Don’t click: towards an effective anti-phishing training. A comparative literature review
出版年份 2020 全文链接
标题
Don’t click: towards an effective anti-phishing training. A comparative literature review
作者
关键词
-
出版物
Human-centric Computing and Information Sciences
Volume 10, Issue 1, Pages -
出版商
Springer Science and Business Media LLC
发表日期
2020-08-09
DOI
10.1186/s13673-020-00237-7
参考文献
相关参考文献
注意:仅列出部分参考文献,下载原文获取全部文献信息。- Email fraud: The search for psychological predictors of susceptibility
- (2019) Helen S. Jones et al. PLoS One
- Spear phishing in a barrel: Insights from a targeted phishing campaign
- (2019) A. J. Burns et al. JOURNAL OF ORGANIZATIONAL COMPUTING AND ELECTRONIC COMMERCE
- Susceptibility to Spear-Phishing Emails
- (2019) Tian Lin et al. ACM Transactions on Computer-Human Interaction
- Phishing: message appraisal and the exploration of fear and self-confidence
- (2019) Deanna House et al. BEHAVIOUR & INFORMATION TECHNOLOGY
- Deterrent effects of punishment and training on insider security threats: a field experiment on phishing attacks
- (2019) Bora Kim et al. BEHAVIOUR & INFORMATION TECHNOLOGY
- Phishing in an academic community: A study of user susceptibility and behavior
- (2019) Alejandra Diaz et al. CRYPTOLOGIA
- Informing, simulating experience, or both: A field experiment on phishing risks
- (2019) Aurélien Baillon et al. PLoS One
- Exploring susceptibility to phishing in the workplace
- (2018) Emma J. Williams et al. INTERNATIONAL JOURNAL OF HUMAN-COMPUTER STUDIES
- Phishing-Aware: A Neuro-Fuzzy Approach for Anti-Phishing on Fog Networks
- (2018) Chuan Pham et al. IEEE Transactions on Network and Service Management
- Phishing-Aware: A Neuro-Fuzzy Approach for Anti-Phishing on Fog Networks
- (2018) Chuan Pham et al. IEEE Transactions on Network and Service Management
- How persuasive is phishing email? The role of authentic design, influence and current events in email judgements
- (2018) Emma J. Williams et al. BEHAVIOUR & INFORMATION TECHNOLOGY
- Machine Learning Based Phishing Detection from URLs
- (2018) Ozgur Koray Sahingoz et al. EXPERT SYSTEMS WITH APPLICATIONS
- Embedding Training Within Warnings Improves Skills of Identifying Phishing Webpages
- (2018) Aiping Xiong et al. HUMAN FACTORS
- Systematization of Knowledge (SoK): A Systematic Review of Software-Based Web Phishing Detection
- (2017) Zuochao Dou et al. IEEE Communications Surveys and Tutorials
- Training to Mitigate Phishing Attacks Using Mindfulness Techniques
- (2017) Matthew L. Jensen et al. JOURNAL OF MANAGEMENT INFORMATION SYSTEMS
- Quantifying Phishing Susceptibility for Detection and Behavior Decisions
- (2016) Casey Inez Canfield et al. HUMAN FACTORS
- Fighting against phishing attacks: state of the art and future challenges
- (2016) B. B. Gupta et al. NEURAL COMPUTING & APPLICATIONS
- Individual processing of phishing emails
- (2016) Brynne Harrison et al. ONLINE INFORMATION REVIEW
- Security Fatigue
- (2016) Brian Stanton et al. IT Professional
- Baiting the hook: factors impacting susceptibility to phishing attacks
- (2016) Cristian Iuga et al. Human-centric Computing and Information Sciences
- The design of phishing studies: Challenges for researchers
- (2015) Kathryn Parsons et al. COMPUTERS & SECURITY
- Phishing Detection: A Literature Survey
- (2013) Mahmoud Khonji et al. IEEE Communications Surveys and Tutorials
- Going Spear Phishing: Exploring Embedded Training and Awareness
- (2013) Deanna D. Caputo et al. IEEE SECURITY & PRIVACY
- Future directions for behavioral information security research
- (2012) Robert E. Crossler et al. COMPUTERS & SECURITY
- The state of phishing attacks
- (2011) Jason Hong COMMUNICATIONS OF THE ACM
- Why do people get phished? Testing individual differences in phishing vulnerability within an integrated, information processing model
- (2011) Arun Vishwanath et al. DECISION SUPPORT SYSTEMS
- Security Education against Phishing: A Modest Proposal for a Major Rethink
- (2011) Iacovos Kirlappos et al. IEEE SECURITY & PRIVACY
- Teaching Johnny not to fall for phish
- (2010) Ponnurangam Kumaraguru et al. ACM Transactions on Internet Technology
- Wisecrackers: A theory-grounded investigation of phishing and pretext social engineering threats to information security
- (2007) Michael Workman JOURNAL OF THE AMERICAN SOCIETY FOR INFORMATION SCIENCE AND TECHNOLOGY
Publish scientific posters with Peeref
Peeref publishes scientific posters from all research disciplines. Our Diamond Open Access policy means free access to content and no publication fees for authors.
Learn MoreFind the ideal target journal for your manuscript
Explore over 38,000 international journals covering a vast array of academic fields.
Search