[HTML][HTML] A Multi-vocal Literature Review on challenges and critical success factors of phishing education, training and awareness

O Sarker, A Jayatilaka, S Haggag, C Liu… - Journal of Systems and …, 2024 - Elsevier
Background: Phishing is a malicious attempt by cyber attackers to steal personal information
through deception. Phishing attacks are often aided by carefully crafted phishing emails …

A qualitative systematic review of trust in technology

S Schuetz, L Kuai, MC Lacity… - Journal of Information …, 2024 - journals.sagepub.com
Although many information systems (IS) scholars have researched the antecedents and
consequences of trust in technology, the sheer amount of work published, authors' use of …

“My Name is Alexa. What's Your Name?” The Impact of Reciprocal Self-Disclosure on Post-Interaction Trust in Conversational Agents

K Saffarizadeh, M Keil, M Boodraj… - Journal of the …, 2024 - aisel.aisnet.org
The use of conversational AI agents (CAs), such as Alexa and Siri, has steadily increased
over the past several years. However, the functionality of these agents relies on the personal …

On the interdependence of reliance behavior and accuracy in AI-assisted decision-making

J Schoeffer, J Jakubik, M Voessing… - HHAI 2023 …, 2023 - ebooks.iospress.nl
In AI-assisted decision-making, a central promise of putting a human in the loop is that they
should be able to complement the AI system by adhering to its correct and overriding its …

[HTML][HTML] Effects of Visual Risk Indicators on Phishing Detection Behavior: An Eye-Tracking Experiment

D Baltuttis, T Teubner - Computers & Security, 2024 - Elsevier
Cybersecurity vulnerability ranks among the foremost global business risks. Phishing
attempts, in particular through email, persistently challenge organizations despite …

[HTML][HTML] To trust or not to trust: a qualitative study of older adults' online communication during the COVID-19 pandemic

X Cheng, L Qiao, B Yang, R Han - Electronic Commerce Research, 2023 - Springer
Online communication is an effective solution to the social isolation of older adults that can
result from attempts to avoid COVID-19 transmission, but they may not be familiar with virtual …

On the Interplay of Transparency and Fairness in AI-Informed Decision-Making

J Schöffer - 2023 - publikationen.bibliothek.kit.edu
Using artificial intelligence (AI) systems for informing high-stakes decisions has become
increasingly pervasive in a variety of domains, including but not limited to hiring, lending, or …

Tekoälymallien hyödyntäminen kalasteluhuijaussivustojen tunnistamisen työkaluissa

A Kettunen - 2024 - jyx.jyu.fi
Kalasteluhuijaukset ovat yksi nykyajan vaarallisimmista kyberrikollisuuden muodoista.
Kalasteluhuijaus on matalan kynnyksen kyberhyökkäys, jolla kohteelta voidaan huijata …

An Analysis of Phishing Susceptibility Through the Lens of Protection Motivation Theory

R Rudi - 2023 - uia.brage.unit.no
Users of communication tools are vulnerable to a cyberattack called phishing which aims to
trick a recipient into giving away information or access that the attacker should not have …

User-Centric Design, Implementation and Evaluation Support for Phishing Interventions

O Sarker - 2023 - digital.library.adelaide.edu.au
Phishing education, training, and awareness interventions are crucial to safeguarding
organizations against malicious phishing attacks. However, the effectiveness of phishing …