• Reference Citation Analysis
  • v
  • v
  • Find an Article
Find an Article PDF (4642360)   Today's Articles (2108)   Subscriber (50499)
For: Moreno-fernández MM, Blanco F, Garaizar P, Matute H. Fishing for phishers. Improving Internet users' sensitivity to visual deception cues to prevent electronic fraud. Computers in Human Behavior 2017;69:421-36. [DOI: 10.1016/j.chb.2016.12.044] [Citation(s) in RCA: 22] [Impact Index Per Article: 3.1] [Reference Citation Analysis] [What about the content of this article? (0)] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/18/2022]
Number Cited by Other Article(s)
1
Chao CM, Kao KY, Yu TK. Reactions to Problematic Internet Use Among Adolescents: Inappropriate Physical and Mental Health Perspectives. Front Psychol 2020;11:1782. [PMID: 32849054 PMCID: PMC7411128 DOI: 10.3389/fpsyg.2020.01782] [Citation(s) in RCA: 6] [Impact Index Per Article: 1.5] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Received: 05/06/2020] [Accepted: 06/29/2020] [Indexed: 12/24/2022]  Open
2
Susceptibility to phishing on social network sites: A personality information processing model. Comput Secur 2020;94:101862. [PMID: 32501314 PMCID: PMC7252086 DOI: 10.1016/j.cose.2020.101862] [Citation(s) in RCA: 21] [Impact Index Per Article: 5.3] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Received: 03/05/2019] [Revised: 04/26/2020] [Accepted: 04/28/2020] [Indexed: 11/26/2022]
3
An effective security alert mechanism for real-time phishing tweet detection on Twitter. Comput Secur 2019. [DOI: 10.1016/j.cose.2019.02.004] [Citation(s) in RCA: 22] [Impact Index Per Article: 4.4] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/18/2022]
4
Jones HS, Towse JN, Race N, Harrison T. Email fraud: The search for psychological predictors of susceptibility. PLoS One 2019;14:e0209684. [PMID: 30650114 PMCID: PMC6334892 DOI: 10.1371/journal.pone.0209684] [Citation(s) in RCA: 33] [Impact Index Per Article: 6.6] [Reference Citation Analysis] [Abstract] [MESH Headings] [Track Full Text] [Download PDF] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Received: 07/30/2018] [Accepted: 12/09/2018] [Indexed: 11/26/2022]  Open
5
Whitty MT. Predicting susceptibility to cyber-fraud victimhood. ACTA ACUST UNITED AC 2019. [DOI: 10.1108/jfc-10-2017-0095] [Citation(s) in RCA: 32] [Impact Index Per Article: 6.4] [Reference Citation Analysis] [Abstract] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/17/2022]
6
Al-Ajlouni MM. Human Resources and their Tendency to Information Security Crimes Based on Holland Theory. INFORMATION RESOURCES MANAGEMENT JOURNAL 2018. [DOI: 10.4018/irmj.2018100103] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.2] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 11/08/2022]
7
Yan Z, Robertson T, Yan R, Park SY, Bordoff S, Chen Q, Sprissler E. Finding the weakest links in the weakest link: How well do undergraduate students make cybersecurity judgment? COMPUTERS IN HUMAN BEHAVIOR 2018. [DOI: 10.1016/j.chb.2018.02.019] [Citation(s) in RCA: 36] [Impact Index Per Article: 6.0] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/26/2022]
PrevPage 1 of 1 1Next
© 2004-2024 Baishideng Publishing Group Inc. All rights reserved. 7041 Koll Center Parkway, Suite 160, Pleasanton, CA 94566, USA