[HTML][HTML] Mitigation strategies against the phishing attacks: A systematic literature review
Phishing attacks are among the most prevalent attack mechanisms employed by attackers.
The consequences of successful phishing include (and are not limited to) financial losses …
The consequences of successful phishing include (and are not limited to) financial losses …
[HTML][HTML] A Multi-vocal Literature Review on challenges and critical success factors of phishing education, training and awareness
Background: Phishing is a malicious attempt by cyber attackers to steal personal information
through deception. Phishing attacks are often aided by carefully crafted phishing emails …
through deception. Phishing attacks are often aided by carefully crafted phishing emails …
Phishing happens beyond technology: The effects of human behaviors and demographics on each step of a phishing process
Prior studies have shown that the behaviours and attitudes of Internet users influence the
likelihood of being victimised by phishing attacks. Many scammers design a step-by-step …
likelihood of being victimised by phishing attacks. Many scammers design a step-by-step …
Sixteen years of phishing user studies: What have we learned?
Several previous studies have investigated user susceptibility to phishing attacks. A
thorough meta-analysis or systematic review is required to gain a better understanding of …
thorough meta-analysis or systematic review is required to gain a better understanding of …
Evaluating user susceptibility to phishing attacks
Purpose Phishing is a well-known cybersecurity attack that has rapidly increased in recent
years. It poses risks to businesses, government agencies and all users due to sensitive data …
years. It poses risks to businesses, government agencies and all users due to sensitive data …
Evaluating user perception of multi-factor authentication: A systematic review
Security vulnerabilities of traditional single factor authentication has become a major
concern for security practitioners and researchers. To mitigate single point failures, new and …
concern for security practitioners and researchers. To mitigate single point failures, new and …
[HTML][HTML] Research communities in cyber security: A comprehensive literature review
In order to provide a coherent overview of cyber security research, the Scopus academic
abstract and citation database was mined to create a citation graph of 98,373 authors active …
abstract and citation database was mined to create a citation graph of 98,373 authors active …
Exploring evolution of augmented and virtual reality education space in 2020 through systematic literature review
Research is increasingly being conducted to identify the benefits provided by the latest
developments in the AR/VR domain, which has seen an increase in interest as a result of the …
developments in the AR/VR domain, which has seen an increase in interest as a result of the …
What mid-career professionals think, know, and feel about phishing: Opportunities for university it departments to better empower employees in their anti-phishing …
Phishing attacks, in which deceptive messages purporting to be from a legitimate contact are
used to trick recipients and acquire sensitive information for the purposes of committing …
used to trick recipients and acquire sensitive information for the purposes of committing …
Mfa is a waste of time! understanding negative connotation towards mfa applications via user generated content
Traditional single-factor authentication possesses several critical security vulnerabilities due
to single-point failure feature. Multi-factor authentication (MFA), intends to enhance security …
to single-point failure feature. Multi-factor authentication (MFA), intends to enhance security …