[HTML][HTML] A systematic review of current cybersecurity training methods

J Prümmer, T van Steen, B van den Berg - Computers & Security, 2024 - Elsevier
Cybersecurity continues to be a growing issue, with cyberattacks causing financial losses
and loss of productivity and reputation. Especially in an organisational setting, end-user …

Anti-phishing: A comprehensive perspective

G Varshney, R Kumawat, V Varadharajan… - Expert Systems with …, 2024 - Elsevier
Phishing is a form of deception technique that attackers often use to acquire sensitive
information related to individuals and organizations fraudulently. Although Phishing attacks …

Protective factors for developing cognitive skills against cyberattacks

M Cazares, W Fuertes, R Andrade, I Ortiz-Garcés… - Electronics, 2023 - mdpi.com
Cyberattacks capitalize on human behaviors. The prevalence of cyberattacks surged during
the COVID-19 pandemic, fueled by the increased interconnectivity of individuals on online …

An overview of phishing victimization: Human factors, training and the role of emotions

M Jari - arXiv preprint arXiv:2209.11197, 2022 - arxiv.org
Phishing is a form of cybercrime and a threat that allows criminals, phishers, to deceive end
users in order to steal their confidential and sensitive information. Attackers usually attempt …

Impact analysis and performance model of social engineering techniques

ŞA Duman, R Hayran… - 2023 11th International …, 2023 - ieeexplore.ieee.org
The field of information security is rapidly growing discipline. Although the effectiveness of
security measures to protect sensitive information is increasing, the human factor that are …

A review of organization-oriented phishing research

K Althobaiti, N Alsufyani - PeerJ Computer Science, 2024 - peerj.com
The increased sophistication and frequency of phishing attacks that target organizations
necessitate a comprehensive cyber security strategy to handle phishing attacks from several …

SpearBot: Leveraging Large Language Models in a Generative-Critique Framework for Spear-Phishing Email Generation

Q Qi, Y Luo, Y Xu, W Guo, Y Fang - arXiv preprint arXiv:2412.11109, 2024 - arxiv.org
Large Language Models (LLMs) are increasingly capable, aiding in tasks such as content
generation, yet they also pose risks, particularly in generating harmful spear-phishing …

[PDF][PDF] A comprehensive survey on social engineering-based attacks on social networks

A Naz, M Sarwar, M Kaleem, MA Mushtaq, S Rashid - 2024 - researchgate.net
Threats based on social engineering in social networks are becoming a more common
problem. Social engineering is a type of attack that relies on trickery and exploiting human …

Vulnerability to online fraud-A mixed-method study of human factors, user perceptions and strategies

E Rieber - 2024 - ntnuopen.ntnu.no
This thesis explores the human factors influencing susceptibility to online fraud, with a focus
on online fraud attacks within the Norwegian context. Online fraud remains a significant …

[图书][B] A Qualitative Study of Self-Determination Theory in Cybersecurity Using Autonomy Framing

PM Romero-Masters - 2023 - search.proquest.com
Organizations consider cybersecurity important to prevent costly cybersecurity breaches.
Using cybersecurity awareness training organizations motivate their users to engage in …