Don't click: towards an effective anti-phishing training. A comparative literature review
Email is of critical importance as a communication channel for both business and personal
matters. Unfortunately, it is also often exploited for phishing attacks. To defend against such …
matters. Unfortunately, it is also often exploited for phishing attacks. To defend against such …
SoK: a comprehensive reexamination of phishing research from the security perspective
Phishing and spear phishing are typical examples of masquerade attacks since trust is built
up through impersonation for the attack to succeed. Given the prevalence of these attacks …
up through impersonation for the attack to succeed. Given the prevalence of these attacks …
[HTML][HTML] Exploring susceptibility to phishing in the workplace
EJ Williams, J Hinds, AN Joinson - International Journal of Human …, 2018 - Elsevier
Phishing emails provide a means to infiltrate the technical systems of organisations by
encouraging employees to click on malicious links or attachments. Despite the use of …
encouraging employees to click on malicious links or attachments. Despite the use of …
Effectiveness of privacy assurance mechanisms in users' privacy protection on social networking sites from the perspective of protection motivation theory
Along with recent advancement of web technologies, social networking sites (SNSs) affect
peoples lifestyles by enabling them to perform so many activities which were not easy to do …
peoples lifestyles by enabling them to perform so many activities which were not easy to do …
The psychology of internet fraud victimisation: A systematic review
G Norris, A Brookes, D Dowell - Journal of Police and Criminal Psychology, 2019 - Springer
Existing theories of fraud provide some insight into how criminals target and exploit people
in the online environment; whilst reference to psychological explanations is common, the …
in the online environment; whilst reference to psychological explanations is common, the …
Human cognition through the lens of social engineering cyberattacks
R Montañez, E Golob, S Xu - Frontiers in psychology, 2020 - frontiersin.org
Social engineering cyberattacks are a major threat because they often prelude sophisticated
and devastating cyberattacks. Social engineering cyberattacks are a kind of psychological …
and devastating cyberattacks. Social engineering cyberattacks are a kind of psychological …
Why people keep falling for phishing scams: The effects of time pressure and deception cues on the detection of phishing emails
Lack of personalisation and poor mechanics (eg, grammar, spelling and punctuation) are
commonly cited as cues of deception that people can use to identify phishing emails …
commonly cited as cues of deception that people can use to identify phishing emails …
Persuasion: How phishing emails can influence users and bypass security measures
A Ferreira, S Teles - International Journal of Human-Computer Studies, 2019 - Elsevier
Phishing is a very dangerous form of social engineering with the aim to deceive people into
disclosing private/confidential information. Despite widespread warnings and means to …
disclosing private/confidential information. Despite widespread warnings and means to …
Individual cyber security: Empowering employees to resist spear phishing to prevent identity theft and ransomware attacks
J Thomas - Thomas, JE (2018). Individual cyber security …, 2018 - papers.ssrn.com
One of the most difficult challenges in information security today is phishing. Phishing is a
difficult problem to address because there are many permutations, messages, and value …
difficult problem to address because there are many permutations, messages, and value …
Sixteen years of phishing user studies: What have we learned?
Several previous studies have investigated user susceptibility to phishing attacks. A
thorough meta-analysis or systematic review is required to gain a better understanding of …
thorough meta-analysis or systematic review is required to gain a better understanding of …