[HTML][HTML] Mitigation strategies against the phishing attacks: A systematic literature review

B Naqvi, K Perova, A Farooq, I Makhdoom… - Computers & …, 2023 - Elsevier
Phishing attacks are among the most prevalent attack mechanisms employed by attackers.
The consequences of successful phishing include (and are not limited to) financial losses …

[HTML][HTML] A Multi-vocal Literature Review on challenges and critical success factors of phishing education, training and awareness

O Sarker, A Jayatilaka, S Haggag, C Liu… - Journal of Systems and …, 2024 - Elsevier
Background: Phishing is a malicious attempt by cyber attackers to steal personal information
through deception. Phishing attacks are often aided by carefully crafted phishing emails …

Phishing happens beyond technology: The effects of human behaviors and demographics on each step of a phishing process

H Abroshan, J Devos, G Poels, E Laermans - IEEE Access, 2021 - ieeexplore.ieee.org
Prior studies have shown that the behaviours and attitudes of Internet users influence the
likelihood of being victimised by phishing attacks. Many scammers design a step-by-step …

Sixteen years of phishing user studies: What have we learned?

S Baki, RM Verma - IEEE Transactions on Dependable and …, 2022 - ieeexplore.ieee.org
Several previous studies have investigated user susceptibility to phishing attacks. A
thorough meta-analysis or systematic review is required to gain a better understanding of …

Evaluating user susceptibility to phishing attacks

S Das, C Nippert-Eng, LJ Camp - Information & Computer Security, 2022 - emerald.com
Purpose Phishing is a well-known cybersecurity attack that has rapidly increased in recent
years. It poses risks to businesses, government agencies and all users due to sensitive data …

Evaluating user perception of multi-factor authentication: A systematic review

S Das, B Wang, Z Tingle, LJ Camp - arxiv preprint arxiv:1908.05901, 2019 - arxiv.org
Security vulnerabilities of traditional single factor authentication has become a major
concern for security practitioners and researchers. To mitigate single point failures, new and …

[HTML][HTML] Research communities in cyber security: A comprehensive literature review

S Katsikeas, P Johnson, M Ekstedt… - Computer Science …, 2021 - Elsevier
In order to provide a coherent overview of cyber security research, the Scopus academic
abstract and citation database was mined to create a citation graph of 98,373 authors active …

Exploring evolution of augmented and virtual reality education space in 2020 through systematic literature review

N Noah, S Das - Computer Animation and Virtual Worlds, 2021 - Wiley Online Library
Research is increasingly being conducted to identify the benefits provided by the latest
developments in the AR/VR domain, which has seen an increase in interest as a result of the …

What mid-career professionals think, know, and feel about phishing: Opportunities for university it departments to better empower employees in their anti-phishing …

AC Tally, J Abbott, A Bochner, S Das… - Proceedings of the ACM …, 2023 - dl.acm.org
Phishing attacks, in which deceptive messages purporting to be from a legitimate contact are
used to trick recipients and acquire sensitive information for the purposes of committing …

Mfa is a waste of time! understanding negative connotation towards mfa applications via user generated content

S Das, B Wang, LJ Camp - arxiv preprint arxiv:1908.05902, 2019 - arxiv.org
Traditional single-factor authentication possesses several critical security vulnerabilities due
to single-point failure feature. Multi-factor authentication (MFA), intends to enhance security …