2020
DOI: 10.1007/978-981-15-5859-7_32
|View full text |Cite
|
Sign up to set email alerts
|

URL’s Folder Name Length as a Phishing Detection Feature

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

2
6
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
3
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(8 citation statements)
references
References 12 publications
2
6
0
Order By: Relevance
“…On the other hand, textual learning medium negatively impacts the ISA. By establishing the importance of knowledge on ISA (Abawayj, 2012;Al-Daeef et al, 2017), our study forms the basis for future efforts to scrutinize knowledge when examining ISA and its related issues. Second, our finding shows that only informal sources of knowledge have positive and significant impact on ISA.…”
Section: Discussionmentioning
confidence: 94%
See 3 more Smart Citations
“…On the other hand, textual learning medium negatively impacts the ISA. By establishing the importance of knowledge on ISA (Abawayj, 2012;Al-Daeef et al, 2017), our study forms the basis for future efforts to scrutinize knowledge when examining ISA and its related issues. Second, our finding shows that only informal sources of knowledge have positive and significant impact on ISA.…”
Section: Discussionmentioning
confidence: 94%
“…Existing literature has studied various ISA-related knowledge aspects, such as knowledge delivery methods of ISA campaigns (Abawayj, 2012;Al-Daeef et al, 2017;Al-Hamdani, 2006), the role of knowledge types in improving ISA (Khan et al, 2011;Siponen, 2000), how the emotion of fear influences ISA positively and how different knowledge sources influence ISA (Al-Hamdani, 2006;Abawayj, 2012;Al-Daeef et al, 2017;Siponen, 2000). Based on the literature, we consolidated the knowledge aspects into types of knowledge, source of knowledge, medium of knowledge and emotion toward knowledge.…”
Section: Literature Review and Hypotheses Developmentmentioning
confidence: 99%
See 2 more Smart Citations
“…Electronic media-based methods include computer-based training (CBT) and web-based training (WBT). Some other methods are formal instructor-led training, video-based, simulation-based and game-based methods (Abawajy, 2014;Al-Daeef et al, 2017;Ghazvini and Shukur, 2017). Previous research indicates that conventional delivery methods have limited success in changing the cybersecurity behaviour of the end-users (Bada et al, 2019;Hart et al, 2020).…”
Section: Introductionmentioning
confidence: 99%