The role of eye gaze in security and privacy applications: Survey and future HCI research directions

C Katsini, Y Abdrabou, GE Raptis, M Khamis… - Proceedings of the 2020 …, 2020 - dl.acm.org
For the past 20 years, researchers have investigated the use of eye tracking in security
applications. We present a holistic view on gaze-based security applications. In particular …

Cognition in social engineering empirical research: a systematic literature review

P Burda, L Allodi, N Zannone - ACM Transactions on Computer-Human …, 2024 - dl.acm.org
The interdisciplinarity of the Social Engineering (SE) domain creates crucial challenges for
the development and advancement of empirical SE research, making it particularly difficult to …

[HTML][HTML] Which factors predict susceptibility to phishing? An empirical study

L Ribeiro, IS Guedes, CS Cardoso - Computers & Security, 2024 - Elsevier
Phishing is a cybercrime in active growth that victimizes a large number of individuals and
organizations. To explore which individual and contextual factors predict phishing …

[HTML][HTML] Effects of visual risk indicators on phishing detection behavior: An eye-tracking experiment

D Baltuttis, T Teubner - Computers & Security, 2024 - Elsevier
Cybersecurity vulnerability ranks among the foremost global business risks. Phishing
attempts, in particular through email, persistently challenge organizations despite …

A systematic review and research challenges on phishing cyberattacks from an electroencephalography and gaze-based perspective

GA Thomopoulos, DP Lyras, CA Fidas - Personal and Ubiquitous …, 2024 - Springer
Phishing is one of the most important security threats in modern information systems causing
different levels of damages to end-users and service providers such as financial and …

Understanding phishing email processing and perceived trustworthiness through eye tracking

J McAlaney, PJ Hills - Frontiers in Psychology, 2020 - frontiersin.org
Social engineering attacks in the form of phishing emails represent one of the biggest risks
to cybersecurity. There is a lack of research on how the common elements of phishing …

Humans vs. machines in malware classification

S Aonzo, Y Han, A Mantovani, D Balzarotti - 32nd USENIX Security …, 2023 - usenix.org
Humans vs. Machines in Malware Classification Page 1 This paper is included in the
Proceedings of the 32nd USENIX Security Symposium. August 9–11, 2023 • Anaheim, CA, USA …

Investigating teenagers' ability to detect phishing messages

J Nicholson, Y Javed, M Dixon… - 2020 IEEE European …, 2020 - ieeexplore.ieee.org
Young people are increasingly becoming responsible for the security of their devices, yet do
not appear to receive formal instruction on how to protect themselves online. In this paper …