Luo et al., 2013 - Google Patents
Investigating phishing victimization with the Heuristic–Systematic Model: A theoretical framework and an explorationLuo et al., 2013
View PDF- Document ID
- 1569094328393324412
- Author
- Luo X
- Zhang W
- Burd S
- Seazzu A
- Publication year
- Publication venue
- Computers & Security
External Links
Snippet
To the extent that phishing has become a serious threat to information security, there has been rather limited theory-grounded research on this burgeoning phenomenon. In this paper, we develop a theoretical model of victimization by phishing based on the Heuristic …
- 241001466737 Scopus 0 description 21
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Luo et al. | Investigating phishing victimization with the Heuristic–Systematic Model: A theoretical framework and an exploration | |
Jensen et al. | Training to mitigate phishing attacks using mindfulness techniques | |
Goel et al. | Got phished? Internet security and human vulnerability | |
Wright et al. | The influence of experiential and dispositional factors in phishing: An empirical investigation of the deceived | |
Carroll et al. | How good are we at detecting a phishing attack? Investigating the evolving phishing attack email and why it continues to successfully deceive society | |
Lusthaus | Trust in the world of cybercrime | |
Sotirakopoulos et al. | On the challenges in usable security lab studies: Lessons learned from replicating a study on SSL warnings | |
Chen et al. | An investigation of email processing from a risky decision making perspective | |
Arend et al. | Passive-and not active-risk tendencies predict cyber security behavior | |
Das et al. | Evaluating user susceptibility to phishing attacks | |
Das | A risk-reduction-based incentivization model for human-centered multi-factor authentication | |
Jensen et al. | Using susceptibility claims to motivate behaviour change in IT security | |
Nohlberg | Securing information assets: understanding, measuring and protecting against social engineering attacks | |
Alseadoon | The impact of users' characteristics on their ability to detect phishing emails | |
Zhang et al. | How could I fall for that? Exploring phishing victimization with the heuristic-systematic model | |
Tambe Ebot et al. | Towards a cybercontextual transmission model for online scamming | |
Langford et al. | Phishing faster: Implementing chatgpt into phishing campaigns | |
Staggs et al. | A perceptual taxonomy of contextual cues for cyber trust | |
Wu | Fighting phishing at the user interface | |
Dittrich | The ethics of social honeypots | |
Muhanad et al. | On how Cialdini’s Persuasion principles influence individuals in the context of social engineering: a qualitative study | |
Lechner | Future security: Processes or properties?—Research directions in cybersecurity | |
Sherine et al. | Development of an Efficient and Secured E‐Voting Mobile Application Using Android | |
Frauenstein | An investigation into students responses to various phishing emails and other phishing-related behaviours | |
Nino et al. | Factors in fraudulent emails that deceive elderly people |