2022
DOI: 10.3390/info13080392
|View full text |Cite
|
Sign up to set email alerts
|

Investigation into Phishing Risk Behaviour among Healthcare Staff

Abstract: A phishing attack is one of the less complicated ways to circumvent sophisticated technical security measures. It is often used to exploit psychological (as as well as other) factors of human users to succeed in social engineering attacks including ransomware. Guided by the state-of-the-arts in a phishing simulation study in healthcare and after deeply assessing the ethical dilemmas, an SMSbased phishing simulation was conducted among healthcare workers in Ghana. The study adopted an in-the-wild study approach… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
1
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 7 publications
(2 citation statements)
references
References 66 publications
(123 reference statements)
0
1
0
Order By: Relevance
“…Another paper (Yeng, et al, 2022) conducts a quantitative and qualitative survey of doctors in the field on simulated phishing attacks using SMS. The results show that doctors who prioritized patient care were not as susceptible to those simulated phishing attacks because they did not pay attention to those messages.…”
Section: The Literature Reviewmentioning
confidence: 99%
“…Another paper (Yeng, et al, 2022) conducts a quantitative and qualitative survey of doctors in the field on simulated phishing attacks using SMS. The results show that doctors who prioritized patient care were not as susceptible to those simulated phishing attacks because they did not pay attention to those messages.…”
Section: The Literature Reviewmentioning
confidence: 99%
“…The process of transformation often makes use of several sorts of systems, such as software platforms, computer networks, and other types of network infrastructure. To identify phishing simulation research methods, technologies and research gaps in practically evaluated literature, a comprehensive review was carried out by Yeng et al [ 30 ]. Phishing serves as the most prevalent ransomware assault because it exploits the weakest link.…”
Section: Related Workmentioning
confidence: 99%