Don't click: towards an effective anti-phishing training. A comparative literature review

D Jampen, G Gür, T Sutter, B Tellenbach - Human-centric Computing and …, 2020 - Springer
Email is of critical importance as a communication channel for both business and personal
matters. Unfortunately, it is also often exploited for phishing attacks. To defend against such …

SoK: a comprehensive reexamination of phishing research from the security perspective

A Das, S Baki, A El Aassal, R Verma… - … Surveys & Tutorials, 2019 - ieeexplore.ieee.org
Phishing and spear phishing are typical examples of masquerade attacks since trust is built
up through impersonation for the attack to succeed. Given the prevalence of these attacks …

Correlating human traits and cyber security behavior intentions

M Gratian, S Bandi, M Cukier, J Dykstra, A Ginther - computers & security, 2018 - Elsevier
In this paper, we correlate human characteristics with cyber security behavior intentions.
While previous papers have identified correlations between certain human traits and specific …

[HTML][HTML] Exploring susceptibility to phishing in the workplace

EJ Williams, J Hinds, AN Joinson - International Journal of Human …, 2018 - Elsevier
Phishing emails provide a means to infiltrate the technical systems of organisations by
encouraging employees to click on malicious links or attachments. Despite the use of …

Eyes wide open: The role of situational information security awareness for security‐related behaviour

L Jaeger, A Eckhardt - Information Systems Journal, 2021 - Wiley Online Library
Most contemporary studies on information security focus on largely static phenomena in
examining security‐related behaviours. We take a more dynamic, situational and …

Susceptibility to phishing on social network sites: A personality information processing model

ED Frauenstein, S Flowerday - Computers & security, 2020 - Elsevier
Today, the traditional approach used to conduct phishing attacks through email and spoofed
websites has evolved to include social network sites (SNSs). This is because phishers are …

Shaping intention to resist social engineering through transformational leadership, information security culture and awareness

WR Flores, M Ekstedt - Computers & security, 2016 - Elsevier
This paper empirically investigates how organizational and individual factors complement
each other in shaping employees' intention to resist social engineering. The study followed a …

Human cognition through the lens of social engineering cyberattacks

R Montañez, E Golob, S Xu - Frontiers in psychology, 2020 - frontiersin.org
Social engineering cyberattacks are a major threat because they often prelude sophisticated
and devastating cyberattacks. Social engineering cyberattacks are a kind of psychological …

Predicting susceptibility to social influence in phishing emails

K Parsons, M Butavicius, P Delfabbro, M Lillie - International Journal of …, 2019 - Elsevier
To reduce the threat caused by phishing attacks, it is vital to investigate why some phishing
attacks are successful, and why some people are more susceptible to them than others. To …

Overconfidence in phishing email detection

J Wang, Y Li, HR Rao - Journal of the Association for Information …, 2016 - aisel.aisnet.org
This study examines overconfidence in phishing email detection. Researchers believe that
overconfidence (ie, where one's judgmental confidence exceeds one's actual performance …