These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.
148 related articles for article (PubMed ID: 32364511)
1. The Role of Health Concerns in Phishing Susceptibility: Survey Design Study. Abdelhamid M J Med Internet Res; 2020 May; 22(5):e18394. PubMed ID: 32364511 [TBL] [Abstract][Full Text] [Related]
2. Why Employees (Still) Click on Phishing Links: Investigation in Hospitals. Jalali MS; Bruckes M; Westmattelmann D; Schewe G J Med Internet Res; 2020 Jan; 22(1):e16775. PubMed ID: 32012071 [TBL] [Abstract][Full Text] [Related]
3. Thwarting Instant Messaging Phishing Attacks: The Role of Self-Efficacy and the Mediating Effect of Attitude towards Online Sharing of Personal Information. Lee YY; Gan CL; Liew TW Int J Environ Res Public Health; 2023 Feb; 20(4):. PubMed ID: 36834209 [TBL] [Abstract][Full Text] [Related]
4. Assessment of Employee Susceptibility to Phishing Attacks at US Health Care Institutions. Gordon WJ; Wright A; Aiyagari R; Corbo L; Glynn RJ; Kadakia J; Kufahl J; Mazzone C; Noga J; Parkulo M; Sanford B; Scheib P; Landman AB JAMA Netw Open; 2019 Mar; 2(3):e190393. PubMed ID: 30848810 [TBL] [Abstract][Full Text] [Related]
5. How personal characteristics impact phishing susceptibility: The mediating role of mail processing. Ge Y; Lu L; Cui X; Chen Z; Qu W Appl Ergon; 2021 Nov; 97():103526. PubMed ID: 34246073 [TBL] [Abstract][Full Text] [Related]
6. It's the deceiver and the receiver: Individual differences in phishing susceptibility and false positives with item profiling. Kleitman S; Law MKH; Kay J PLoS One; 2018; 13(10):e0205089. PubMed ID: 30365492 [TBL] [Abstract][Full Text] [Related]
7. Personalized persuasion: Quantifying susceptibility to information exploitation in spear-phishing attacks. Xu T; Singh K; Rajivan P Appl Ergon; 2023 Apr; 108():103908. PubMed ID: 36403509 [TBL] [Abstract][Full Text] [Related]
8. Predicting User Susceptibility to Phishing Based on Multidimensional Features. Yang R; Zheng K; Wu B; Li D; Wang Z; Wang X Comput Intell Neurosci; 2022; 2022():7058972. PubMed ID: 35082844 [TBL] [Abstract][Full Text] [Related]
9. Email phishing and signal detection: How persuasion principles and personality influence response patterns and accuracy. Lawson P; Pearson CJ; Crowson A; Mayhorn CB Appl Ergon; 2020 Jul; 86():103084. PubMed ID: 32174448 [TBL] [Abstract][Full Text] [Related]
10. Susceptibility to Spear-Phishing Emails: Effects of Internet User Demographics and Email Content. Lin T; Capecci DE; Ellis DM; Rocha HA; Dommaraju S; Oliveira DS; Ebner NC ACM Trans Comput Hum Interact; 2019 Sep; 26(5):. PubMed ID: 32508486 [TBL] [Abstract][Full Text] [Related]
11. Phishing in healthcare organisations: threats, mitigation and approaches. Priestman W; Anstis T; Sebire IG; Sridharan S; Sebire NJ BMJ Health Care Inform; 2019 Sep; 26(1):. PubMed ID: 31488498 [TBL] [Abstract][Full Text] [Related]
12. The effect of automation trust tendency, system reliability and feedback on users' phishing detection. Zhou Y; Cui X; Qu W; Ge Y Appl Ergon; 2022 Jul; 102():103754. PubMed ID: 35339760 [TBL] [Abstract][Full Text] [Related]
13. Susceptibility to phishing on social network sites: A personality information processing model. Frauenstein ED; Flowerday S Comput Secur; 2020 Jul; 94():101862. PubMed ID: 32501314 [TBL] [Abstract][Full Text] [Related]
14. Signal Detection Theory (SDT) Is Effective for Modeling User Behavior Toward Phishing and Spear-Phishing Attacks. Martin J; Dubé C; Coovert MD Hum Factors; 2018 Dec; 60(8):1179-1191. PubMed ID: 30063406 [TBL] [Abstract][Full Text] [Related]
15. How Good Are We at Detecting a Phishing Attack? Investigating the Evolving Phishing Attack Email and Why It Continues to Successfully Deceive Society. Carroll F; Adejobi JA; Montasari R SN Comput Sci; 2022; 3(2):170. PubMed ID: 35224514 [TBL] [Abstract][Full Text] [Related]
16. So Many Phish, So Little Time: Exploring Email Task Factors and Phishing Susceptibility. Sarno DM; Neider MB Hum Factors; 2022 Dec; 64(8):1379-1403. PubMed ID: 33835881 [TBL] [Abstract][Full Text] [Related]
17. Measuring the level of cyber-security awareness for cybercrime in Saudi Arabia. Alzubaidi A Heliyon; 2021 Jan; 7(1):e06016. PubMed ID: 33537477 [TBL] [Abstract][Full Text] [Related]
18. Phishing for suitable targets in the Netherlands: routine activity theory and phishing victimization. Leukfeldt ER Cyberpsychol Behav Soc Netw; 2014 Aug; 17(8):551-5. PubMed ID: 25080013 [TBL] [Abstract][Full Text] [Related]
19. Evaluation of a mandatory phishing training program for high-risk employees at a US healthcare system. Gordon WJ; Wright A; Glynn RJ; Kadakia J; Mazzone C; Leinbach E; Landman A J Am Med Inform Assoc; 2019 Jun; 26(6):547-552. PubMed ID: 30861069 [TBL] [Abstract][Full Text] [Related]
20. Quantifying Phishing Susceptibility for Detection and Behavior Decisions. Canfield CI; Fischhoff B; Davis A Hum Factors; 2016 Dec; 58(8):1158-1172. PubMed ID: 27562565 [TBL] [Abstract][Full Text] [Related] [Next] [New Search]