Background. E-mail phishing is a type of social engineering where the threat actor sends e-mails with the intention to, for example, gain sensitive information or gain access to sensitive assets. Anyone can be a target of a phishing attempt, and any user that uses a digital environment should be aware of which factors to be attentive to in an e-mail. Objectives. This thesis intends to study the practical ability to identify phishing e-mails among users and what factors they are looking for when performing the classification. The intention is also to investigate if subjective knowledge impacts practical ability. Methods. A user study was conducted where the participants were to classify e-mails from an inbox as either phishing or legitimate....
Despite Emails and websites being widely used for communication, collaboration, and day-to-day activ...
Phishing, or the attempt of criminals to obtain sensitive information through a variety of technique...
Purpose This paper aims to review the behavioral phishing literature to understand why anti-phishin...
Social engineering attacking method is a serious threat that targets the human element of informatio...
Phishing emails are semantic attacks that con people into divulging sensitive information using tech...
Part 8: Social EngineeringInternational audienceUsing a role play scenario experiment, 117 participa...
The goal of this research was to find the factors that influence a user’s ability to identify e-mail...
Phishing is a scam that has been around for a long time and has only grown in popularity. In this st...
Email phishing is a serious and potentially catastrophic threat to organisations and individuals. Un...
A victim of phishing emails could be subjected to money loss and identity theft. This paper investig...
We investigate how email users' characteristics influence their response to phishing emails. A user ...
Phishing emails are semantic attacks that con people into divulging sensitive information using tech...
Phishing is a widespread threat that has attracted a lot of attention from the security community. A...
In this paper, the authors report on a collaborative research project that investigates how people r...
Phishing is a social engineering tactic that targets internet users in an attempt to trick them into...
Despite Emails and websites being widely used for communication, collaboration, and day-to-day activ...
Phishing, or the attempt of criminals to obtain sensitive information through a variety of technique...
Purpose This paper aims to review the behavioral phishing literature to understand why anti-phishin...
Social engineering attacking method is a serious threat that targets the human element of informatio...
Phishing emails are semantic attacks that con people into divulging sensitive information using tech...
Part 8: Social EngineeringInternational audienceUsing a role play scenario experiment, 117 participa...
The goal of this research was to find the factors that influence a user’s ability to identify e-mail...
Phishing is a scam that has been around for a long time and has only grown in popularity. In this st...
Email phishing is a serious and potentially catastrophic threat to organisations and individuals. Un...
A victim of phishing emails could be subjected to money loss and identity theft. This paper investig...
We investigate how email users' characteristics influence their response to phishing emails. A user ...
Phishing emails are semantic attacks that con people into divulging sensitive information using tech...
Phishing is a widespread threat that has attracted a lot of attention from the security community. A...
In this paper, the authors report on a collaborative research project that investigates how people r...
Phishing is a social engineering tactic that targets internet users in an attempt to trick them into...
Despite Emails and websites being widely used for communication, collaboration, and day-to-day activ...
Phishing, or the attempt of criminals to obtain sensitive information through a variety of technique...
Purpose This paper aims to review the behavioral phishing literature to understand why anti-phishin...