Don't click: towards an effective anti-phishing training. A comparative literature review

D Jampen, G Gür, T Sutter, B Tellenbach - Human-centric Computing and …, 2020 - Springer
Email is of critical importance as a communication channel for both business and personal
matters. Unfortunately, it is also often exploited for phishing attacks. To defend against such …

SoK: a comprehensive reexamination of phishing research from the security perspective

A Das, S Baki, A El Aassal, R Verma… - … Surveys & Tutorials, 2019 - ieeexplore.ieee.org
Phishing and spear phishing are typical examples of masquerade attacks since trust is built
up through impersonation for the attack to succeed. Given the prevalence of these attacks …

Got phished? Internet security and human vulnerability

S Goel, K Williams, E Dincelli - Journal of the Association for …, 2017 - aisel.aisnet.org
A leading cause of security breaches is a basic human vulnerability: our susceptibility to
deception. Hackers exploit this vulnerability by sending phishing emails that induce users to …

Why security and privacy research lies at the centre of the information systems (IS) artefact: Proposing a bold research agenda

PB Lowry, T Dinev, R Willison - European Journal of Information …, 2017 - Taylor & Francis
In this essay, we outline some important concerns in the hope of improving the effectiveness
of security and privacy research. We discuss the need to re-examine our understanding of …

An investigation of phishing awareness and education over time: When and how to best remind users

B Reinheimer, L Aldag, P Mayer, M Mossano… - … Symposium on Usable …, 2020 - usenix.org
Security awareness and education programmes are rolled out in more and more
organisations. However, their effectiveness over time and, correspondingly, appropriate …

Eyes wide open: The role of situational information security awareness for security‐related behaviour

L Jaeger, A Eckhardt - Information Systems Journal, 2021 - Wiley Online Library
Most contemporary studies on information security focus on largely static phenomena in
examining security‐related behaviours. We take a more dynamic, situational and …

Co** responses in phishing detection: an investigation of antecedents and consequences

J Wang, Y Li, HR Rao - Information Systems Research, 2017 - pubsonline.informs.org
This study investigates users' co** responses in the process of phishing email detection.
Three common responses are identified based on the co** literature: task-focused co** …

Being critical is good, but better with philosophy! From digital transformation and values to the future of IS research

F Rowe - European Journal of Information Systems, 2018 - Taylor & Francis
Being critical is a self-directed and self-correcting capacity to think otherwise about an issue
in order to see the limitations of ones' or others' past or present theoretical or practical …

Covid-19 and phishing: Effects of human emotions, behavior, and demographics on the success of phishing attempts during the pandemic

H Abroshan, J Devos, G Poels, E Laermans - Ieee Access, 2021 - ieeexplore.ieee.org
Phishing is an online scam where criminals trick users with various strategies, with the goal
of obtaining sensitive information or compromising accounts, systems, and/or other personal …

Sixteen years of phishing user studies: What have we learned?

S Baki, RM Verma - IEEE Transactions on Dependable and …, 2022 - ieeexplore.ieee.org
Several previous studies have investigated user susceptibility to phishing attacks. A
thorough meta-analysis or systematic review is required to gain a better understanding of …