[go: up one dir, main page]

Garcia et al., 2023 - Google Patents

Phishing in social media: Investigating training techniques on Instagram shop

Garcia et al., 2023

View HTML @Full View
Document ID
1819523851199062589
Author
Garcia K
Ammons J
Xu X
Chen J
Publication year
Publication venue
Proceedings of the Human Factors and Ergonomics Society Annual Meeting

External Links

Snippet

As new communication technologies emerge, social media continues to grow rapidly and falls into users' hands. However, social media also brings new forms of phishing attacks compared to conventional email phishing and desires new forms of anti-phishing …
Continue reading at journals.sagepub.com (HTML) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce, e.g. shopping or e-commerce
    • G06Q30/02Marketing, e.g. market research and analysis, surveying, promotions, advertising, buyer profiling, customer management or rewards; Price estimation or determination
    • G06Q30/0241Advertisement
    • G06Q30/0251Targeted advertisement
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce, e.g. shopping or e-commerce
    • G06Q30/06Buying, selling or leasing transactions
    • G06Q30/0601Electronic shopping
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce, e.g. shopping or e-commerce
    • G06Q30/02Marketing, e.g. market research and analysis, surveying, promotions, advertising, buyer profiling, customer management or rewards; Price estimation or determination
    • G06Q30/0282Business establishment or product rating or recommendation

Similar Documents

Publication Publication Date Title
Celliers et al. A systematic review on fake news themes reported in literature
Leukfeldt Phishing for suitable targets in the Netherlands: Routine activity theory and phishing victimization
Goel et al. Got phished? Internet security and human vulnerability
Holt Examining the forces shaping cybercrime markets online
Holt et al. Testing an integrated self-control and routine activities framework to examine malware infection victimization
Button et al. Online frauds: Learning from victims why they fall for these scams
Ngo et al. Victimization in cyberspace: Is it how long we spend online, what we do online, or what we post online?
Ho et al. Privacy protection issues in social networking sites
Alseadoon et al. What is the influence of users’ characteristics on their ability to detect phishing emails?
Gainsbury et al. Identifying risky Internet use: Associating negative online experience with specific online behaviours
Zielinska et al. A temporal analysis of persuasion principles in phishing emails
Milani et al. Exposure to cyber victimization: Results from a Swiss survey
Herbert et al. A world full of privacy and security (mis) conceptions? findings of a representative survey in 12 countries
Holt et al. Exploring the factors associated with rejection from a closed cybercrime community
Mohr et al. Formation of consumers’ perceived information security: Examining the transfer of trust in online retailers
Howell et al. Risk avoidance behavior on darknet marketplaces
Ogbanufe et al. “Just how risky is it anyway?” The role of risk perception and trust on click-through intention
Lee et al. Typology of cybercrime victimization in Europe: A multilevel latent class analysis
Mensah et al. Experiences and perceptions of cybercrime victims in Ghana: The Perspective of digital consumers of agricultural produce
Venkatanathan et al. Online disclosure of personally identifiable information with strangers: Effects of public and private sharing
Garcia et al. Phishing in social media: Investigating training techniques on Instagram shop
Alzghoul et al. Fraud in online classified ads: strategies, risks, and detection methods: a survey
Shalhoub et al. Cyber law and cyber security in developing and emerging economies
Shepherd et al. The impact of deviant social media influencers and consumer characteristics on purchasing counterfeit goods
Rae et al. Defining a new composite cybersecurity rating scheme for smes in the uk