Semantic Filter
show all semantic filters
Found 193 articles
  • Benchmarking the Robustness of Phishing Email Detection Systems

    2023 | Americas Conference on Information Systems | Citations: 0

    Authors: Ampel, Benjamin; Gao, Yang; Hu, James; Samtani, Sagar; Chen, Hsinchun

    Abstract: Social engineering attacks are currently the most cited cybersecurity threat to ... Expand

    Semantic filters: phishing

    Topics: artificial intelligence electronic mail email phishing phishing IT security

    Methods: word2vec random forest classification naïve bayes literature study pre-trained language model

  • The Interplay of Information Processing, Mindfulness, and Affective State in Phishing Detection

    2023 | International Conference on Information Systems | Citations: 0

    Authors: Bera, Debalina; Kim, Dan

    Abstract: This study investigates the effect of individuals' information processing modes ... Expand

    Semantic filters: phishing

    Topics: phishing mindfulness electronic mail email phishing data security

    Methods: experiment survey partial least squares regression machine learning laboratory experiment

    Theories: protection motivation theory

  • Towards a thematic dimensional framework of online fraud: An exploration of fraudulent email attack tactics and intentions

    PDF

    2023 | Decision Support Systems | Citations: 1

    Authors: Bera, Debalina; Ogbanufe, Obi; Kim, Dan J.

    Abstract: Despite anti-phishing filters, social engineering-based cyber-attacks still resu ... Expand

    Semantic filters: phishing

    Topics: phishing email phishing electronic mail email spam personalization

    Methods: term frequency–inverse document frequency natural language processing topic model discriminant analysis literature study

  • The effect of lockup and persuasion on online investment decisions: An experimental study in ICOs

    PDF

    2023 | Electronic Markets | Citations: 0

    Authors: Bruckner, Moritz T.; Steininger, Dennis M.; Thatcher, Jason Bennett; Veit, Daniel J.

    Abstract: Many firms use social media (SM) to solicit online investments. In this study, w ... Expand

    Semantic filters: phishing

    Topics: internet technology crowdfunding crowdsourcing Facebook blockchain

    Methods: experimental group parametric test repeated measures ANOVA experimental design cross sectional research

    Theories: signaling theory

  • Barking Up the Wrong Tree? Reconsidering Policy Compliance as a Dependent Variable within Behavioral Cybersecurity Research

    2023 | HICSS | Citations: 0

    Authors: Cram, W. Alec; D'Arcy, John

    Abstract: A rich body of research examines the cybersecurity behavior of employees, with a ... Expand

    Semantic filters: phishing

    Topics: IT security data breach computer data storage cybersecurity behavior top management support

    Methods: survey linguistic analysis company material

  • Impact of Bot Involvement in an Incentivized Blockchain-Based Online Social Media Platform

    PDF

    2023 | Journal of Management Information Systems | Citations: 0

    Authors: Delkhosh, Fatemeh; Gopal, Ram D.; Patterson, Raymond A.; Yaraghi, Niam

    Abstract: Incentivized blockchain-based online social media (BOSM), where creators and cur ... Expand

    Semantic filters: phishing

    Topics: social media user behavior application programming interface participatory design blockchain

    Methods: longitudinal research theory development design methodology regression discontinuity design vector autoregression

  • How “What you think you know about cybersecurity” can help users make more secure decisions

    PDF

    2023 | Information & Management | Citations: 0

    Authors: Fard Bahreini, Amir; Cavusoglu, Hasan; Cenfetelli, Ronald T.

    Abstract: The increasing use of information technology artifacts in daily life makes secur ... Expand

    Semantic filters: phishing

    Topics: mobile application data security decision making self efficacy mobile application market

    Methods: survey descriptive statistic structural equation modeling literature study post-hoc analysis

    Theories: theory of bounded rationality

  • Managing Organizational Cyber Security – The Distinct Role of Internalized Responsibility

    2023 | HICSS | Citations: 0

    Authors: Faltermaier, Stefan; Strunk, Kim; Obermeier, Michaela; Fiedler, Marina

    Abstract: Desirable user behavior is key to cyber security in organizations. However, a co ... Expand

    Semantic filters: phishing

    Topics: IT security user behavior information technology capability IT security defense password

    Methods: qualitative interview personal interview qualitative coding grounded theory case study

  • Unraveling the behavioral influence of social media on phishing susceptibility: A Personality-Habit-Information Processing model

    PDF

    2023 | Information & Management | Citations: 0

    Authors: Frauenstein, Edwin Donald; Flowerday, Stephen; Mishi, Syden; Warkentin, Merrill

    Abstract: Frequent and habitual engagement with social media can reinforce certain activit ... Expand

    Semantic filters: phishing

    Topics: phishing Facebook personality social media electronic mail

    Methods: survey structural equation modeling survey design theory development self reported survey

    Theories: big five model Maslow motivation theory uses and gratifications theory technology acceptance model theory of planned behavior

  • Determinants of Gamification Effectiveness: Gamification Affordances and Coping Responses in the Context of Gamified ERP Training

    2023 | Americas Conference on Information Systems | Citations: 0

    Authors: John, Asher; Patwary, Md Masum Ikbal; Park, Soomin; Zhao, Yu; Kwak, Dong-Heon

    Abstract: Gamified training is often used to facilitate the adoption of complex informati ... Expand

    Semantic filters: phishing

    Topics: affordance user experience usability enterprise resource planning gamification

    Methods: structural equation modeling survey simulation psychometrics data transformation

    Theories: theory of affordance