[go: up one dir, main page]

Luo et al., 2013 - Google Patents

Investigating phishing victimization with the Heuristic–Systematic Model: A theoretical framework and an exploration

Luo et al., 2013

View PDF
Document ID
1569094328393324412
Author
Luo X
Zhang W
Burd S
Seazzu A
Publication year
Publication venue
Computers & Security

External Links

Snippet

To the extent that phishing has become a serious threat to information security, there has been rather limited theory-grounded research on this burgeoning phenomenon. In this paper, we develop a theoretical model of victimization by phishing based on the Heuristic …
Continue reading at www.unm.edu (PDF) (other versions)

Similar Documents

Publication Publication Date Title
Luo et al. Investigating phishing victimization with the Heuristic–Systematic Model: A theoretical framework and an exploration
Jensen et al. Training to mitigate phishing attacks using mindfulness techniques
Goel et al. Got phished? Internet security and human vulnerability
Wright et al. The influence of experiential and dispositional factors in phishing: An empirical investigation of the deceived
Carroll et al. How good are we at detecting a phishing attack? Investigating the evolving phishing attack email and why it continues to successfully deceive society
Lusthaus Trust in the world of cybercrime
Sotirakopoulos et al. On the challenges in usable security lab studies: Lessons learned from replicating a study on SSL warnings
Chen et al. An investigation of email processing from a risky decision making perspective
Arend et al. Passive-and not active-risk tendencies predict cyber security behavior
Das et al. Evaluating user susceptibility to phishing attacks
Das A risk-reduction-based incentivization model for human-centered multi-factor authentication
Jensen et al. Using susceptibility claims to motivate behaviour change in IT security
Nohlberg Securing information assets: understanding, measuring and protecting against social engineering attacks
Alseadoon The impact of users' characteristics on their ability to detect phishing emails
Zhang et al. How could I fall for that? Exploring phishing victimization with the heuristic-systematic model
Tambe Ebot et al. Towards a cybercontextual transmission model for online scamming
Langford et al. Phishing faster: Implementing chatgpt into phishing campaigns
Staggs et al. A perceptual taxonomy of contextual cues for cyber trust
Wu Fighting phishing at the user interface
Dittrich The ethics of social honeypots
Muhanad et al. On how Cialdini’s Persuasion principles influence individuals in the context of social engineering: a qualitative study
Lechner Future security: Processes or properties?—Research directions in cybersecurity
Sherine et al. Development of an Efficient and Secured E‐Voting Mobile Application Using Android
Frauenstein An investigation into students responses to various phishing emails and other phishing-related behaviours
Nino et al. Factors in fraudulent emails that deceive elderly people