In an exploratory quasi-experimental observational study, 138 participants recruited during a university orientation week were exposed to social engineering directives in the form of fake email or phishing attacks over several months in 2017. These email attacks attempted to elicit personal information from participants or entice them into clicking links which may have been compromised in a real-world setting. The study aimed to determine the risks of cybercrime for students by observing their responses to social engineering and exploring attitudes to cybercrime risks before and after the phishing phase. Three types of scam emails were distributed that varied in the degree of individualization: generic, tailored, and targeted or ‘spear.’ To...
This paper reports on a simulated phishing experiment targeting 6,938 faculty and staff at George Ma...
The use of email has been exploited by cybercriminals, as a means of carrying out their cybersecurit...
In the past 25 years, the internet has grown and evolved from a niche networking technology, used al...
In an exploratory quasi-experimental observational study, 138 participants recruited during a univer...
In an exploratory quasi-experimental study, 138 students recruited during a university orientation w...
In this observational quasi-experimental study, we recruited 200 participants during the Federal Uni...
In our exploratory quasi-experimental study, 480-student were recruited and exposed to social engine...
In this observational quasi-experimental study, we recruited 200 participants during the Federal Uni...
A leading cause of security breaches is a basic human vulnerability: our susceptibility to deception...
Access ease, mobility, portability, and improved speed have continued to ease the adoption of comput...
The effectiveness of phishing attacks is being analyzed by many researchers. At the same time, resea...
This study focuses on gauging awareness of different phishing communication students in the School o...
Despite Emails and websites being widely used for communication, collaboration, and day-to-day activ...
Phishing, or the attempt of criminals to obtain sensitive information through a variety of technique...
Information manipulation for deception continues to evolve at a remarkable rate. Artificial intellig...
This paper reports on a simulated phishing experiment targeting 6,938 faculty and staff at George Ma...
The use of email has been exploited by cybercriminals, as a means of carrying out their cybersecurit...
In the past 25 years, the internet has grown and evolved from a niche networking technology, used al...
In an exploratory quasi-experimental observational study, 138 participants recruited during a univer...
In an exploratory quasi-experimental study, 138 students recruited during a university orientation w...
In this observational quasi-experimental study, we recruited 200 participants during the Federal Uni...
In our exploratory quasi-experimental study, 480-student were recruited and exposed to social engine...
In this observational quasi-experimental study, we recruited 200 participants during the Federal Uni...
A leading cause of security breaches is a basic human vulnerability: our susceptibility to deception...
Access ease, mobility, portability, and improved speed have continued to ease the adoption of comput...
The effectiveness of phishing attacks is being analyzed by many researchers. At the same time, resea...
This study focuses on gauging awareness of different phishing communication students in the School o...
Despite Emails and websites being widely used for communication, collaboration, and day-to-day activ...
Phishing, or the attempt of criminals to obtain sensitive information through a variety of technique...
Information manipulation for deception continues to evolve at a remarkable rate. Artificial intellig...
This paper reports on a simulated phishing experiment targeting 6,938 faculty and staff at George Ma...
The use of email has been exploited by cybercriminals, as a means of carrying out their cybersecurit...
In the past 25 years, the internet has grown and evolved from a niche networking technology, used al...