2015
DOI: 10.1016/j.cose.2015.02.008
|View full text |Cite
|
Sign up to set email alerts
|

The design of phishing studies: Challenges for researchers

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

5
66
0

Year Published

2016
2016
2024
2024

Publication Types

Select...
5
4
1

Relationship

0
10

Authors

Journals

citations
Cited by 73 publications
(71 citation statements)
references
References 23 publications
5
66
0
Order By: Relevance
“…There are some vulnerabilities in human cognition which help attackers in deceiving people. Researchers in [23] categorized emails based on their intention into four groups: (1) Risk or Loss (2) Benefit or Gain (3) Account Information and (4) Information Only. The first category uses the sense of urgency and panic to make people click on a link and expose their sensitive information.…”
Section: E Human Vulnerabilitymentioning
confidence: 99%
“…There are some vulnerabilities in human cognition which help attackers in deceiving people. Researchers in [23] categorized emails based on their intention into four groups: (1) Risk or Loss (2) Benefit or Gain (3) Account Information and (4) Information Only. The first category uses the sense of urgency and panic to make people click on a link and expose their sensitive information.…”
Section: E Human Vulnerabilitymentioning
confidence: 99%
“…The layout of e-commerce and banking sites is almost similar in different languages. Heuristics based phishing detection techniques [54,69,86,87] use the keywords, and they are language dependent. As we discussed, some of the visual feature based techniques [48,71] can detect this attack because they utilise the webpage features like the logo of the company, CSS Structure, DOM tree, and so forth.…”
Section: Open Issues and Challengesmentioning
confidence: 99%
“…Interventions that increase attention or effort have sometimes been found to increase sensitivity. For example, Parsons and colleagues found that telling users that they were being evaluated for their phishing detection ability increased their sensitivity without changing their response bias . Wolfe and colleagues observed an increase in sensitivity during high base rate training trials .…”
Section: Introductionmentioning
confidence: 99%