Phishing happens beyond technology: The effects of human behaviors and demographics on each step of a phishing process

H Abroshan, J Devos, G Poels, E Laermans - IEEE Access, 2021 - ieeexplore.ieee.org
Prior studies have shown that the behaviours and attitudes of Internet users influence the
likelihood of being victimised by phishing attacks. Many scammers design a step-by-step …

Presenting suspicious details in {User-Facing} e-mail headers does not improve phishing detection

S Zheng, I Becker - Eighteenth Symposium on Usable Privacy and …, 2022 - usenix.org
Phishing requires humans to fall for impersonated sources. Sender authenticity can often be
inferred from e-mail header information commonly displayed by e-mail clients, such as …

[HTML][HTML] Which factors predict susceptibility to phishing? An empirical study

L Ribeiro, IS Guedes, CS Cardoso - Computers & Security, 2024 - Elsevier
Phishing is a cybercrime in active growth that victimizes a large number of individuals and
organizations. To explore which individual and contextual factors predict phishing …

Shaken to the core: trust trajectories in the aftermaths of adverse cyber events

R Searle, KV Renaud, L van der Werff - Journal of Intellectual Capital, 2024 - emerald.com
Purpose Adverse cyber events, like death and taxes, have become inevitable. They are an
increasingly common feature of organisational life. Their aftermaths are a critical and under …

Understanding the viability of gmail's origin indicator for identifying the sender

E Liu, L Sun, A Bellon, G Ho, GM Voelker… - … Symposium on Usable …, 2023 - usenix.org
The current design of email authentication mechanisms has made it challenging for email
providers to establish the authenticity of email messages with complicated provenance, such …

[PDF][PDF] Phishing Attacks in Social Engineering: A Review.

KS Adu-Manu, RK Ahiable, JK Appati… - … of Cybersecurity (2579 …, 2022 - cdn.techscience.cn
Organisations closed their offices and began working from home online to prevent the
spread of the COVID-19 virus. This shift in work culture coincided with increased online use …

Social Commerce and Metaverse in a New Virtual World: Exploring Women's Adoption Intentions

A Grover, N Arora, P Sharma - Cultural Marketing and Metaverse for …, 2023 - igi-global.com
Social commerce platforms are used for a variety of purposes including networking,
shopping, and purchasing goods and services from others, while metaverse platform …

Unraveling the behavioral influence of social media on phishing susceptibility: A Personality-Habit-Information Processing model

ED Frauenstein, S Flowerday, S Mishi… - Information & …, 2023 - Elsevier
Frequent and habitual engagement with social media can reinforce certain activities such as
sharing, clicking hyperlinks, and liking, which may be performed with insufficient cognition …

Recognition of genuine and phishing emails may not be associated with response to phishing attacks

A Crgol, S Vrhovec - Journal of Universal Computer Science, 2024 - search.proquest.com
This paper investigates the associations between recognition of phishing and genuine
emails, and response to phishing attacks, namely susceptibility to phishing emails (ie, click …

Advanced BERT and CNN-Based Computational Model for Phishing Detection in Enterprise Systems.

BB Gupta, A Gaurav, V Arya, RW Attar… - … in Engineering & …, 2024 - search.ebscohost.com
Phishing attacks present a serious threat to enterprise systems, requiring advanced
detection techniques to protect sensitive data. This study introduces a phishing email …