[HTML][HTML] Exploring the evidence for email phishing training: A sco** review
Background Phishing emails are a pervasive threat to the security of confidential
information. To mitigate this risk, a range of training measures have been developed to …
information. To mitigate this risk, a range of training measures have been developed to …
How well does GPT phish people? An investigation involving cognitive biases and feedback
Phishing scams have increased drastically over the years. Prior research has investigated
various ways to prevent phishing email scams. However, little is known about human …
various ways to prevent phishing email scams. However, little is known about human …
{FakeBehalf}: Imperceptible Email Spoofing Attacks against the Delegation Mechanism in Email Systems
Email has become an essential service for global communication. In email protocols, a
Delegation Mechanism allows emails to be sent by other entities on behalf of the email …
Delegation Mechanism allows emails to be sent by other entities on behalf of the email …
Spam email classification based on cybersecurity potential risk using natural language processing
Spam emails go beyond being merely annoying messages, they have become one of the
most used vectors for cyberattacks such as stealing personal information or spreading …
most used vectors for cyberattacks such as stealing personal information or spreading …
Warning deterrence or knowledge guidance? Research on triggering mechanism of phishing sensitivity
Z Wang, G Li, Y Diao, N Wang - Computers & Security, 2024 - Elsevier
Using SOR model, this study explores the triggering mechanism of phishing sensitivity
caused by security warning deterrence, security knowledge guidance, and security warning …
caused by security warning deterrence, security knowledge guidance, and security warning …
Applying Generative Artificial Intelligence to cognitive models of decision making
Introduction Generative Artificial Intelligence has made significant impacts in many fields,
including computational cognitive modeling of decision making, although these applications …
including computational cognitive modeling of decision making, although these applications …
Training Users Against Human and GPT-4 Generated Social Engineering Attacks
T Malloy, MJ Ferreira, F Fang, C Gonzalez - arxiv preprint arxiv …, 2025 - arxiv.org
In real-world decision making, outcomes are often delayed, meaning individuals must make
multiple decisions before receiving any feedback. Moreover, feedback can be presented in …
multiple decisions before receiving any feedback. Moreover, feedback can be presented in …
Being phished and reporting phishing emails: emotional and knowledge antecedents and training gaps
Research on phishing, a prevalent cybercrime, has not addressed which dispositional and
knowledge antecedents are related to reporting suspicious emails to their organizations and …
knowledge antecedents are related to reporting suspicious emails to their organizations and …
Agreement and Divergence in Predicting Human Phishing Classification Decisions
Despite enormous efforts to develop defenses against phishing attacks, humans still
struggle to detect phishing emails given the constantly evolving attacker strategies. This …
struggle to detect phishing emails given the constantly evolving attacker strategies. This …
On the dimensionality and predictability of phishing susceptibility
Email phishing is a major source of fraud costing individuals and organizations billions of
dollars each year. As phishing attacks increase in sophistication, there is a growing need to …
dollars each year. As phishing attacks increase in sophistication, there is a growing need to …