All About Phishing: Exploring User Research through a Systematic Literature Review

08/16/2019
by   Sanchari Das, et al.
0

Phishing is a well-known cybersecurity attack that has rapidly increased in recent years. It poses legitimate risks to businesses, government agencies, and all users due to sensitive data breaches, subsequent financial and productivity losses, and social and personal inconvenience. Often, these attacks use social engineering techniques to deceive end-users, indicating the importance of user-focused studies to help prevent future attacks. We provide a detailed overview of phishing research that has focused on users by conducting a systematic literature review of peer-reviewed academic papers published in ACM Digital Library. Although published work on phishing appears in this data set as early as 2004, we found that of the total number of papers on phishing (N = 367) only 13.9 such as interviews, surveys, and in-lab studies. Even within this small subset of papers, we note a striking lack of attention to reporting important information about methods and participants (e.g., the number and nature of participants), along with crucial recruitment biases in some of the research.

READ FULL TEXT
research
08/16/2019

Evaluating User Perception of Multi-Factor Authentication: A Systematic Review

Security vulnerabilities of traditional single factor authentication has...
research
06/24/2020

Adoption of ICT innovations in the agriculture sector in Africa: A Systematic Literature Review

According to the latest World Economic Forum report, about 70 population...
research
06/08/2023

Who are CUIs Really For? Representation and Accessibility in the Conversational User Interface Literature

The theme for CUI 2023 is 'designing for inclusive conversation', but wh...
research
05/06/2021

Profiling the Cybercriminal: A Systematic Review of Research

As cybercrime becomes one of the most significant threats facing society...
research
04/27/2022

Systematic Literature Review: Anti-Phishing Defences and Their Application to Before-the-click Phishing Email Detection

Most research into anti-phishing defence assumes that the mal-actor is a...
research
05/10/2023

WEIRD FAccTs: How Western, Educated, Industrialized, Rich, and Democratic is FAccT?

Studies conducted on Western, Educated, Industrialized, Rich, and Democr...
research
12/29/2021

Working mechanism of Eternalblue and its application in ransomworm

After the leaking of exploit Eternalblue, some ransomworms utilizing thi...

Please sign up or login with your details

Forgot password? Click here to reset