Phishing Happens Beyond Technology: The Effects of Human Behaviors and Demographics on Each Step of a Phishing Process (original) (raw)

Which Phish Get Caught? An Exploratory Study of Individual Susceptibility to Phishing

Greg Moody

2011

View PDFchevron_right

Falling for phishing attempts: An investigation of individual differences that are associated with behavior in a naturalistic phishing simulation

Mansooreh Zahedi

View PDFchevron_right

Falling for Phishing: An Empirical Investigation into People's Email Response Behaviors

CREST: The Centre for Research in Engineering Software Technologies Crest, Nalin Asanka Gamagedara Arachchilage

The 42nd International Conference on Information Systems (ICIS'21), Austin, Texas, USA, 2021, 17, 2021

View PDFchevron_right

Got Phished? Internet Security and Human Vulnerability

Ersin Dincelli

Journal of the Association for Information Systems, 2017

View PDFchevron_right

Why do people get phished? Testing individual differences in phishing vulnerability within an integrated, information processing model

T. Herath, Arun Vishwanath

Decision Support Systems, 2011

View PDFchevron_right

EXAMINING INDIVIDUAL TENDENCY TO RESPOND TO PHISHING E-MAILS FROM THE PERSPECTIVE OF PROTECTION MOTIVATION THEORY

Allen Peter Diman

The Journal of Education and Social Science (JESOC), 2023

View PDFchevron_right

An Investigation Into Students Responses to Various Phishing Emails and Other Phishing-Related Behaviours

Edwin Donald Frauenstein

Communications in Computer and Information Science, 2018

View PDFchevron_right

IDENTIFYING FACTORS THAT INFLUENCE SECURITY BEHAVIORS RELATING TO PHISHING ATTACKS SUSCEPTIBILITY: A SYSTEMATIC LITERATURE REVIEW

Ayman Asfoor

2020

View PDFchevron_right

Identifying Factors That Influence Security Behaviors Relating to Phishing Attacks Susceptibility : A Systematic Literature

Ayman Asfoor

2020

View PDFchevron_right

Phishing for the Truth: A Scenario-Based Experiment of Users’ Behavioural Response to Emails

Cate Jerram

IFIP Advances in Information and Communication Technology, 2013

View PDFchevron_right

The design of phishing studies: Challenges for researchers

Cate Jerram

Computers & Security, 2015

View PDFchevron_right

Sixteen Years of Phishing User Studies: What Have We Learned?

Rakesh Verma

ArXiv, 2021

View PDFchevron_right

COVID-19 and Phishing: effects of human emotions, behaviour, and demographics on the success of phishing attempts during the pandemic

Jan Devos

IEEE Access

View PDFchevron_right

A Review of Factors Affecting the Effectiveness of Phishing

Robert Karamagi

Canadian Center of Science and Education, 2021

View PDFchevron_right

Something Smells Phishy: Exploring Definitions, Consequences, and Reactions to Phishing

Emerson Murphy-hill

View PDFchevron_right

Baiting the Hook: Exploring the Interaction of Personality and Persuasion Tactics in Email Phishing Attacks

Christopher Mayhorn

Advances in intelligent systems and computing, 2018

View PDFchevron_right

The Effectiveness of Deceptive Tactics in Phishing

Ryan Wright

2009

View PDFchevron_right

Trends in Phishing Attacks: Suggestions for Future Research

Ryan Schuetzler

2011

View PDFchevron_right

Evaluating user vulnerabilities vs phisher skills in spear phishing

Mathew Nicho

IADIS INTERNATIONAL JOURNAL ON COMPUTER SCIENCE AND INFORMATION SYSTEMS

View PDFchevron_right

Which phish get caught? An exploratory study of individuals′ susceptibility to phishing

Dennis Galletta

European Journal of Information Systems

View PDFchevron_right

F for fake: Four studies on how we fall for phish

Helen Petrie

2011

View PDFchevron_right

Combatting Phishing: A Holistic Human Approach

Edwin Donald Frauenstein

Combatting Phishing: A Holistic Human Approach, 2014

View PDFchevron_right

The Role of Contextualization in Users Vulnerability to Phishing Attempts

Dr Jocelyn Williams

Australasian Journal of Information Systems, 2020

View PDFchevron_right

American and Indian Conceptualizations of Phishing

Christopher Mayhorn

2013 Third Workshop on Socio-Technical Aspects in Security and Trust, 2013

View PDFchevron_right

A Personality Based Model for Determining Susceptibility to Phishing Attacks

Janet Bailey

View PDFchevron_right

Phishing in an academic community: A study of user susceptibility and behavior

ALEJANDRA SORCIA DIAZ

Cryptologia

View PDFchevron_right

Towards understanding phishing victims' profile

Ahmed Zarka

2012 International Conference on Computer Systems and Industrial Informatics, 2012

View PDFchevron_right

Exploring How User Behavior Shapes Cybersecurity Awareness in the Face of Phishing Attacks

Kalla Dinesh, samaah Fnu

International Journal of Computer Trends and Technology , 2023

View PDFchevron_right

A socio-cognitive and computational model for decision making and user modelling in social phishing

Sunil Chaudhary

2017

View PDFchevron_right

Social Engineering and the Dangers of Phishing

Vanessa Gomes

2020 15th Iberian Conference on Information Systems and Technologies (CISTI), 2020

View PDFchevron_right

Living in a Spamster's Paradise: Deceit and Threats in Phishing Emails

Andra Siibak

Masaryk University Journal of Law and Technology, 2019

View PDFchevron_right