Don’t click: towards an effective anti-phishing training. A comparative literature review
Published 2020 View Full Article
- Home
- Publications
- Publication Search
- Publication Details
Title
Don’t click: towards an effective anti-phishing training. A comparative literature review
Authors
Keywords
-
Journal
Human-centric Computing and Information Sciences
Volume 10, Issue 1, Pages -
Publisher
Springer Science and Business Media LLC
Online
2020-08-09
DOI
10.1186/s13673-020-00237-7
References
Ask authors/readers for more resources
Related references
Note: Only part of the references are listed.- Email fraud: The search for psychological predictors of susceptibility
- (2019) Helen S. Jones et al. PLoS One
- Spear phishing in a barrel: Insights from a targeted phishing campaign
- (2019) A. J. Burns et al. JOURNAL OF ORGANIZATIONAL COMPUTING AND ELECTRONIC COMMERCE
- Susceptibility to Spear-Phishing Emails
- (2019) Tian Lin et al. ACM Transactions on Computer-Human Interaction
- Phishing: message appraisal and the exploration of fear and self-confidence
- (2019) Deanna House et al. BEHAVIOUR & INFORMATION TECHNOLOGY
- Deterrent effects of punishment and training on insider security threats: a field experiment on phishing attacks
- (2019) Bora Kim et al. BEHAVIOUR & INFORMATION TECHNOLOGY
- Phishing in an academic community: A study of user susceptibility and behavior
- (2019) Alejandra Diaz et al. CRYPTOLOGIA
- Informing, simulating experience, or both: A field experiment on phishing risks
- (2019) Aurélien Baillon et al. PLoS One
- Exploring susceptibility to phishing in the workplace
- (2018) Emma J. Williams et al. INTERNATIONAL JOURNAL OF HUMAN-COMPUTER STUDIES
- Phishing-Aware: A Neuro-Fuzzy Approach for Anti-Phishing on Fog Networks
- (2018) Chuan Pham et al. IEEE Transactions on Network and Service Management
- Phishing-Aware: A Neuro-Fuzzy Approach for Anti-Phishing on Fog Networks
- (2018) Chuan Pham et al. IEEE Transactions on Network and Service Management
- How persuasive is phishing email? The role of authentic design, influence and current events in email judgements
- (2018) Emma J. Williams et al. BEHAVIOUR & INFORMATION TECHNOLOGY
- Machine Learning Based Phishing Detection from URLs
- (2018) Ozgur Koray Sahingoz et al. EXPERT SYSTEMS WITH APPLICATIONS
- Embedding Training Within Warnings Improves Skills of Identifying Phishing Webpages
- (2018) Aiping Xiong et al. HUMAN FACTORS
- Systematization of Knowledge (SoK): A Systematic Review of Software-Based Web Phishing Detection
- (2017) Zuochao Dou et al. IEEE Communications Surveys and Tutorials
- Training to Mitigate Phishing Attacks Using Mindfulness Techniques
- (2017) Matthew L. Jensen et al. JOURNAL OF MANAGEMENT INFORMATION SYSTEMS
- Quantifying Phishing Susceptibility for Detection and Behavior Decisions
- (2016) Casey Inez Canfield et al. HUMAN FACTORS
- Fighting against phishing attacks: state of the art and future challenges
- (2016) B. B. Gupta et al. NEURAL COMPUTING & APPLICATIONS
- Individual processing of phishing emails
- (2016) Brynne Harrison et al. ONLINE INFORMATION REVIEW
- Security Fatigue
- (2016) Brian Stanton et al. IT Professional
- Baiting the hook: factors impacting susceptibility to phishing attacks
- (2016) Cristian Iuga et al. Human-centric Computing and Information Sciences
- The design of phishing studies: Challenges for researchers
- (2015) Kathryn Parsons et al. COMPUTERS & SECURITY
- Phishing Detection: A Literature Survey
- (2013) Mahmoud Khonji et al. IEEE Communications Surveys and Tutorials
- Going Spear Phishing: Exploring Embedded Training and Awareness
- (2013) Deanna D. Caputo et al. IEEE SECURITY & PRIVACY
- Future directions for behavioral information security research
- (2012) Robert E. Crossler et al. COMPUTERS & SECURITY
- The state of phishing attacks
- (2011) Jason Hong COMMUNICATIONS OF THE ACM
- Why do people get phished? Testing individual differences in phishing vulnerability within an integrated, information processing model
- (2011) Arun Vishwanath et al. DECISION SUPPORT SYSTEMS
- Security Education against Phishing: A Modest Proposal for a Major Rethink
- (2011) Iacovos Kirlappos et al. IEEE SECURITY & PRIVACY
- Teaching Johnny not to fall for phish
- (2010) Ponnurangam Kumaraguru et al. ACM Transactions on Internet Technology
- Wisecrackers: A theory-grounded investigation of phishing and pretext social engineering threats to information security
- (2007) Michael Workman JOURNAL OF THE AMERICAN SOCIETY FOR INFORMATION SCIENCE AND TECHNOLOGY
Create your own webinar
Interested in hosting your own webinar? Check the schedule and propose your idea to the Peeref Content Team.
Create NowAsk a Question. Answer a Question.
Quickly pose questions to the entire community. Debate answers and get clarity on the most important issues facing researchers.
Get Started