A survey on systems security metrics

M Pendleton, R Garcia-Lebron, JH Cho… - ACM Computing Surveys …, 2016 - dl.acm.org
Security metrics have received significant attention. However, they have not been
systematically explored based on the understanding of attack-defense interactions, which …

The psychology of internet fraud victimisation: A systematic review

G Norris, A Brookes, D Dowell - Journal of Police and Criminal Psychology, 2019 - Springer
Existing theories of fraud provide some insight into how criminals target and exploit people
in the online environment; whilst reference to psychological explanations is common, the …

Phishing happens beyond technology: The effects of human behaviors and demographics on each step of a phishing process

H Abroshan, J Devos, G Poels, E Laermans - IEEE Access, 2021 - ieeexplore.ieee.org
Prior studies have shown that the behaviours and attitudes of Internet users influence the
likelihood of being victimised by phishing attacks. Many scammers design a step-by-step …

Eyes wide open: The role of situational information security awareness for security‐related behaviour

L Jaeger, A Eckhardt - Information Systems Journal, 2021 - Wiley Online Library
Most contemporary studies on information security focus on largely static phenomena in
examining security‐related behaviours. We take a more dynamic, situational and …

Susceptibility to phishing on social network sites: A personality information processing model

ED Frauenstein, S Flowerday - Computers & security, 2020 - Elsevier
Today, the traditional approach used to conduct phishing attacks through email and spoofed
websites has evolved to include social network sites (SNSs). This is because phishers are …

Human cognition through the lens of social engineering cyberattacks

R Montañez, E Golob, S Xu - Frontiers in psychology, 2020 - frontiersin.org
Social engineering cyberattacks are a major threat because they often prelude sophisticated
and devastating cyberattacks. Social engineering cyberattacks are a kind of psychological …

Stram: Measuring the trustworthiness of computer-based systems

JH Cho, S Xu, PM Hurley, M Mackay… - ACM Computing …, 2019 - dl.acm.org
Various system metrics have been proposed for measuring the quality of computer-based
systems, such as dependability and security metrics for estimating their performance and …

Impacts of personal characteristics on user trust in conversational recommender systems

W Cai, Y Jin, L Chen - Proceedings of the 2022 CHI Conference on …, 2022 - dl.acm.org
Conversational recommender systems (CRSs) imitate human advisors to assist users in
finding items through conversations and have recently gained increasing attention in …

Fiends and fools: a narrative review and neo-socioanalytic perspective on personality and insider threats

AR Marbut, PD Harms - Journal of Business and Psychology, 2024 - Springer
Insider threats represent a serious threat to organizations but are considered to be difficult to
predict and prevent. Although a growing body of research has examined personological …

Phishing attempts among the dark triad: Patterns of attack and vulnerability

SR Curtis, P Rajivan, DN Jones, C Gonzalez - Computers in Human …, 2018 - Elsevier
Phishing attacks are more common and more sophisticated than other forms of social
engineering attacks. This study presents an investigation of the relationships between three …