References
- Ashby, F. G., and W. T. Maddox. 2011. “Human Category Learning 2.0.” Annals of the New York Academy of Sciences 1224: 147–161. doi:10.1111/j.1749-6632.2010.05874.x.
- Ashby, F. G., and J. T. Townsend. 1986. “Varieties of Perceptual Independence.” Psychological Review 93 (2): 154. doi:10.1037/0033-295X.93.2.154.
- Bergholz, A., J. De Beer, S. Glahn, M. Moens, G. Paaß, and S. Strobel. 2010. “New Filtering Approaches for Phishing Email.” Journal of Computer Security 18 (1): 7–35. doi:10.3233/JCS-2010-0371.
- Canfield, C. I., B. Fischhoff, and A. Davis. 2016. “Quantifying Phishing Susceptibility for Detection and Behavior Decisions.” Human Factors: The Journal of the Human Factors and Ergonomics Society 58 (8): 1158–1172. doi:10.1177/0018720816665025.
- Chandrasekaran, M., K. Narayanan, and S. Upadhyaya. 2006. “Phishing Email Detection Based on Structural Properties.” Paper presented at the New York State Cyber Security Conference. Albany, NY, June 2006.
- Downs, J. S., M. B. Holbrook, and L. F. Cranor. 2006. “Decision Strategies and Susceptibility to Phishing.” In Proceedings of the Second Symposium on Usable Privacy and Security, 79–90. Pittsburgh, PA: ACM.
- Drake, C. E., J. J. Oliver, and E. J. Koontz. 2004. “Anatomy of a Phishing Email.” In Proceedings of the Second Conference on Email and Anti-Spam (CEAS). ACM, New York, NY, USA.
- Farris, C., R. J. Viken, and T. A. Treat. 2010. “Perceived Association between Diagnostic and Non-Diagnostic Cues of Women’s Sexual Interest: General Recognition Theory Predictors of Risk for Sexual Coercion.” Journal of Mathematical Psychology 54 (1): 137–149. doi:10.1016/j.jmp.2008.10.001.
- Farris, C., R. J. Viken, T. A. Treat, and R. M. McFall. 2006. “Heterosocial Perceptual Organization: Application of the Choice Model to Sexual Coercion.” Psychological Science 17 (10): 869–875. doi:10.1111/j.1467-9280.2006.01796.x.
- Ferguson, A. J. 2005. “Fostering Email Security Awareness: The West Point Carronade.” Educause Quarterly 1: 55–57.
- Fette, I., N. Sadeh, and A. Tomasic. 2007. “Learning to Detect Phishing Emails.” In Proceedings of the 16th International Conference on World Wide Web. Ney York, NY: ACM.
- Grimes, G. A., M. G. Hough, and M. L. Signorella. 2007. “Email End Users and Spam: Relations of Gender and Age Group to Attitudes and Actions.” Computers in Human Behavior 23 (1): 318–332. doi:10.1016/j.chb.2004.10.015.
- Hayden, E. C. 2015. “Cybercrime Fight Targets User Error.” Nature 518: 282–283.
- Herley, C. 2012. “Why do Nigerian Scammers Say They are from Nigeria?” In Proceedings of the Workshop on the Economics of Information Security. Berlin, Germany: Springer-Verlag.
- Jagatic, T. N., N. A. Johnson, M. Jakobsson, and F. Menczer. 2007. “Social Phishing.” Communications of the ACM 50 (10): 94–100. doi:10.1145/1290958.1290968.
- Kleider-Offutt, H. M., A. D. Bond, S. E. Williams, and C. J. Bohil. 2018. “When a Face Type Is Perceived as Threatening: Using General Recognition Theory to Understand Biased Categorization of Afrocentric Faces.” Memory and Cognition 46 (5): 716–728.
- Kumaraguru, P., S. Sheng, A. Acquisti, L. F. Cranor, and J. Hong. 2010. “Teaching Johnny Not to Fall for Phish.” ACM Transactions on Internet Technology (TOIT) 10 (2): 7. doi:10.1145/1754393.1754396.
- Lowd, D., and C. Meek. 2005. “Good Word Attacks on Statistical Spam Filters.” In Proceedings of the Second Conference on Email and Anti-Spam (CEAS). ACM, New York, NY, USA.
- Macmillan, N. A., and C. D. Creelman. 2004. Detection Theory: A User’s Guide. New York, NY: Psychology press.
- Mayhorn, C. B., and P. G. Nyeste. 2012. “Training Users to Counteract Phishing.” Work 41 (1): 3549–3552. doi:10.3233/WOR-2012-1054-3549.
- McCarley, J. S., and W. K. Krebs. 2006. “The Psychophysics of Sensor Fusion: A Multidimensional Signal Detection Analysis.” Proceedings of the Human Factors and Ergonomics Society Annual Meeting 50 (17): 2094–2098. doi:10.1177/154193120605001781.
- Parsons, K., A. McCormac, M. Pattinson, M. Butavicius, and C. Jerram. 2013. Phishing for the Truth: A Scenario-Based Experiment of Users’ Behavioural Response to Emails. In IFIP International Information Security Conference, 366–378. Berlin, Heidelberg: Springer.
- R Core Team. 2016. “R: A language and environment for statistical computing.” R Foundation for Statistical Computing. Vienna, Austria. Accessed on May 9, 2019. http://www.R-project.org/
- Robila, S. A., and J. W. Ragucci. 2006. “Don’t Be a Phish: Steps in User Education.” Proceedings of the 11th annual SIGCSE conference on Innovation and technology in computer science education. ACM New York, NY, USA.
- RStudio Team. 2016. RStudio: Integrated Development for R. Boston, MA: RStudio, Inc. Retrieved from http://www.rstudio.com/
- Soto, F. A., L. Vucovich, R. Musgrave, and F. G. Ashby. 2015. “General Recognition Theory with Individual Differences: A New Method for Examining Perceptual and Decisional Interactions with an Application to Face Perception.” Psychonomic Bulletin & Review 22 (1): 88–111. doi:10.3758/s13423-014-0661-y.
- Soto, F. A., E. Zheng, J. Fonseca, and F. G. Ashby. 2017. “Testing Separability and Independence of Perceptual Dimensions with General Recognition Theory: A Tutorial and New R Package (grtools).” Frontiers in Psychology.8: 696. doi:10.3389/fpsyg.2017.00696.
- Vishwanath, A., B. Harrison, and Y. J. Ng. 2016. “Suspicion, Cognition, and Automaticity Model of Phishing Susceptibility.” Communication Research 45 (8): 1146–1166. doi:10.1177%2F0093650215627483.
- Vishwanath, A., T. Herath, R. Chen, J. Wang, and H. R. Rao. 2011. “Why Do People Get Phished? Testing Individual Differences in Phishing Vulnerability within an Integrated, Information Processing Model.” Decision Support Systems 51 (3): 576–586. doi:10.1016/j.dss.2011.03.002.
- Wu, C., K. Cheng, Q. Zhu, and Y. Wu. 2005. “Using Visual Features for Anti-Spam Filtering.” In Proceedings of the IEEE International Conference on Image Processing. Genoa, Italy: IEEE.
- Youn, S., and D. McLeod. 2007. “A Comparative Study for Email Classification.” Computing Sciences and Software Engineering 387: 391.