{Sok}: Still plenty of phish in the sea—a taxonomy of {user-oriented} phishing interventions and avenues for future research

A Franz, V Zimmermann, G Albrecht, K Hartwig… - … symposium on usable …, 2021 - usenix.org
Phishing is a prevalent cyber threat, targeting individuals and organizations alike. Previous
approaches on anti-phishing measures have started to recognize the role of the user, who …

Checking, nudging or scoring? Evaluating e-mail user security tools

SY Zheng, I Becker - Nineteenth Symposium on Usable Privacy and …, 2023 - usenix.org
Phishing e-mail threats are increasing in sophistication. Technical measures alone do not
fully prevent users from falling for them and common e-mail interfaces provide little support …

A Large-Scale Study of Device and Link Presentation in Email Phishing Susceptibility

S Zhuo, R Biddle, L Betts, N Arachchilage… - Proceedings of the 35th …, 2023 - dl.acm.org
Phishing is one of the most prevalent social engineering attacks that targets both
organisations and individuals. It is crucial to understand how email presentation impacts …

Der Phish und die Nutzerin: Formalisierung, Konzeption und Analyse

O Wiese - 2023 - refubium.fu-berlin.de
Phishing-Angriffe sind im Internetzeitalter eine dauerhafte Erscheinung geworden. Eine nur
technische Lösung zur Phishing-Bekämpfung bei E-Mails wurde bisher noch nicht …

Krebssignalwege

WA Schulz - Molekularbiologie menschlicher Krebserkrankungen, 2024 - Springer
Zusammenfassung Die Proliferation, Differenzierung und das Überleben normaler Zellen
werden durch miteinander verknüpfte Wege reguliert, die Signale von Wachstumsfaktoren …

Online Scam Detection Using Human Psychology: Toward Usable Cybersecurity

SY Zheng - 2024 - search.proquest.com
Online scams are taking an emotional and financial toll on people around the globe. Current
scam prevention methods thus are falling short. This thesis aims to understand why people …

A Zero Trust Roadmap for Consumers and Small Businesses

J Luckett - 2024 - search.proquest.com
This study explores the implementation of Zero Trust security principles across consumers
and small businesses. Through in-depth interviews with ten cybersecurity professionals, the …

[HTML][HTML] Human-centered Information Security and Privacy: Investigating How and Why Social and Emotional Factors Affect the Protection of Information Assets

A Franz - 2023 - tuprints.ulb.tu-darmstadt.de
Information systems (IS) are becoming increasingly integrated into the fabric of our everyday
lives, for example, through cloud-based collaboration platforms, smart wearables, and social …

[PDF][PDF] Phishing Resistant Systems: A Literature Review

J Luckett - Journal of Computing Sciences in Colleges, 2023 - personales.upv.es
Phishing is one of the leading cyber attack vectors against businesses and consumers.
President Biden signed an Executive Order on Improving the Nation's Cybersecurity in May …

Cancer pathways

WA Schulz - Molecular Biology of Human Cancers, 2023 - Springer
Proliferation, differentiation, and survival of normal cells are regulated by interlinked
pathways that transmit and integrate signals from growth factors, hormones, cell-cell and cell …