Human factors in phishing attacks: a systematic literature review

G Desolda, LS Ferro, A Marrella, T Catarci… - ACM Computing …, 2021 - dl.acm.org
Phishing is the fraudulent attempt to obtain sensitive information by disguising oneself as a
trustworthy entity in digital communication. It is a type of cyber attack often successful …

Mobile phishing attacks and defence mechanisms: State of art and open research challenges

D Goel, AK Jain - computers & security, 2018 - Elsevier
Phishing is an online identity theft in which an attacker tries to steal user's personal
information, resulting in financial loss of individuals as well as organisations. Nowadays …

A systematic literature review of empirical methods and risk representation in usable privacy and security research

V Distler, M Fassl, H Habib, K Krombholz… - ACM Transactions on …, 2021 - dl.acm.org
Usable privacy and security researchers have developed a variety of approaches to
represent risk to research participants. To understand how these approaches are used and …

{DeepPhish}: Understanding user trust towards artificially generated profiles in online social networks

J Mink, L Luo, NM Barbosa, O Figueira… - 31st USENIX Security …, 2022 - usenix.org
Fabricated media from deep learning models, or deepfakes, have been recently applied to
facilitate social engineering efforts by constructing a trusted social persona. While existing …

Debunking rumors on social media: The use of denials

A Pal, AYK Chua, DHL Goh - Computers in Human Behavior, 2019 - Elsevier
The literature currently lacks an understanding of how denials can be crafted to effectively
debunk rumors on social media. Underpinned by the theory of planned behavior, this …

A quarter century of usable security and privacy research: transparency, tailorability, and the road ahead

C Reuter, LL Iacono, A Benlian - Behaviour & information …, 2022 - Taylor & Francis
In the last decades, research has shown that both technical solutions and user perceptions
are important to improve security and privacy in the digital realm. The field of 'usable …

Gui-squatting attack: Automated generation of android phishing apps

S Chen, L Fan, C Chen, M Xue, Y Liu… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
Mobile phishing attacks, such as mimic mobile browser pages, masquerade as legitimate
applications by leveraging repackaging or clone techniques, have caused varied yet …

Design and evaluation of inclusive email security indicators for people with visual impairments

Y Yu, S Ashok, S Kaushik, Y Wang… - 2023 IEEE Symposium …, 2023 - ieeexplore.ieee.org
Due to the challenges to detect and filter phishing emails, it is inevitable that some phishing
emails can still reach a user's inbox. As a result, email providers such as Gmail have …