Article published In:
Interaction Studies
Vol. 24:3 (2023) ► pp.437463
References
Amos, Z.
(2022) Why do phishing emails have such obvious typos? Security Boulevard.Google Scholar
Burns, A. J., Johnson, M. E., and Caputo, D. D.
(2019) Spear phishing in a barrel: Insights from a targeted phishing campaign. Journal of Organizational Computing and Electronic Commerce, 29(1):24–39. DOI logoGoogle Scholar
Competition, A. and Commission, C.
(2018).Google Scholar
Cuchta, T., Blackwood, B., Devine, T. R., Niichel, R. J., Daniels, K. M., Lutjens, C. H., Maibach, S., and Stephenson, R. J.
(2019) Human risk factors in cybersecurity. In Proceedings of the 20th Annual SIG Conference on Information Technology Education. ACM. DOI logoGoogle Scholar
Dhamija, R., Tygar, J. D., and Hearst, M.
(2006) Why phishing works. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, CHI ’06, pages 581–590, New York, NY, USA. ACM. DOI logoGoogle Scholar
Downs, J. S., Holbrook, M., and Cranor, L. F.
(2007) Behavioral response to phishing risk. In Proceedings of the Anti-phishing Working Groups 2Nd Annual eCrime Researchers Summit, eCrime ’07, pages 37–44, New York, NY, USA. ACM. DOI logoGoogle Scholar
Downs, J. S., Holbrook, M. B., and Cranor, L. F.
(2006) Decision strategies and susceptibility to phishing. In Proceedings of the Second Symposium on Usable Privacy and Security, SOUPS ’06, pages 79–90, New York, NY, USA. ACM. DOI logoGoogle Scholar
Hanna, K. T.
(2021) Definition: attack surface. WhatIs.com.Google Scholar
Inc, P.
(2019) State of the phish. [URL]
Jones, M.
(2015) The effects of conformity and training in a phishing context: Conforming to the school of phish. Master’s thesis, The University of Alabama in Huntsville.
Khonji, M., Iraqi, Y., and Jones, A.
(2013) Phishing detection: A literature survey. IEEE Communications Surveys Tutorials, 15(4):2091–2121. DOI logoGoogle Scholar
Matamoros-Macias;, R. B. K. S. N. S. B. and Ipsen, Y.
(2019) Phishing and cybercrime risks in a university student community. International Journal of Cybersecurity Intelligence & Cybercrime, 21.Google Scholar
Mathews, L.
(2017) Phishing scams cost american businesses half a billion dollars a year. Forbes.Google Scholar
Mimecast
(2019) Email security risk assessment: Quarterly report, june 2019. Accessed: 2019-05-30.Google Scholar
Moody, G. D., Galletta, D. F., and Dunn, B. K.
(2017) Which phish get caught? an exploratory study of individuals’ susceptibility to phishing. European Journal of Information Systems, 26(6):564–584. DOI logoGoogle Scholar
Oliveira, D., Rocha, H., Yang, H., Ellis, D., Dommaraju, S., Muradoglu, M., Weir, D., Soliman, A., Lin, T., and Ebner, N.
(2017) Dissecting spear phishing emails for older vs young adults. In Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems. ACM. DOI logoGoogle Scholar
Sheng, S., Holbrook, M., Kumaraguru, P., Cranor, L. F., and Downs, J.
(2010) Who falls for phish?: A demographic analysis of phishing susceptibility and effectiveness of interventions. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, CHI ’10, pages 373–382, New York, NY, USA. ACM. DOI logoGoogle Scholar
Sheng, S., Magnien, B., Kumaraguru, P., Acquisti, A., Cranor, L. F., Hong, J., and Nunge, E.
(2007) Anti-phishing phil: The design and evaluation of a game that teaches people not to fall for phish. In Proceedings of the 3rd Symposium on Usable Privacy and Security, SOUPS ’07, pages 88–99, New York, NY, USA. ACM. DOI logoGoogle Scholar
Technologies, P.
(2019) Cybersecurity threatscape q4 2018. [URL]
Williams, E. J., Hinds, J., and Joinson, A. N.
(2018) Exploring susceptibility to phishing in the workplace. International Journal of Human-Computer Studies, 1201:1–13. DOI logoGoogle Scholar
(2018) Exploring susceptibility to phishing in the workplace. International Journal of Human-Computer Studies, 201:1 – 13. DOI logoGoogle Scholar
Young-McLear, K., Wyman, G., Benin, J., and Young-McLear, Y.
(2016) A White Hat Approach to Identifying Gaps Between Cybersecurity Education and Training: A Social Engineering Case Study, pages 229–237.Google Scholar
Zhao, R., John, S., Karas, S., Bussell, C., Roberts, J., Six, D., Gavett, B., and Yue, C.
(2017) Design and evaluation of the highly insidious extreme phishing attacks. Computers & Security, 701:634–647. DOI logoGoogle Scholar