Phishing happens beyond technology: The effects of human behaviors and demographics on each step of a phishing process

H Abroshan, J Devos, G Poels, E Laermans - IEEE Access, 2021 - ieeexplore.ieee.org
Prior studies have shown that the behaviours and attitudes of Internet users influence the
likelihood of being victimised by phishing attacks. Many scammers design a step-by-step …

You are probably not the weakest link: Towards practical prediction of susceptibility to semantic social engineering attacks

R Heartfield, G Loukas, D Gan - IEEE Access, 2016 - ieeexplore.ieee.org
Semantic social engineering attacks are a pervasive threat to computer and communication
systems. By employing deception rather than by exploiting technical vulnerabilities, spear …

A meta-analysis of field experiments on phishing susceptibility

T Sommestad, H Karlzén - 2019 APWG symposium on …, 2019 - ieeexplore.ieee.org
Phishing is a serious threat to any organization allowing their employees to use messaging
systems and computers connected to the internet. Consequently, researchers have …

Two methodologies for physical penetration testing using social engineering

T Dimkov, A Van Cleeff, W Pieters… - Proceedings of the 26th …, 2010 - dl.acm.org
Penetration tests on IT systems are sometimes coupled with physical penetration tests and
social engineering. In physical penetration tests where social engineering is allowed, the …

An empirical investigation of the factors that influence Internet user's ability to correctly identify a phishing website

S Purkait, S Kumar De, D Suar - Information Management & Computer …, 2014 - emerald.com
Purpose–The aim of this study is to report on the results of an empirical investigation of the
various factors which have significant impacts on the Internet user's ability to correctly …

Cyber-crime science= crime science+ information security

PH Hartel, M Junger, RJ Wieringa - 2010 - research.utwente.nl
Cyber-crime Science is an emerging area of study aiming to prevent cyber-crime by
combining security protection techniques from Information Security with empirical research …

APD: ARM deceptive phishing detector system phishing detection in instant messengers using data mining approach

MM Ali, L Rajamani - Global Trends in Computing and Communication …, 2012 - Springer
Deceptive Phishing, is the major problem in Instant Messengers, one is able to disclose
sensitive information, including personal information, fact or even patterns that are not …

Enforced community standards for research on users of the Tor anonymity network

C Soghoian - Financial Cryptography and Data Security: FC 2011 …, 2012 - Springer
Security and privacy researchers are increasingly taking an interest in the Tor network, and
have even performed studies that involved intercepting the network communications of Tor …

Mixed methods research approach and experimental procedure for measuring human factors in cybersecurity using phishing simulations

S Mäses, K Kikerpill, K Jüristo… - … European Conference on …, 2019 - books.google.com
Cyberattacks have a growing effect on business management. Organisations are
increasingly focusing on human factors-how to train and evaluate people to minimise …

Socio-technological phishing prevention

G Gupta, J Pieprzyk - information security technical report, 2011 - Elsevier
Phishing is deceptive collection of personal information leading to embezzlement, identity
theft, and so on. Preventive and combative measures have been taken by banking …