Which Factors Predict Susceptibility to Phishing? An Empirical Study
Published 2023 View Full Article
- Home
- Publications
- Publication Search
- Publication Details
Title
Which Factors Predict Susceptibility to Phishing? An Empirical Study
Authors
Keywords
-
Journal
COMPUTERS & SECURITY
Volume -, Issue -, Pages 103558
Publisher
Elsevier BV
Online
2023-10-22
DOI
10.1016/j.cose.2023.103558
References
Ask authors/readers for more resources
Related references
Note: Only part of the references are listed.- Intelligent cyber-phishing detection for online
- (2021) P.A. Barraclough et al. COMPUTERS & SECURITY
- An examination of the effect of recent phishing encounters on phishing susceptibility
- (2020) Rui Chen et al. DECISION SUPPORT SYSTEMS
- Susceptibility to Spear-Phishing Emails
- (2019) Tian Lin et al. ACM Transactions on Computer-Human Interaction
- Predicting susceptibility to social influence in phishing emails
- (2019) Kathryn Parsons et al. INTERNATIONAL JOURNAL OF HUMAN-COMPUTER STUDIES
- Embedding Training Within Warnings Improves Skills of Identifying Phishing Webpages
- (2018) Aiping Xiong et al. HUMAN FACTORS
- Which phish get caught? An exploratory study of individuals′ susceptibility to phishing
- (2017) Gregory D. Moody et al. EUROPEAN JOURNAL OF INFORMATION SYSTEMS
- Quantifying Phishing Susceptibility for Detection and Behavior Decisions
- (2016) Casey Inez Canfield et al. HUMAN FACTORS
- Neural Markers of Cybersecurity: An fMRI Study of Phishing and Malware Warnings
- (2016) Ajaya Neupane et al. IEEE Transactions on Information Forensics and Security
- Overconfidence in Phishing Email Detection
- (2016) Jingguo Wang et al. Journal of the Association for Information Systems
- Phishing Detection: A Literature Survey
- (2013) Mahmoud Khonji et al. IEEE Communications Surveys and Tutorials
- Investigating phishing victimization with the Heuristic–Systematic Model: A theoretical framework and an exploration
- (2012) Xin (Robert) Luo et al. COMPUTERS & SECURITY
- The state of phishing attacks
- (2011) Jason Hong COMMUNICATIONS OF THE ACM
- Why do people get phished? Testing individual differences in phishing vulnerability within an integrated, information processing model
- (2011) Arun Vishwanath et al. DECISION SUPPORT SYSTEMS
- Trustworthiness and IT Suspicion: An Evaluation of the Nomological Network
- (2011) Joseph B. Lyons et al. HUMAN FACTORS
- The Influence of Experiential and Dispositional Factors in Phishing: An Empirical Investigation of the Deceived
- (2010) Ryan T. Wright et al. JOURNAL OF MANAGEMENT INFORMATION SYSTEMS
Find Funding. Review Successful Grants.
Explore over 25,000 new funding opportunities and over 6,000,000 successful grants.
ExploreAsk a Question. Answer a Question.
Quickly pose questions to the entire community. Debate answers and get clarity on the most important issues facing researchers.
Get Started