A Large-Scale Study of Device and Link Presentation in Email Phishing Susceptibility
Abstract
References
Index Terms
- A Large-Scale Study of Device and Link Presentation in Email Phishing Susceptibility
Recommendations
Eyes on the Phish(er): Towards Understanding Users' Email Processing Pattern and Mental Models in Phishing Detection
EuroUSEC '24: Proceedings of the 2024 European Symposium on Usable SecurityPhishing emails typically masquerade themselves as reputable identities to trick people into providing sensitive information and credentials. Despite advancements in cybersecurity, attackers continuously adapt, posing ongoing threats to individuals and ...
SoK: Human-centered Phishing Susceptibility
Phishing is recognized as a serious threat to organizations and individuals. While there have been significant technical advances in blocking phishing attacks, end-users remain the last line of defence after phishing emails reach their email inboxes. Most ...
Phishing Susceptibility Detection through Social Media Analytics
SIN '16: Proceedings of the 9th International Conference on Security of Information and NetworksPhishing is one of the most dangerous information security threats present in the world today, with losses toping 5.9 billion dollars in 2013. Evolving from the original concept of phishing, spear phishing also attempts to scam individuals online, ...
Comments
Information & Contributors
Information
Published In
![cover image ACM Other conferences](/cms/asset/0488a800-4348-4a31-b850-7c7c7a7a693e/3638380.cover.jpg)
Publisher
Association for Computing Machinery
New York, NY, United States
Publication History
Check for updates
Author Tags
Qualifiers
- Short-paper
- Research
- Refereed limited
Conference
Acceptance Rates
Contributors
Other Metrics
Bibliometrics & Citations
Bibliometrics
Article Metrics
- 0Total Citations
- 63Total Downloads
- Downloads (Last 12 months)63
- Downloads (Last 6 weeks)5
Other Metrics
Citations
View Options
Login options
Check if you have access through your login credentials or your institution to get full access on this article.
Sign inFull Access
View options
View or Download as a PDF file.
PDFeReader
View online with eReader.
eReaderHTML Format
View this article in HTML Format.
HTML Format