7,636
Views
86
CrossRef citations to date
0
Altmetric
Web based cooperation and collaboration

Phishing for phishing awareness

&
Pages 584-593 | Received 18 Mar 2011, Accepted 13 Oct 2011, Published online: 09 Nov 2011

Keep up to date with the latest research on this topic with citation updates for this article.

Read on this site (11)

Neha Chhabra Roy & Sreeleakha Prabhakaran. (2024) Insider employee-led cyber fraud (IECF) in Indian banks: from identification to sustainable mitigation planning. Behaviour & Information Technology 43:5, pages 876-906.
Read now
Kevin F. Steinmetz. (2023) Executing Effective Social Engineering Penetration Tests: A Qualitative Analysis. Journal of Applied Security Research 18:2, pages 246-266.
Read now
Emmanuel W. Ayaburi & Francis Kofi Andoh-Baidoo. (2023) How do technology use patterns influence phishing susceptibility? A two-wave study of the role of reformulated locus of control. European Journal of Information Systems 0:0, pages 1-21.
Read now
Shian-Shyong Tseng, Tsung-Yu Yang, Wen-Chung Shih & Bo-Yang Shan. (2022) Building a self-evolving iMonsters board game for cyber-security education. Interactive Learning Environments 0:0, pages 1-19.
Read now
William Yeoh, He Huang, Wang-Sheng Lee, Fadi Al Jafari & Rachel Mansson. (2022) Simulated Phishing Attack and Embedded Training Campaign. Journal of Computer Information Systems 62:4, pages 802-821.
Read now
Katrin Hartwig & Christian Reuter. (2022) Nudging users towards better security decisions in password creation using whitebox-based multidimensional visualisations. Behaviour & Information Technology 41:7, pages 1357-1380.
Read now
Bartlomiej Hanus, Yu Andy Wu & James Parrish. (2022) Phish Me, Phish Me Not. Journal of Computer Information Systems 62:3, pages 516-526.
Read now
Hamidreza Shahbaznezhad, Farzan Kolini & Mona Rashidirad. (2021) Employees’ Behavior in Phishing Attacks: What Individual, Organizational, and Technological Factors Matter?. Journal of Computer Information Systems 61:6, pages 539-550.
Read now
Bora Kim, Do-Yeon Lee & Beomsoo Kim. (2020) Deterrent effects of punishment and training on insider security threats: a field experiment on phishing attacks. Behaviour & Information Technology 39:11, pages 1156-1175.
Read now
A. J. Burns, M. Eric Johnson & Deanna D. Caputo. (2019) Spear phishing in a barrel: Insights from a targeted phishing campaign. Journal of Organizational Computing and Electronic Commerce 29:1, pages 24-39.
Read now
Mona A. Mohamed, Joyram Chakraborty & Josh Dehlinger. (2017) Trading off usability and security in user interface design through mental models. Behaviour & Information Technology 36:5, pages 493-516.
Read now

Articles from other publishers (75)

Pavlo Burda, Luca Allodi & Nicola Zannone. (2024) Cognition in Social Engineering Empirical Research: A Systematic Literature Review. ACM Transactions on Computer-Human Interaction 31:2, pages 1-55.
Crossref
Nina Marshall, Daniel Sturman & Jaime C. Auton. (2024) Exploring the evidence for email phishing training: A scoping review. Computers & Security 139, pages 103695.
Crossref
Ivan Skula & Michal Kvet. (2024) A Framework for Preparing a Balanced and Comprehensive Phishing Dataset. IEEE Access 12, pages 53610-53622.
Crossref
Julia Prümmer, Tommy van Steen & Bibi van den Berg. (2024) A systematic review of current cybersecurity training methods. Computers & Security 136, pages 103585.
Crossref
Qi Li & Mingyu Cheng. 2024. Advanced Parallel Processing Technologies. Advanced Parallel Processing Technologies 351 371 .
Emin Huseynov. (2023) Phishing Windows Login Credentials Using HTML Full-page Technique. Phishing Windows Login Credentials Using HTML Full-page Technique.
Olufunsho I. Falowo, Jess Kropczynski & Chengcheng Li. (2023) Protecting Critical Infrastructure: Strategies for Managing Cybersecurity Risks in Nuclear Fusion Facilities. Protecting Critical Infrastructure: Strategies for Managing Cybersecurity Risks in Nuclear Fusion Facilities.
Andrea Kő, Gábor Tarján & Ariel Mitev. (2023) Information security awareness maturity: conceptual and practical aspects in Hungarian organizations. Information Technology & People 36:8, pages 174-195.
Crossref
S. Surya, Dipen Bhuva, Abhishek Bhuva, Sunil S. Chavan, D. Khalandar Basha & Saumitra Chattopadhyay. (2023) Implementation of Internet of Things (IoT) framework for Governing Modern Cyber Attacks in Computer Network. Implementation of Internet of Things (IoT) framework for Governing Modern Cyber Attacks in Computer Network.
Joakim Kävrestad, Marcus Nohlberg & Steven Furnell. (2023) A Taxonomy of SETA Methods and Linkage to Delivery Preferences. ACM SIGMIS Database: the DATABASE for Advances in Information Systems 54:4, pages 107-133.
Crossref
Alin-Marius Stanciu, Horia Ciocârlie & Carla-Patricia Julean. (2023) Product Security: An Overview of Concepts and Challenges. Product Security: An Overview of Concepts and Challenges.
Anthony William Chandra, Zefanya Chandiarta, Lutfi Setiyawan, Alexander Agung Santoso Gunawan & Ivan Sebastian Edbert. (2023) Public Awareness of Phishing in Indonesia: System Literature Review. Public Awareness of Phishing in Indonesia: System Literature Review.
Alvin Kenneth, Bernard Bryan Hayashi, Jason Lionardi, Stevanus Richie, Said Achmad, Franz Adeta Junior & Nadia. (2023) Phishing Attack Awareness Among College Students. Phishing Attack Awareness Among College Students.
Shiyue Liu, Hua Wu, Guang Cheng & Xiaoyan Hu. (2023) Real-Time Phishing Detection Based on URL Multi-Perspective Features: Aiming at the Real Web Environment. Real-Time Phishing Detection Based on URL Multi-Perspective Features: Aiming at the Real Web Environment.
Arzu Tufan & Gurkan Tuna. 2023. Handbook of Research on Cybersecurity Risk in Contemporary Business Systems. Handbook of Research on Cybersecurity Risk in Contemporary Business Systems 49 78 .
Ashish Rathee, Parveen Malik & Manoj Kumar Parida. (2023) Network Intrusion Detection System using Deep Learning Techniques. Network Intrusion Detection System using Deep Learning Techniques.
Moruf Akin Adebowale, Khin T. Lwin & M. A. Hossain. (2020) Intelligent phishing detection scheme using deep learning algorithms. Journal of Enterprise Information Management 36:3, pages 747-766.
Crossref
Katharina Schiller, Florian Adamsky & Zinaida Benenson. (2023) Towards an Empirical Study to Determine the Effectiveness of Support Systems against E-Mail Phishing Attacks. Towards an Empirical Study to Determine the Effectiveness of Support Systems against E-Mail Phishing Attacks.
Ahmad R. Pratama, Nunu Vadila & Firman M. Firmansyah. Exposing generational and gender gap in phishing awareness among young adults: A survey experiment. Exposing generational and gender gap in phishing awareness among young adults: A survey experiment.
Mrinal Paliwal. A review on cyber security. A review on cyber security.
Daniel Sturman, Chelsea Valenzuela, Oliver Plate, Tazin Tanvir, Jaime C. Auton, Piers Bayl-Smith & Mark W. Wiggins. (2023) The role of cue utilization in the detection of phishing emails. Applied Ergonomics 106, pages 103887.
Crossref
Giuseppe Desolda, Lauren S. Ferro, Andrea Marrella, Tiziana Catarci & Maria Francesca Costabile. (2021) Human Factors in Phishing Attacks: A Systematic Literature Review. ACM Computing Surveys 54:8, pages 1-35.
Crossref
Tim Kollmer, Andreas Eckhardt & Victoria Reibenspiess. (2022) Explaining consumer suspicion: insights of a vignette study on online product reviews. Electronic Markets 32:3, pages 1221-1238.
Crossref
Adir Solomon, Michael Michaelshvili, Ron Bitton, Bracha Shapira, Lior Rokach, Rami Puzis & Asaf Shabtai. (2022) Contextual security awareness: A context-based approach for assessing the security awareness of users. Knowledge-Based Systems 246, pages 108709.
Crossref
Qi Li, Mingyu Cheng, Junfeng Wang & Bowen Sun. (2022) LSTM Based Phishing Detection for Big Email Data. IEEE Transactions on Big Data 8:1, pages 278-288.
Crossref
Dave McKay & Atefeh Mashatan. 2022. Blockchain in Life Sciences. Blockchain in Life Sciences 285 313 .
Shahbaz Ahmad Khanday, Hoor Fatima & Nitin Rakesh. (2021) Deep learning offering resilience from trending cyber-attacks, a review. Deep learning offering resilience from trending cyber-attacks, a review.
Kholoud Althobaiti, Adam D G Jenkins & Kami Vaniea. (2021) A Case Study of Phishing Incident Response in an Educational Organization. Proceedings of the ACM on Human-Computer Interaction 5:CSCW2, pages 1-32.
Crossref
Amy Hetro Washo. (2021) An interdisciplinary view of social engineering: A call to action for research. Computers in Human Behavior Reports 4, pages 100126.
Crossref
Christopher Nguyen, Matthew L. Jensen, Alexandra Durcikova & Ryan T. Wright. (2021) A comparison of features in a crowdsourced phishing warning system. Information Systems Journal 31:3, pages 473-513.
Crossref
Matthew Canham, Clay Posey, Delainey Strickland & Michael Constantino. (2021) Phishing for Long Tails: Examining Organizational Repeat Clickers and Protective Stewards. SAGE Open 11:1, pages 215824402199065.
Crossref
Tabisa Ncubukezi, Laban Mwansa & Francois Rocaries. (2020) A Review of the Current Cyber Hygiene in Small and Medium-sized Businesses. A Review of the Current Cyber Hygiene in Small and Medium-sized Businesses.
Younis A. Younis & Mohamed Musbah. (2020) A Framework to Protect Against Phishing Attacks. A Framework to Protect Against Phishing Attacks.
Jan-Willem Bullee & Marianne Junger. (2020) How effective are social engineering interventions? A meta-analysis. Information & Computer Security 28:5, pages 801-830.
Crossref
Raneem AlMindeel & Jorge Tiago Martins. (2020) Information security awareness in a developing country context: insights from the government sector in Saudi Arabia. Information Technology & People 34:2, pages 770-788.
Crossref
Mohamed Abdelhamid. (2020) The Role of Health Concerns in Phishing Susceptibility: Survey Design Study. Journal of Medical Internet Research 22:5, pages e18394.
Crossref
Avisha Das, Shahryar Baki, Ayman El Aassal, Rakesh Verma & Arthur Dunbar. (2020) SoK: A Comprehensive Reexamination of Phishing Research From the Security Perspective. IEEE Communications Surveys & Tutorials 22:1, pages 671-708.
Crossref
Emma J Williams & Adam N Joinson. (2020) Developing a measure of information seeking about phishing. Journal of Cybersecurity 6:1.
Crossref
Jan-Willem Bullée & Marianne Junger. 2020. The Palgrave Handbook of International Cybercrime and Cyberdeviance. The Palgrave Handbook of International Cybercrime and Cyberdeviance 849 875 .
Surayahani Hasnul Bhaharin, Umi Asma' Mokhtar, Rossilawati Sulaiman & Maryati Mohd Yusof. (2019) Issues and Trends in Information Security Policy Compliance. Issues and Trends in Information Security Policy Compliance.
Rubia Fatima, Affan Yasin, Lin Liu & Jianmin Wang. (2019) How persuasive is a phishing email? A phishing game for phishing awareness. Journal of Computer Security 27:6, pages 581-612.
Crossref
William J Gordon, Adam Wright, Robert J Glynn, Jigar Kadakia, Christina Mazzone, Elizabeth Leinbach & Adam Landman. (2019) Evaluation of a mandatory phishing training program for high-risk employees at a US healthcare system. Journal of the American Medical Informatics Association 26:6, pages 547-552.
Crossref
Gerald Onwujekwe, Manoj Thomas & Kweku-Muata Osei-Bryson. (2019) Using Robust Data Governance to Mitigate the Impact of Cybercrime. Using Robust Data Governance to Mitigate the Impact of Cybercrime.
Leanne Hirshfield, Philip Bobko, Alex J. Barelka, Mark R. Costa, Gregory J. Funke, Vincent F. Mancuso, Victor Finomore & Benjamin A. Knott. 2019. Cyber Law, Privacy, and Security. Cyber Law, Privacy, and Security 1482 1499 .
Samantha Bordoff, Quan Chen & Zheng Yan. 2019. Cyber Law, Privacy, and Security. Cyber Law, Privacy, and Security 20 37 .
Samantha Bordoff, Quan Chen & Zheng Yan. 2019. National Security. National Security 60 77 .
Samantha Bordoff, Quan Chen & Zheng Yan. 2019. Multigenerational Online Behavior and Media Use. Multigenerational Online Behavior and Media Use 407 424 .
Javaria Khalid, Rabiya Jalil, Myda Khalid, Maliha Maryam, Muhammad Aatif Shafique & Wajid Rasheed. 2019. Intelligent Technologies and Applications. Intelligent Technologies and Applications 168 181 .
Jan-Willem Bullée & Marianne Junger. 2019. The Palgrave Handbook of International Cybercrime and Cyberdeviance. The Palgrave Handbook of International Cybercrime and Cyberdeviance 1 28 .
Rika Butler & Martin Butler. (2018) Assessing the information quality of phishing-related content on financial institutions’ websites. Information & Computer Security 26:5, pages 514-532.
Crossref
Ron Torten, Carmen Reaiche & Stephen Boyle. (2018) The impact of security Awareness on information technology professionals’ behavior. Computers & Security 79, pages 68-79.
Crossref
Gilchan Park & Julia Rayz. (2018) Ontological Detection of Phishing Emails. Ontological Detection of Phishing Emails.
Lies De Kimpe, Michel Walrave, Wim Hardyns, Lieven Pauwels & Koen Ponnet. (2018) You’ve got mail! Explaining individual differences in becoming a phishing target. Telematics and Informatics 35:5, pages 1277-1287.
Crossref
Steven McElwee, George Murphy & Paul Shelton. (2018) Influencing Outcomes and Behaviors in Simulated Phishing Exercises. Influencing Outcomes and Behaviors in Simulated Phishing Exercises.
Anandharaman Pattabiraman, Sridhar Srinivasan, Kaushik Swaminathan & Manish Gupta. 2018. Information Technology Risk Management and Compliance in Modern Organizations. Information Technology Risk Management and Compliance in Modern Organizations 142 175 .
Melanie Volkamer, Karen Renaud, Benjamin Reinheimer, Philipp Rack, Marco Ghiglieri, Peter Mayer, Alexandra Kunz & Nina Gerber. 2018. Trust, Privacy and Security in Digital Business. Trust, Privacy and Security in Digital Business 119 134 .
Harrison Stewart & Jan Jürjens. (2017) Information security management and the human aspect in organizations. Information & Computer Security 25:5, pages 494-534.
Crossref
Samantha Bordoff, Quan Chen & Zheng Yan. (2017) Cyber Attacks, Contributing Factors, and Tackling Strategies. International Journal of Cyber Behavior, Psychology and Learning 7:4, pages 68-82.
Crossref
M. Junger, L. Montoya & F.-J. Overink. (2017) Priming and warnings are not effective to prevent social engineering attacks. Computers in Human Behavior 66, pages 75-87.
Crossref
Monica T. Whitty & Garry Young. 2016. Cyberpsychology: The Study of Individuals, Society and Digital Technologies. Cyberpsychology: The Study of Individuals, Society and Digital Technologies 203 239 .
Cristian Iuga, Jason R. C. Nurse & Arnau Erola. (2016) Baiting the hook: factors impacting susceptibility to phishing attacks. Human-centric Computing and Information Sciences 6:1.
Crossref
Wayne D. Kearney & Hennie A. Kruger. (2016) Theorising on risk homeostasis in the context of information security behaviour. Information and Computer Security 24:5, pages 496-513.
Crossref
Jerry Chih-Yuan Sun & Ariel Yu-Zhen Chen. (2016) Effects of integrating dynamic concept maps with Interactive Response System on elementary school students' motivation and learning outcome: The case of anti-phishing education. Computers & Education 102, pages 117-127.
Crossref
W.D. Kearney & H.A. Kruger. (2016) Can perceptual differences account for enigmatic information security behaviour in an organisation?. Computers & Security 61, pages 46-58.
Crossref
Gizem Öğütçü, Özlem Müge Testik & Oumout Chouseinoglou. (2016) Analysis of personal information security behavior and awareness. Computers & Security 56, pages 83-93.
Crossref
Ileen E. Van Vuuren. (2016) IT Security Trust Model - Securing the Human Perimeter. International Journal of Social Science and Humanity 6:11, pages 852-858.
Crossref
Ileen E. van Vuuren, Elmarie Kritzinger & Conrad Mueller. (2015) Identifying gaps in IT retail Information Security policy implementation processes. Identifying gaps in IT retail Information Security policy implementation processes.
Jurjen Jansen & Rutger Leukfeldt. (2015) How people help fraudsters steal their money: an analysis of 600 online banking fraud cases. How people help fraudsters steal their money: an analysis of 600 online banking fraud cases.
박진성. (2015) A Comparative Study on the Relief Systems of Electronic Banking Fraud in Major Countries: Law & Economics Approach. The Journal of International Trade & Commerce 11:1, pages 535-560.
Crossref
Waldo Rocha Flores, Hannes Holm, Gustav Svensson & Göran Ericsson. (2014) Using phishing experiments and scenario-based surveys to understand security behaviours in practice. Information Management & Computer Security 22:4, pages 393-406.
Crossref
Jemal Abawajy, Andrei Kelarev & Morshed Chowdhury. (2014) Automatic Generation of Meta Classifiers with Large Levels for Distributed Computing and Networking. Journal of Networks 9:9.
Crossref
Jemal Abawajy, Gleb Beliakov, Andrei Kelarev & Morshed Chowdhury. (2014) Iterative Construction of Hierarchical Classifiers for Phishing Website Detection. Journal of Networks 9:8.
Crossref
Morshed Chowdhury, Jemal Abawajy, Andrei Kelarev & Kouichi Sakurai. 2014. Applications and Techniques in Information Security. Applications and Techniques in Information Security 25 32 .
Wayne D. Kearney & Hennie A. Kruger. 2013. Security and Privacy Protection in Information Processing Systems. Security and Privacy Protection in Information Processing Systems 379 390 .
Dr. Umamaheswari K.. (2021) IMPACTS OF CYBER CRIME ON INTERNET BANKING. SSRN Electronic Journal.
Crossref

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.