In an exploratory quasi-experimental study, 138 students recruited during a university orientation week were exposed to social engineering directives in the form of fake emails, or phishing, over several months in 2017. The study assessed the risks of cybercrime for students by observing their responses. Three types of scam emails were distributed that varied in the degree of individualisation: generic, tailored, and targeted or 'spear'. The study explored the influence of scam type, cybercrime awareness, gender, IT competence and perceived internet safety on susceptibility to email scams. Although tailored and individually crafted email scams were more likely to induce engagement than generic scams, differences were not significant. Ana...
We examined the influence of three social engineering strategies on users’ judgments of how safe it ...
The goal of this research was to find the factors that influence a user’s ability to identify e-mail...
Phishing emails cause enormous losses to both users and organisations. The goal of this study is to ...
In an exploratory quasi-experimental observational study, 138 participants recruited during a univer...
A leading cause of security breaches is a basic human vulnerability: our susceptibility to deception...
In our exploratory quasi-experimental study, 480-student were recruited and exposed to social engine...
In this observational quasi-experimental study, we recruited 200 participants during the Federal Uni...
In this observational quasi-experimental study, we recruited 200 participants during the Federal Uni...
Phishing, or the attempt of criminals to obtain sensitive information through a variety of technique...
A victim of a phishing email could be subject to money loss and identity theft. This paper investiga...
The effectiveness of phishing attacks is being analyzed by many researchers. At the same time, resea...
Despite Emails and websites being widely used for communication, collaboration, and day-to-day activ...
Access ease, mobility, portability, and improved speed have continued to ease the adoption of comput...
The prevalence of using email as a communication tool for personal and professional purposes makes i...
The use of email has been exploited by cybercriminals, as a means of carrying out their cybersecurit...
We examined the influence of three social engineering strategies on users’ judgments of how safe it ...
The goal of this research was to find the factors that influence a user’s ability to identify e-mail...
Phishing emails cause enormous losses to both users and organisations. The goal of this study is to ...
In an exploratory quasi-experimental observational study, 138 participants recruited during a univer...
A leading cause of security breaches is a basic human vulnerability: our susceptibility to deception...
In our exploratory quasi-experimental study, 480-student were recruited and exposed to social engine...
In this observational quasi-experimental study, we recruited 200 participants during the Federal Uni...
In this observational quasi-experimental study, we recruited 200 participants during the Federal Uni...
Phishing, or the attempt of criminals to obtain sensitive information through a variety of technique...
A victim of a phishing email could be subject to money loss and identity theft. This paper investiga...
The effectiveness of phishing attacks is being analyzed by many researchers. At the same time, resea...
Despite Emails and websites being widely used for communication, collaboration, and day-to-day activ...
Access ease, mobility, portability, and improved speed have continued to ease the adoption of comput...
The prevalence of using email as a communication tool for personal and professional purposes makes i...
The use of email has been exploited by cybercriminals, as a means of carrying out their cybersecurit...
We examined the influence of three social engineering strategies on users’ judgments of how safe it ...
The goal of this research was to find the factors that influence a user’s ability to identify e-mail...
Phishing emails cause enormous losses to both users and organisations. The goal of this study is to ...