Human factors in phishing attacks: a systematic literature review

G Desolda, LS Ferro, A Marrella, T Catarci… - ACM Computing …, 2021 - dl.acm.org
Phishing is the fraudulent attempt to obtain sensitive information by disguising oneself as a
trustworthy entity in digital communication. It is a type of cyber attack often successful …

[HTML][HTML] Don't click: towards an effective anti-phishing training. A comparative literature review

D Jampen, G Gür, T Sutter, B Tellenbach - Human-centric Computing and …, 2020 - Springer
Email is of critical importance as a communication channel for both business and personal
matters. Unfortunately, it is also often exploited for phishing attacks. To defend against such …

(Un) informed consent: Studying GDPR consent notices in the field

C Utz, M Degeling, S Fahl, F Schaub… - Proceedings of the 2019 …, 2019 - dl.acm.org
Since the adoption of the General Data Protection Regulation (GDPR) in May 2018 more
than 60% of popular websites in Europe display cookie consent notices to their visitors. This …

User perceptions of smart home IoT privacy

S Zheng, N Apthorpe, M Chetty… - Proceedings of the ACM on …, 2018 - dl.acm.org
Smart home Internet of Things (IoT) devices are rapidly increasing in popularity, with more
households including Internet-connected devices that continuously monitor user activities. In …

A survey of phishing attack techniques, defence mechanisms and open research challenges

AK Jain, BB Gupta - Enterprise Information Systems, 2022 - Taylor & Francis
Phishing is an identity theft, which deceives Internet users into revealing their sensitive data,
eg, login information, credit/debit card details, and so on. Researchers have developed …

[图书][B] Re-engineering humanity

B Frischmann, E Selinger - 2019 - books.google.com
Every day, new warnings emerge about artificial intelligence rebelling against us. All the
while, a more immediate dilemma flies under the radar. Have forces been unleashed that …

Phishing in organizations: Findings from a large-scale and long-term study

D Lain, K Kostiainen, S Čapkun - 2022 IEEE Symposium on …, 2022 - ieeexplore.ieee.org
In this paper, we present findings from a largescale and long-term phishing experiment that
we conducted in collaboration with a partner company. Our experiment ran for 15 months …

Phishing environments, techniques, and countermeasures: A survey

A Aleroud, L Zhou - Computers & Security, 2017 - Elsevier
Phishing has become an increasing threat in online space, largely driven by the evolving
web, mobile, and social networking technologies. Previous phishing taxonomies have …

Android permissions: User attention, comprehension, and behavior

AP Felt, E Ha, S Egelman, A Haney, E Chin… - Proceedings of the …, 2012 - dl.acm.org
Android's permission system is intended to inform users about the risks of installing
applications. When a user installs an application, he or she has the opportunity to review the …

Phishing detection: a literature survey

M Khonji, Y Iraqi, A Jones - IEEE Communications Surveys & …, 2013 - ieeexplore.ieee.org
This article surveys the literature on the detection of phishing attacks. Phishing attacks target
vulnerabilities that exist in systems due to the human factor. Many cyber attacks are spread …