Jones, 2016 - Google Patents
What makes people click: assessing individual differences in susceptibility to email fraudJones, 2016
- Document ID
- 4925006849295256207
- Author
- Jones H
- Publication year
- Publication venue
- PQDT-Global
External Links
Snippet
Cyber security experts have acknowledged that human users are consistently the most vulnerable part of a computer network, however little psychological research has considered why. This thesis focuses on susceptibility to email fraud, and highlights three core …
- 238000011160 research 0 abstract description 73
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/316—User authentication by observing the pattern of computer usage, e.g. typical user behaviour
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Frauenstein et al. | Susceptibility to phishing on social network sites: A personality information processing model | |
Goel et al. | Got phished? Internet security and human vulnerability | |
Moody et al. | Which phish get caught? An exploratory study of individuals′ susceptibility to phishing | |
Williams et al. | How persuasive is phishing email? The role of authentic design, influence and current events in email judgements | |
Broadhurst et al. | Phishing and cybercrime risks in a university student community | |
Alohali et al. | Information security behavior: Recognizing the influencers | |
Nguyen et al. | A comparison of features in a crowdsourced phishing warning system | |
Patel et al. | Perceptual representation of spam and phishing emails | |
Nohlberg | Securing information assets: understanding, measuring and protecting against social engineering attacks | |
Jensen et al. | Using susceptibility claims to motivate behaviour change in IT security | |
Ammar | Cyber Gremlin: social networking, machine learning and the global war on Al-Qaida-and IS-inspired terrorism | |
Zheng et al. | Checking, nudging or scoring? Evaluating e-mail user security tools | |
Frik et al. | A qualitative model of older adults’ contextual decision-making about information sharing | |
Chan-Tin et al. | Predicting phishing victimization: roles of protective and vulnerable strategies and decision-making styles | |
Xu et al. | Determining psycholinguistic features of deception in phishing messages | |
Frauenstein | An investigation into students responses to various phishing emails and other phishing-related behaviours | |
Yisa et al. | Beyond the Birthday Cake Emoji: Unraveling Gender Differences and Behavioral Nuances in Nigerian Birthday Disclosures on Social Media | |
Boothroyd | Older Adults' Perceptions of Online Risk | |
Jones | What makes people click: assessing individual differences in susceptibility to email fraud | |
Lee et al. | Susceptibility to instant messaging phishing attacks: does systematic information processing differ between genders? | |
Allison | From abhorrent to acceptable: Norms, standards, and negativity in online communities | |
Hale et al. | Toward increasing awareness of suspicious content through game play | |
Anderson et al. | Exploring the roles played by trust and technology in the online investment fraud victimisation process | |
Xu | Modeling memory processes in phishing decision making using instance based learning and natural language processing | |
Wulandari et al. | Are You a Soft Target for Cyber Attack? Drivers of Susceptibility to Social Engineering‐Based Cyber Attack (SECA): A Case Study of Mobile Messaging Application |