Societal aspects of phishing

JW Ragucci, SA Robila - 2006 IEEE International Symposium …, 2006 - ieeexplore.ieee.org
… to phishing. First, we investigate the concept of contextaware attacks where the phishing
message is … Second, we investigate the effect phishing has on legitimate businesses and the …

The dark side of social networking sites: Understanding phishing risks

M Silic, A Back - Computers in Human Behavior, 2016 - Elsevier
phishing phenomenon for security and privacy reasons. We believe that the business context
is an important aspect … factor (ie employees) and the phishing attacks, which may lead to a …

Contributing factors to increased susceptibility to social media phishing attacks

HJ Parker, SV Flowerday - South African Journal of Information …, 2020 - scielo.org.za
… more susceptible to phishing attacks. The … phishing attacks on social media. CONCLUSION:
This article concludes that certain people are more susceptible to phishing attacks on social

An analysis of social engineering principles in effective phishing

A Ferreira, G Lenzini - … Workshop on Socio-Technical Aspects …, 2015 - ieeexplore.ieee.org
… persuasion, scams and social engineering. This paper … phishing, and manually quantifies
them within a phishing email sample. Most elements recognised as more effective in phishing

Principles of persuasion in social engineering and their use in phishing

A Ferreira, L Coventry, G Lenzini - Human Aspects of Information Security …, 2015 - Springer
… Then, we analyse various phishing emails and show that our principles are used therein in
specific combinations. Our analysis of phishing is based on peer review and further research …

Cybercrime and social ties: Phishing in Amsterdam

ER Leukfeldt - Trends in organized crime, 2014 - Springer
… study of phishing in Amsterdam, demonstrating that the current literature on criminal phishing
… group of phishers whose relationships are based on real-world social networks rather than …

The persuasive phish: Examining the social psychological principles hidden in phishing emails

O Zielinska, A Welk, CB Mayhorn… - Proceedings of the …, 2016 - dl.acm.org
Phishing is a social engineering tactic used to trick people into revealing … As phishing emails
continue to infiltrate users’ mailboxes, what social engineering techniques are the phishers

Phishing happens beyond technology: The effects of human behaviors and demographics on each step of a phishing process

H Abroshan, J Devos, G Poels, E Laermans - IEEE Access, 2021 - ieeexplore.ieee.org
Phishing, which is a social engineering attack, is like other scams. Phishers use technical,
social… of falling into phishing traps and becoming the victim of a phishing attack, while the level …

Susceptibility to phishing on social network sites: A personality information processing model

ED Frauenstein, S Flowerday - Computers & security, 2020 - Elsevier
… Today, the traditional approach used to conduct phishing attacks through email … social
network sites (SNSs). This is because phishers are able to use similar methods to entice social

The influences of social networks on phishing vulnerability

K Coronges, R Dodge, C Mukina… - 2012 45th Hawaii …, 2012 - ieeexplore.ieee.org
… Additionally, phishing attacks have become very sophisticated and even more … of a phishing
attack, this paper applies the foundations of social network analysis to identify how social