2015
DOI: 10.1016/j.ijhcs.2015.05.005
|View full text |Cite
|
Sign up to set email alerts
|

Why phishing still works: User strategies for combating phishing attacks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

3
129
0

Year Published

2016
2016
2020
2020

Publication Types

Select...
4
2
2

Relationship

0
8

Authors

Journals

citations
Cited by 188 publications
(136 citation statements)
references
References 37 publications
(46 reference statements)
3
129
0
Order By: Relevance
“…There is also research about using eye trackers to better understand human users' cognitive processes when interacting with security-sensitive systems, e.g., recently Miyamoto et al [22] conducted a study on using eye-tracking data to link UI elements to the detection of possible phishing websites. Alsharnouby et al [3] used eye trackers to assess the influence of browser security indicators and the awareness of phishing on a user's ability to avoid cyber attacks. While there is quite some work on the combined use of eye tracking and cognitive modeling, to the best of our knowledge, except some general recommendations such as those reported in [15] still limited work has been done on combining the two techniques for cyber security applications.…”
Section: Related Workmentioning
confidence: 99%
“…There is also research about using eye trackers to better understand human users' cognitive processes when interacting with security-sensitive systems, e.g., recently Miyamoto et al [22] conducted a study on using eye-tracking data to link UI elements to the detection of possible phishing websites. Alsharnouby et al [3] used eye trackers to assess the influence of browser security indicators and the awareness of phishing on a user's ability to avoid cyber attacks. While there is quite some work on the combined use of eye tracking and cognitive modeling, to the best of our knowledge, except some general recommendations such as those reported in [15] still limited work has been done on combining the two techniques for cyber security applications.…”
Section: Related Workmentioning
confidence: 99%
“…PhishTank provides data for download or access via an API call under a restrictive license. On the other hand, Alexa provides commercial web traffic data, global rankings, and analytics of about 30 million websites (Alsharnouby et al, 2015).…”
Section: Proposed Schemementioning
confidence: 99%
“…Such fake websites or electronic communication usually comes with the feel or patterns of genuine communication or original sites. Lack of knowledge of security indicators, bounded attention, visual deception and lack of computer system knowledge on the part of unsuspecting users sometimes assists the phishers to have a field day (Alsharnouby et al, 2015). For instance, the Anti-Phishing Working Group (APWG) reported that the total number of unique phishing sites detected from Q1 through Q3 of 2015 was 630,494 (www.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…Empirical studies focus on a simple "yes" or "no" response (i.e., subjects use or do not use the indicators) or some more nuanced version (e.g., how much time subjects spend looking at the security indicators) [5], [6]. One limitation of these paradigms is that correct and incorrect login decisions could be due to more than one source of knowledge or decision process.…”
Section: Introductionmentioning
confidence: 99%