Cognition in social engineering empirical research: a systematic literature review

P Burda, L Allodi, N Zannone - ACM Transactions on Computer-Human …, 2024 - dl.acm.org
The interdisciplinarity of the Social Engineering (SE) domain creates crucial challenges for
the development and advancement of empirical SE research, making it particularly difficult to …

Susceptibility to phishing on social network sites: A personality information processing model

ED Frauenstein, S Flowerday - Computers & security, 2020 - Elsevier
Today, the traditional approach used to conduct phishing attacks through email and spoofed
websites has evolved to include social network sites (SNSs). This is because phishers are …

Phishing happens beyond technology: The effects of human behaviors and demographics on each step of a phishing process

H Abroshan, J Devos, G Poels, E Laermans - IEEE Access, 2021 - ieeexplore.ieee.org
Prior studies have shown that the behaviours and attitudes of Internet users influence the
likelihood of being victimised by phishing attacks. Many scammers design a step-by-step …

Internet-based social engineering psychology, attacks, and defenses: A survey

TT Longtchi, RM Rodriguez, L Al-Shawaf… - Proceedings of the …, 2024 - ieeexplore.ieee.org
Internet-based social engineering (SE) attacks are a major cyber threat. These attacks often
serve as the first step in a sophisticated sequence of attacks that target, among other things …

User characteristics that influence judgment of social engineering attacks in social networks

SM Albladi, GRS Weir - Human-centric Computing and Information …, 2018 - Springer
Social engineering is a growing source of information security concern. Exploits appear to
evolve, with increasing levels of sophistication, in order to target multiple victims. Despite …

Baiting the hook: factors impacting susceptibility to phishing attacks

C Iuga, JRC Nurse, A Erola - Human-centric Computing and Information …, 2016 - Springer
Over the last decade, substantial progress has been made in understanding and mitigating
phishing attacks. Nonetheless, the percentage of successful attacks is still on the rise. In this …

Is there a scam for everyone? Psychologically profiling cyberscam victims

MT Whitty - European Journal on Criminal Policy and Research, 2020 - Springer
By studying the psychological profile of cyberscam victims, we may be able to develop more
effective methods to reduce the rates of this type of cybercrime substantially. This paper …

Predicting individuals' vulnerability to social engineering in social networks

SM Albladi, GRS Weir - Cybersecurity, 2020 - Springer
The popularity of social networking sites has attracted billions of users to engage and share
their information on these networks. The vast amount of circulating data and information …

Unraveling the behavioral influence of social media on phishing susceptibility: A Personality-Habit-Information Processing model

ED Frauenstein, S Flowerday, S Mishi… - Information & …, 2023 - Elsevier
Frequent and habitual engagement with social media can reinforce certain activities such as
sharing, clicking hyperlinks, and liking, which may be performed with insufficient cognition …

Presenting suspicious details in {user-facing} E-mail headers does not improve phishing detection

S Zheng, I Becker - Eighteenth Symposium on Usable Privacy and …, 2022 - usenix.org
Phishing requires humans to fall for impersonated sources. Sender authenticity can often be
inferred from e-mail header information commonly displayed by e-mail clients, such as …