CybSafe
  • Why CybSafe?
    • Borderless security awareness
  • Products
    • Our technology
    • Awareness Hub
    • Behaviour Change Hub
    • Culture Hub
    • Managed Service Hub
    • Pricing
  • SebDB
    • About SebDB
  • Customers
    • Case studies
  • Company
    • About CybSafe
    • About our team
    • Research and Analysis
    • Events
    • Press
    • Careers
    • Legal
    • Contact us
    • Support
  • Resources
    • All Resources
    • Blog
    • Whitepapers
    • Research library
    • Webinars
  • Login
  • Watch the Demo
Select Page

Examining the distinct antecedents of E-mail habits and its influence on the outcomes of a phishing attack

Jun 1, 2015 | Research

While research has linked social media phishing susceptibility to individual Facebook habits,the underlying process by which habits lead to victimization and the extent to which it explainse-mail-based phishing remains unclear. The study compared the antecedents and...

Habitual Facebook use and its impact on getting deceived on social media

Aug 25, 2014 | Research

This paper looks into how Facebook habits impact susceptibility to social engineering attacks via social media, concluding habitual Facebook users are significantly more likely to succumb to level 1 friend-request attacks than non-habitual users.

Research article phishing susceptibility: An investigation into the processing of a targeted spear phishing email

Aug 12, 2012 | Research

Research problem: Phishing is an email-based scam where a perpetrator camouflages emails to appear as a legitimate request for personal and sensitive information. Research question: How do individuals process a phishing email, and determine whether to respond to it?...

Why do people get phished? Testing individual differences in phishing vulnerability within an integrated, information processing model

Jun 1, 2011 | Research

This research presents an integrated information processing model of phishing susceptibility grounded in the prior research in information process and interpersonal deception. We refine and validate the model using a sample of intended victims of an actual phishing...
Sign up

Recent Posts

  • [Technology] Condeco
  • [TEISS2020] Panel discussion
  • [IMPACT2020] Laura Shipp – How private is your period?
  • [PEEPSEC] Professor David Carroll, Associate Professor of Media Design at Parsons School of Design
  • [PEEPSEC] James Linton, Social Engineer & Threat Hunter
cybsafe icon teal

Why CybSafe?

Borderless security awareness

Products

Our technology

Awareness Hub

Behaviour Change Hub

Culture Hub

Managed Service Hub

Pricing

Customers

Case studies

Support

Resources

All resources

Webinars

Whitepapers

Research library

Blog

Partners

Become a partner

Partner portal

Company

About CybSafe

About our team

About Research & Analysis

Events

Press

CybSafe careers

Contact us

Legal

  • Follow
  • Follow
Copyright © 2020 CybSafe Ltd. All Rights Reserved.
Privacy policy | Cookies policy | Terms of website use