Categorizing human phishing difficulty: a Phish Scale

[1]  Ben D. Sawyer,et al.  Hacking the Human: The Prevalence Paradox in Cybersecurity , 2018, Hum. Factors.

[2]  Malcolm Robert Pattinson,et al.  Do Users Focus on the Correct Cues to Differentiate Between Phishing and Genuine Emails? , 2016, ACIS.

[3]  D. Kahneman Thinking, Fast and Slow , 2011 .

[4]  Arun Vishwanath,et al.  Suspicion, Cognition, and Automaticity Model of Phishing Susceptibility , 2018, Commun. Res..

[5]  Ryan T. Wright,et al.  Where Did They Go Right? Understanding the Deception in Phishing Communications , 2010 .

[6]  S. Grazioli Where Did They Go Wrong? An Analysis of the Failure of Knowledgeable Internet Consumers to Detect Deception Over the Internet , 2004 .

[7]  Shari Lawrence Pfleeger,et al.  Going Spear Phishing: Exploring Embedded Training and Awareness , 2014, IEEE Security & Privacy.

[8]  Alexander L. Davis,et al.  Quantifying Phishing Susceptibility for Detection and Behavior Decisions , 2016, Hum. Factors.

[9]  Timothy D. Wilson,et al.  Prevalence-induced concept change in human judgment , 2018, Science.

[10]  S. Furnell Phishing: can we spot the signs? , 2007 .

[11]  Mary Frances Theofanos,et al.  No Phishing beyond This Point , 2018, Computer.

[12]  C. Bray Transfer of learning. , 1928 .

[13]  Christopher Hadnagy,et al.  Phishing Dark Waters: The Offensive and Defensive Sides of Malicious E-mails , 2015 .

[14]  Adam N. Joinson,et al.  Exploring susceptibility to phishing in the workplace , 2018, International Journal of Human-Computer Studies.

[15]  R. W. Rogers,et al.  A Protection Motivation Theory of Fear Appeals and Attitude Change1. , 1975, The Journal of psychology.

[16]  Rui Chen,et al.  Why do people get phished? Testing individual differences in phishing vulnerability within an integrated, information processing model , 2011, Decis. Support Syst..

[17]  Sonia Chiasson,et al.  Why phishing still works: User strategies for combating phishing attacks , 2015, Int. J. Hum. Comput. Stud..

[18]  Daejoong Kim,et al.  Understanding persuasive elements in phishing e-mails: A categorical content and semantic network analysis , 2013, Online Inf. Rev..

[19]  Jingguo Wang,et al.  Coping Responses in Phishing Detection: An Investigation of Antecedents and Consequences , 2017, Inf. Syst. Res..

[20]  Matthew L. Bolton,et al.  Evaluating the applicability of the double system lens model to the analysis of phishing email judgments , 2018, Comput. Secur..

[21]  Allard J van der Beek,et al.  Measuring individual work performance: identifying and selecting indicators. , 2014, Work.