Sixteen years of phishing user studies: What have we learned?

S Baki, RM Verma - IEEE Transactions on Dependable and …, 2022 - ieeexplore.ieee.org
Several previous studies have investigated user susceptibility to phishing attacks. A
thorough meta-analysis or systematic review is required to gain a better understanding of …

Cognition in social engineering empirical research: a systematic literature review

P Burda, L Allodi, N Zannone - ACM Transactions on Computer-Human …, 2024 - dl.acm.org
The interdisciplinarity of the Social Engineering (SE) domain creates crucial challenges for
the development and advancement of empirical SE research, making it particularly difficult to …

Factors influencing fake news rebuttal acceptance during the COVID-19 pandemic and the moderating effect of cognitive ability

X Wang, F Chao, G Yu, K Zhang - Computers in human behavior, 2022 - Elsevier
Fake news is spreading rapidly on social media and poses a serious threat to the COVID-19
outbreak response. This study thus aims to reveal the factors influencing the acceptance of …

Indicators of employee phishing email behaviours: Intuition, elaboration, attention, and email typology

J Buckley, D Lottridge, JG Murphy… - International Journal of …, 2023 - Elsevier
Employees' behaviour to phishing emails can strengthen or undermine business
organisations' cyber security. This phishing simulation and survey study explored the …

The role of cue utilization in the detection of phishing emails

D Sturman, C Valenzuela, O Plate, T Tanvir, JC Auton… - Applied Ergonomics, 2023 - Elsevier
This study was designed to examine the roles of cue utilization, phishing features and time
pressure in the detection of phishing emails. During two experiments, participants completed …

Presenting suspicious details in {User-Facing} e-mail headers does not improve phishing detection

S Zheng, I Becker - Eighteenth Symposium on Usable Privacy and …, 2022 - usenix.org
Phishing requires humans to fall for impersonated sources. Sender authenticity can often be
inferred from e-mail header information commonly displayed by e-mail clients, such as …

Informing, simulating experience, or both: A field experiment on phishing risks

A Baillon, J De Bruin, A Emirmahmutoglu… - PloS one, 2019 - journals.plos.org
Cybersecurity cannot be ensured with mere technical solutions. Hackers often use
fraudulent emails to simply ask people for their password to breach into organizations. This …

Consumer fraud in online shopping: Detecting risk indicators through data mining

T Knuth, DC Ahrholdt - International Journal of Electronic …, 2022 - Taylor & Francis
Consumer fraud in online shopping has become a major problem and severe challenge for
online retailers. However, detection lags behind—for academia and practice—and data …

SoK: Human-centered phishing susceptibility

S Zhuo, R Biddle, YS Koh, D Lottridge… - ACM Transactions on …, 2023 - dl.acm.org
Phishing is recognized as a serious threat to organizations and individuals. While there
have been significant technical advances in blocking phishing attacks, end-users remain the …

Contextual drivers of employees' phishing susceptibility: Insights from a field study

M Frank, L Jaeger, LM Ranft - Decision Support Systems, 2022 - Elsevier
Phishing attacks rate as one of the most prevalent security threats to contemporary
organizations. Hence, managers strive heavily to apply security measures that keep their …