Categorizing human phishing difficulty: a Phish Scale
暂无分享,去创建一个
[1] Ben D. Sawyer,et al. Hacking the Human: The Prevalence Paradox in Cybersecurity , 2018, Hum. Factors.
[2] Malcolm Robert Pattinson,et al. Do Users Focus on the Correct Cues to Differentiate Between Phishing and Genuine Emails? , 2016, ACIS.
[3] D. Kahneman. Thinking, Fast and Slow , 2011 .
[4] Arun Vishwanath,et al. Suspicion, Cognition, and Automaticity Model of Phishing Susceptibility , 2018, Commun. Res..
[5] Ryan T. Wright,et al. Where Did They Go Right? Understanding the Deception in Phishing Communications , 2010 .
[6] S. Grazioli. Where Did They Go Wrong? An Analysis of the Failure of Knowledgeable Internet Consumers to Detect Deception Over the Internet , 2004 .
[7] Shari Lawrence Pfleeger,et al. Going Spear Phishing: Exploring Embedded Training and Awareness , 2014, IEEE Security & Privacy.
[8] Alexander L. Davis,et al. Quantifying Phishing Susceptibility for Detection and Behavior Decisions , 2016, Hum. Factors.
[9] Timothy D. Wilson,et al. Prevalence-induced concept change in human judgment , 2018, Science.
[10] S. Furnell. Phishing: can we spot the signs? , 2007 .
[11] Mary Frances Theofanos,et al. No Phishing beyond This Point , 2018, Computer.
[12] C. Bray. Transfer of learning. , 1928 .
[13] Christopher Hadnagy,et al. Phishing Dark Waters: The Offensive and Defensive Sides of Malicious E-mails , 2015 .
[14] Adam N. Joinson,et al. Exploring susceptibility to phishing in the workplace , 2018, International Journal of Human-Computer Studies.
[15] R. W. Rogers,et al. A Protection Motivation Theory of Fear Appeals and Attitude Change1. , 1975, The Journal of psychology.
[16] Rui Chen,et al. Why do people get phished? Testing individual differences in phishing vulnerability within an integrated, information processing model , 2011, Decis. Support Syst..
[17] Sonia Chiasson,et al. Why phishing still works: User strategies for combating phishing attacks , 2015, Int. J. Hum. Comput. Stud..
[18] Daejoong Kim,et al. Understanding persuasive elements in phishing e-mails: A categorical content and semantic network analysis , 2013, Online Inf. Rev..
[19] Jingguo Wang,et al. Coping Responses in Phishing Detection: An Investigation of Antecedents and Consequences , 2017, Inf. Syst. Res..
[20] Matthew L. Bolton,et al. Evaluating the applicability of the double system lens model to the analysis of phishing email judgments , 2018, Comput. Secur..
[21] Allard J van der Beek,et al. Measuring individual work performance: identifying and selecting indicators. , 2014, Work.