Don't click: towards an effective anti-phishing training. A comparative literature review
Email is of critical importance as a communication channel for both business and personal
matters. Unfortunately, it is also often exploited for phishing attacks. To defend against such …
matters. Unfortunately, it is also often exploited for phishing attacks. To defend against such …
SoK: a comprehensive reexamination of phishing research from the security perspective
Phishing and spear phishing are typical examples of masquerade attacks since trust is built
up through impersonation for the attack to succeed. Given the prevalence of these attacks …
up through impersonation for the attack to succeed. Given the prevalence of these attacks …
Got phished? Internet security and human vulnerability
A leading cause of security breaches is a basic human vulnerability: our susceptibility to
deception. Hackers exploit this vulnerability by sending phishing emails that induce users to …
deception. Hackers exploit this vulnerability by sending phishing emails that induce users to …
Why security and privacy research lies at the centre of the information systems (IS) artefact: Proposing a bold research agenda
In this essay, we outline some important concerns in the hope of improving the effectiveness
of security and privacy research. We discuss the need to re-examine our understanding of …
of security and privacy research. We discuss the need to re-examine our understanding of …
An investigation of phishing awareness and education over time: When and how to best remind users
Security awareness and education programmes are rolled out in more and more
organisations. However, their effectiveness over time and, correspondingly, appropriate …
organisations. However, their effectiveness over time and, correspondingly, appropriate …
Eyes wide open: The role of situational information security awareness for security‐related behaviour
Most contemporary studies on information security focus on largely static phenomena in
examining security‐related behaviours. We take a more dynamic, situational and …
examining security‐related behaviours. We take a more dynamic, situational and …
Co** responses in phishing detection: an investigation of antecedents and consequences
This study investigates users' co** responses in the process of phishing email detection.
Three common responses are identified based on the co** literature: task-focused co** …
Three common responses are identified based on the co** literature: task-focused co** …
Being critical is good, but better with philosophy! From digital transformation and values to the future of IS research
F Rowe - European Journal of Information Systems, 2018 - Taylor & Francis
Being critical is a self-directed and self-correcting capacity to think otherwise about an issue
in order to see the limitations of ones' or others' past or present theoretical or practical …
in order to see the limitations of ones' or others' past or present theoretical or practical …
Covid-19 and phishing: Effects of human emotions, behavior, and demographics on the success of phishing attempts during the pandemic
Phishing is an online scam where criminals trick users with various strategies, with the goal
of obtaining sensitive information or compromising accounts, systems, and/or other personal …
of obtaining sensitive information or compromising accounts, systems, and/or other personal …
Sixteen years of phishing user studies: What have we learned?
Several previous studies have investigated user susceptibility to phishing attacks. A
thorough meta-analysis or systematic review is required to gain a better understanding of …
thorough meta-analysis or systematic review is required to gain a better understanding of …