2018
DOI: 10.1016/j.chb.2018.05.037
|View full text |Cite
|
Sign up to set email alerts
|

Phishing attempts among the dark triad: Patterns of attack and vulnerability

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

2
17
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
5
4

Relationship

0
9

Authors

Journals

citations
Cited by 54 publications
(19 citation statements)
references
References 36 publications
2
17
0
Order By: Relevance
“…This mirrors previous research (e.g. [26], [27]) that has also used a scale response method to emulate the range of response behaviors that a user may engage in, each of which carries with it a varying level of vulnerability. For example, simply opening the email itself carries a level of risk if embedded images are automatically downloaded, whilst clicking on the link within an email shows a greater level of vulnerability, but entering personal details on a linked web page demonstrates an even higher level.…”
Section: Introductionsupporting
confidence: 69%
“…This mirrors previous research (e.g. [26], [27]) that has also used a scale response method to emulate the range of response behaviors that a user may engage in, each of which carries with it a varying level of vulnerability. For example, simply opening the email itself carries a level of risk if embedded images are automatically downloaded, whilst clicking on the link within an email shows a greater level of vulnerability, but entering personal details on a linked web page demonstrates an even higher level.…”
Section: Introductionsupporting
confidence: 69%
“…Other studies concentrated on phishing scams to identify the influence of individual differences and other factors, such as demographics, on a user's response to phishing attempts or phishing susceptibility [31][32][33][34]. While most of the studies investigated the effects of individual differences on a user's responses to phishing in general, the present study concentrates on the effects of user's behaviour during the different steps of a phishing process.…”
Section: Background and Hypothesis Developmentmentioning
confidence: 99%
“…The participants in the study were 62.2% female (84 participants) and 37.8% male (51 participants). Age ranged from 18 to 45 years old (three age groups of 18-25, [26][27][28][29][30][31][32][33][34][35][36][37][38][39][40][41][42][43][44][45]. All the participants were university students, researchers, or had recently completed one level of higher-level education and were preparing to continue their education.…”
Section: A Demographicsmentioning
confidence: 99%
“…They believe that logo extraction can be improved in the future. Authors in Curtis et al [ 21 ] introduced the dark triad attacker’s concepts. They used a dark triad score to complete the 27 items short dark triad with both attackers.…”
Section: Literature Surveymentioning
confidence: 99%