Results for ' phishing'

8 found
Order:
  1.  11
    Understanding Phishing Email Processing and Perceived Trustworthiness Through Eye Tracking.John McAlaney & Peter J. Hills - 2020 - Frontiers in Psychology 11.
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  2.  34
    Ethics and Phishing Experiments.David B. Resnik & Peter R. Finn - 2018 - Science and Engineering Ethics 24 (4):1241-1252.
    Phishing is a fraudulent form of email that solicits personal or financial information from the recipient, such as a password, username, or social security or bank account number. The scammer may use the illicitly obtained information to steal the victim’s money or identity or sell the information to another party. The direct costs of phishing on consumers are exceptionally high and have risen substantially over the past 12 years. Phishing experiments that simulate real world conditions can provide (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  3.  10
    Who Responds to Phishing Emails? An International Investigation of 15-Year-Olds Using PISA Data.John Jerrim - 2023 - British Journal of Educational Studies 71 (6):701-724.
    Young people are facing an ever-increasing array of online dangers. One of the most common is receipt of a phishing email. This paper presents new evidence on the characteristics of young people most likely to respond to such emails. I find approximately one-in-seven 15-year-olds are at risk of responding to a phishing email, rising to one-in-five amongst those from disadvantaged socio-economic backgrounds. Such risks are particularly high amongst young people with low levels of cognitive skill. Unfortunately, students who (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  4.  15
    Creative Persuasion: A Study on Adversarial Behaviors and Strategies in Phishing Attacks.Prashanth Rajivan & Cleotilde Gonzalez - 2018 - Frontiers in Psychology 9.
  5.  8
    Human risk factors in cybersecurity.Tom Cuchta, Brian Blackwood, Thomas R. Devine & Robert J. Niichel - 2023 - Interaction Studies 24 (3):437-463.
    This article presents an experimental analysis of several cybersecurity risks affecting the human attack surface of Fairmont State University, a mid-size state university. We consider two social engineering experiments: a phishing email barrage and a targeted spearphishing campaign. In the phishing experiment, a total of 4,769 students, faculty, and staff on campus were targeted by 90,000 phishing emails. Throughout these experiments, we explored the effectiveness of three types of phishing awareness training. Our results show that (...) emails that make it through IT’s defenses pose a clear and present threat to large educational organizations. Moreover, we found that simple, visual, instructional guides are more effective training tools than long documents or interactive training. (shrink)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  6.  92
    Adaptive intelligent learning approach based on visual anti-spam email model for multi-natural language.Akbal Omran Salman, Dheyaa Ahmed Ibrahim & Mazin Abed Mohammed - 2021 - Journal of Intelligent Systems 30 (1):774-792.
    Spam electronic mails (emails) refer to harmful and unwanted commercial emails sent to corporate bodies or individuals to cause harm. Even though such mails are often used for advertising services and products, they sometimes contain links to malware or phishing hosting websites through which private information can be stolen. This study shows how the adaptive intelligent learning approach, based on the visual anti-spam model for multi-natural language, can be used to detect abnormal situations effectively. The application of this approach (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark   1 citation  
  7.  5
    Deconstruction machines: writing in the age of cyberwar.Justin Joque - 2018 - Minneapolis: University of Minnesota Press.
    Root kit -- Buffer overflow: the space and time of cyberwar -- Injection attack: writing and the information catastrophe -- Distributed denial of service: cybernetic sovereignty -- Spear phishing: nodal subjects -- Firmware vulnerabilities.
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark   1 citation  
  8.  26
    An interdisciplinary approach to address identity theft education.S. Helser - 2011 - Acm Sigcas Computers and Society 41 (2):38-50.
    An earlier version of this paper was presented at the 2011 IEEE International Symposium on Technology and Society at Saint Xavier University in Chicago, Illinois. The focus of this paper is to present observations related to information assurance in rural and urban populations. Based on our experience teaching college students in these environments, we have noted that on entering school, generally, individuals demonstrate limited background knowledge of a variety of computer related technologies. Students begin with a technical disadvantage that represents (...)
    No categories
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark