[HTML][HTML] Don't click: towards an effective anti-phishing training. A comparative literature review

D Jampen, G Gür, T Sutter, B Tellenbach - Human-centric Computing and …, 2020 - Springer
Email is of critical importance as a communication channel for both business and personal
matters. Unfortunately, it is also often exploited for phishing attacks. To defend against such …

Social engineering attacks prevention: A systematic literature review

W Syafitri, Z Shukur, U Asma'Mokhtar… - IEEE …, 2022 - ieeexplore.ieee.org
Social engineering is an attack on information security for accessing systems or networks.
Social engineering attacks occur when victims do not recognize methods, models, and …

Experimental study to assess the impact of timers on user susceptibility to phishing attacks

AE Antonucci, Y Levy… - Journal of …, 2022 - digitalcommons.kennesaw.edu
Social engineering costs organizations billions of dollars. It exploits the weakest link of
information systems security, the users. It is well-documented in literature that users continue …

Scan Me: QR Codes as Emerging Malware Delivery Mechanism

K Cargrill, T Abegaz, LC Parra, R DaSouza - Proceedings of the Future …, 2023 - Springer
The current era of contactless operations and transactions, the use of Quick Response or
QR codes has become more important than before for delivering information to a large …

[PDF][PDF] An Evaluation of Current Malware Trends and Defense Techniques: A Scoping Review with Empirical Case Studies

A Cletus, AA Opoku, BA Weyori - Journal of Advances in Information …, 2024 - jait.us
1 Department of Computer Science and Informatics, University of Energy and Natural
Resources, Sunyani, Ghana 2 Department of Mathematics and ICT, St. John Boscos College …

Social Media's Impact on Adolescent Technology Users: A Quantitative Analysis

RJ Honomichl - 2023 - search.proquest.com
Abstract Information-based cyberattacks shape public opinions, provoke discord, polarize
individuals, erode trust, and create social division. Adolescent technology users rely heavily …

Understanding Human Behavior in Phishing Attacks Across Diverse User Groups: An Ethical Hacking Analysis

F Hussain, R Rahman, ZS Attarbashi… - 2024 IEEE 1st …, 2024 - ieeexplore.ieee.org
In the face of increasingly advanced cyber threats employing different social engineering
methods, there is a crucial need to comprehend how individuals respond to deceptive …

[PDF][PDF] PREVENTION OF PHISHING ATTACKS: A THREE-PILLARED APPROACH.

B Miller, K Miller, X Zhang, MG Terwilliger - Issues in Information Systems, 2020 - iacis.org
This paper presents a three-pillared strategy for the prevention of phishing attacks. Phishing
is a deceptive method of creating and distributing emails and/or websites that attempt to fool …

Information security awareness techniques that reduce data breaches caused by social engineering attacks

LC Kostic - 2020 - search.proquest.com
The objective of this qualitative Delphi study was to examine the various information security
awareness techniques related to social engineering attacks that organizations employ. Data …

The Effects of IT Identity on Information Security Behaviors

B Bloodworth - 2023 - ttu-ir.tdl.org
Despite decades of research, the information security literature built upon the grounded
theories of protection motivation and general deterrence continues to produce inconsistent …