2019
DOI: 10.14569/ijacsa.2019.0101046
|View full text |Cite
|
Sign up to set email alerts
|

An Evaluation of User Awareness for the Detection of Phishing Emails

Abstract: Phishing attacks are among the most serious Internet criminal activities. They aim to make Internet users believe that they are using a trusted entity, for the purpose of stealing sensitive information, such as bank account or credit card information. Phishing costs Internet users millions of dollars each year. An effective method that can prevent such attacks is improving the security awareness of Internet users, especially in light of the significant growth of online services. This paper discusses a real-wor… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2023
2023
2023
2023

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(1 citation statement)
references
References 8 publications
0
1
0
Order By: Relevance
“…Out-of-bands simulation (Aldawood & Skinner, 2019;Burris, Deneke, & Maulding, 2018;Ntokas, Maratou, & Xenos, 2015;Yamin, Katt, & Gkioulos, 2020) Attack simulations (Aldawood & Skinner, 2019;Alwanain, 2020;Bakar, Mohd, & Sulaiman, 2018;Caputo, Pfleeger, Freeman, & Johnson, 2014;Carella, Kotsoev, & Truta, 2017;Dodge Jr, Carver, & Ferguson, 2007;Dodge & Ferguson, 2006;Higashino, Kawato, Ohmori, & Kawamura, 2019;Jansson & von Solms, 2013;Lee et al, 2019;Pirocca, Allodi, & Zannone, 2020;Styles & Tryfonas, 2009) E-learning (Abawajy, 2014;Aldawood & Skinner, 2019;Arain, Tarraf, & Ahmad, 2019;Charoen, Raman, & Olfman, 2008;Cooper, 2008;Cox, Connolly, & Currall, 2001;Dlamini & Modise, 2012;Dukarm, Dill, & Reith, 2019;Eminağaoğlu, Uçar, & Eren, 2009;Figueroa & Ayyagari, 2015;Furnell, Warren, & Dowland, 2003;Goluch et al, 2007;Gundu & Flowerday, 2013;Hagen & Albrechtsen, 2009;Hansche, 2001;He et al, 2020;Hepp, Tarraf, Birney, & Arain, 2018;Jenkins & Durcikova, 2013;Jensen, Dinger, Wright, & Thatcher, 2017;Labuschagne & Eloff, 2012;Mashiane, Dlamini, & Mahlangu, 2019;…”
Section: Methods Sourcesmentioning
confidence: 99%
“…Out-of-bands simulation (Aldawood & Skinner, 2019;Burris, Deneke, & Maulding, 2018;Ntokas, Maratou, & Xenos, 2015;Yamin, Katt, & Gkioulos, 2020) Attack simulations (Aldawood & Skinner, 2019;Alwanain, 2020;Bakar, Mohd, & Sulaiman, 2018;Caputo, Pfleeger, Freeman, & Johnson, 2014;Carella, Kotsoev, & Truta, 2017;Dodge Jr, Carver, & Ferguson, 2007;Dodge & Ferguson, 2006;Higashino, Kawato, Ohmori, & Kawamura, 2019;Jansson & von Solms, 2013;Lee et al, 2019;Pirocca, Allodi, & Zannone, 2020;Styles & Tryfonas, 2009) E-learning (Abawajy, 2014;Aldawood & Skinner, 2019;Arain, Tarraf, & Ahmad, 2019;Charoen, Raman, & Olfman, 2008;Cooper, 2008;Cox, Connolly, & Currall, 2001;Dlamini & Modise, 2012;Dukarm, Dill, & Reith, 2019;Eminağaoğlu, Uçar, & Eren, 2009;Figueroa & Ayyagari, 2015;Furnell, Warren, & Dowland, 2003;Goluch et al, 2007;Gundu & Flowerday, 2013;Hagen & Albrechtsen, 2009;Hansche, 2001;He et al, 2020;Hepp, Tarraf, Birney, & Arain, 2018;Jenkins & Durcikova, 2013;Jensen, Dinger, Wright, & Thatcher, 2017;Labuschagne & Eloff, 2012;Mashiane, Dlamini, & Mahlangu, 2019;…”
Section: Methods Sourcesmentioning
confidence: 99%