Although phishing is a form of cybercrime that internet users get confronted with rather frequently, many people still get deceived by these practices. Since receiving phishing e-mails is an important prerequisite of victimization, this study focusses on becoming a phishing target. More precisely, we use an integrative lifestyle exposure model to study the effects of risky online routine activities that make a target more likely to come across a motivated offender. Insights of the lifestyle exposure model are combined with propensity theories in order to determine which role impulsivity plays in phishing targeting. To achieve these objectives, data collected in 2016 from a representative sample (n = 723) were used. Support was found for a r...
Phishing is a social engineering scam that can result in data loss, reputational damage, identity th...
The worldwide popularity of social networking sites (SNSs) and the technical features they offer use...
Purpose The purpose of this paper is to understand the influence of exposure to motivated offenders...
Although phishing is a form of cybercrime that internet users get confronted with rather frequently,...
Despite Emails and websites being widely used for communication, collaboration, and day-to-day activ...
The use of the Internet and networking technologies continues to rise. Alongside the benefits that a...
Prior studies have shown that the behaviours and attitudes of Internet users influence the likelihoo...
Phishing is a process in which attackers send emails to Internet users and try to convince them to c...
A leading cause of security breaches is a basic human vulnerability: our susceptibility to deception...
The two studies in this dissertation examine two pervasive and common forms of Internet crimes fro...
This paper presents a set of statistical analyses on an empirical study of phishing email sorting by...
The use of email has been exploited by cybercriminals, as a means of carrying out their cybersecurit...
Over the last decade, substantial progress has been made in understanding and mitigating phishing at...
This preliminary study investigates individuals’ susceptibility in responding to phishing email. Dra...
In the past 25 years, the internet has grown and evolved from a niche networking technology, used al...
Phishing is a social engineering scam that can result in data loss, reputational damage, identity th...
The worldwide popularity of social networking sites (SNSs) and the technical features they offer use...
Purpose The purpose of this paper is to understand the influence of exposure to motivated offenders...
Although phishing is a form of cybercrime that internet users get confronted with rather frequently,...
Despite Emails and websites being widely used for communication, collaboration, and day-to-day activ...
The use of the Internet and networking technologies continues to rise. Alongside the benefits that a...
Prior studies have shown that the behaviours and attitudes of Internet users influence the likelihoo...
Phishing is a process in which attackers send emails to Internet users and try to convince them to c...
A leading cause of security breaches is a basic human vulnerability: our susceptibility to deception...
The two studies in this dissertation examine two pervasive and common forms of Internet crimes fro...
This paper presents a set of statistical analyses on an empirical study of phishing email sorting by...
The use of email has been exploited by cybercriminals, as a means of carrying out their cybersecurit...
Over the last decade, substantial progress has been made in understanding and mitigating phishing at...
This preliminary study investigates individuals’ susceptibility in responding to phishing email. Dra...
In the past 25 years, the internet has grown and evolved from a niche networking technology, used al...
Phishing is a social engineering scam that can result in data loss, reputational damage, identity th...
The worldwide popularity of social networking sites (SNSs) and the technical features they offer use...
Purpose The purpose of this paper is to understand the influence of exposure to motivated offenders...