Nothing Special   »   [go: up one dir, main page]

Jones, 2016 - Google Patents

What makes people click: assessing individual differences in susceptibility to email fraud

Jones, 2016

Document ID
4925006849295256207
Author
Jones H
Publication year
Publication venue
PQDT-Global

External Links

Snippet

Cyber security experts have acknowledged that human users are consistently the most vulnerable part of a computer network, however little psychological research has considered why. This thesis focuses on susceptibility to email fraud, and highlights three core …
Continue reading at search.proquest.com (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/316User authentication by observing the pattern of computer usage, e.g. typical user behaviour

Similar Documents

Publication Publication Date Title
Frauenstein et al. Susceptibility to phishing on social network sites: A personality information processing model
Goel et al. Got phished? Internet security and human vulnerability
Moody et al. Which phish get caught? An exploratory study of individuals′ susceptibility to phishing
Williams et al. How persuasive is phishing email? The role of authentic design, influence and current events in email judgements
Broadhurst et al. Phishing and cybercrime risks in a university student community
Alohali et al. Information security behavior: Recognizing the influencers
Nguyen et al. A comparison of features in a crowdsourced phishing warning system
Patel et al. Perceptual representation of spam and phishing emails
Nohlberg Securing information assets: understanding, measuring and protecting against social engineering attacks
Jensen et al. Using susceptibility claims to motivate behaviour change in IT security
Ammar Cyber Gremlin: social networking, machine learning and the global war on Al-Qaida-and IS-inspired terrorism
Zheng et al. Checking, nudging or scoring? Evaluating e-mail user security tools
Frik et al. A qualitative model of older adults’ contextual decision-making about information sharing
Chan-Tin et al. Predicting phishing victimization: roles of protective and vulnerable strategies and decision-making styles
Xu et al. Determining psycholinguistic features of deception in phishing messages
Frauenstein An investigation into students responses to various phishing emails and other phishing-related behaviours
Yisa et al. Beyond the Birthday Cake Emoji: Unraveling Gender Differences and Behavioral Nuances in Nigerian Birthday Disclosures on Social Media
Boothroyd Older Adults' Perceptions of Online Risk
Jones What makes people click: assessing individual differences in susceptibility to email fraud
Lee et al. Susceptibility to instant messaging phishing attacks: does systematic information processing differ between genders?
Allison From abhorrent to acceptable: Norms, standards, and negativity in online communities
Hale et al. Toward increasing awareness of suspicious content through game play
Anderson et al. Exploring the roles played by trust and technology in the online investment fraud victimisation process
Xu Modeling memory processes in phishing decision making using instance based learning and natural language processing
Wulandari et al. Are You a Soft Target for Cyber Attack? Drivers of Susceptibility to Social Engineering‐Based Cyber Attack (SECA): A Case Study of Mobile Messaging Application