Personalized persuasion: Quantifying susceptibility to information exploitation in spear-phishing attacks

T Xu, K Singh, P Rajivan - Applied Ergonomics, 2023 - Elsevier
Many cyberattacks begin with a malicious email message, known as spear phishing,
targeted at unsuspecting victims. Although security technologies have improved significantly …

Determining psycholinguistic features of deception in phishing messages

T Xu, P Rajivan - Information & Computer Security, 2023 - emerald.com
Purpose Distinguishing phishing emails from legitimate emails continues to be a difficult task
for most individuals. This study aims to investigate the psycholinguistic factors associated …

Employee perspective on information security related human error in healthcare: Proactive use of IS-CHEC in questionnaire form

M Evans, Y He, C Luo, I Yevseyeva, H Janicke… - IEEE …, 2019 - ieeexplore.ieee.org
The objective of the research was to establish data relating to underlying causes of human
error which are the most common cause of information security incidents within a private …

Tips, Tricks, and Training: Supporting Anti-Phishing Awareness among Mid-Career Office Workers Based on Employees' Current Practices

AC Tally, J Abbott, AM Bochner, S Das… - Proceedings of the …, 2023 - dl.acm.org
Preventing workplace phishing depends on the actions of every employee, regardless of
cybersecurity expertise. Based on 24 semi-structured interviews with mid-career office …

Development of methodology for modeling the interaction of antagonistic agents in cybersecurity systems

OV Milov, A Voitko, I Husarova, O Domaskin… - 2019 - repository.hneu.edu.ua
Визначено основні концепції, що формують основу інтегрованого моделювання
поведінки антагоністичних агентів в системах кібербезпеки. Показано, що значною …

User-centered risk communication for safer browsing

S Das, J Abbott, S Gopavaram, J Blythe… - … Cryptography and Data …, 2020 - Springer
Solutions to phishing have included training users, stand-alone warnings, and automatic
blocking. We integrated personalized blocking, filtering, and alerts into a single holistic risk …

[图书][B] A risk-reduction-based incentivization model for human-centered multi-factor authentication

S Das - 2020 - search.proquest.com
Online user presence has increased rapidly over the last few years, broadening the user
base. With the rise in digital usage, we have also witnessed a rise in digital crimes, which …

Conducting malicious cybersecurity experiments on crowdsourcing platforms

A Aljohani, J Jones - Proceedings of the 2021 3rd International …, 2021 - dl.acm.org
Evaluating the effectiveness of defense technologies mandates the inclusion of a human
element, specifically if these technologies target human cognition and emotions. One of the …

Statistical and Signature Analysis Methods of Intrusion Detection

T Radivilova, L Kirichenko, AS Alghawli… - … Security Technologies in …, 2022 - Springer
Existing models and methods of intrusion detection are mostly aimed at detecting intensive
attacks, do not take into account the security of computer system resources and the …

Common α-Fuzzy Fixed Point Results for F-Contractions with Applications

J Ahmad, G Marino, SA Al-Mezel - Mathematics, 2021 - mdpi.com
F-contractions have inspired a branch of metric fixed point theory committed to the
generalization of the classical Banach contraction principle. The study of these contractions …