Personalized persuasion: Quantifying susceptibility to information exploitation in spear-phishing attacks
Many cyberattacks begin with a malicious email message, known as spear phishing,
targeted at unsuspecting victims. Although security technologies have improved significantly …
targeted at unsuspecting victims. Although security technologies have improved significantly …
Determining psycholinguistic features of deception in phishing messages
Purpose Distinguishing phishing emails from legitimate emails continues to be a difficult task
for most individuals. This study aims to investigate the psycholinguistic factors associated …
for most individuals. This study aims to investigate the psycholinguistic factors associated …
Employee perspective on information security related human error in healthcare: Proactive use of IS-CHEC in questionnaire form
The objective of the research was to establish data relating to underlying causes of human
error which are the most common cause of information security incidents within a private …
error which are the most common cause of information security incidents within a private …
Tips, tricks, and training: Supporting anti-phishing awareness among mid-career office workers based on employees' current practices
Preventing workplace phishing depends on the actions of every employee, regardless of
cybersecurity expertise. Based on 24 semi-structured interviews with mid-career office …
cybersecurity expertise. Based on 24 semi-structured interviews with mid-career office …
User-centered risk communication for safer browsing
Solutions to phishing have included training users, stand-alone warnings, and automatic
blocking. We integrated personalized blocking, filtering, and alerts into a single holistic risk …
blocking. We integrated personalized blocking, filtering, and alerts into a single holistic risk …
Development of methodology for modeling the interaction of antagonistic agents in cybersecurity systems
Визначено основні концепції, що формують основу інтегрованого моделювання
поведінки антагоністичних агентів в системах кібербезпеки. Показано, що значною …
поведінки антагоністичних агентів в системах кібербезпеки. Показано, що значною …
[图书][B] A risk-reduction-based incentivization model for human-centered multi-factor authentication
S Das - 2020 - search.proquest.com
Online user presence has increased rapidly over the last few years, broadening the user
base. With the rise in digital usage, we have also witnessed a rise in digital crimes, which …
base. With the rise in digital usage, we have also witnessed a rise in digital crimes, which …
Gamifying cybersecurity knowledge to promote good cybersecurity behaviour
Cybersecurity is a major issue in contemporary times as security breaches are prevalent in
organizations due to cyberattacks. The bulk of these attacks is caused by human errors as …
organizations due to cyberattacks. The bulk of these attacks is caused by human errors as …
That's not a Good Idea: A Robot Changes Your Behavior Against Social Engineering
Dangers in modern human society are commonly attributed to the safety of online activities.
In the domain of cybersecurity, Social Engineering (SE) relates to how attackers manipulate …
In the domain of cybersecurity, Social Engineering (SE) relates to how attackers manipulate …
Cybersecurity Knowledge Deterioration and the role of Gamification Intervention
F Fatokun, Z Awang, S Hamid… - Journal of Advanced …, 2025 - semarakilmu.com.my
Cybersecurity is becoming an overly critical issue in contemporary times. Cyberspace safety
is declining, and this covers all categories of persons, businesses, institutions, and even the …
is declining, and this covers all categories of persons, businesses, institutions, and even the …