Investigating phishing victimization with the Heuristic–Systematic Model: A theoretical framework and an exploration

XR Luo, W Zhang, S Burd, A Seazzu - Computers & Security, 2013 - Elsevier
To the extent that phishing has become a serious threat to information security, there has
been rather limited theory-grounded research on this burgeoning phenomenon. In this …

Got phished? Internet security and human vulnerability

S Goel, K Williams, E Dincelli - Journal of the Association for …, 2017 - aisel.aisnet.org
A leading cause of security breaches is a basic human vulnerability: our susceptibility to
deception. Hackers exploit this vulnerability by sending phishing emails that induce users to …

[HTML][HTML] The human factor in phishing: Collecting and analyzing user behavior when reading emails

L Gallo, D Gentile, S Ruggiero, A Botta, G Ventre - Computers & Security, 2024 - Elsevier
Phishing emails are constantly increasing their sophistication, and typical countermeasures
struggle at addressing them. Attackers target our cognitive vulnerabilities with a varied set of …

Phishing attacks: A recent comprehensive study and a new anatomy

Z Alkhalil, C Hewage, L Nawaf, I Khan - Frontiers in Computer Science, 2021 - frontiersin.org
With the significant growth of internet usage, people increasingly share their personal
information online. As a result, an enormous amount of personal information and financial …

A new approach to modelling the effects of cognitive processing and threat detection on phishing susceptibility

PMW Musuva, KW Getao, CK Chepken - Computers in Human Behavior, 2019 - Elsevier
Phishing threats are real and are ever increasing in their reach and devastating effects. This
study delves into the role of cognitive processing in detecting and curtailing phishing attacks …

A survey of phishing attacks: Their types, vectors and technical approaches

KL Chiew, KSC Yong, CL Tan - Expert Systems with Applications, 2018 - Elsevier
Phishing was a threat in the cyber world a couple of decades ago and still is today. It has
grown and evolved over the years as phishers are getting creative in planning and …

Research article phishing susceptibility: An investigation into the processing of a targeted spear phishing email

J Wang, T Herath, R Chen… - IEEE transactions on …, 2012 - ieeexplore.ieee.org
Research problem: Phishing is an email-based scam where a perpetrator camouflages
emails to appear as a legitimate request for personal and sensitive information. Research …

Experimental case studies for investigating e-banking phishing techniques and attack strategies

M Aburrous, MA Hossain, K Dahal, F Thabtah - Cognitive Computation, 2010 - Springer
Phishing is a form of electronic identity theft in which a combination of social engineering
and Web site spoofing techniques is used to trick a user into revealing confidential …

Anti-phishing: A comprehensive perspective

G Varshney, R Kumawat, V Varadharajan… - Expert Systems with …, 2024 - Elsevier
Phishing is a form of deception technique that attackers often use to acquire sensitive
information related to individuals and organizations fraudulently. Although Phishing attacks …

[PDF][PDF] The human factor in phishing

M Jakobsson - Privacy & Security of Consumer Information, 2007 - markus-jakobsson.com
We discuss the importance of understanding psychological aspects of phishing, and review
some recent findings. Given these findings, we critique some commonly used security …