These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.


BIOMARKERS

Molecular Biopsy of Human Tumors

- a resource for Precision Medicine *

136 related articles for article (PubMed ID: 35321019)

  • 1. Phishing simulation exercise in a large hospital: A case study.
    Rizzoni F; Magalini S; Casaroli A; Mari P; Dixon M; Coventry L
    Digit Health; 2022; 8():20552076221081716. PubMed ID: 35321019
    [TBL] [Abstract][Full Text] [Related]  

  • 2. Assessment of Employee Susceptibility to Phishing Attacks at US Health Care Institutions.
    Gordon WJ; Wright A; Aiyagari R; Corbo L; Glynn RJ; Kadakia J; Kufahl J; Mazzone C; Noga J; Parkulo M; Sanford B; Scheib P; Landman AB
    JAMA Netw Open; 2019 Mar; 2(3):e190393. PubMed ID: 30848810
    [TBL] [Abstract][Full Text] [Related]  

  • 3. Phishing in healthcare organisations: threats, mitigation and approaches.
    Priestman W; Anstis T; Sebire IG; Sridharan S; Sebire NJ
    BMJ Health Care Inform; 2019 Sep; 26(1):. PubMed ID: 31488498
    [TBL] [Abstract][Full Text] [Related]  

  • 4. Evaluation of a mandatory phishing training program for high-risk employees at a US healthcare system.
    Gordon WJ; Wright A; Glynn RJ; Kadakia J; Mazzone C; Leinbach E; Landman A
    J Am Med Inform Assoc; 2019 Jun; 26(6):547-552. PubMed ID: 30861069
    [TBL] [Abstract][Full Text] [Related]  

  • 5. So Many Phish, So Little Time: Exploring Email Task Factors and Phishing Susceptibility.
    Sarno DM; Neider MB
    Hum Factors; 2022 Dec; 64(8):1379-1403. PubMed ID: 33835881
    [TBL] [Abstract][Full Text] [Related]  

  • 6. Personalized persuasion: Quantifying susceptibility to information exploitation in spear-phishing attacks.
    Xu T; Singh K; Rajivan P
    Appl Ergon; 2023 Apr; 108():103908. PubMed ID: 36403509
    [TBL] [Abstract][Full Text] [Related]  

  • 7. Why Employees (Still) Click on Phishing Links: Investigation in Hospitals.
    Jalali MS; Bruckes M; Westmattelmann D; Schewe G
    J Med Internet Res; 2020 Jan; 22(1):e16775. PubMed ID: 32012071
    [TBL] [Abstract][Full Text] [Related]  

  • 8. Understanding Phishing Email Processing and Perceived Trustworthiness Through Eye Tracking.
    McAlaney J; Hills PJ
    Front Psychol; 2020; 11():1756. PubMed ID: 32849040
    [TBL] [Abstract][Full Text] [Related]  

  • 9. Susceptibility to Spear-Phishing Emails: Effects of Internet User Demographics and Email Content.
    Lin T; Capecci DE; Ellis DM; Rocha HA; Dommaraju S; Oliveira DS; Ebner NC
    ACM Trans Comput Hum Interact; 2019 Sep; 26(5):. PubMed ID: 32508486
    [TBL] [Abstract][Full Text] [Related]  

  • 10. The Phishing Email Suspicion Test (PEST) a lab-based task for evaluating the cognitive mechanisms of phishing detection.
    Hakim ZM; Ebner NC; Oliveira DS; Getz SJ; Levin BE; Lin T; Lloyd K; Lai VT; Grilli MD; Wilson RC
    Behav Res Methods; 2021 Jun; 53(3):1342-1352. PubMed ID: 33078362
    [TBL] [Abstract][Full Text] [Related]  

  • 11. Cybersecurity Awareness Enhancement: A Study of the Effects of Age and Gender of Thai Employees Associated with Phishing Attacks.
    Daengsi T; Pornpongtechavanich P; Wuttidittachotti P
    Educ Inf Technol (Dordr); 2022; 27(4):4729-4752. PubMed ID: 34803469
    [TBL] [Abstract][Full Text] [Related]  

  • 12. Influence of Human Factors on Cyber Security within Healthcare Organisations: A Systematic Review.
    Nifakos S; Chandramouli K; Nikolaou CK; Papachristou P; Koch S; Panaousis E; Bonacina S
    Sensors (Basel); 2021 Jul; 21(15):. PubMed ID: 34372354
    [No Abstract]   [Full Text] [Related]  

  • 13. The role of cue utilization in the detection of phishing emails.
    Sturman D; Valenzuela C; Plate O; Tanvir T; Auton JC; Bayl-Smith P; Wiggins MW
    Appl Ergon; 2023 Jan; 106():103887. PubMed ID: 36037654
    [TBL] [Abstract][Full Text] [Related]  

  • 14. The roles of phishing knowledge, cue utilization, and decision styles in phishing email detection.
    Sturman D; Bell EA; Auton JC; Breakey GR; Wiggins MW
    Appl Ergon; 2024 Sep; 119():104309. PubMed ID: 38729025
    [TBL] [Abstract][Full Text] [Related]  

  • 15. Advancing Phishing Email Detection: A Comparative Study of Deep Learning Models.
    Altwaijry N; Al-Turaiki I; Alotaibi R; Alakeel F
    Sensors (Basel); 2024 Mar; 24(7):. PubMed ID: 38610289
    [TBL] [Abstract][Full Text] [Related]  

  • 16. "Alexa, What's a Phishing Email?": Training users to spot phishing emails using a voice assistant.
    Sharevski F; Jachim P
    EURASIP J Inf Secur; 2022; 2022(1):7. PubMed ID: 36466991
    [TBL] [Abstract][Full Text] [Related]  

  • 17. Creative Persuasion: A Study on Adversarial Behaviors and Strategies in Phishing Attacks.
    Rajivan P; Gonzalez C
    Front Psychol; 2018; 9():135. PubMed ID: 29515478
    [TBL] [Abstract][Full Text] [Related]  

  • 18. Evaluation of Federated Learning in Phishing Email Detection.
    Thapa C; Tang JW; Abuadbba A; Gao Y; Camtepe S; Nepal S; Almashor M; Zheng Y
    Sensors (Basel); 2023 Apr; 23(9):. PubMed ID: 37177549
    [TBL] [Abstract][Full Text] [Related]  

  • 19. The development of phishing during the COVID-19 pandemic: An analysis of over 1100 targeted domains.
    Hoheisel R; van Capelleveen G; Sarmah DK; Junger M
    Comput Secur; 2023 May; 128():103158. PubMed ID: 36883044
    [TBL] [Abstract][Full Text] [Related]  

  • 20. How personal characteristics impact phishing susceptibility: The mediating role of mail processing.
    Ge Y; Lu L; Cui X; Chen Z; Qu W
    Appl Ergon; 2021 Nov; 97():103526. PubMed ID: 34246073
    [TBL] [Abstract][Full Text] [Related]  

    [Next]    [New Search]
    of 7.