Published on in Vol 22, No 5 (2020): May

The Role of Health Concerns in Phishing Susceptibility: Survey Design Study

The Role of Health Concerns in Phishing Susceptibility: Survey Design Study

The Role of Health Concerns in Phishing Susceptibility: Survey Design Study

Authors of this article:

Mohamed Abdelhamid1 Author Orcid Image

Journals

  1. Monteith S, Bauer M, Alda M, Geddes J, Whybrow P, Glenn T. Increasing Cybercrime Since the Pandemic: Concerns for Psychiatry. Current Psychiatry Reports 2021;23(4) View
  2. Abroshan H, Devos J, Poels G, Laermans E. Phishing Happens Beyond Technology: The Effects of Human Behaviors and Demographics on Each Step of a Phishing Process. IEEE Access 2021;9:44928 View
  3. Yeng P, Fauzi M, Yang B, Nimbe P. Investigation into Phishing Risk Behaviour among Healthcare Staff. Information 2022;13(8):392 View
  4. Sergi C. Biorepository – A key component of research studies. Contemporary Clinical Trials 2022;112:106655 View
  5. TOĞAÇAR M. Web Sitelerinde Gerçekleştirilen Oltalama Saldırılarının Yapay Zekâ Yaklaşımı ile Tespiti. Bitlis Eren Üniversitesi Fen Bilimleri Dergisi 2021;10(4):1603 View
  6. Bragg T, Rantanen E, Pelletier J, Rashedi E. Cognitive Engineering Modeling of Phishing. Proceedings of the Human Factors and Ergonomics Society Annual Meeting 2022;66(1):2088 View
  7. Chaudhary S, Kakkar R, Jadav N, Nair A, Gupta R, Tanwar S, Agrawal S, Alshehri M, Sharma R, Sharma G, Davidson I, Gonçalves P. A Taxonomy on Smart Healthcare Technologies: Security Framework, Case Study, and Future Directions. Journal of Sensors 2022;2022:1 View
  8. Arafa A, Sheerah H, Alsalamah S. Emerging Digital Technologies in Healthcare with a Spotlight on Cybersecurity: A Narrative Review. Information 2023;14(12):640 View
  9. Gan C, Lee Y, Liew T. Fishing for phishy messages: predicting phishing susceptibility through the lens of cyber-routine activities theory and heuristic-systematic model. Humanities and Social Sciences Communications 2024;11(1) View
  10. Havers B, Tripathi K, Burton A, McManus S, Cooper C, Ukwandu E. Cybercrime victimisation among older adults: A probability sample survey in England and Wales. PLOS ONE 2024;19(12):e0314380 View

Books/Policy Documents

  1. Sahoo B, Pattnaik P. Communication Technology and Gender Violence. View

Conference Proceedings

  1. Yeng P, Yang B, Fauzi M, Nimbe P. 2023 Intelligent Methods, Systems, and Applications (IMSA). A framework for exploring incentive methods towards reducing phishing susceptibility in Healthcare: Based on a review and In-the-wild-field study approach View
  2. Singano T, Mudau C, Ngejane H, Ndlovu L, Mncwango L. 2024 International Conference on Sustainable Technology and Engineering (i-COSTE). Predictive Analytics for Proactive Email Security Risk Management: A Systematic Review View