Our system is currently under heavy load due to increased usage. We're actively working on upgrades to improve performance. Thank you for your patience.
2020
DOI: 10.1007/978-3-030-54455-3_2
|View full text |Cite
|
Sign up to set email alerts
|

User-Centered Risk Communication for Safer Browsing

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
3
2

Relationship

2
3

Authors

Journals

citations
Cited by 6 publications
(2 citation statements)
references
References 33 publications
0
2
0
Order By: Relevance
“…Anti-phishing tools are designed to detect phishing contents (Das et al, 2022;Shankar et al, 2019). These tools make use of different approaches which includes whitelisting and blacklisting of known legitimate and phishing URLs respectively or through the heuristics in URL and message content (Das et al, 2020;Zeydan et al, 2014). These tools are implemented at different application levels; client-side or sever-side and integrated into browsers or deployed on web portal (Khonji et al, 2013).…”
Section: Related Workmentioning
confidence: 99%
“…Anti-phishing tools are designed to detect phishing contents (Das et al, 2022;Shankar et al, 2019). These tools make use of different approaches which includes whitelisting and blacklisting of known legitimate and phishing URLs respectively or through the heuristics in URL and message content (Das et al, 2020;Zeydan et al, 2014). These tools are implemented at different application levels; client-side or sever-side and integrated into browsers or deployed on web portal (Khonji et al, 2013).…”
Section: Related Workmentioning
confidence: 99%
“…Unlike physical security and privacy, which people have been dealing with for several thousands of years, information security and privacy continue to be abstract and ambiguous concepts for most individuals. Even computer savvy, college-educated individuals demonstrate difficulty in differentiating between important, everyday security concepts, such as differences between a spam email (Das, Abbott, Gopavaram, Blythe, & Camp, 2020) and a phishing attack (Das, Kim, Tingle, & Nippert-Eng, 2019). People regularly place inappropriate optimism on accessible security controls (e.g., security certificates or antivirus software) while discounting other essential and proactive security controls (e.g., software updates (Stallings, Brown, Bauer, & Bhattacharjee, 2012)).…”
Section: Prashanth Rajivan Phd Industrial and Systems Engineering University Of Washingtonmentioning
confidence: 99%