Phishing attacks survey: Types, vectors, and technical approaches

R Alabdan - Future internet, 2020 - mdpi.com
Phishing attacks, which have existed for several decades and continue to be a major
problem today, constitute a severe threat in the cyber world. Attackers are adopting multiple …

Human factors in phishing attacks: a systematic literature review

G Desolda, LS Ferro, A Marrella, T Catarci… - ACM Computing …, 2021 - dl.acm.org
Phishing is the fraudulent attempt to obtain sensitive information by disguising oneself as a
trustworthy entity in digital communication. It is a type of cyber attack often successful …

A survey of phishing attack techniques, defence mechanisms and open research challenges

AK Jain, BB Gupta - Enterprise Information Systems, 2022 - Taylor & Francis
Phishing is an identity theft, which deceives Internet users into revealing their sensitive data,
eg, login information, credit/debit card details, and so on. Researchers have developed …

[HTML][HTML] Using protection motivation theory in the design of nudges to improve online security behavior

R Van Bavel, N Rodríguez-Priego, J Vila… - International Journal of …, 2019 - Elsevier
We conducted an online experiment (n= 2024) on a representative sample of internet users
in Germany, Sweden, Poland, Spain and the UK to explore the effect of notifications on …

Phishing in organizations: Findings from a large-scale and long-term study

D Lain, K Kostiainen, S Čapkun - 2022 IEEE Symposium on …, 2022 - ieeexplore.ieee.org
In this paper, we present findings from a largescale and long-term phishing experiment that
we conducted in collaboration with a partner company. Our experiment ran for 15 months …

[HTML][HTML] Exploring susceptibility to phishing in the workplace

EJ Williams, J Hinds, AN Joinson - International Journal of Human …, 2018 - Elsevier
Phishing emails provide a means to infiltrate the technical systems of organisations by
encouraging employees to click on malicious links or attachments. Despite the use of …

An investigation of phishing awareness and education over time: When and how to best remind users

B Reinheimer, L Aldag, P Mayer, M Mossano… - … Symposium on Usable …, 2020 - usenix.org
Security awareness and education programmes are rolled out in more and more
organisations. However, their effectiveness over time and, correspondingly, appropriate …

SoK: a comprehensive reexamination of phishing research from the security perspective

A Das, S Baki, A El Aassal, R Verma… - … Surveys & Tutorials, 2019 - ieeexplore.ieee.org
Phishing and spear phishing are typical examples of masquerade attacks since trust is built
up through impersonation for the attack to succeed. Given the prevalence of these attacks …

Privacy and security threat models and mitigation strategies of older adults

A Frik, L Nurgalieva, J Bernd, J Lee, F Schaub… - Fifteenth symposium on …, 2019 - usenix.org
Older adults (65+) are becoming primary users of emerging smart systems, especially in
health care. However, these technologies are often not designed for older users and can …

Organizational science and cybersecurity: abundant opportunities for research at the interface

RS Dalal, DJ Howard, RJ Bennett, C Posey… - Journal of business and …, 2022 - Springer
Cybersecurity is an ever-present problem for organizations, but organizational science has
barely begun to enter the arena of cybersecurity research. As a result, the “human factor” in …