Abraham S., Chengalur-Smith I., (2010). An overview of social engineering malware: Trends, tactics, and implications. Technology in Society, 32(3), 183–196.
- Akdemir N., Tuncer C. O., (2020). Covid-19 salgını sonrasında siber suç mağduriyeti riskleri üzerine bir değerlendirme. In Demircioğlu İ. H., Avşar Z., Tuncer C. O., (Eds.), Salgınla Yaşamak: Güvenli Gelecek (pp. 111–133). Pegem Akademi.
Paper not yet in RePEc: Add citation now
- Akdemir N., Yenal S., (2020). Card-not-present fraud victimization: A routine activities approach to understand the risk factors. Security Sciences, 9(1), 243–268. https://doi.org/10.28956/gbd.736179.
Paper not yet in RePEc: Add citation now
- Alsharnouby M., Alaca F., Chiasson S., (2015). Why phishing still works: User strategies for combating phishing attacks. International Journal of Human-Computer Studies, 82, 69–82.
Paper not yet in RePEc: Add citation now
- Assarroudi A., Heshmati Nabavi F., Armat M. R., Ebadi A., Vaismoradi M., (2018). Directed qualitative content analysis: The description and elaboration of its underpinning methods and data analysis process. Journal of Research in Nursing, 23(1), 42–55.
Paper not yet in RePEc: Add citation now
- Baker P., (2020, April 22). Oil & gas spearphishing campaigns carry Agent Tesla Spyware. Channel Futures. https://www.channelfutures.com/mssp-insider/oil-gas-spearphishing-campaigns-carry-agent-tesla-spyware.
Paper not yet in RePEc: Add citation now
- Baryshevtsev M., McGlynn J., (2020). Persuasive appeals predict credibility judgments of phishing messages. Cyberpsychology, Behavior, and Social Networking, 23(5), 297–302.
Paper not yet in RePEc: Add citation now
- Berg B. L., Lune H., Lune H., (2004). Qualitative research methods for the social sciences (Vol. 5). Pearson.
Paper not yet in RePEc: Add citation now
- Bowen B. M., Devarajan R., Stolfo S., (2011, November 15–17). Measuring the human factor of cyber security [Conference session]. 2011 IEEE International Conference on Technologies for Homeland Security (HST). https://ieeexplore.ieee.org/document/6107876.
Paper not yet in RePEc: Add citation now
Braga A. A., (2008). Pulling levers focused deterrence strategies and the prevention of gun homicide. Journal of Criminal Justice, 36(4), 332–343.
Braga A. A., Weisburd D. L., (2012). The effects of “pulling levers†focused deterrence strategies on crime. Campbell Systematic Reviews, 8(1), 1–90.
Braga A. A., Weisburd D. L., Turchan B., (2019). Focused deterrence strategies effects on crime: A systematic review. Campbell Systematic Reviews, 15(3), Article e1051.
- Braun V., Clarke V., (2006). Using thematic analysis in psychology. Qualitative Research in Psychology, 3(2), 77–101.
Paper not yet in RePEc: Add citation now
- Brunson R. K., (2015). Focused deterrence and improved police-community relations: Unpacking the proverbial black box. Criminology & Public Policy, 14, 507–514.
Paper not yet in RePEc: Add citation now
- Bullée J.-W. H., Montoya L., Pieters W., Junger M., Hartel P. H., (2015). The persuasion and security awareness experiment: reducing the success of social engineering attacks. Journal of Experimental Criminology, 11(1), 97–115.
Paper not yet in RePEc: Add citation now
- Butavicius M., Parsons K., Pattinson M., McCormac A., (2016). Breaching the human firewall: Social engineering in phishing and spear-phishing emails. arXiv preprint arXiv:1606.00887. https://arxiv.org/abs/1606.00887.
Paper not yet in RePEc: Add citation now
- Check Point. (2020a, January 2). January 2020’s most wanted malware: Coronavirus-themed spam spreads malicious Emotet malware. https://blog.checkpoint.com/2020/02/13/january-2020s-most-wanted-malware-coronavirus-themed-spam-spreads-malicious-emotet-malware/.
Paper not yet in RePEc: Add citation now
- Check Point. (2020b, March 5). Update: Coronavirus-themed domains 50% more likely to be malicious than other domains. https://blog.checkpoint.com/2020/03/05/update-coronavirus-themed-domains-50-more-likely-to-be-malicious-than-other-domains/.
Paper not yet in RePEc: Add citation now
- Cialdini R. B., (2001). Harnessing the science of persuasion. Harvard Business Review, 79(9), 72–81.
Paper not yet in RePEc: Add citation now
- Cialdini R. B., (2009). Influence: Science and practice (Vol. 4). Pearson Education.
Paper not yet in RePEc: Add citation now
- Cialdini R. B., Goldstein N., (2004). Social influence: Compliance and conformity. Annual Review of Psychology, 55, 591–621.
Paper not yet in RePEc: Add citation now
- Cialdini R. B., Wosinska W., Barrett D. W., Butner J., Gornik-Durose M., (1999). Compliance with a request in two cultures: The differential influence of social proof and commitment/consistency on collectivists and individualists. Personality Social Psychology Bulletin, 25(10), 1242–1253.
Paper not yet in RePEc: Add citation now
Clark J. W., (2017). Trends in social engineering: Securing the weakest link. NSI. http://docplayer.net/78444755-Trends-in-social-engineering-securing-the-weakest-link.html.
- Creswell J. W., Miller D. L., (2000). Determining validity in qualitative inquiry. Theory Into Practice, 39(3), 124–130.
Paper not yet in RePEc: Add citation now
- Cybersecurity and Infrastructure Security Agency. (2020). COVID-19 exploited by malicious cyber actors. https://www.us-cert.gov/ncas/alerts/aa20-099a.
Paper not yet in RePEc: Add citation now
- DeCuir-Gunby J. T., Marshall P. L., McCulloch A. W., (2011). Developing and using a codebook for the analysis of interview data: An example from a professional development research project. Field Methods, 23(2), 136–155.
Paper not yet in RePEc: Add citation now
- Dewan A., (2020, February 25). Warning: Email scam uses list of “corona-virus affected company staff†to deliver malicious payload. Mail Guard. https://www.mailguard.com.au/blog/warning-email-scam-uses-list-of-corona-virus-affected-company-staff-to-deliver-malicious-payload.
Paper not yet in RePEc: Add citation now
- Dunford R., Su Q., Tamang E., (2014). The Pareto principle. The Plymouth Student Scientist, 7(1), 140–148.
Paper not yet in RePEc: Add citation now
- Elo S., Kääriäinen M., Kanste O., Pölkki T., Utriainen K., Kyngäs H., (2014). Qualitative content analysis: A focus on trustworthiness. SAGE Open, 4(1). https://doi.org/10.1177/2158244014522633.
Paper not yet in RePEc: Add citation now
- Elo S., Kyngäs H., (2008). The qualitative content analysis process. Journal of Advanced Nursing, 62(1), 107–115.
Paper not yet in RePEc: Add citation now
- Goel S., Williams K., Dincelli E., (2017). Got phished? Internet security and human vulnerability. Journal of the Association for Information Systems, 18(1), Article 2.
Paper not yet in RePEc: Add citation now
- Gomes V., Reis J., Alturas B., (2020, June 24–27). Social engineering and the dangers of phishing [Conference Session]. 2020 15th Iberian Conference on Information Systems and Technologies (CISTI). https://ieeexplore.ieee.org/document/9140445.
Paper not yet in RePEc: Add citation now
- Graneheim U. H., Lindgren B.-M., Lundman B., (2017). Methodological challenges in qualitative content analysis: A discussion paper. Nurse Education Today, 56, 29–34.
Paper not yet in RePEc: Add citation now
- Grosfeld-Nir A., Ronen B., Kozlovsky N., (2007). The Pareto managerial principle: When does it apply? International Journal of Production Research, 45(10), 2317–2325.
Paper not yet in RePEc: Add citation now
- Harrison B., Svetieva E., Vishwanath A., (2016). Individual processing of phishing emails: How attention and elaboration protect against phishing. Online Information Review, 40(2), 265–281.
Paper not yet in RePEc: Add citation now
- Harwood T. G., Garry T., (2003). An overview of content analysis. The Marketing Review, 3(4), 479–498.
Paper not yet in RePEc: Add citation now
- Hawdon J., Parti K., Dearden T. E., (2020). Cybercrime in America amid COVID-19: The initial results from a natural experiment. American Journal of Criminal Justice, 45, 546–562.
Paper not yet in RePEc: Add citation now
- Heartfield R., Loukas G., Gan D., (2016). You are probably not the weakest link: Towards practical prediction of susceptibility to semantic social engineering attacks. IEEE Access, 4, 6910–6928.
Paper not yet in RePEc: Add citation now
- Holt T. J., Bossler A. M., (2013). Examining the relationship between routine activities and malware infection indicators. Journal of Contemporary Criminal Justice, 29, 420–436. https://doi.org/10.1177/1043986213507401.
Paper not yet in RePEc: Add citation now
- Hsieh H.-F., Shannon S. E., (2005). Three approaches to qualitative content analysis. Qualitative Health Research, 15(9), 1277–1288.
Paper not yet in RePEc: Add citation now
Hu Y., Wang D., Pang K., Xu G., Guo J., (2015). The effect of emotion and time pressure on risk decision-making. Journal of Risk Research, 18(5), 637–650.
- Huberman A. M., Miles M., Saldana J., (2014). Qualitative data analysis: A methods sourcebook. SAGE.
Paper not yet in RePEc: Add citation now
- Jansen J., (2015, June 3). Studying safe online banking behaviour: A protection motivation theory approach [Conference Session]. The Ninth International Symposium on Human Aspects of Information Security & Assurance (HAISA 2015, June 3). https://www.semanticscholar.org/paper/Studying-Safe-Online-Banking-Behaviour%3A-A-Theory-Jansen/1cdfca4fc6d8d69ef2690efb446d7c641fc5cf16.
Paper not yet in RePEc: Add citation now
- Jansen J., Leukfeldt R., (2016). Phishing and malware attacks on online banking customers in the Netherlands: A qualitative analysis of factors leading to victimization. International Journal of Cyber Criminology, 10(1), 79–91.
Paper not yet in RePEc: Add citation now
- Jansen J., van Schaik P., (2018). Persuading end users to act cautiously online: A fear appeals study on phishing. Information & Computer Security, 26(3), 264–276.
Paper not yet in RePEc: Add citation now
- Kahneman D., (2011). Thinking, fast and slow. Macmillan.
Paper not yet in RePEc: Add citation now
- Kashif M., Javed M. K., Pandey D., (2020). A surge in cyber-crime during COVID-19. Indonesian Journal of Social and Environmental Issues, 1(2), 48–52.
Paper not yet in RePEc: Add citation now
- Kim D., Hyun Kim J., (2013). Understanding persuasive elements in phishing e-mails: A categorical content and semantic network analysis. Online Information Review, 37(6), 835–850.
Paper not yet in RePEc: Add citation now
- Kim I., Kuljis J., (2010). Applying content analysis to web-based content. Journal of Computing and Information Technology, 18(4), 369–375.
Paper not yet in RePEc: Add citation now
- Kondracki N. L., Wellman N. S., Amundson D. R., (2002). Content analysis: Review of methods and their applications in nutrition education. Journal of Nutrition Education and Behavior, 34(4), 224–230.
Paper not yet in RePEc: Add citation now
- Korpela K., (2015). Improving cyber security awareness and training programs with data analytics. Information Security Journal: A Global Perspective, 24(1–3), 72–77.
Paper not yet in RePEc: Add citation now
- Krippendorff K., (2004). Content analysis: An introduction to its methodology. SAGE.
Paper not yet in RePEc: Add citation now
- Krombholz K., Hobel H., Huber M., Weippl E., (2015). Advanced social engineering attacks. Journal of Information Security and Applications, 22, 113–122.
Paper not yet in RePEc: Add citation now
- Leukfeldt E. R., (2014). Phishing for suitable targets in the Netherlands: Routine activity theory and phishing victimization. Cyberpsychology, Behavior, and Social Networking, 17(8), 551–555.
Paper not yet in RePEc: Add citation now
- Liang H., Xue Y., (2010). Understanding security behaviors in personal computer usage: A threat avoidance perspective. Journal of the Association for Information Systems, 11(7), 394–413.
Paper not yet in RePEc: Add citation now
- Luo X. R., Zhang W., Burd S., Seazzu A., (2013). Investigating phishing victimization with the heuristic–systematic model: A theoretical framework and an exploration. Computers & Security, 38, 28–38.
Paper not yet in RePEc: Add citation now
- Lutsky N., (1995). When is “obedience†obedience? Conceptual and historical commentary. Journal of Social Issues, 51(3), 55–65.
Paper not yet in RePEc: Add citation now
- Lyons K., (2020, April 16). Google saw more than 18 million daily malware and phishing emails related to COVID-19 last week. The Verge. https://www.theverge.com/2020/4/16/21223800/google-malware-phishing-covid-19-coronavirus-scams.
Paper not yet in RePEc: Add citation now
- Maheswaran D., Chaiken S., (1991). Promoting systematic processing in low-motivation settings: Effect of incongruent information on processing and judgment. Journal of Personality and Social Psychology, 61(1), 13–25.
Paper not yet in RePEc: Add citation now
- Mayring P., (2015). Qualitative content analysis: Theoretical background and procedures. In Bikner-Ahsbahs A., Knipping C., Presmeg N., (Eds.), Approaches to qualitative research in mathematics education (pp. 365–380). Springer.
Paper not yet in RePEc: Add citation now
- McCrohan K. F., Engel K., Harvey J. W., (2010). Influence of awareness and training on cyber security. Journal of Internet Commerce, 9(1), 23–41.
Paper not yet in RePEc: Add citation now
- Miles M. B., Huberman A. M., (1994). Qualitative data analysis: An expanded sourcebook. SAGE.
Paper not yet in RePEc: Add citation now
- Mishra M., Gaurav A. J., Jain A., (2012). A preventive anti-phishing technique using code word. International Journal of Computer Science and Information Technologies, 3(3), 4248–4250.
Paper not yet in RePEc: Add citation now
- Moore T., Clayton R., (2012, October). Discovering phishing dropboxes using email metadata [Conference Session]. eCrime Researchers Summit (eCrime), 2012. https://www.researchgate.net/publication/261038322_Discovering_phishing_dropboxes_using_email_metadata.
Paper not yet in RePEc: Add citation now
- Moretti F., van Vliet L., Bensing J., Deledda G., Mazzi M., Rimondini M., Zimmermann C., Fletcher I., (2011). A standardized approach to qualitative content analysis of focus group discussions from different countries. Patient Education and Counseling, 82(3), 420–428.
Paper not yet in RePEc: Add citation now
- Naidoo R., (2020). A multi-level influence model of COVID-19 themed cybercrime. European Journal of Information Systems, 29(3), 306–321.
Paper not yet in RePEc: Add citation now
- Newman G. R., Clarke R. V., (2013). Superhighway robbery. Routledge.
Paper not yet in RePEc: Add citation now
- Nirmal K., Ewards S. V., Geetha K., (2010, December 3–50). Maximizing online security by providing a 3 factor authentication system to counter-attack “phishing†[Conference Session]. Emerging Trends in Robotics and Communication Technologies (INTERACT), 2010 International Conference. https://ieeexplore.ieee.org/document/5706185.
Paper not yet in RePEc: Add citation now
- Oliveira D., Rocha H., Yang H., Ellis D., Dommaraju S., Muradoglu M., Weir D., Soliman A., Lin T., Ebner N., (2017, May 2). Dissecting spear phishing emails for older vs young adults: On the interplay of weapons of influence and life domains in predicting susceptibility to phishing [Conference Session]. 2017 CHI Conference on Human Factors in Computing Systems. https://dl.acm.org/doi/10.1145/3025453.3025831.
Paper not yet in RePEc: Add citation now
- Onwuegbuzie A. J., Dickinson W. B., (2008). Mixed methods analysis and information visualization: graphical display for effective communication of research results. Qualitative Report, 13(2), 204–225.
Paper not yet in RePEc: Add citation now
- Park G., Taylor J. M., (2015). Using syntactic features for phishing detection. arXiv preprint arXiv:1506.00037. https://arxiv.org/abs/1506.00037.
Paper not yet in RePEc: Add citation now
- Patton M. Q., (2002). Qualitative research & evaluation methods (3rd ed.). SAGE.
Paper not yet in RePEc: Add citation now
- Peltier T. R., (2006). Social engineering: Concepts and solutions. Information Security Journal, 15(5), 13–21.
Paper not yet in RePEc: Add citation now
- Rahman M. A., Zaman N., Asyhari A. T., Al-Turjman F., Bhuiyan M. Z. A., Zolkipli M., (2020). Data-driven dynamic clustering framework for mitigating the adverse economic impact of Covid-19 lockdown practices. Sustainable Cities and Society, 62. https://doi.org/10.1016/j.scs.2020.102372.
Paper not yet in RePEc: Add citation now
- Review—Navigating cybersecurity during a pandemic: Latest malware and threat actors. (2020, April 22). News Lagoon. https://newslagoon.com/en/review-navigating-cybersecurity-during-a-pandemic-latest-malware-and-threat-actors/16206.
Paper not yet in RePEc: Add citation now
- Riley A., (2019). Agent Tesla Keylogger is now a top phishing threat. Cofense. https://cofense.com/agent-tesla-keylogger-now-top-phishing-threat/.
Paper not yet in RePEc: Add citation now
- Ruiz D., (2020, April 2). Cybercriminals exploit coronavirus with wave of new scams. Isbuzz. https://www.informationsecuritybuzz.com/articles/cybercriminals-exploit-coronavirus-with-wave-of-new-scams/.
Paper not yet in RePEc: Add citation now
- Sandelowski M., (1993). Theory unmasked: The uses and guises of theory in qualitative research. Research in Nursing & Health, 16(3), 213–218.
Paper not yet in RePEc: Add citation now
Saqib N. U., Chan E. Y., (2015). Time pressure reverses risk preferences. Organizational Behavior and Human Decision Processes, 130, 58–68.
- Schreier M., (2012). Qualitative content analysis in practice. SAGE.
Paper not yet in RePEc: Add citation now
- Schuetz S., Lowry P. B., Thatcher J., (2016, August 24). Defending against spear-phishing: Motivating users through fear appeal manipulations [Conference Session]. PACIS 2016. https://aisel.aisnet.org/pacis2016/74/.
Paper not yet in RePEc: Add citation now
- Sharma K., (2010). An anatomy of phishing messages as deceiving persuasion: a categorical content and semantic network study. EDPACS, 42(6), 1–19.
Paper not yet in RePEc: Add citation now
- Silic M., Back A., (2016). The dark side of social networking sites: Understanding phishing risks. Computers in Human Behavior, 60, 35–43.
Paper not yet in RePEc: Add citation now
- Stemler S., (2000). An overview of content analysis. Practical Assessment, Research, and Evaluation, 7(1), Article 17.
Paper not yet in RePEc: Add citation now
Sumner A., Hoy C., Ortiz-Juarez E., (2020). Estimates of the impact of COVID-19 on global poverty (WIDER Working Paper Series, Working Paper No. 2020-43). World Institute for Development Economic Research (UNU-WIDER).
- Thayer A., Evans M., McBride A., Queen M., Spyridakis J., (2007). Content analysis as a best practice in technical communication research. Journal of Technical Writing & Communication, 37(3), 267–279.
Paper not yet in RePEc: Add citation now
- Thomas J., Harden A., (2008). Methods for the thematic synthesis of qualitative research in systematic reviews. BMC Medical Research Methodology, 8(1), Article 45.
Paper not yet in RePEc: Add citation now
- Tillyer M. S., Engel R. S., Lovins B., (2012). Beyond Boston: Applying theory to understand and address sustainability issues in focused deterrence initiatives for violence reduction. Crime & Delinquency, 58(6), 973–997.
Paper not yet in RePEc: Add citation now
- Tillyer M. S., Kennedy D. M., (2008). Locating focused deterrence approaches within a situational crime prevention framework. Crime Prevention and Community Safety, 10(2), 75–84.
Paper not yet in RePEc: Add citation now
- Vahia I. V., Blazer D. G., Smith G. S., Karp J. F., Steffens D. C., Forester B. P., Tampi R., Agronin M., Jeste D. V., Reynolds C. F., (2020). COVID-19, mental health and aging: A need for new knowledge to bridge science and service. The American Journal of Geriatric Psychiatry: Official Journal of the American Association for Geriatric Psychiatry, 28(7), 695–697. https://doi.org/10.1016/j.jagp.2020.03.007.
Paper not yet in RePEc: Add citation now
Vaismoradi M., Turunen H., Bondas T., (2013). Content analysis and thematic analysis: Implications for conducting a qualitative descriptive study. Nursing & Health Sciences, 15(3), 398–405.
- Vance A., Eargle D., Ouimet K., Straub D., (2013, January 7–10). Enhancing password security through interactive fear appeals: A web-based field experiment [Conference Session]. 2013 46th Hawaii International Conference on System Sciences. https://ieeexplore.ieee.org/document/6480204.
Paper not yet in RePEc: Add citation now
- Vishwanath A., Herath T., Chen R., Wang J., Rao H. R., (2011). Why do people get phished? Testing individual differences in phishing vulnerability within an integrated, information processing model. Decision Support Systems, 51(3), 576–586.
Paper not yet in RePEc: Add citation now
- Wang J., Herath T., Chen R., Vishwanath A., Rao H. R., (2012). Phishing susceptibility: An investigation into the processing of a targeted spear phishing email. IEEE Transactions on Professional Communication, 55(4), 345–362.
Paper not yet in RePEc: Add citation now
- Williams E. J., Beardmore A., Joinson A. N., (2017). Individual differences in susceptibility to online influence: A theoretical review. Computers in Human Behavior, 72, 412–421.
Paper not yet in RePEc: Add citation now
- Williams K. C., (2012). Fear appeal theory. Research in Business and Economics Journal, 5, 63–82.
Paper not yet in RePEc: Add citation now
- Witte K., (1992). Putting the fear back into fear appeals: The extended parallel process model. Communications Monographs, 59(4), 329–349.
Paper not yet in RePEc: Add citation now
Workman M., (2008). Wisecrackers: A theory-grounded investigation of phishing and pretext social engineering threats to information security. Journal of the American Society for Information Science and Technology, 59(4), 662–674.
- World Health Organization. (2020). Beware of criminals pretending to be WHO. https://www.dakotaprairiebank.com/beware-of-criminals-pretending-to-be-who/.
Paper not yet in RePEc: Add citation now
Wright R. T., Jensen M. L., Thatcher J. B., Dinger M., Marett K., (2014). Research Note—Influence techniques in phishing attacks: An examination of vulnerability and resistance. Information Systems Research, 25(2), 385–400.
- Xiong J., Lipsitz O., Nasri F., Lui L. M. W., Gill H., Phan L., Chen-Li D., Iacobucci M., Ho R., Majeed A., McIntyre R. S., (2020). Impact of COVID-19 pandemic on mental health in the general population: A systematic review. Journal of Affective Disorders, 277, 55–64. https://doi.org/10.1016/j.jad.2020.08.001.
Paper not yet in RePEc: Add citation now
Young D. L., Goodie A. S., Hall D. B., Wu E., (2012). Decision making under time pressure, modeled in a prospect theory framework. Organizational Behavior and Human Decision Processes, 118(2), 179–188.
- Zhang W., Luo X., Burd S. D., Seazzu A. F., (2012, January 4–7). How could I fall for that? Exploring phishing victimization with the heuristic-systematic model [Conference Session]. 2012 45th Hawaii International Conference on System Sciences. https://ieeexplore.ieee.org/document/6149302.
Paper not yet in RePEc: Add citation now
- Zhang Y., Wildemuth B., (2009). Qualitative analysis of content. In Wildemuth B., (Ed.), Applications of social research methods to questions in information and library science (pp. 308–319). Libraries Unlimited.
Paper not yet in RePEc: Add citation now
- Zwilling M., Klien G., Lesjak D., Wiechetek Š., Cetin F., Basim H. N., (2020). Cyber security awareness, knowledge and behavior: A comparative study. Journal of Computer Information Systems, 1–16. https://doi.org/10.1080/08874417.2020.1712269.
Paper not yet in RePEc: Add citation now