2023
DOI: 10.1016/j.ijhcs.2023.102996
|View full text |Cite
|
Sign up to set email alerts
|

Indicators of employee phishing email behaviours: Intuition, elaboration, attention, and email typology

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
1
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 7 publications
(3 citation statements)
references
References 72 publications
0
1
0
Order By: Relevance
“…A clustering and categorization of email contents have been provided in Alsmadi and Alhami [57], which takes a similar approach to the one described here. In addition, a thorough investigation into the identification of spam in emails through the application of bio-inspired optimization techniques has demonstrated a high level of detection accuracy [58]. In a similar vein, an email classification system that makes use of artificial neural networks has demonstrated very high levels of performance accuracy [59].…”
Section: Discussion and Open Questions On Previous Empirical Study As...mentioning
confidence: 99%
See 1 more Smart Citation
“…A clustering and categorization of email contents have been provided in Alsmadi and Alhami [57], which takes a similar approach to the one described here. In addition, a thorough investigation into the identification of spam in emails through the application of bio-inspired optimization techniques has demonstrated a high level of detection accuracy [58]. In a similar vein, an email classification system that makes use of artificial neural networks has demonstrated very high levels of performance accuracy [59].…”
Section: Discussion and Open Questions On Previous Empirical Study As...mentioning
confidence: 99%
“…Hash values are generated to ensure that the integrity of the data is not compromised and that it remains unaltered during the investigation. These hash values act as a "fingerprint" for electronic documents, and any minor alteration to the file will result in a different hash value being generated [56][57][58][59][60].…”
Section: • Hashing Algorithmmentioning
confidence: 99%
“…(2023) there are many factors that determine how people respond to phishing emails including sociodemographics, cyber security training, phishing email typology, information processing factors and faith in the institution itself. Buckley, et. al.…”
Section: Impact Of Behavior On Security Typologymentioning
confidence: 99%