Don't click: towards an effective anti-phishing training. A comparative literature review

D Jampen, G Gür, T Sutter, B Tellenbach - Human-centric Computing and …, 2020 - Springer
Email is of critical importance as a communication channel for both business and personal
matters. Unfortunately, it is also often exploited for phishing attacks. To defend against such …

SoK: a comprehensive reexamination of phishing research from the security perspective

A Das, S Baki, A El Aassal, R Verma… - … Surveys & Tutorials, 2019 - ieeexplore.ieee.org
Phishing and spear phishing are typical examples of masquerade attacks since trust is built
up through impersonation for the attack to succeed. Given the prevalence of these attacks …

The human aspects of information security questionnaire (HAIS-Q): two further validation studies

K Parsons, D Calic, M Pattinson, M Butavicius… - Computers & …, 2017 - Elsevier
Abstract Information security awareness (ISA) is integral to protecting an organisation from
cyber threats. The aim of this paper is to further establish the validity of the Human Aspects …

Phishing in organizations: Findings from a large-scale and long-term study

D Lain, K Kostiainen, S Čapkun - 2022 IEEE Symposium on …, 2022 - ieeexplore.ieee.org
In this paper, we present findings from a largescale and long-term phishing experiment that
we conducted in collaboration with a partner company. Our experiment ran for 15 months …

Phishing detection: analysis of visual similarity based approaches

AK Jain, BB Gupta - Security and Communication Networks, 2017 - Wiley Online Library
Phishing is one of the major problems faced by cyber‐world and leads to financial losses for
both industries and individuals. Detection of phishing attack with high accuracy has always …

A novel approach to protect against phishing attacks at client side using auto-updated white-list

AK Jain, BB Gupta - EURASIP Journal on Information Security, 2016 - Springer
Most of the anti-phishing solutions are having two major limitations; the first is the need of a
fast access time for a real-time environment and the second is the need of high detection …

Eyes wide open: The role of situational information security awareness for security‐related behaviour

L Jaeger, A Eckhardt - Information Systems Journal, 2021 - Wiley Online Library
Most contemporary studies on information security focus on largely static phenomena in
examining security‐related behaviours. We take a more dynamic, situational and …

Priming and warnings are not effective to prevent social engineering attacks

M Junger, L Montoya, FJ Overink - Computers in human behavior, 2017 - Elsevier
Humans tend to trust each other and to easily disclose personal information. This makes
them vulnerable to social engineering attacks. The present study investigated the …

[PDF][PDF] Evidence of personality traits on phishing attack menace among selected university undergraduates in Nigerian

RE Yoro, FO Aghware, MI Akazue, AE Ibor… - International Journal of …, 2023 - unidel.edu.ng
Access ease, mobility, portability, and improved speed have continued to ease the adoption
of computing devices; while, consequently proliferating phishing attacks. These, in turn …

Predicting susceptibility to social influence in phishing emails

K Parsons, M Butavicius, P Delfabbro, M Lillie - International Journal of …, 2019 - Elsevier
To reduce the threat caused by phishing attacks, it is vital to investigate why some phishing
attacks are successful, and why some people are more susceptible to them than others. To …