SoK: a comprehensive reexamination of phishing research from the security perspective

A Das, S Baki, A El Aassal, R Verma… - … Surveys & Tutorials, 2019 - ieeexplore.ieee.org
Phishing and spear phishing are typical examples of masquerade attacks since trust is built
up through impersonation for the attack to succeed. Given the prevalence of these attacks …

Towards an improved understanding of human factors in cybersecurity

J Jeong, J Mihelcic, G Oliver… - 2019 IEEE 5th …, 2019 - ieeexplore.ieee.org
Cybersecurity cannot be addressed by technology alone; the most intractable aspects are in
fact sociotechnical. As a result, the'human factor'has been recognised as being the weakest …

[HTML][HTML] Which factors predict susceptibility to phishing? An empirical study

L Ribeiro, IS Guedes, CS Cardoso - Computers & Security, 2024 - Elsevier
Phishing is a cybercrime in active growth that victimizes a large number of individuals and
organizations. To explore which individual and contextual factors predict phishing …

Cognition in social engineering empirical research: a systematic literature review

P Burda, L Allodi, N Zannone - ACM Transactions on Computer-Human …, 2024 - dl.acm.org
The interdisciplinarity of the Social Engineering (SE) domain creates crucial challenges for
the development and advancement of empirical SE research, making it particularly difficult to …

An explainable multi-modal hierarchical attention model for develo** phishing threat intelligence

Y Chai, Y Zhou, W Li, Y Jiang - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
Phishing website attack, as one of the most persistent forms of cyber threats, evolves and
remains a major cyber threat. Various detection methods (eg, lookup systems, fraud cue …

A systematic review and research challenges on phishing cyberattacks from an electroencephalography and gaze-based perspective

GA Thomopoulos, DP Lyras, CA Fidas - Personal and Ubiquitous …, 2024 - Springer
Phishing is one of the most important security threats in modern information systems causing
different levels of damages to end-users and service providers such as financial and …

PhishSim: aiding phishing website detection with a feature-free tool

RW Purwanto, A Pal, A Blair… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
In this paper, we propose a feature-free method for detecting phishing websites using the
Normalized Compression Distance (NCD), a parameter-free similarity measure which …

Testing an integrated self-control and routine activities framework to examine malware infection victimization

TJ Holt, J van Wilsem… - Social Science …, 2020 - journals.sagepub.com
Recent research demonstrates that those with low self-control have an increased risk of
victimization due to involvement in routine activities that place them in close proximity to …

Discovering the correlation between phishing susceptibility causing data biases and big five personality traits using C-GAN

AU Rahman, F Al-Obeidat, A Tubaishat… - IEEE Transactions …, 2022 - ieeexplore.ieee.org
Recently, on social media, various kinds of social engineering (SE) have made individuals
more susceptible to attacks. A phishing attempt is a widely used SE technique that takes …

Information disclosure and privacy paradox: the role of impulsivity

Z Aivazpour, VS Rao - ACM SIGMIS Database: the DATABASE for …, 2020 - dl.acm.org
Self-disclosure of personal information is generally accepted as a security risk. Nonetheless,
many individuals who are concerned about their privacy will often voluntarily reveal …