• Reference Citation Analysis
  • v
  • v
  • Find an Article
Find an Article PDF (4630704)   Today's Articles (2)   Subscriber (49817)
For: Lin T, Capecci DE, Ellis DM, Rocha HA, Dommaraju S, Oliveira DS, Ebner NC. Susceptibility to Spear-Phishing Emails: Effects of Internet User Demographics and Email Content. ACM Trans Comput Hum Interact 2019;26:32. [PMID: 32508486 PMCID: PMC7274040 DOI: 10.1145/3336141] [Citation(s) in RCA: 23] [Impact Index Per Article: 4.6] [Reference Citation Analysis] [What about the content of this article? (0)] [Track Full Text] [Subscribe] [Scholar Register] [Received: 10/01/2018] [Accepted: 05/01/2019] [Indexed: 06/11/2023]
Number Cited by Other Article(s)
1
Pehlivanoglu D, Shoenfelt A, Hakim Z, Heemskerk A, Zhen J, Mosqueda M, Wilson RC, Huentelman M, Grilli MD, Turner G, Spreng RN, Ebner NC. Phishing vulnerability compounded by older age, apolipoprotein E e4 genotype, and lower cognition. PNAS NEXUS 2024;3:pgae296. [PMID: 39118834 PMCID: PMC11309394 DOI: 10.1093/pnasnexus/pgae296] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [Grants] [Track Full Text] [Figures] [Subscribe] [Scholar Register] [Received: 01/10/2024] [Accepted: 07/08/2024] [Indexed: 08/10/2024]
2
Ebner NC, Horta M, El-Shafie D. New directions for studying the aging social-cognitive brain. Curr Opin Psychol 2024;56:101768. [PMID: 38104362 PMCID: PMC10939782 DOI: 10.1016/j.copsyc.2023.101768] [Citation(s) in RCA: 1] [Impact Index Per Article: 1.0] [Reference Citation Analysis] [Abstract] [Key Words] [MESH Headings] [Grants] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Received: 11/01/2023] [Revised: 11/17/2023] [Accepted: 11/21/2023] [Indexed: 12/19/2023]
3
Ebner NC, Pehlivanoglu D, Shoenfelt A. Financial Fraud and Deception in Aging. ADVANCES IN GERIATRIC MEDICINE AND RESEARCH 2023;5:e230007. [PMID: 37990708 PMCID: PMC10662792 DOI: 10.20900/agmr20230007] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [Grants] [Track Full Text] [Figures] [Subscribe] [Scholar Register] [Indexed: 11/23/2023]
4
Beach SR, Czaja SJ, Schulz R. Novel methods for assessment of vulnerability to financial exploitation (FE). J Elder Abuse Negl 2023;35:151-173. [PMID: 37952111 DOI: 10.1080/08946566.2023.2281672] [Citation(s) in RCA: 1] [Impact Index Per Article: 1.0] [Reference Citation Analysis] [Abstract] [Key Words] [MESH Headings] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/14/2023]
5
Xu T, Singh K, Rajivan P. Personalized persuasion: Quantifying susceptibility to information exploitation in spear-phishing attacks. APPLIED ERGONOMICS 2023;108:103908. [PMID: 36403509 DOI: 10.1016/j.apergo.2022.103908] [Citation(s) in RCA: 1] [Impact Index Per Article: 1.0] [Reference Citation Analysis] [Abstract] [Key Words] [MESH Headings] [Track Full Text] [Subscribe] [Scholar Register] [Received: 02/09/2022] [Revised: 06/10/2022] [Accepted: 09/20/2022] [Indexed: 06/16/2023]
6
Zhuo S, Biddle R, Koh YS, Lottridge D, Russello G. SoK: Human-Centered Phishing Susceptibility. ACM TRANSACTIONS ON PRIVACY AND SECURITY 2022. [DOI: 10.1145/3575797] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 12/13/2022]
7
Sharevski F, Jachim P. “Alexa, What’s a Phishing Email?”: Training users to spot phishing emails using a voice assistant. EURASIP JOURNAL ON INFORMATION SECURITY 2022;2022:7. [DOI: 10.1186/s13635-022-00133-w] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Received: 09/14/2021] [Accepted: 10/24/2022] [Indexed: 11/24/2022]  Open
8
Shi H, Silva M, Giovanini L, Capecci D, Czech L, Fernandes J, Oliveira D. Lumen: A machine learning framework to expose influence cues in texts. FRONTIERS IN COMPUTER SCIENCE 2022. [DOI: 10.3389/fcomp.2022.929515] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/13/2022]  Open
9
Jiang Y, Yang F. Association between internet use and successful aging of older Chinese women: a cross-sectional study. BMC Geriatr 2022;22:536. [PMID: 35764930 PMCID: PMC9241215 DOI: 10.1186/s12877-022-03199-w] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.5] [Reference Citation Analysis] [Abstract] [Key Words] [MESH Headings] [Track Full Text] [Download PDF] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Received: 12/26/2021] [Accepted: 06/08/2022] [Indexed: 12/16/2022]  Open
10
Ho HTN, Luong HT. Research trends in cybercrime victimization during 2010-2020: a bibliometric analysis. SN SOCIAL SCIENCES 2022;2:4. [PMID: 35013728 PMCID: PMC8732210 DOI: 10.1007/s43545-021-00305-4] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.5] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 09/13/2021] [Accepted: 12/15/2021] [Indexed: 01/24/2023]
11
Burton A, Cooper C, Dar A, Mathews L, Tripathi K. Exploring how, why and in what contexts older adults are at risk of financial cybercrime victimisation: A realist review. Exp Gerontol 2021;159:111678. [PMID: 34973345 DOI: 10.1016/j.exger.2021.111678] [Citation(s) in RCA: 3] [Impact Index Per Article: 1.0] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Received: 09/06/2021] [Revised: 11/29/2021] [Accepted: 12/20/2021] [Indexed: 11/04/2022]
12
Grilli MD, McVeigh KS, Hakim ZM, Wank AA, Getz SJ, Levin BE, Ebner NC, Wilson RC. Is This Phishing? Older Age Is Associated With Greater Difficulty Discriminating Between Safe and Malicious Emails. J Gerontol B Psychol Sci Soc Sci 2021;76:1711-1715. [PMID: 33378418 DOI: 10.1093/geronb/gbaa228] [Citation(s) in RCA: 7] [Impact Index Per Article: 2.3] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Received: 07/10/2020] [Indexed: 11/14/2022]  Open
13
Morrison B, Coventry L, Briggs P. How do Older Adults feel about engaging with Cyber‐Security? HUMAN BEHAVIOR AND EMERGING TECHNOLOGIES 2021. [DOI: 10.1002/hbe2.291] [Citation(s) in RCA: 3] [Impact Index Per Article: 1.0] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/05/2022]
14
O'Connor AM, Judges RA, Lee K, Evans AD. Can adults discriminate between fraudulent and legitimate e-mails? Examining the role of age and prior fraud experience. J Elder Abuse Negl 2021;33:181-205. [PMID: 34134594 DOI: 10.1080/08946566.2021.1934767] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.3] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 10/21/2022]
15
Pehlivanoglu D, Lin T, Deceus F, Heemskerk A, Ebner NC, Cahill BS. The role of analytical reasoning and source credibility on the evaluation of real and fake full-length news articles. Cogn Res Princ Implic 2021;6:24. [PMID: 33788040 PMCID: PMC8012428 DOI: 10.1186/s41235-021-00292-3] [Citation(s) in RCA: 7] [Impact Index Per Article: 2.3] [Reference Citation Analysis] [Abstract] [Key Words] [MESH Headings] [Grants] [Track Full Text] [Download PDF] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Received: 08/01/2020] [Accepted: 03/17/2021] [Indexed: 12/03/2022]  Open
16
Frazier I, Lin T, Liu P, Skarsten S, Feifel D, Ebner NC. Age and intranasal oxytocin effects on trust-related decisions after breach of trust: Behavioral and brain evidence. Psychol Aging 2021;36:10-21. [PMID: 33705182 DOI: 10.1037/pag0000545] [Citation(s) in RCA: 5] [Impact Index Per Article: 1.7] [Reference Citation Analysis] [Abstract] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/08/2022]
17
Hanus B, Wu YA, Parrish J. Phish Me, Phish Me Not. JOURNAL OF COMPUTER INFORMATION SYSTEMS 2021. [DOI: 10.1080/08874417.2020.1858730] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 10/22/2022]
18
“Warn Them” or “Just Block Them”?: Investigating Privacy Concerns Among Older and Working Age Adults. PROCEEDINGS ON PRIVACY ENHANCING TECHNOLOGIES 2021. [DOI: 10.2478/popets-2021-0016] [Citation(s) in RCA: 3] [Impact Index Per Article: 1.0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 11/21/2022]
19
Burita L, Matoulek P, Halouzka K, Kozak P. Analysis of phishing emails. AIMS ELECTRONICS AND ELECTRICAL ENGINEERING 2021. [DOI: 10.3934/electreng.2021006] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/18/2022]  Open
20
Aleroud A, Abu-Shanab E, Al-Aiad A, Alshboul Y. An examination of susceptibility to spear phishing cyber attacks in non-English speaking communities. JOURNAL OF INFORMATION SECURITY AND APPLICATIONS 2020. [DOI: 10.1016/j.jisa.2020.102614] [Citation(s) in RCA: 6] [Impact Index Per Article: 1.5] [Reference Citation Analysis] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 11/17/2022]
21
The Phishing Email Suspicion Test (PEST) a lab-based task for evaluating the cognitive mechanisms of phishing detection. Behav Res Methods 2020;53:1342-1352. [PMID: 33078362 DOI: 10.3758/s13428-020-01495-0] [Citation(s) in RCA: 8] [Impact Index Per Article: 2.0] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Accepted: 09/30/2020] [Indexed: 11/08/2022]
22
Phishing Attacks Survey: Types, Vectors, and Technical Approaches. FUTURE INTERNET 2020. [DOI: 10.3390/fi12100168] [Citation(s) in RCA: 37] [Impact Index Per Article: 9.3] [Reference Citation Analysis] [Abstract] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/16/2022]  Open
23
Montañez R, Golob E, Xu S. Human Cognition Through the Lens of Social Engineering Cyberattacks. Front Psychol 2020;11:1755. [PMID: 33101096 PMCID: PMC7554349 DOI: 10.3389/fpsyg.2020.01755] [Citation(s) in RCA: 14] [Impact Index Per Article: 3.5] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Received: 01/19/2020] [Accepted: 06/25/2020] [Indexed: 11/13/2022]  Open
24
Jampen D, Gür G, Sutter T, Tellenbach B. Don’t click: towards an effective anti-phishing training. A comparative literature review. HUMAN-CENTRIC COMPUTING AND INFORMATION SCIENCES 2020. [DOI: 10.1186/s13673-020-00237-7] [Citation(s) in RCA: 17] [Impact Index Per Article: 4.3] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 01/26/2023]
PrevPage 1 of 1 1Next
© 2004-2024 Baishideng Publishing Group Inc. All rights reserved. 7041 Koll Center Parkway, Suite 160, Pleasanton, CA 94566, USA