Published on in Vol 22, No 5 (2020): May

The Role of Health Concerns in Phishing Susceptibility: Survey Design Study

The Role of Health Concerns in Phishing Susceptibility: Survey Design Study

The Role of Health Concerns in Phishing Susceptibility: Survey Design Study

Authors of this article:

Mohamed Abdelhamid1 Author Orcid Image

Journals

  1. Monteith S, Bauer M, Alda M, Geddes J, Whybrow P, Glenn T. Increasing Cybercrime Since the Pandemic: Concerns for Psychiatry. Current Psychiatry Reports 2021;23(4) View
  2. Abroshan H, Devos J, Poels G, Laermans E. Phishing Happens Beyond Technology: The Effects of Human Behaviors and Demographics on Each Step of a Phishing Process. IEEE Access 2021;9:44928 View
  3. Yeng P, Fauzi M, Yang B, Nimbe P. Investigation into Phishing Risk Behaviour among Healthcare Staff. Information 2022;13(8):392 View
  4. Sergi C. Biorepository – A key component of research studies. Contemporary Clinical Trials 2022;112:106655 View
  5. TOĞAÇAR M. Web Sitelerinde Gerçekleştirilen Oltalama Saldırılarının Yapay Zekâ Yaklaşımı ile Tespiti. Bitlis Eren Üniversitesi Fen Bilimleri Dergisi 2021;10(4):1603 View
  6. Bragg T, Rantanen E, Pelletier J, Rashedi E. Cognitive Engineering Modeling of Phishing. Proceedings of the Human Factors and Ergonomics Society Annual Meeting 2022;66(1):2088 View
  7. Chaudhary S, Kakkar R, Jadav N, Nair A, Gupta R, Tanwar S, Agrawal S, Alshehri M, Sharma R, Sharma G, Davidson I, Gonçalves P. A Taxonomy on Smart Healthcare Technologies: Security Framework, Case Study, and Future Directions. Journal of Sensors 2022;2022:1 View
  8. Arafa A, Sheerah H, Alsalamah S. Emerging Digital Technologies in Healthcare with a Spotlight on Cybersecurity: A Narrative Review. Information 2023;14(12):640 View
  9. Gan C, Lee Y, Liew T. Fishing for phishy messages: predicting phishing susceptibility through the lens of cyber-routine activities theory and heuristic-systematic model. Humanities and Social Sciences Communications 2024;11(1) View

Books/Policy Documents

  1. Sahoo B, Pattnaik P. Communication Technology and Gender Violence. View