In this paper we examine phishing emails received over a thirteen-year period and evaluate how they have changed on a number of characteristics. Using a dual-path model of persuasion, we categorize some characteristics as central (such as persuasiveness) and some as peripheral (such as message appearance), and hypothesize that both types of characteristics should be more prominent as phishing attacks have evolved and matured. Surprisingly, results show phishing emails are not more sophisticated over time. We comment on these results, discuss implications for IT security research, and describe future research directions
Fraudulent emails, otherwise known as phishing emails, use a range of influence techniques to persua...
In this paper, the authors report on a collaborative research project that investigates how people r...
Phishing is one of the many types of cybercrime targeting internet users. A phishing message is sent...
The nature of phishing scams seems to vary in degree of complexity. These scams have generally been ...
Phishing as a form of Social Engineering has a prominent presence in today’s threat landscape, and c...
We investigate how email users' characteristics influence their response to phishing emails. A user ...
One of the most common and costly forms of deception and fraud online is phishing. Due to the ramifi...
A victim of phishing emails could be subjected to money loss and identity theft. This paper investig...
Success of phishing attacks depend on effective exploitation of human weaknesses. This research expl...
Abstract: The widespread use of email caused the number of warnings being made about the dark side o...
This preliminary study investigates individuals’ susceptibility in responding to phishing email. Dra...
Phishing attacks are on the increase. The fact that our ways of living, studying and working have dr...
Despite sophisticated phishing email detection systems, and training and awareness programs, humans ...
<p>Success of phishing attacks depend on effective exploitation of human weaknesses. This research e...
Phishing is a social engineering scam that can result in data loss, reputational damage, identity th...
Fraudulent emails, otherwise known as phishing emails, use a range of influence techniques to persua...
In this paper, the authors report on a collaborative research project that investigates how people r...
Phishing is one of the many types of cybercrime targeting internet users. A phishing message is sent...
The nature of phishing scams seems to vary in degree of complexity. These scams have generally been ...
Phishing as a form of Social Engineering has a prominent presence in today’s threat landscape, and c...
We investigate how email users' characteristics influence their response to phishing emails. A user ...
One of the most common and costly forms of deception and fraud online is phishing. Due to the ramifi...
A victim of phishing emails could be subjected to money loss and identity theft. This paper investig...
Success of phishing attacks depend on effective exploitation of human weaknesses. This research expl...
Abstract: The widespread use of email caused the number of warnings being made about the dark side o...
This preliminary study investigates individuals’ susceptibility in responding to phishing email. Dra...
Phishing attacks are on the increase. The fact that our ways of living, studying and working have dr...
Despite sophisticated phishing email detection systems, and training and awareness programs, humans ...
<p>Success of phishing attacks depend on effective exploitation of human weaknesses. This research e...
Phishing is a social engineering scam that can result in data loss, reputational damage, identity th...
Fraudulent emails, otherwise known as phishing emails, use a range of influence techniques to persua...
In this paper, the authors report on a collaborative research project that investigates how people r...
Phishing is one of the many types of cybercrime targeting internet users. A phishing message is sent...