[1]
|
Digital Literacy and Inclusion
2024
DOI:10.1007/978-3-031-30808-6_4
|
|
|
[2]
|
Towards a cybercontextual transmission model for online scamming
European Journal of Information Systems,
2024
DOI:10.1080/0960085X.2023.2210772
|
|
|
[3]
|
Raising Cyber Security Awareness to Reduce Social Engineering Through Social Media in Indonesia
2023 3rd International Conference on Electronic and Electrical Engineering and Intelligent System (ICE3IS),
2023
DOI:10.1109/ICE3IS59323.2023.10335454
|
|
|
[4]
|
Masks and Human Connections
2023
DOI:10.1007/978-3-031-16673-0_4
|
|
|
[5]
|
Executing Effective Social Engineering Penetration Tests: A Qualitative Analysis
Journal of Applied Security Research,
2023
DOI:10.1080/19361610.2021.2002119
|
|
|
[6]
|
A study on the discourse strategy of telecommunication fraud based on proximization theory
Discourse & Communication,
2023
DOI:10.1177/17504813221129517
|
|
|
[7]
|
“If We Don’t Listen to Them, We Make Them Lose More than Money:” Exploring Reasons for Underreporting and the Needs of Older Scam Victims
Social Sciences,
2023
DOI:10.3390/socsci12050264
|
|
|
[8]
|
Towards a cybercontextual transmission model for online scamming
European Journal of Information Systems,
2023
DOI:10.1080/0960085X.2023.2210772
|
|
|
[9]
|
How Frauds in Times of Crisis Target People
Victims & Offenders,
2022
DOI:10.1080/15564886.2022.2043968
|
|
|
[10]
|
Exposing the Phish: The Effect of Persuasion Techniques in Phishing E-Mails
DG.O 2022: The 23rd Annual International Conference on Digital Government Research,
2022
DOI:10.1145/3543434.3543476
|
|
|
[11]
|
How Frauds in Times of Crisis Target People
Victims & Offenders,
2022
DOI:10.1080/15564886.2022.2043968
|
|
|
[12]
|
Simulated Phishing Attack and Embedded Training Campaign
Journal of Computer Information Systems,
2022
DOI:10.1080/08874417.2021.1919941
|
|
|
[13]
|
The psychology of the internet fraud victimization of older adults: A systematic review
Frontiers in Psychology,
2022
DOI:10.3389/fpsyg.2022.912242
|
|
|
[14]
|
A study on the discourse strategy of telecommunication fraud based on proximization theory
Discourse & Communication,
2022
DOI:10.1177/17504813221129517
|
|
|
[15]
|
Exposing the Phish: The Effect of Persuasion Techniques in Phishing E-Mails
DG.O 2022: The 23rd Annual International Conference on Digital Government Research,
2022
DOI:10.1145/3543434.3543476
|
|
|
[16]
|
Exposing the Phish: The Effect of Persuasion Techniques in Phishing E-Mails
DG.O 2022: The 23rd Annual International Conference on Digital Government Research,
2022
DOI:10.1145/3543434.3543476
|
|
|
[17]
|
Intelligent Phishing Url Detection: A Solution Based On Deep Learning Framework
2021 18th International Computer Conference on Wavelet Active Media Technology and Information Processing (ICCWAMTIP),
2021
DOI:10.1109/ICCWAMTIP53232.2021.9674162
|
|
|
[18]
|
Performing social engineering: A qualitative study of information security deceptions
Computers in Human Behavior,
2021
DOI:10.1016/j.chb.2021.106930
|
|
|
[19]
|
Machine Learning for Multiple Stage Phishing URL Prediction
2021 International Conference on Computational Science and Computational Intelligence (CSCI),
2021
DOI:10.1109/CSCI54926.2021.00049
|
|
|
[20]
|
ICT Analysis and Applications
Lecture Notes in Networks and Systems,
2021
DOI:10.1007/978-981-15-8354-4_45
|
|
|
[21]
|
Performing social engineering: A qualitative study of information security deceptions
Computers in Human Behavior,
2021
DOI:10.1016/j.chb.2021.106930
|
|
|
[22]
|
Executing Effective Social Engineering Penetration Tests: A Qualitative Analysis
Journal of Applied Security Research,
2021
DOI:10.1080/19361610.2021.2002119
|
|
|
[23]
|
Handbook of Research on Intrusion Detection Systems
Advances in Information Security, Privacy, and Ethics,
2020
DOI:10.4018/978-1-7998-2242-4.ch005
|
|
|
[24]
|
Network Algorithms, Data Mining, and Applications
Springer Proceedings in Mathematics & Statistics,
2020
DOI:10.1007/978-3-030-37157-9_13
|
|
|
[25]
|
Orienting the Development of Crime Analysis Processes in Police Organisations Covering the Digital Transformations of Fraud Mechanisms
European Journal on Criminal Policy and Research,
2020
DOI:10.1007/s10610-020-09438-3
|
|
|
[26]
|
The Palgrave Handbook of International Cybercrime and Cyberdeviance
2020
DOI:10.1007/978-3-319-78440-3_42
|
|
|
[27]
|
The Palgrave Handbook of Citizenship and Education
2020
DOI:10.1007/978-3-319-67828-3_65
|
|
|
[28]
|
The Identification of a Model Victim for Social Engineering: A Qualitative Analysis
Victims & Offenders,
2020
DOI:10.1080/15564886.2020.1818658
|
|
|
[29]
|
Phishing Attacks Survey: Types, Vectors, and Technical Approaches
Future Internet,
2020
DOI:10.3390/fi12100168
|
|
|
[30]
|
An Examination of Email Fraudsters’ Modus Operandi
Crime & Delinquency,
2020
DOI:10.1177/0011128720968504
|
|
|
[31]
|
Living in a Spamster's Paradise: Deceit and Threats in Phishing Emails
Masaryk University Journal of Law and Technology,
2019
DOI:10.5817/MUJLT2019-1-3
|
|
|
[32]
|
Human-Computer Interaction – INTERACT 2019
Lecture Notes in Computer Science,
2019
DOI:10.1007/978-3-030-29381-9_35
|
|
|
[33]
|
Challenges of Implementing Training and Awareness Programs Targeting Cyber Security Social Engineering
2019 Cybersecurity and Cyberforensics Conference (CCC),
2019
DOI:10.1109/CCC.2019.00004
|
|
|
[34]
|
Online deception and situations conducive to the progression of non-payment fraud
Journal of Crime and Justice,
2019
DOI:10.1080/0735648X.2019.1691857
|
|
|
[35]
|
The Palgrave Handbook of International Cybercrime and Cyberdeviance
2019
DOI:10.1007/978-3-319-90307-1_42-1
|
|
|
[36]
|
Credulity rather than general trust may increase vulnerability to fraud in older adults: a moderated mediation model
Journal of Elder Abuse & Neglect,
2019
DOI:10.1080/08946566.2018.1564105
|
|
|
[37]
|
Data Analytics: Intelligent Anti-Phishing Techniques Based on Machine Learning
Journal of Information & Knowledge Management,
2019
DOI:10.1142/S0219649219500059
|
|
|
[38]
|
Reviewing Cyber Security Social Engineering Training and Awareness Programs—Pitfalls and Ongoing Issues
Future Internet,
2019
DOI:10.3390/fi11030073
|
|
|
[39]
|
The Palgrave Handbook of Deceptive Communication
2019
DOI:10.1007/978-3-319-96334-1_13
|
|
|
[40]
|
The Palgrave Handbook of Citizenship and Education
2019
DOI:10.1007/978-3-319-67905-1_65-1
|
|
|
[41]
|
The Palgrave Handbook of Deceptive Communication
2019
DOI:10.1007/978-3-319-96334-1_13
|
|
|
[42]
|
Security and Privacy Management, Techniques, and Protocols
Advances in Information Security, Privacy, and Ethics,
2018
DOI:10.4018/978-1-5225-5583-4.ch013
|
|
|
[43]
|
How persuasive is phishing email? The role of authentic design, influence and current events in email judgements
Behaviour & Information Technology,
2018
DOI:10.1080/0144929X.2018.1519599
|
|
|
[44]
|
Testing an Integrated Self-Control and Routine Activities Framework to Examine Malware Infection Victimization
Social Science Computer Review,
2018
DOI:10.1177/0894439318805067
|
|
|
[45]
|
A Critical Appraisal of Contemporary Cyber Security Social Engineering Solutions: Measures, Policies, Tools and Applications
2018 26th International Conference on Systems Engineering (ICSEng),
2018
DOI:10.1109/ICSENG.2018.8638166
|
|
|
[46]
|
Social Engineering: Application of Psychology to Information Security
2018 6th International Conference on Future Internet of Things and Cloud Workshops (FiCloudW),
2018
DOI:10.1109/W-FiCloud.2018.00023
|
|
|
[47]
|
Avoiding the Phishing Bait: The Need for Conventional Countermeasures for Mobile Users
2018 IEEE 9th Annual Information Technology, Electronics and Mobile Communication Conference (IEMCON),
2018
DOI:10.1109/IEMCON.2018.8615095
|
|
|
[48]
|
Application Development and Design
2018
DOI:10.4018/978-1-5225-3422-8.ch037
|
|
|
[49]
|
Priming and warnings are not effective to prevent social engineering attacks
Computers in Human Behavior,
2017
DOI:10.1016/j.chb.2016.09.012
|
|
|
[50]
|
You can trust me: a multimethod analysis of the Nigerian email scam
Security Journal,
2017
DOI:10.1057/s41284-017-0095-0
|
|
|
[51]
|
Press accept to update now: Individual differences in susceptibility to malevolent interruptions
Decision Support Systems,
2017
DOI:10.1016/j.dss.2017.02.014
|
|
|
[52]
|
Individual differences in susceptibility to online influence: A theoretical review
Computers in Human Behavior,
2017
DOI:10.1016/j.chb.2017.03.002
|
|
|
[53]
|
Deception in the Digital Age
2017
DOI:10.1016/B978-0-12-411630-6.00001-3
|
|
|
[54]
|
Occurrences of online fraud complaints: 2002 through 2015
International Journal of Accounting & Information Management,
2017
DOI:10.1108/IJAIM-12-2016-0113
|
|
|
[55]
|
Financial and other frauds in the United States: a panel analysis approach
International Journal of Accounting & Information Management,
2017
DOI:10.1108/IJAIM-03-2017-0033
|
|
|
[56]
|
Rassismuskritik und Widerstandsformen
2017
DOI:10.1007/978-3-658-14721-1_38
|
|
|
[57]
|
A Taxonomy of Attacks and a Survey of Defence Mechanisms for Semantic Social Engineering Attacks
ACM Computing Surveys,
2016
DOI:10.1145/2835375
|
|
|
[58]
|
L’escroquerie sur Internet
Réseaux,
2016
DOI:10.3917/res.197.0137
|
|
|
[59]
|
L’escroquerie sur Internet
Réseaux,
2016
DOI:10.3917/res.197.0137
|
|
|
[60]
|
Fusing system design and social science to reduce susceptibility to online influence
2016
DOI:10.14236/ewic/HCI2016.58
|
|
|
[61]
|
The design of phishing studies: Challenges for researchers
Computers & Security,
2015
DOI:10.1016/j.cose.2015.02.008
|
|
|
[62]
|
Analyzing Art, Culture, and Design in the Digital Age
Advances in Media, Entertainment, and the Arts,
2015
DOI:10.4018/978-1-4666-8679-3.ch014
|
|
|
[63]
|
Improving Knowledge Discovery through the Integration of Data Mining Techniques
Advances in Data Mining and Database Management,
2015
DOI:10.4018/978-1-4666-8513-0.ch014
|
|
|
[64]
|
A Taxonomy of Attacks and a Survey of Defence Mechanisms for Semantic Social Engineering Attacks
ACM Computing Surveys,
2015
DOI:10.1145/2835375
|
|
|
[65]
|
Weapons of Influence Misused: A Social Influence Analysis of Why People Fall Prey to Internet Scams
Social and Personality Psychology Compass,
2014
DOI:10.1111/spc3.12115
|
|
|
[66]
|
How to Obtain Passwords of Online Scammers by Using Social Engineering Methods
2014 International Conference on Cyberworlds,
2014
DOI:10.1109/CW.2014.54
|
|
|
[67]
|
A defence scheme against Identity Theft Attack based on multiple social networks
Expert Systems with Applications,
2014
DOI:10.1016/j.eswa.2013.09.032
|
|
|
[68]
|
Weapons of Influence Misused: A Social Influence Analysis of Why People Fall Prey to Internet Scams
Social and Personality Psychology Compass,
2014
DOI:10.1111/spc3.12115
|
|
|