The authors review the existing literature on the psychology of email fraud, and attempt to integrate the small but burgeoning set of research findings. They show that research has adopted a variety of methodologies and taken a number of conceptual positions in the attempt to throw light on decisions about emails that may be in best-case scenarios, sub-optimal, or in the worst-case scenarios, catastrophic. They point to the potential from cognitive science and social psychology to inform the field, and attempt to identify the opportunities and limitations from researcher's design decisions. The study of email decision-making is an important topic in its own right, but also has the potential to inform about general cognitive processes too
Fraudulent emails, otherwise known as phishing emails, use a range of influence techniques to persua...
Phishing email is one of the biggest risks to online information security due to its ability to expl...
Background. E-mail phishing is a type of social engineering where the threat actor sends e-mails wit...
The authors review the existing literature on the psychology of email fraud, and attempt to integrat...
The authors review the existing literature on the psychology of email fraud, and attempt to integrat...
Decisions that we make about email legitimacy can result in a pernicious threat to security of both ...
Decisions that we make about email legitimacy can result in a pernicious threat to security of both ...
Decisions that we make about email legitimacy can result in a pernicious threat to security of both ...
The internet provides an ever-expanding, valuable resource for entertainment, communication, and com...
When interacting with computers or digital artifacts, individuals tend to replicate interpersonal tr...
The internet provides an ever-expanding, valuable resource for entertainment, communication, and com...
Cyber-security is an ever-increasing problem in the 21st century. Though the majority of cyber-secur...
Despite sophisticated phishing email detection systems, and training and awareness programs, humans ...
In this paper, the authors report on a collaborative research project that investigates how people r...
This study explored distinct perceptual and decisional contributions to spam email mental construal....
Fraudulent emails, otherwise known as phishing emails, use a range of influence techniques to persua...
Phishing email is one of the biggest risks to online information security due to its ability to expl...
Background. E-mail phishing is a type of social engineering where the threat actor sends e-mails wit...
The authors review the existing literature on the psychology of email fraud, and attempt to integrat...
The authors review the existing literature on the psychology of email fraud, and attempt to integrat...
Decisions that we make about email legitimacy can result in a pernicious threat to security of both ...
Decisions that we make about email legitimacy can result in a pernicious threat to security of both ...
Decisions that we make about email legitimacy can result in a pernicious threat to security of both ...
The internet provides an ever-expanding, valuable resource for entertainment, communication, and com...
When interacting with computers or digital artifacts, individuals tend to replicate interpersonal tr...
The internet provides an ever-expanding, valuable resource for entertainment, communication, and com...
Cyber-security is an ever-increasing problem in the 21st century. Though the majority of cyber-secur...
Despite sophisticated phishing email detection systems, and training and awareness programs, humans ...
In this paper, the authors report on a collaborative research project that investigates how people r...
This study explored distinct perceptual and decisional contributions to spam email mental construal....
Fraudulent emails, otherwise known as phishing emails, use a range of influence techniques to persua...
Phishing email is one of the biggest risks to online information security due to its ability to expl...
Background. E-mail phishing is a type of social engineering where the threat actor sends e-mails wit...