[HTML][HTML] Mitigation strategies against the phishing attacks: A systematic literature review

B Naqvi, K Perova, A Farooq, I Makhdoom… - Computers & …, 2023 - Elsevier
Phishing attacks are among the most prevalent attack mechanisms employed by attackers.
The consequences of successful phishing include (and are not limited to) financial losses …

[HTML][HTML] A Multi-vocal Literature Review on challenges and critical success factors of phishing education, training and awareness

O Sarker, A Jayatilaka, S Haggag, C Liu… - Journal of Systems and …, 2024 - Elsevier
Background: Phishing is a malicious attempt by cyber attackers to steal personal information
through deception. Phishing attacks are often aided by carefully crafted phishing emails …

Phishing in organizations: Findings from a large-scale and long-term study

D Lain, K Kostiainen, S Čapkun - 2022 IEEE Symposium on …, 2022 - ieeexplore.ieee.org
In this paper, we present findings from a largescale and long-term phishing experiment that
we conducted in collaboration with a partner company. Our experiment ran for 15 months …

From chatbots to phishbots?: Phishing scam generation in commercial large language models

SS Roy, P Thota, KV Naragam… - 2024 IEEE Symposium …, 2024 - ieeexplore.ieee.org
The advanced capabilities of Large Language Models (LLMs) have made them invaluable
across various applications, from conversational agents and content creation to data …

Why people keep falling for phishing scams: The effects of time pressure and deception cues on the detection of phishing emails

M Butavicius, R Taib, SJ Han - Computers & Security, 2022 - Elsevier
Lack of personalisation and poor mechanics (eg, grammar, spelling and punctuation) are
commonly cited as cues of deception that people can use to identify phishing emails …

GramBeddings: a new neural network for URL based identification of phishing web pages through n-gram embeddings

AS Bozkir, FC Dalgic, M Aydos - Computers & Security, 2023 - Elsevier
There has been ever-growing use of Internet and progress within many communication
channels such as social media and this escalates the need for rapid and low source …

Internet-based social engineering psychology, attacks, and defenses: A survey

TT Longtchi, RM Rodriguez, L Al-Shawaf… - Proceedings of the …, 2024 - ieeexplore.ieee.org
Internet-based social engineering (SE) attacks are a major cyber threat. These attacks often
serve as the first step in a sophisticated sequence of attacks that target, among other things …

{“To} Do This Properly, You Need More {Resources”}: The Hidden Costs of Introducing Simulated Phishing Campaigns

L Brunken, A Buckmann, J Hielscher… - 32nd USENIX Security …, 2023 - usenix.org
Many organizations use phishing simulation campaigns to raise and measure their
employees' security awareness. They can create their own campaigns, or buy phishing-as-a …

Experimental investigation of technical and human factors related to phishing susceptibility

FL Greitzer, W Li, KB Laskey, J Lee, J Purl - ACM Transactions on Social …, 2021 - dl.acm.org
This article reports on a simulated phishing experiment targeting 6,938 faculty and staff at
George Mason University. The three-week phishing campaign employed three types of …

[HTML][HTML] Chatbots for active learning: A case of phishing email identification

S Hobert, A Følstad, ELC Law - International Journal of Human-Computer …, 2023 - Elsevier
Chatbots represent a promising approach to provide instructional content and facilitate
active learning processes. However, there is a lack of knowledge as how to design chatbot …