2014
DOI: 10.1186/s40163-014-0009-y
|View full text |Cite
|
Sign up to set email alerts
|

Achieving a consensual definition of phishing based on a systematic review of the literature

Abstract: Background: Phishing is a widely known phenomenon, but currently lacks a commonly accepted definition. As a result, many studies about phishing use their own definition. The lack of a common definition prevents knowledge accumulation and makes analysing studies or aggregating data about phishing a difficult task. Method:To develop a definition, we used existing definitions as input and combined them using crime science theories as the theoretical framework. A systematic review of the literature up to August 20… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
39
0
1

Year Published

2016
2016
2020
2020

Publication Types

Select...
4
4
1

Relationship

0
9

Authors

Journals

citations
Cited by 84 publications
(50 citation statements)
references
References 32 publications
(34 reference statements)
0
39
0
1
Order By: Relevance
“…In order to make the study as close as possible to a real phishing scenario, we implemented a fullscreen page API. 1 Moreover, by hovering their cursor over specific areas of the images, participants were able to identify useful information about the web page including security certificate information, button links, and basic source code. This was setup to mirror real web pages and to allow participants to move their mouse in the areas they were actually inspecting.…”
Section: Overviewmentioning
confidence: 99%
“…In order to make the study as close as possible to a real phishing scenario, we implemented a fullscreen page API. 1 Moreover, by hovering their cursor over specific areas of the images, participants were able to identify useful information about the web page including security certificate information, button links, and basic source code. This was setup to mirror real web pages and to allow participants to move their mouse in the areas they were actually inspecting.…”
Section: Overviewmentioning
confidence: 99%
“…There is no universal definition for phishing and so far there have been many definitions for phishing attacks. For instance, Figure (2) represents the number of definitions for phishing attacks in respected papers [12]. As can be seen from the figure, in 2012 about 23 different definitions for phishing were presented.…”
Section: A Definitions Of Phishingmentioning
confidence: 99%
“…Phishing is an internet attack using social engineering where the intruder tries to use different online or other techniques such as chat, SMS, and email to encourage users to enter certain websites to do a certain act [12].…”
Section: A Definitions Of Phishingmentioning
confidence: 99%
“…Exploitation begins and extends when the user begins to share passwords and usernames via the social network. The fourth phase, execution, is the stage at which the attacker accomplishes the ultimate goal by executing the attack and exiting the relationship in such a way that the target does not realize [8]. The fact that there is a cycle does not mean all the attacks are similar; each is unique and may involve one or multiple phases.…”
Section: Social Engineering and Phishingmentioning
confidence: 99%