Don't click: towards an effective anti-phishing training. A comparative literature review

D Jampen, G Gür, T Sutter, B Tellenbach - Human-centric Computing and …, 2020 - Springer
Email is of critical importance as a communication channel for both business and personal
matters. Unfortunately, it is also often exploited for phishing attacks. To defend against such …

SoK: a comprehensive reexamination of phishing research from the security perspective

A Das, S Baki, A El Aassal, R Verma… - … Surveys & Tutorials, 2019 - ieeexplore.ieee.org
Phishing and spear phishing are typical examples of masquerade attacks since trust is built
up through impersonation for the attack to succeed. Given the prevalence of these attacks …

[HTML][HTML] Exploring susceptibility to phishing in the workplace

EJ Williams, J Hinds, AN Joinson - International Journal of Human …, 2018 - Elsevier
Phishing emails provide a means to infiltrate the technical systems of organisations by
encouraging employees to click on malicious links or attachments. Despite the use of …

Effectiveness of privacy assurance mechanisms in users' privacy protection on social networking sites from the perspective of protection motivation theory

R Mousavi, R Chen, DJ Kim, K Chen - Decision Support Systems, 2020 - Elsevier
Along with recent advancement of web technologies, social networking sites (SNSs) affect
peoples lifestyles by enabling them to perform so many activities which were not easy to do …

The psychology of internet fraud victimisation: A systematic review

G Norris, A Brookes, D Dowell - Journal of Police and Criminal Psychology, 2019 - Springer
Existing theories of fraud provide some insight into how criminals target and exploit people
in the online environment; whilst reference to psychological explanations is common, the …

Human cognition through the lens of social engineering cyberattacks

R Montañez, E Golob, S Xu - Frontiers in psychology, 2020 - frontiersin.org
Social engineering cyberattacks are a major threat because they often prelude sophisticated
and devastating cyberattacks. Social engineering cyberattacks are a kind of psychological …

Why people keep falling for phishing scams: The effects of time pressure and deception cues on the detection of phishing emails

M Butavicius, R Taib, SJ Han - Computers & Security, 2022 - Elsevier
Lack of personalisation and poor mechanics (eg, grammar, spelling and punctuation) are
commonly cited as cues of deception that people can use to identify phishing emails …

Persuasion: How phishing emails can influence users and bypass security measures

A Ferreira, S Teles - International Journal of Human-Computer Studies, 2019 - Elsevier
Phishing is a very dangerous form of social engineering with the aim to deceive people into
disclosing private/confidential information. Despite widespread warnings and means to …

Individual cyber security: Empowering employees to resist spear phishing to prevent identity theft and ransomware attacks

J Thomas - Thomas, JE (2018). Individual cyber security …, 2018 - papers.ssrn.com
One of the most difficult challenges in information security today is phishing. Phishing is a
difficult problem to address because there are many permutations, messages, and value …

Sixteen years of phishing user studies: What have we learned?

S Baki, RM Verma - IEEE Transactions on Dependable and …, 2022 - ieeexplore.ieee.org
Several previous studies have investigated user susceptibility to phishing attacks. A
thorough meta-analysis or systematic review is required to gain a better understanding of …