Cyber-security is an ever-increasing problem in the 21st century. Though the majority of cyber-security breaches are a direct result of human error (Hu, Dinev, Hart, & Cooke, 2012), there is a dearth of research in psychology on the application of human decision-making for cyber-security compliance. Through an online inbox simulation, the present research examined the utility of a robust psychological model for decision-making, signal detection theory (SDT) for modeling decision-making in the context of receiving and responding to phishing and spear-phishing email scams. The influence of individual differences, specifically conscientiousness, on phishing email detection was also examined. The results indicate that SDT is useful for modeling...
In this paper, the authors report on a collaborative research project that investigates how people r...
Phishing email is one of the biggest risks to online information security due to its ability to expl...
We investigate how email users' characteristics influence their response to phishing emails. A user ...
Cyber-security is an ever-increasing problem in the 21st century. Though the majority of cyber-secur...
<p>OBJECTIVE: We use signal detection theory to measure vulnerability to phishing attacks, including...
Objective: We use signal detection theory to measure vulnerability to phishing attacks, including va...
<p>Phishing attacks target individuals or organizations to steal information (such as credentials) o...
Email phishing is a serious and potentially catastrophic threat to organisations and individuals. Un...
With the increasing amount of digital storage of personal and organizational data, there has been an...
This preliminary study investigates individuals’ susceptibility in responding to phishing email. Dra...
Despite sophisticated phishing email detection systems, and training and awareness programs, humans ...
Decisions that we make about email legitimacy can result in a pernicious threat to security of both ...
Decisions that we make about email legitimacy can result in a pernicious threat to security of both ...
Phishing, as a social engineering attack has become an increasing threat to organizations in cybersp...
Phishing is a social engineering tactic that targets internet users in an attempt to trick them into...
In this paper, the authors report on a collaborative research project that investigates how people r...
Phishing email is one of the biggest risks to online information security due to its ability to expl...
We investigate how email users' characteristics influence their response to phishing emails. A user ...
Cyber-security is an ever-increasing problem in the 21st century. Though the majority of cyber-secur...
<p>OBJECTIVE: We use signal detection theory to measure vulnerability to phishing attacks, including...
Objective: We use signal detection theory to measure vulnerability to phishing attacks, including va...
<p>Phishing attacks target individuals or organizations to steal information (such as credentials) o...
Email phishing is a serious and potentially catastrophic threat to organisations and individuals. Un...
With the increasing amount of digital storage of personal and organizational data, there has been an...
This preliminary study investigates individuals’ susceptibility in responding to phishing email. Dra...
Despite sophisticated phishing email detection systems, and training and awareness programs, humans ...
Decisions that we make about email legitimacy can result in a pernicious threat to security of both ...
Decisions that we make about email legitimacy can result in a pernicious threat to security of both ...
Phishing, as a social engineering attack has become an increasing threat to organizations in cybersp...
Phishing is a social engineering tactic that targets internet users in an attempt to trick them into...
In this paper, the authors report on a collaborative research project that investigates how people r...
Phishing email is one of the biggest risks to online information security due to its ability to expl...
We investigate how email users' characteristics influence their response to phishing emails. A user ...