2023 | Americas Conference on Information Systems | Citations: 0
Authors: Ampel, Benjamin; Gao, Yang; Hu, James; Samtani, Sagar; Chen, Hsinchun
Abstract: Social engineering attacks are currently the most cited cybersecurity threat to ... Expand
Semantic filters: email phishing
Topics: artificial intelligence electronic mail email phishing phishing IT security
Methods: word2vec random forest classification naïve bayes literature study pre-trained language model
2023 | International Conference on Information Systems | Citations: 0
Authors: Bera, Debalina; Kim, Dan
Abstract: This study investigates the effect of individuals' information processing modes ... Expand
Semantic filters: email phishing
Topics: phishing mindfulness electronic mail email phishing data security
Methods: experiment survey partial least squares regression machine learning laboratory experiment
Theories: protection motivation theory
2023 | Decision Support Systems | Citations: 1
Authors: Bera, Debalina; Ogbanufe, Obi; Kim, Dan J.
Abstract: Despite anti-phishing filters, social engineering-based cyber-attacks still resu ... Expand
Semantic filters: email phishing
Topics: phishing email phishing electronic mail email spam personalization
Methods: term frequency–inverse document frequency natural language processing topic model discriminant analysis literature study
2023 | Information & Management | Citations: 0
Authors: Fard Bahreini, Amir; Cavusoglu, Hasan; Cenfetelli, Ronald T.
Abstract: The increasing use of information technology artifacts in daily life makes secur ... Expand
Semantic filters: email phishing
Topics: mobile application data security decision making self efficacy mobile application market
Methods: survey descriptive statistic structural equation modeling literature study post-hoc analysis
Theories: theory of bounded rationality
2023 | HICSS | Citations: 0
Authors: Faltermaier, Stefan; Strunk, Kim; Obermeier, Michaela; Fiedler, Marina
Abstract: Desirable user behavior is key to cyber security in organizations. However, a co ... Expand
Semantic filters: email phishing
Topics: IT security user behavior information technology capability IT security defense password
Methods: qualitative interview personal interview qualitative coding grounded theory case study
2023 | Information & Management | Citations: 0
Authors: Frauenstein, Edwin Donald; Flowerday, Stephen; Mishi, Syden; Warkentin, Merrill
Abstract: Frequent and habitual engagement with social media can reinforce certain activit ... Expand
Semantic filters: email phishing
Topics: phishing Facebook personality social media electronic mail
Methods: survey structural equation modeling survey design theory development self reported survey
Theories: big five model Maslow motivation theory uses and gratifications theory technology acceptance model theory of planned behavior
2023 | Decision Support Systems | Citations: 0
Authors: Kayhan, Varol O.; Agrawal, Manish; Shivendu, Shivendu
Abstract: The cyber security industry is rapidly adopting threat hunting as a proactive to ... Expand
Semantic filters: email phishing
Topics: IT security artificial intelligence Python decision support system email phishing
Methods: autoencoder data transformation DBSCAN anomaly detection machine learning
2023 | Information Systems Journal | Citations: 1
Authors: Mady, Ashraf; Gupta, Saurabh; Warkentin, Merrill
Abstract: Organisations implement a variety of knowledge mechanisms such as information se ... Expand
Semantic filters: email phishing
Topics: data security email phishing security policy IT security task complexity
Methods: survey experiment Student's t-test parametric test survey design
Theories: construal level theory security compliance theory
2023 | European Journal of Information Systems | Citations: 0
Authors: Nguyen, Christopher; Jensen, Matthew; Day, Eric
Abstract: As phishing becomes increasingly sophisticated and costly, interventions that im ... Expand
Semantic filters: email phishing
Topics: phishing electronic mail mindfulness email phishing self efficacy
Methods: survey longitudinal research experiment survey design longitudinal experiment
Theories: signal detection theory big five model
2023 | Americas Conference on Information Systems | Citations: 0
Authors: Nwankpa, Joseph; Shan, (Jay) Zhe; Merhout, Jeffrey; Benamati, John; Weese, Maria
Abstract: The education sector continues to be challenged by phishing attacks. A simulati ... Expand
Semantic filters: email phishing
Topics: phishing email phishing electronic mail process mining
Methods: computational algorithm design science chi squared test archival research simulation