Garcia et al., 2023 - Google Patents
Phishing in social media: Investigating training techniques on Instagram shopGarcia et al., 2023
View HTML- Document ID
- 1819523851199062589
- Author
- Garcia K
- Ammons J
- Xu X
- Chen J
- Publication year
- Publication venue
- Proceedings of the Human Factors and Ergonomics Society Annual Meeting
External Links
Snippet
As new communication technologies emerge, social media continues to grow rapidly and falls into users' hands. However, social media also brings new forms of phishing attacks compared to conventional email phishing and desires new forms of anti-phishing …
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q30/00—Commerce, e.g. shopping or e-commerce
- G06Q30/02—Marketing, e.g. market research and analysis, surveying, promotions, advertising, buyer profiling, customer management or rewards; Price estimation or determination
- G06Q30/0241—Advertisement
- G06Q30/0251—Targeted advertisement
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q30/00—Commerce, e.g. shopping or e-commerce
- G06Q30/06—Buying, selling or leasing transactions
- G06Q30/0601—Electronic shopping
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q30/00—Commerce, e.g. shopping or e-commerce
- G06Q30/02—Marketing, e.g. market research and analysis, surveying, promotions, advertising, buyer profiling, customer management or rewards; Price estimation or determination
- G06Q30/0282—Business establishment or product rating or recommendation
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Celliers et al. | A systematic review on fake news themes reported in literature | |
Leukfeldt | Phishing for suitable targets in the Netherlands: Routine activity theory and phishing victimization | |
Goel et al. | Got phished? Internet security and human vulnerability | |
Holt | Examining the forces shaping cybercrime markets online | |
Holt et al. | Testing an integrated self-control and routine activities framework to examine malware infection victimization | |
Button et al. | Online frauds: Learning from victims why they fall for these scams | |
Ngo et al. | Victimization in cyberspace: Is it how long we spend online, what we do online, or what we post online? | |
Ho et al. | Privacy protection issues in social networking sites | |
Alseadoon et al. | What is the influence of users’ characteristics on their ability to detect phishing emails? | |
Gainsbury et al. | Identifying risky Internet use: Associating negative online experience with specific online behaviours | |
Zielinska et al. | A temporal analysis of persuasion principles in phishing emails | |
Milani et al. | Exposure to cyber victimization: Results from a Swiss survey | |
Herbert et al. | A world full of privacy and security (mis) conceptions? findings of a representative survey in 12 countries | |
Holt et al. | Exploring the factors associated with rejection from a closed cybercrime community | |
Mohr et al. | Formation of consumers’ perceived information security: Examining the transfer of trust in online retailers | |
Howell et al. | Risk avoidance behavior on darknet marketplaces | |
Ogbanufe et al. | “Just how risky is it anyway?” The role of risk perception and trust on click-through intention | |
Lee et al. | Typology of cybercrime victimization in Europe: A multilevel latent class analysis | |
Mensah et al. | Experiences and perceptions of cybercrime victims in Ghana: The Perspective of digital consumers of agricultural produce | |
Venkatanathan et al. | Online disclosure of personally identifiable information with strangers: Effects of public and private sharing | |
Garcia et al. | Phishing in social media: Investigating training techniques on Instagram shop | |
Alzghoul et al. | Fraud in online classified ads: strategies, risks, and detection methods: a survey | |
Shalhoub et al. | Cyber law and cyber security in developing and emerging economies | |
Shepherd et al. | The impact of deviant social media influencers and consumer characteristics on purchasing counterfeit goods | |
Rae et al. | Defining a new composite cybersecurity rating scheme for smes in the uk |