SoK: a comprehensive reexamination of phishing research from the security perspective

A Das, S Baki, A El Aassal, R Verma… - … Surveys & Tutorials, 2019 - ieeexplore.ieee.org
Phishing and spear phishing are typical examples of masquerade attacks since trust is built
up through impersonation for the attack to succeed. Given the prevalence of these attacks …

Cognition in social engineering empirical research: a systematic literature review

P Burda, L Allodi, N Zannone - ACM Transactions on Computer-Human …, 2024 - dl.acm.org
The interdisciplinarity of the Social Engineering (SE) domain creates crucial challenges for
the development and advancement of empirical SE research, making it particularly difficult to …

Understanding phishing email processing and perceived trustworthiness through eye tracking

J McAlaney, PJ Hills - Frontiers in Psychology, 2020 - frontiersin.org
Social engineering attacks in the form of phishing emails represent one of the biggest risks
to cybersecurity. There is a lack of research on how the common elements of phishing …

Advert: an adaptive and data-driven attention enhancement mechanism for phishing prevention

L Huang, S Jia, E Balcetis, Q Zhu - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
Attacks exploiting the innate and the acquired vulnerabilities of human users have posed
severe threats to cybersecurity. This work proposes ADVERT, a human-technical solution …

An empirical approach to phishing countermeasures through smart glasses and validation agents

JD Ndibwile, ET Luhanga, D Fall, D Miyamoto… - IEEE …, 2019 - ieeexplore.ieee.org
Phishing attacks have been persistent for more than two decades despite mitigation efforts
from academia and industry. We believe that users fall victim to attacks not only because of …

A systematic review and research challenges on phishing cyberattacks from an electroencephalography and gaze-based perspective

GA Thomopoulos, DP Lyras, CA Fidas - Personal and Ubiquitous …, 2024 - Springer
Phishing is one of the most important security threats in modern information systems causing
different levels of damages to end-users and service providers such as financial and …

Simulating human detection of phishing websites: An investigation into the applicability of the ACT-R cognitive behaviour architecture model

N Williams, S Li - 2017 3rd IEEE international conference on …, 2017 - ieeexplore.ieee.org
The prevalence and effectiveness of phishing attacks, despite the presence of a vast array of
technical defences, are due largely to the fact that attackers are ruthlessly targeting what is …

When eye-tracking meets cognitive modeling: applications to cyber security systems

H Yuan, S Li, P Rusconi, N Aljaffan - … Conference, HAS 2017, Held as Part …, 2017 - Springer
Human cognitive modeling techniques and related software tools have been widely used by
researchers and practitioners to evaluate the effectiveness of user interface (UI) designs and …

[PDF][PDF] Eye-tracking in Association with Phishing Cyber Attacks: A Comprehensive Literature Review

N Hussein - learning, 2023 - researchgate.net
As of 2021, it has been reported that around 90% of data breaches occur on account of
phishing, while about 83% of organizations experienced phishing attacks [1]. Phishing can …

[HTML][HTML] StudySandboxx: a tool for scraping, sandboxing, preserving, and preparing interactive Web sites for use in human-computer interaction and behavioral …

G Wethor, ML Hale - Journal of …, 2022 - openresearchsoftware.metajnl.com
Human-computer interaction and computer-mediated behavioral psychology research
studies often rely on capturing user interaction data to characterize online behaviors. IRB …