A taxonomy of attacks and a survey of defence mechanisms for semantic social engineering attacks

R Heartfield, G Loukas - ACM Computing Surveys (CSUR), 2015 - dl.acm.org
Social engineering is used as an umbrella term for a broad spectrum of computer
exploitations that employ a variety of attack vectors and strategies to psychologically …

The role of user behaviour in improving cyber security management

AA Moustafa, A Bello, A Maurushat - Frontiers in Psychology, 2021 - frontiersin.org
Information security has for long time been a field of study in computer science, software
engineering, and information communications technology. The term 'information security'has …

A design space for effective privacy notices

F Schaub, R Balebako, AL Durity… - Eleventh symposium on …, 2015 - usenix.org
Notifying users about a system's data practices is supposed to enable users to make
informed privacy decisions. Yet, current notice and choice mechanisms, such as privacy …

Training to mitigate phishing attacks using mindfulness techniques

ML Jensen, M Dinger, RT Wright… - Journal of Management …, 2017 - Taylor & Francis
Phishing attacks are at a record high and are causing billions of dollars in losses. To
mitigate phishing's impact, organizations often use rule-based training to teach individuals to …

The role of uncertainty, awareness, and trust in visual analytics

D Sacha, H Senaratne, BC Kwon… - IEEE transactions on …, 2015 - ieeexplore.ieee.org
Visual analytics supports humans in generating knowledge from large and often complex
datasets. Evidence is collected, collated and cross-linked with our existing knowledge. In the …

SoK: secure messaging

N Unger, S Dechand, J Bonneau, S Fahl… - … IEEE Symposium on …, 2015 - ieeexplore.ieee.org
Motivated by recent revelations of widespread state surveillance of personal communication,
many solutions now claim to offer secure and private messaging. This includes both a large …

An experience sampling study of user reactions to browser warnings in the field

RW Reeder, AP Felt, S Consolvo, N Malkin… - Proceedings of the …, 2018 - dl.acm.org
Web browser warnings should help protect people from malware, phishing, and network
attacks. Adhering to warnings keeps people safer online. Recent improvements in warning …

A systematic literature review of empirical methods and risk representation in usable privacy and security research

V Distler, M Fassl, H Habib, K Krombholz… - ACM Transactions on …, 2021 - dl.acm.org
Usable privacy and security researchers have developed a variety of approaches to
represent risk to research participants. To understand how these approaches are used and …

More harm than good? How messages that interrupt can make us vulnerable

JL Jenkins, BB Anderson, A Vance… - Information Systems …, 2016 - pubsonline.informs.org
System-generated alerts are ubiquitous in personal computing and, with the proliferation of
mobile devices, daily activity. While these interruptions provide timely information, research …

Put your warning where your link is: Improving and evaluating email phishing warnings

J Petelka, Y Zou, F Schaub - Proceedings of the 2019 CHI conference on …, 2019 - dl.acm.org
Phishing emails often disguise a link's actual URL. Thus, common anti-phishing advice is to
check a link's URL before clicking, but email clients do not support this well. Automated …