Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Cognition in social engineering empirical research: a systematic literature review
The interdisciplinarity of the Social Engineering (SE) domain creates crucial challenges for
the development and advancement of empirical SE research, making it particularly difficult to …
the development and advancement of empirical SE research, making it particularly difficult to …
Susceptibility to phishing on social network sites: A personality information processing model
Today, the traditional approach used to conduct phishing attacks through email and spoofed
websites has evolved to include social network sites (SNSs). This is because phishers are …
websites has evolved to include social network sites (SNSs). This is because phishers are …
Phishing happens beyond technology: The effects of human behaviors and demographics on each step of a phishing process
Prior studies have shown that the behaviours and attitudes of Internet users influence the
likelihood of being victimised by phishing attacks. Many scammers design a step-by-step …
likelihood of being victimised by phishing attacks. Many scammers design a step-by-step …
Internet-based social engineering psychology, attacks, and defenses: A survey
Internet-based social engineering (SE) attacks are a major cyber threat. These attacks often
serve as the first step in a sophisticated sequence of attacks that target, among other things …
serve as the first step in a sophisticated sequence of attacks that target, among other things …
User characteristics that influence judgment of social engineering attacks in social networks
Social engineering is a growing source of information security concern. Exploits appear to
evolve, with increasing levels of sophistication, in order to target multiple victims. Despite …
evolve, with increasing levels of sophistication, in order to target multiple victims. Despite …
Baiting the hook: factors impacting susceptibility to phishing attacks
Over the last decade, substantial progress has been made in understanding and mitigating
phishing attacks. Nonetheless, the percentage of successful attacks is still on the rise. In this …
phishing attacks. Nonetheless, the percentage of successful attacks is still on the rise. In this …
Is there a scam for everyone? Psychologically profiling cyberscam victims
MT Whitty - European Journal on Criminal Policy and Research, 2020 - Springer
By studying the psychological profile of cyberscam victims, we may be able to develop more
effective methods to reduce the rates of this type of cybercrime substantially. This paper …
effective methods to reduce the rates of this type of cybercrime substantially. This paper …
Predicting individuals' vulnerability to social engineering in social networks
The popularity of social networking sites has attracted billions of users to engage and share
their information on these networks. The vast amount of circulating data and information …
their information on these networks. The vast amount of circulating data and information …
Unraveling the behavioral influence of social media on phishing susceptibility: A Personality-Habit-Information Processing model
Frequent and habitual engagement with social media can reinforce certain activities such as
sharing, clicking hyperlinks, and liking, which may be performed with insufficient cognition …
sharing, clicking hyperlinks, and liking, which may be performed with insufficient cognition …
Presenting suspicious details in {user-facing} E-mail headers does not improve phishing detection
S Zheng, I Becker - Eighteenth Symposium on Usable Privacy and …, 2022 - usenix.org
Phishing requires humans to fall for impersonated sources. Sender authenticity can often be
inferred from e-mail header information commonly displayed by e-mail clients, such as …
inferred from e-mail header information commonly displayed by e-mail clients, such as …