Phishing attacks survey: Types, vectors, and technical approaches

R Alabdan - Future internet, 2020 - mdpi.com
Phishing attacks, which have existed for several decades and continue to be a major
problem today, constitute a severe threat in the cyber world. Attackers are adopting multiple …

A comprehensive survey of phishing: Mediums, intended targets, attack and defence techniques and a novel taxonomy

R Goenka, M Chawla, N Tiwari - International Journal of Information …, 2024 - Springer
The recent surge in phishing incidents in the post-COVID era poses a serious threat towards
the social and economic well-being of users. The escalation in dependency upon the …

[PDF][PDF] Citizens' cybersecurity behavior: Some major challenges

Y Li, T Xin, M Siponen - IEEE Security & Privacy, 2022 - jyx.jyu.fi
Citizens' Cybersecurity Behavior: Some Major Challenges Page 1 This is a self-archived version of
an original article. This version may differ from the original in pagination and typographic details …

Misinformation and disinformation in the era of covid-19: The role of primary information sources and the development of attitudes toward vaccination

M Dupuis, K Chhor, N Ly - Proceedings of the 22nd Annual Conference …, 2021 - dl.acm.org
Misinformation is not new; however, the proliferation of social media has resulted in a much
broader reach and instantaneous impact. Results from such proliferation were seen during …

Scaring people is not enough: an examination of fear appeals within the context of promoting good password hygiene

M Dupuis, A Jennings, K Renaud - … of the 22nd Annual Conference on …, 2021 - dl.acm.org
Fear appeals have been used for thousands of years to scare people into engaging in a
specific behavior or omitting an existing one. From religion, public health campaigns …

[HTML][HTML] Cybersecurity insights gleaned from world religions

K Renaud, M Dupuis - Computers & Security, 2023 - Elsevier
Organisations craft and disseminate security policies, encoding the actions they want
employees to take to preserve and protect organisational information resources. They …

Design and evaluation of a self-paced cybersecurity tool

A Shojaifar, SA Fricker - Information & Computer Security, 2023 - emerald.com
Purpose This paper aims to present the evaluation of a self-paced tool, CyberSecurity
Coach (CYSEC), and discuss the adoption of CYSEC for cybersecurity capability …

When googling it doesn't work: The challenge of finding security advice for smart home devices

S Turner, J Nurse, S Li - Human Aspects of Information Security and …, 2021 - Springer
As users increasingly introduce Internet-connected devices into their homes, having access
to accurate and relevant cyber security information is a fundamental means of ensuring safe …

Fear might motivate secure password choices in the short term, but at what cost?

M Dupuis, K Renaud… - … Conference on System …, 2022 - strathprints.strath.ac.uk
Fear has been used to convince people to behave securely in a variety of cyber security
domains. In this study, we tested the use of fear appeals, with the threat appraisal and …

A dangerous infodemic: an examination of the impact social media misinformation has on COVID-19 vaccination status

L Crouse, M Dupuis - Proceedings of the 23rd Annual Conference on …, 2022 - dl.acm.org
The concept of misinformation is not new, but the digital age has created a new environment
for the rapid spreading of misinformation. The overabundance of information that is available …