These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.
166 related articles for article (PubMed ID: 31338464)
1. Effectiveness of and user preferences for security awareness training methodologies. Tschakert KF; Ngamsuriyaroj S Heliyon; 2019 Jun; 5(6):e02010. PubMed ID: 31338464 [TBL] [Abstract][Full Text] [Related]
2. Susceptibility to Spear-Phishing Emails: Effects of Internet User Demographics and Email Content. Lin T; Capecci DE; Ellis DM; Rocha HA; Dommaraju S; Oliveira DS; Ebner NC ACM Trans Comput Hum Interact; 2019 Sep; 26(5):. PubMed ID: 32508486 [TBL] [Abstract][Full Text] [Related]
3. Personalized persuasion: Quantifying susceptibility to information exploitation in spear-phishing attacks. Xu T; Singh K; Rajivan P Appl Ergon; 2023 Apr; 108():103908. PubMed ID: 36403509 [TBL] [Abstract][Full Text] [Related]
4. Identifying and Mitigating Phishing Attack Threats in IoT Use Cases Using a Threat Modelling Approach. Abbas SG; Vaccari I; Hussain F; Zahid S; Fayyaz UU; Shah GA; Bakhshi T; Cambiaso E Sensors (Basel); 2021 Jul; 21(14):. PubMed ID: 34300556 [TBL] [Abstract][Full Text] [Related]
5. An intelligent cyber security phishing detection system using deep learning techniques. Mughaid A; AlZu'bi S; Hnaif A; Taamneh S; Alnajjar A; Elsoud EA Cluster Comput; 2022; 25(6):3819-3828. PubMed ID: 35602317 [TBL] [Abstract][Full Text] [Related]
6. Creative Persuasion: A Study on Adversarial Behaviors and Strategies in Phishing Attacks. Rajivan P; Gonzalez C Front Psychol; 2018; 9():135. PubMed ID: 29515478 [TBL] [Abstract][Full Text] [Related]
7. Assessment of Employee Susceptibility to Phishing Attacks at US Health Care Institutions. Gordon WJ; Wright A; Aiyagari R; Corbo L; Glynn RJ; Kadakia J; Kufahl J; Mazzone C; Noga J; Parkulo M; Sanford B; Scheib P; Landman AB JAMA Netw Open; 2019 Mar; 2(3):e190393. PubMed ID: 30848810 [TBL] [Abstract][Full Text] [Related]
8. How Good Are We at Detecting a Phishing Attack? Investigating the Evolving Phishing Attack Email and Why It Continues to Successfully Deceive Society. Carroll F; Adejobi JA; Montasari R SN Comput Sci; 2022; 3(2):170. PubMed ID: 35224514 [TBL] [Abstract][Full Text] [Related]
10. A comprehensive survey of AI-enabled phishing attacks detection techniques. Basit A; Zafar M; Liu X; Javed AR; Jalil Z; Kifayat K Telecommun Syst; 2021; 76(1):139-154. PubMed ID: 33110340 [TBL] [Abstract][Full Text] [Related]
11. The Role of User Behaviour in Improving Cyber Security Management. Moustafa AA; Bello A; Maurushat A Front Psychol; 2021; 12():561011. PubMed ID: 34220596 [TBL] [Abstract][Full Text] [Related]
12. Why Employees (Still) Click on Phishing Links: Investigation in Hospitals. Jalali MS; Bruckes M; Westmattelmann D; Schewe G J Med Internet Res; 2020 Jan; 22(1):e16775. PubMed ID: 32012071 [TBL] [Abstract][Full Text] [Related]
13. Phishing suspiciousness in older and younger adults: The role of executive functioning. Gavett BE; Zhao R; John SE; Bussell CA; Roberts JR; Yue C PLoS One; 2017; 12(2):e0171620. PubMed ID: 28158316 [TBL] [Abstract][Full Text] [Related]
14. Embedding Training Within Warnings Improves Skills of Identifying Phishing Webpages. Xiong A; Proctor RW; Yang W; Li N Hum Factors; 2019 Jun; 61(4):577-595. PubMed ID: 30526089 [TBL] [Abstract][Full Text] [Related]
15. Predicting User Susceptibility to Phishing Based on Multidimensional Features. Yang R; Zheng K; Wu B; Li D; Wang Z; Wang X Comput Intell Neurosci; 2022; 2022():7058972. PubMed ID: 35082844 [TBL] [Abstract][Full Text] [Related]
16. Statistical Models for Predicting Threat Detection From Human Behavior. Kelley T; Amon MJ; Bertenthal BI Front Psychol; 2018; 9():466. PubMed ID: 29713296 [TBL] [Abstract][Full Text] [Related]
17. Signal Detection Theory (SDT) Is Effective for Modeling User Behavior Toward Phishing and Spear-Phishing Attacks. Martin J; Dubé C; Coovert MD Hum Factors; 2018 Dec; 60(8):1179-1191. PubMed ID: 30063406 [TBL] [Abstract][Full Text] [Related]
18. The roles of phishing knowledge, cue utilization, and decision styles in phishing email detection. Sturman D; Bell EA; Auton JC; Breakey GR; Wiggins MW Appl Ergon; 2024 Sep; 119():104309. PubMed ID: 38729025 [TBL] [Abstract][Full Text] [Related]
19. The Role of Cue Utilization and Cognitive Load in the Recognition of Phishing Emails. Nasser G; Morrison BW; Bayl-Smith P; Taib R; Gayed M; Wiggins MW Front Big Data; 2020; 3():546860. PubMed ID: 33693413 [TBL] [Abstract][Full Text] [Related]
20. So Many Phish, So Little Time: Exploring Email Task Factors and Phishing Susceptibility. Sarno DM; Neider MB Hum Factors; 2022 Dec; 64(8):1379-1403. PubMed ID: 33835881 [TBL] [Abstract][Full Text] [Related] [Next] [New Search]