Human factors in phishing attacks: a systematic literature review

G Desolda, LS Ferro, A Marrella, T Catarci… - ACM Computing …, 2021 - dl.acm.org
Phishing is the fraudulent attempt to obtain sensitive information by disguising oneself as a
trustworthy entity in digital communication. It is a type of cyber attack often successful …

A systematic review on fake news research through the lens of news creation and consumption: Research efforts, challenges, and future directions

B Kim, A **ong, D Lee, K Han - PloS one, 2021 - journals.plos.org
Background Although fake news creation and consumption are mutually related and can be
changed to one another, our review indicates that a significant amount of research has …

{“... No} one Can Hack My {Mind”}: Comparing Expert and {Non-Expert} Security Practices

I Ion, R Reeder, S Consolvo - … On Usable Privacy and Security (SOUPS …, 2015 - usenix.org
The state of advice given to people today on how to stay safe online has plenty of room for
improvement. Too many things are asked of them, which may be unrealistic, time …

Expectation and purpose: understanding users' mental models of mobile app privacy through crowdsourcing

J Lin, S Amini, JI Hong, N Sadeh, J Lindqvist… - Proceedings of the 2012 …, 2012 - dl.acm.org
Smartphone security research has produced many useful tools to analyze the privacy-
related behaviors of mobile apps. However, these automated tools cannot assess people's …

Folk models of home computer security

R Wash - Proceedings of the Sixth Symposium on Usable …, 2010 - dl.acm.org
Home computer systems are insecure because they are administered by untrained users.
The rise of botnets has amplified this problem; attackers compromise these computers …

'No Telling Passcodes Out Because They're Private' Understanding Children's Mental Models of Privacy and Security Online

P Kumar, SM Naik, UR Devkar, M Chetty… - Proceedings of the …, 2017 - dl.acm.org
Children under age 12 increasingly use Internet-connected devices to go online. And while
Internet use exposes people to privacy and security risks, few studies examine how these …

[LIBRO][B] Usable security: History, themes, and challenges

S Garfinkel, HR Lipford - 2014 - books.google.com
There has been roughly 15 years of research into approaches for aligning research in
Human Computer Interaction with computer Security, more colloquially known as``usable …

Bridging the gap in computer security warnings: A mental model approach

C Bravo-Lillo, LF Cranor, J Downs… - IEEE Security & …, 2010 - ieeexplore.ieee.org
Computer security warnings are intended to protect users and their computers. However,
research suggests that these warnings might be largely ineffective because they're …

Why do they do what they do?: A study of what motivates users to (not) follow computer security advice

M Fagan, MMH Khan - Twelfth symposium on usable privacy and …, 2016 - usenix.org
Usable security researchers have long been interested in what users do to keep their
devices and data safe and how that compares to recommendations. Additionally, experts …

The phishing funnel model: a design artifact to predict user susceptibility to phishing websites

A Abbasi, D Dobolyi, A Vance… - Information Systems …, 2021 - pubsonline.informs.org
Phishing is a significant security concern for organizations, threatening employees and
members of the public. Phishing threats against employees can lead to severe security …