Semantic Filter
show all semantic filters
Found 74 articles
  • Benchmarking the Robustness of Phishing Email Detection Systems

    2023 | Americas Conference on Information Systems | Citations: 0

    Authors: Ampel, Benjamin; Gao, Yang; Hu, James; Samtani, Sagar; Chen, Hsinchun

    Abstract: Social engineering attacks are currently the most cited cybersecurity threat to ... Expand

    Semantic filters: email phishing

    Topics: artificial intelligence electronic mail email phishing phishing IT security

    Methods: word2vec random forest classification naïve bayes literature study pre-trained language model

  • The Interplay of Information Processing, Mindfulness, and Affective State in Phishing Detection

    2023 | International Conference on Information Systems | Citations: 0

    Authors: Bera, Debalina; Kim, Dan

    Abstract: This study investigates the effect of individuals' information processing modes ... Expand

    Semantic filters: email phishing

    Topics: phishing mindfulness electronic mail email phishing data security

    Methods: experiment survey partial least squares regression machine learning laboratory experiment

    Theories: protection motivation theory

  • Towards a thematic dimensional framework of online fraud: An exploration of fraudulent email attack tactics and intentions

    PDF

    2023 | Decision Support Systems | Citations: 1

    Authors: Bera, Debalina; Ogbanufe, Obi; Kim, Dan J.

    Abstract: Despite anti-phishing filters, social engineering-based cyber-attacks still resu ... Expand

    Semantic filters: email phishing

    Topics: phishing email phishing electronic mail email spam personalization

    Methods: term frequency–inverse document frequency natural language processing topic model discriminant analysis literature study

  • How “What you think you know about cybersecurity” can help users make more secure decisions

    PDF

    2023 | Information & Management | Citations: 0

    Authors: Fard Bahreini, Amir; Cavusoglu, Hasan; Cenfetelli, Ronald T.

    Abstract: The increasing use of information technology artifacts in daily life makes secur ... Expand

    Semantic filters: email phishing

    Topics: mobile application data security decision making self efficacy mobile application market

    Methods: survey descriptive statistic structural equation modeling literature study post-hoc analysis

    Theories: theory of bounded rationality

  • Managing Organizational Cyber Security – The Distinct Role of Internalized Responsibility

    2023 | HICSS | Citations: 0

    Authors: Faltermaier, Stefan; Strunk, Kim; Obermeier, Michaela; Fiedler, Marina

    Abstract: Desirable user behavior is key to cyber security in organizations. However, a co ... Expand

    Semantic filters: email phishing

    Topics: IT security user behavior information technology capability IT security defense password

    Methods: qualitative interview personal interview qualitative coding grounded theory case study

  • Unraveling the behavioral influence of social media on phishing susceptibility: A Personality-Habit-Information Processing model

    PDF

    2023 | Information & Management | Citations: 0

    Authors: Frauenstein, Edwin Donald; Flowerday, Stephen; Mishi, Syden; Warkentin, Merrill

    Abstract: Frequent and habitual engagement with social media can reinforce certain activit ... Expand

    Semantic filters: email phishing

    Topics: phishing Facebook personality social media electronic mail

    Methods: survey structural equation modeling survey design theory development self reported survey

    Theories: big five model Maslow motivation theory uses and gratifications theory technology acceptance model theory of planned behavior

  • Cyber threat detection: Unsupervised hunting of anomalous commands (UHAC)

    PDF

    2023 | Decision Support Systems | Citations: 0

    Authors: Kayhan, Varol O.; Agrawal, Manish; Shivendu, Shivendu

    Abstract: The cyber security industry is rapidly adopting threat hunting as a proactive to ... Expand

    Semantic filters: email phishing

    Topics: IT security artificial intelligence Python decision support system email phishing

    Methods: autoencoder data transformation DBSCAN anomaly detection machine learning

  • The effects of knowledge mechanisms on employees' information security threat construal

    PDF

    2023 | Information Systems Journal | Citations: 1

    Authors: Mady, Ashraf; Gupta, Saurabh; Warkentin, Merrill

    Abstract: Organisations implement a variety of knowledge mechanisms such as information se ... Expand

    Semantic filters: email phishing

    Topics: data security email phishing security policy IT security task complexity

    Methods: survey experiment Student's t-test parametric test survey design

    Theories: construal level theory security compliance theory

  • Learning not to take the bait: a longitudinal examination of digital training methods and overlearning on phishing susceptibility

    PDF

    2023 | European Journal of Information Systems | Citations: 0

    Authors: Nguyen, Christopher; Jensen, Matthew; Day, Eric

    Abstract: As phishing becomes increasingly sophisticated and costly, interventions that im ... Expand

    Semantic filters: email phishing

    Topics: phishing electronic mail mindfulness email phishing self efficacy

    Methods: survey longitudinal research experiment survey design longitudinal experiment

    Theories: signal detection theory big five model

  • A Social Engineering Research Partnership in Higher Education to Improve Information Security Education, Training, and Awareness (SETA) Programs

    2023 | Americas Conference on Information Systems | Citations: 0

    Authors: Nwankpa, Joseph; Shan, (Jay) Zhe; Merhout, Jeffrey; Benamati, John; Weese, Maria

    Abstract: The education sector continues to be challenged by phishing attacks. A simulati ... Expand

    Semantic filters: email phishing

    Topics: phishing email phishing electronic mail process mining

    Methods: computational algorithm design science chi squared test archival research simulation