - Journal of Computing …, 2022 - jtec.org.my
Cybersecurity is a major issue in contemporary times as security breaches are prevalent in
organizations due to cyberattacks. The bulk of these attacks is caused by human errors as …

That's not a Good Idea: A Robot Changes Your Behavior Against Social Engineering

D Pasquali, A Kothig, AM Aroyo… - Proceedings of the 11th …, 2023 - dl.acm.org
Dangers in modern human society are commonly attributed to the safety of online activities.
In the domain of cybersecurity, Social Engineering (SE) relates to how attackers manipulate …

Cybersecurity Knowledge Deterioration and the role of Gamification Intervention

F Fatokun, Z Awang, S Hamid… - Journal of Advanced …, 2025 - semarakilmu.com.my
Cybersecurity is becoming an overly critical issue in contemporary times. Cyberspace safety
is declining, and this covers all categories of persons, businesses, institutions, and even the …