These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.
132 related articles for article (PubMed ID: 36834209)
1. Thwarting Instant Messaging Phishing Attacks: The Role of Self-Efficacy and the Mediating Effect of Attitude towards Online Sharing of Personal Information. Lee YY; Gan CL; Liew TW Int J Environ Res Public Health; 2023 Feb; 20(4):. PubMed ID: 36834209 [TBL] [Abstract][Full Text] [Related]
2. The Role of Health Concerns in Phishing Susceptibility: Survey Design Study. Abdelhamid M J Med Internet Res; 2020 May; 22(5):e18394. PubMed ID: 32364511 [TBL] [Abstract][Full Text] [Related]
3. Phishing for suitable targets in the Netherlands: routine activity theory and phishing victimization. Leukfeldt ER Cyberpsychol Behav Soc Netw; 2014 Aug; 17(8):551-5. PubMed ID: 25080013 [TBL] [Abstract][Full Text] [Related]
4. Personalized persuasion: Quantifying susceptibility to information exploitation in spear-phishing attacks. Xu T; Singh K; Rajivan P Appl Ergon; 2023 Apr; 108():103908. PubMed ID: 36403509 [TBL] [Abstract][Full Text] [Related]
5. How personal characteristics impact phishing susceptibility: The mediating role of mail processing. Ge Y; Lu L; Cui X; Chen Z; Qu W Appl Ergon; 2021 Nov; 97():103526. PubMed ID: 34246073 [TBL] [Abstract][Full Text] [Related]
6. Phishing suspiciousness in older and younger adults: The role of executive functioning. Gavett BE; Zhao R; John SE; Bussell CA; Roberts JR; Yue C PLoS One; 2017; 12(2):e0171620. PubMed ID: 28158316 [TBL] [Abstract][Full Text] [Related]
7. Susceptibility to phishing on social network sites: A personality information processing model. Frauenstein ED; Flowerday S Comput Secur; 2020 Jul; 94():101862. PubMed ID: 32501314 [TBL] [Abstract][Full Text] [Related]
8. Comparative evaluation of machine learning algorithms for phishing site detection. Almujahid NF; Haq MA; Alshehri M PeerJ Comput Sci; 2024; 10():e2131. PubMed ID: 38983211 [TBL] [Abstract][Full Text] [Related]
9. Factors associated with online victimisation among Malaysian adolescents who use social networking sites: a cross-sectional study. Marret MJ; Choo WY BMJ Open; 2017 Jun; 7(6):e014959. PubMed ID: 28667209 [TBL] [Abstract][Full Text] [Related]
10. Why Employees (Still) Click on Phishing Links: Investigation in Hospitals. Jalali MS; Bruckes M; Westmattelmann D; Schewe G J Med Internet Res; 2020 Jan; 22(1):e16775. PubMed ID: 32012071 [TBL] [Abstract][Full Text] [Related]
11. Who Gets Caught in the Web of Lies?: Understanding Susceptibility to Phishing Emails, Fake News Headlines, and Scam Text Messages. Sarno DM; Black J Hum Factors; 2024 Jun; 66(6):1742-1753. PubMed ID: 37127397 [TBL] [Abstract][Full Text] [Related]
12. Predicting User Susceptibility to Phishing Based on Multidimensional Features. Yang R; Zheng K; Wu B; Li D; Wang Z; Wang X Comput Intell Neurosci; 2022; 2022():7058972. PubMed ID: 35082844 [TBL] [Abstract][Full Text] [Related]
13. Susceptibility to Spear-Phishing Emails: Effects of Internet User Demographics and Email Content. Lin T; Capecci DE; Ellis DM; Rocha HA; Dommaraju S; Oliveira DS; Ebner NC ACM Trans Comput Hum Interact; 2019 Sep; 26(5):. PubMed ID: 32508486 [TBL] [Abstract][Full Text] [Related]
14. Signal Detection Theory (SDT) Is Effective for Modeling User Behavior Toward Phishing and Spear-Phishing Attacks. Martin J; Dubé C; Coovert MD Hum Factors; 2018 Dec; 60(8):1179-1191. PubMed ID: 30063406 [TBL] [Abstract][Full Text] [Related]
15. It's the deceiver and the receiver: Individual differences in phishing susceptibility and false positives with item profiling. Kleitman S; Law MKH; Kay J PLoS One; 2018; 13(10):e0205089. PubMed ID: 30365492 [TBL] [Abstract][Full Text] [Related]
16. The association between adolescents' beliefs in a just world and their attitudes to victims of bullying. Fox CL; Elder T; Gater J; Johnson E Br J Educ Psychol; 2010 Jun; 80(Pt 2):183-98. PubMed ID: 19930790 [TBL] [Abstract][Full Text] [Related]
17. A comprehensive survey of AI-enabled phishing attacks detection techniques. Basit A; Zafar M; Liu X; Javed AR; Jalil Z; Kifayat K Telecommun Syst; 2021; 76(1):139-154. PubMed ID: 33110340 [TBL] [Abstract][Full Text] [Related]