Published on in Vol 22, No 1 (2020): January

Why Employees (Still) Click on Phishing Links: Investigation in Hospitals

Why Employees (Still) Click on Phishing Links: Investigation in Hospitals

Why Employees (Still) Click on Phishing Links: Investigation in Hospitals

Journals

  1. Williams C, Chaturvedi R, Chakravarthy K. Cybersecurity Risks in a Pandemic. Journal of Medical Internet Research 2020;22(9):e23692 View
  2. Aleroud A, Abu-Shanab E, Al-Aiad A, Alshboul Y. An examination of susceptibility to spear phishing cyber attacks in non-English speaking communities. Journal of Information Security and Applications 2020;55:102614 View
  3. Abdelhamid M. The Role of Health Concerns in Phishing Susceptibility: Survey Design Study. Journal of Medical Internet Research 2020;22(5):e18394 View
  4. Montañez R, Golob E, Xu S. Human Cognition Through the Lens of Social Engineering Cyberattacks. Frontiers in Psychology 2020;11 View
  5. Jalali M, Landman A, Gordon W. Telemedicine, privacy, and information security in the age of COVID-19. Journal of the American Medical Informatics Association 2021;28(3):671 View
  6. Abroshan H, Devos J, Poels G, Laermans E. Phishing Happens Beyond Technology: The Effects of Human Behaviors and Demographics on Each Step of a Phishing Process. IEEE Access 2021;9:44928 View
  7. He Y, Aliyu A, Evans M, Luo C. Health Care Cybersecurity Challenges and Solutions Under the Climate of COVID-19: Scoping Review. Journal of Medical Internet Research 2021;23(4):e21747 View
  8. Nifakos S, Chandramouli K, Nikolaou C, Papachristou P, Koch S, Panaousis E, Bonacina S. Influence of Human Factors on Cyber Security within Healthcare Organisations: A Systematic Review. Sensors 2021;21(15):5119 View
  9. Batista E, Moncusi M, López-Aguilar P, Martínez-Ballesté A, Solanas A. Sensors for Context-Aware Smart Healthcare: A Security Perspective. Sensors 2021;21(20):6886 View
  10. Sari P, Handayani P, Hidayanto A, Yazid S, Aji R. Information Security Behavior in Health Information Systems: A Review of Research Trends and Antecedent Factors. Healthcare 2022;10(12):2531 View
  11. Yeng P, Fauzi M, Yang B, Nimbe P. Investigation into Phishing Risk Behaviour among Healthcare Staff. Information 2022;13(8):392 View
  12. Rizzoni F, Magalini S, Casaroli A, Mari P, Dixon M, Coventry L. Phishing simulation exercise in a large hospital: A case study. DIGITAL HEALTH 2022;8:205520762210817 View
  13. Wasserman L, Wasserman Y. Hospital cybersecurity risks and gaps: Review (for the non-cyber professional). Frontiers in Digital Health 2022;4 View
  14. Alhuwail D, Al-Jafar E, Abdulsalam Y, AlDuaij S. Information Security Awareness and Behaviors of Health Care Professionals at Public Health Care Facilities. Applied Clinical Informatics 2021;12(04):924 View
  15. Kraft M. Alternatives to Google Suite Applications. Medical Reference Services Quarterly 2021;40(3):303 View
  16. Kandasamy K, Srinivas S, Achuthan K, Rangan V. Digital Healthcare - Cyberattacks in Asian Organizations: An Analysis of Vulnerabilities, Risks, NIST Perspectives, and Recommendations. IEEE Access 2022;10:12345 View
  17. Taodang D, Gundur R. How Frauds in Times of Crisis Target People. Victims & Offenders 2023;18(5):889 View
  18. Grilc Š, Prislan K, Mihelič A. Teorije in modeli v vedenjskih informacijskovarnostnih raziskavah. Psihološka obzorja / Horizons of Psychology 2022;31:602 View
  19. Petrič G, Roer K. The impact of formal and informal organizational norms on susceptibility to phishing: Combining survey and field experiment data. Telematics and Informatics 2022;67:101766 View
  20. Gioulekas F, Stamatiadis E, Tzikas A, Gounaris K, Georgiadou A, Michalitsi-Psarrou A, Doukas G, Kontoulis M, Nikoloudakis Y, Marin S, Cabecinha R, Ntanos C. A Cybersecurity Culture Survey Targeting Healthcare Critical Infrastructures. Healthcare 2022;10(2):327 View
  21. Sturman D, Valenzuela C, Plate O, Tanvir T, Auton J, Bayl-Smith P, Wiggins M. The role of cue utilization in the detection of phishing emails. Applied Ergonomics 2023;106:103887 View
  22. Shiau W, Wang X, Zheng F. What are the trend and core knowledge of information security? A citation and co-citation analysis. Information & Management 2023;60(3):103774 View
  23. Al‐Qahtani A, Cresci S. The COVID‐19 scamdemic: A survey of phishing attacks and their countermeasures during COVID‐19. IET Information Security 2022;16(5):324 View
  24. Georgiadou A, Michalitsi-Psarrou A, Gioulekas F, Stamatiadis E, Tzikas A, Gounaris K, Doukas G, Ntanos C, Landeiro Ribeiro L, Askounis D. Hospitals’ Cybersecurity Culture during the COVID-19 Crisis. Healthcare 2021;9(10):1335 View
  25. Argyridou E, Nifakos S, Laoudias C, Panda S, Panaousis E, Chandramouli K, Navarro-Llobet D, Mora Zamorano J, Papachristou P, Bonacina S. Cyber Hygiene Methodology for Raising Cybersecurity and Data Privacy Awareness in Health Care Organizations: Concept Study. Journal of Medical Internet Research 2023;25:e41294 View
  26. Vrhovec S, Bernik I, Markelj B. Explaining information seeking intentions: Insights from a Slovenian social engineering awareness campaign. Computers & Security 2023;125:103038 View
  27. Zhuo S, Biddle R, Koh Y, Lottridge D, Russello G. SoK: Human-centered Phishing Susceptibility. ACM Transactions on Privacy and Security 2023;26(3):1 View
  28. Dey J. State-of-the-art session key generation on priority-based adaptive neural machine (PANM) in telemedicine. Neural Computing and Applications 2023;35(13):9517 View
  29. Tally A, Abbott J, Bochner A, Das S, Nippert-Eng C. What Mid-Career Professionals Think, Know, and Feel About Phishing: Opportunities for University IT Departments to Better Empower Employees in Their Anti-Phishing Decisions. Proceedings of the ACM on Human-Computer Interaction 2023;7(CSCW1):1 View
  30. Kannelønning K, Katsikas S. A systematic literature review of how cybersecurity-related behavior has been assessed. Information & Computer Security 2023;31(4):463 View
  31. Xu T, Rajivan P. Determining psycholinguistic features of deception in phishing messages. Information & Computer Security 2023;31(2):199 View
  32. Rajamäki J, Chaulagain N, Kukkonen M, Nurmi P, Honkonen M, Saarinen S, Kinnunen T. Improving the Cybersecurity Awareness of Finnish Podiatry SMEs. WSEAS TRANSACTIONS ON COMPUTERS 2023;22:198 View
  33. Mikuletič S, Vrhovec S, Skela-Savič B, Žvanut B. Security and privacy oriented information security culture (ISC): Explaining unauthorized access to healthcare data by nursing employees. Computers & Security 2024;136:103489 View
  34. Merhavy Z, Bassett L, Melchiorre M, Hall M. The impact of lecture playback speeds on concentration and memory. BMC Medical Education 2023;23(1) View
  35. Burda P, Allodi L, Zannone N. Cognition in Social Engineering Empirical Research: A Systematic Literature Review. ACM Transactions on Computer-Human Interaction 2024;31(2):1 View
  36. Willie M. The Role of Organizational Culture in Cybersecurity: Building a Security-First Culture. SSRN Electronic Journal 2023 View
  37. Tazi F, Nandakumar A, Dykstra J, Rajivan P, Das S. SoK: Analyzing Privacy and Security of Healthcare Data from the User Perspective. ACM Transactions on Computing for Healthcare 2024;5(2):1 View
  38. Kim B, Kim M. The influence of work overload on cybersecurity behavior: A moderated mediation model of psychological contract breach, burnout, and self-efficacy in AI learning such as ChatGPT. Technology in Society 2024;77:102543 View
  39. Gerdin M, Kolkowska E, Grönlund Å. What goes around comes around: an in-depth analysis of how respondents interpret ISP non-/compliance questionnaire items. Information & Computer Security 2024 View
  40. Longtchi T, Rodriguez R, Al-Shawaf L, Atyabi A, Xu S. Internet-Based Social Engineering Psychology, Attacks, and Defenses: A Survey. Proceedings of the IEEE 2024;112(3):210 View

Books/Policy Documents

  1. Hendriks F, Distel B, Engelke K, Westmattelmann D, Wintterlin F. Trust and Communication. View
  2. Janzik R, Quandt T. Trust and Communication. View
  3. Montañez R, Atyabi A, Xu S. Cybersecurity and Cognitive Science. View
  4. Jayasinghe R, Jayasinghe R. Effective Use of Social Media in Public Health. View