Unveiling suspicious phishing attacks: enhancing detection with an optimal feature vectorization algorithm and supervised machine learning

MA Tamal, MK Islam, T Bhuiyan, A Sattar… - Frontiers in Computer …, 2024 - frontiersin.org
Introduction The dynamic and sophisticated nature of phishing attacks, coupled with the
relatively weak anti-phishing tools, has made phishing detection a pressing challenge. In …

A review of organization-oriented phishing research

K Althobaiti, N Alsufyani - PeerJ Computer Science, 2024 - peerj.com
The increased sophistication and frequency of phishing attacks that target organizations
necessitate a comprehensive cyber security strategy to handle phishing attacks from several …

You Know What?-Evaluation of a Personalised Phishing Training Based on Users' Phishing Knowledge and Detection Skills

L Schöni, V Carles, M Strohmeier, P Mayer… - Proceedings of the …, 2024 - dl.acm.org
Training is important to support users in phishing detection. To better match phishing
training content with users' current skills, personalised training has huge potential …

Fishing for phishy messages: predicting phishing susceptibility through the lens of cyber-routine activities theory and heuristic-systematic model

CL Gan, YY Lee, TW Liew - Humanities and Social Sciences …, 2024 - nature.com
Mobile phishing has emerged as one of the most severe cybercrime threats; thus, research
must examine the factors affecting people's likelihood of becoming instant messaging …

Strategi Efektif dalam Meningkatkan Kesadaran Keamanan Siber terhadap Ancaman Phishing di Lingkungan Perusahaan PT. XYZ

B Wibowo, T Hidayat - Jurnal Pengabdian Masyarakat …, 2025 - ejournal.sultanpublisher.com
Penelitian ini bertujuan untuk mengevaluasi strategi efektif dalam meningkatkan kesadaran
keamanan siber terhadap ancaman phishing di lingkungan organisasi. Menggunakan …

Eyes on phishing emails: an eye-tracking study

L Ribeiro, IS Guedes, CS Cardoso - Journal of Experimental Criminology, 2024 - Springer
Objective This study aims to explore susceptibility to phishing emails by analysing the visual
patterns of individuals. Method A quasi-experimental study was developed, using 28 emails …

[PDF][PDF] Pengaruh Pengetahuan Tip Pencegahan Terhadap Keyakinan Remaja di Pantai Timur bagi Melindungi Diri daripada Jenayah Scam

F Muhammad, SA Awang, AZM Shaarani… - …, 2024 - journalarticle.ukm.my
Scammer mempelbagaikan modus operandi bagi melaksanakan jenayah penipuan.
Rentetan itu, pengetahuan mengenai tip pencegahan merupakan langkah awal …

Mapping Cyber-Financial Risk Profiles: Implications for European Cybersecurity and Financial Literacy

AR Căciulescu, R Rughiniș, D Țurcanu, A Radovici - Risks, 2024 - search.proquest.com
This study investigates the landscape of cyber-financial risks across Europe by identifying
distinct risk profiles based on financial literacy, digital comfort, and economic vulnerability …

Design, Modeling and Simulation of Cybercriminal Personality-Based Cyberattack Campaigns

J Shin, GB Dobson, LR Carley… - 2024 Winter Simulation …, 2024 - ieeexplore.ieee.org
Cybersecurity challenges are inherently complex, characterized by both advanced technical
elements and complex aspects of human cognition. Although extensive research has …