1,027
Views
19
CrossRef citations to date
0
Altmetric
Articles

Capable Guardians in the Digital Environment: The Role of Digital Literacy in Reducing Phishing Victimization

ORCID Icon &
Pages 1371-1382 | Received 29 Jun 2016, Accepted 30 Aug 2016, Published online: 22 Nov 2016

Keep up to date with the latest research on this topic with citation updates for this article.

Read on this site (3)

Thomas E. Dearden & Petter Gottschalk. (2024) Convenience Theory and Cybercrime Opportunity: An Analysis of Online Cyber Offending. Deviant Behavior 45:3, pages 348-360.
Read now
Loretta Stalans, Eric Chan-Tin, Anna Hart, Madeline Moran & Shelia Kennison. (2023) Predicting Phishing Victimization: Comparing Prior Victimization, Cognitive, and Emotional Styles, and Vulnerable or Protective E-mail Strategies. Victims & Offenders 18:7, pages 1216-1235.
Read now
Riccardo Milani, Stefano Caneppele & Christine Burkhardt. (2022) Exposure to Cyber Victimization: Results from a Swiss Survey. Deviant Behavior 43:2, pages 228-240.
Read now

Articles from other publishers (16)

Liliana Ribeiro, Inês Sousa Guedes & Carla Sofia Cardoso. (2024) Which factors predict susceptibility to phishing? An empirical study. Computers & Security 136, pages 103558.
Crossref
Liliana Queirós Ribeiro, Inês Guedes & Carla Cardoso. 2023. Exploring Cyber Criminals and Data Privacy Measures. Exploring Cyber Criminals and Data Privacy Measures 76 93 .
Hongliang Chen, Yunsha Pu & David Atkin. (2023) Migration stress, risky Internet uses, and scam victimization: An empirical study among Chinese migrant workers. Telematics and Informatics 83, pages 102022.
Crossref
Sijie Zhuo, Robert Biddle, Yun Sing Koh, Danielle Lottridge & Giovanni Russello. (2023) SoK: Human-centered Phishing Susceptibility. ACM Transactions on Privacy and Security 26:3, pages 1-27.
Crossref
Dawn M. Sarno, Maggie W. Harris & Jeffrey Black. (2023) Which phish is captured in the net? Understanding phishing susceptibility and individual differences. Applied Cognitive Psychology 37:4, pages 789-803.
Crossref
Zeya Lwin Tun & Daniel Birks. (2023) Supporting crime script analyses of scams with natural language processing. Crime Science 12:1.
Crossref
Christine Weber & Johanna Marie Wührl. 2023. Handbuch Cyberkriminologie 2. Handbuch Cyberkriminologie 2 459 500 .
Magdalena Obermaier & Desirée Schmuck. (2022) Youths as targets: factors of online hate speech victimization among adolescents and young adults. Journal of Computer-Mediated Communication 27:4.
Crossref
Mattia Caldarulo, Eric W. Welch & Mary K. Feeney. (2022) Determinants of cyber-incidents among small and medium US cities. Government Information Quarterly 39:3, pages 101703.
Crossref
Eric Chan-Tin, Loretta Stalans, Spencer Johnston, Daisy Reyes & Shelia Kennison. (2022) Predicting Phishing Victimization. Predicting Phishing Victimization.
Christine Weber & Johanna Marie Wührl. 2023. Handbuch Cyberkriminologie. Handbuch Cyberkriminologie 1 42 .
Frank Kun-Yueh Chou, Abbott Po-Shun Chen & Vincent Cheng-Lung Lo. (2021) Mindless Response or Mindful Interpretation: Examining the Effect of Message Influence on Phishing Susceptibility. Sustainability 13:4, pages 1651.
Crossref
Byung Lee & Seung Yeop Paek. 2020. The Palgrave Handbook of International Cybercrime and Cyberdeviance. The Palgrave Handbook of International Cybercrime and Cyberdeviance 899 916 .
Ayman Asfoor, Fiza Abdul Rahim & Salman Yussof. 2019. Recent Trends in Data Science and Soft Computing. Recent Trends in Data Science and Soft Computing 641 654 .
Byung Lee & Seung Yeop Paek. 2020. The Palgrave Handbook of International Cybercrime and Cyberdeviance. The Palgrave Handbook of International Cybercrime and Cyberdeviance 1 18 .
Gustavo S. Mesch & Matias Dodel. (2018) Low Self-Control, Information Disclosure, and the Risk of Online Fraud. American Behavioral Scientist 62:10, pages 1356-1371.
Crossref

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.