create a website

How Phishers Exploit the Coronavirus Pandemic: A Content Analysis of COVID-19 Themed Phishing Emails. (2021). Yenal, Serkan ; Akdemir, Naci.
In: SAGE Open.
RePEc:sae:sagope:v:11:y:2021:i:3:p:21582440211031879.

Full description at Econpapers || Download paper

Cited: 0

Citations received by this document

Cites: 105

References cited by this document

Cocites: 21

Documents which have cited the same bibliography

Coauthors: 0

Authors who have wrote about the same topic

Citations

Citations received by this document

    This document has not been cited yet.

References

References cited by this document

  1. Abraham S., Chengalur-Smith I., (2010). An overview of social engineering malware: Trends, tactics, and implications. Technology in Society, 32(3), 183–196.

  2. Akdemir N., Tuncer C. O., (2020). Covid-19 salgını sonrasında siber suç mağduriyeti riskleri üzerine bir değerlendirme. In Demircioğlu İ. H., Avşar Z., Tuncer C. O., (Eds.), Salgınla Yaşamak: Güvenli Gelecek (pp. 111–133). Pegem Akademi.
    Paper not yet in RePEc: Add citation now
  3. Akdemir N., Yenal S., (2020). Card-not-present fraud victimization: A routine activities approach to understand the risk factors. Security Sciences, 9(1), 243–268. https://doi.org/10.28956/gbd.736179.
    Paper not yet in RePEc: Add citation now
  4. Alsharnouby M., Alaca F., Chiasson S., (2015). Why phishing still works: User strategies for combating phishing attacks. International Journal of Human-Computer Studies, 82, 69–82.
    Paper not yet in RePEc: Add citation now
  5. Assarroudi A., Heshmati Nabavi F., Armat M. R., Ebadi A., Vaismoradi M., (2018). Directed qualitative content analysis: The description and elaboration of its underpinning methods and data analysis process. Journal of Research in Nursing, 23(1), 42–55.
    Paper not yet in RePEc: Add citation now
  6. Baker P., (2020, April 22). Oil & gas spearphishing campaigns carry Agent Tesla Spyware. Channel Futures. https://www.channelfutures.com/mssp-insider/oil-gas-spearphishing-campaigns-carry-agent-tesla-spyware.
    Paper not yet in RePEc: Add citation now
  7. Baryshevtsev M., McGlynn J., (2020). Persuasive appeals predict credibility judgments of phishing messages. Cyberpsychology, Behavior, and Social Networking, 23(5), 297–302.
    Paper not yet in RePEc: Add citation now
  8. Berg B. L., Lune H., Lune H., (2004). Qualitative research methods for the social sciences (Vol. 5). Pearson.
    Paper not yet in RePEc: Add citation now
  9. Bowen B. M., Devarajan R., Stolfo S., (2011, November 15–17). Measuring the human factor of cyber security [Conference session]. 2011 IEEE International Conference on Technologies for Homeland Security (HST). https://ieeexplore.ieee.org/document/6107876.
    Paper not yet in RePEc: Add citation now
  10. Braga A. A., (2008). Pulling levers focused deterrence strategies and the prevention of gun homicide. Journal of Criminal Justice, 36(4), 332–343.

  11. Braga A. A., Weisburd D. L., (2012). The effects of “pulling levers†focused deterrence strategies on crime. Campbell Systematic Reviews, 8(1), 1–90.

  12. Braga A. A., Weisburd D. L., Turchan B., (2019). Focused deterrence strategies effects on crime: A systematic review. Campbell Systematic Reviews, 15(3), Article e1051.

  13. Braun V., Clarke V., (2006). Using thematic analysis in psychology. Qualitative Research in Psychology, 3(2), 77–101.
    Paper not yet in RePEc: Add citation now
  14. Brunson R. K., (2015). Focused deterrence and improved police-community relations: Unpacking the proverbial black box. Criminology & Public Policy, 14, 507–514.
    Paper not yet in RePEc: Add citation now
  15. Bullée J.-W. H., Montoya L., Pieters W., Junger M., Hartel P. H., (2015). The persuasion and security awareness experiment: reducing the success of social engineering attacks. Journal of Experimental Criminology, 11(1), 97–115.
    Paper not yet in RePEc: Add citation now
  16. Butavicius M., Parsons K., Pattinson M., McCormac A., (2016). Breaching the human firewall: Social engineering in phishing and spear-phishing emails. arXiv preprint arXiv:1606.00887. https://arxiv.org/abs/1606.00887.
    Paper not yet in RePEc: Add citation now
  17. Check Point. (2020a, January 2). January 2020’s most wanted malware: Coronavirus-themed spam spreads malicious Emotet malware. https://blog.checkpoint.com/2020/02/13/january-2020s-most-wanted-malware-coronavirus-themed-spam-spreads-malicious-emotet-malware/.
    Paper not yet in RePEc: Add citation now
  18. Check Point. (2020b, March 5). Update: Coronavirus-themed domains 50% more likely to be malicious than other domains. https://blog.checkpoint.com/2020/03/05/update-coronavirus-themed-domains-50-more-likely-to-be-malicious-than-other-domains/.
    Paper not yet in RePEc: Add citation now
  19. Cialdini R. B., (2001). Harnessing the science of persuasion. Harvard Business Review, 79(9), 72–81.
    Paper not yet in RePEc: Add citation now
  20. Cialdini R. B., (2009). Influence: Science and practice (Vol. 4). Pearson Education.
    Paper not yet in RePEc: Add citation now
  21. Cialdini R. B., Goldstein N., (2004). Social influence: Compliance and conformity. Annual Review of Psychology, 55, 591–621.
    Paper not yet in RePEc: Add citation now
  22. Cialdini R. B., Wosinska W., Barrett D. W., Butner J., Gornik-Durose M., (1999). Compliance with a request in two cultures: The differential influence of social proof and commitment/consistency on collectivists and individualists. Personality Social Psychology Bulletin, 25(10), 1242–1253.
    Paper not yet in RePEc: Add citation now
  23. Clark J. W., (2017). Trends in social engineering: Securing the weakest link. NSI. http://docplayer.net/78444755-Trends-in-social-engineering-securing-the-weakest-link.html.

  24. Creswell J. W., Miller D. L., (2000). Determining validity in qualitative inquiry. Theory Into Practice, 39(3), 124–130.
    Paper not yet in RePEc: Add citation now
  25. Cybersecurity and Infrastructure Security Agency. (2020). COVID-19 exploited by malicious cyber actors. https://www.us-cert.gov/ncas/alerts/aa20-099a.
    Paper not yet in RePEc: Add citation now
  26. DeCuir-Gunby J. T., Marshall P. L., McCulloch A. W., (2011). Developing and using a codebook for the analysis of interview data: An example from a professional development research project. Field Methods, 23(2), 136–155.
    Paper not yet in RePEc: Add citation now
  27. Dewan A., (2020, February 25). Warning: Email scam uses list of “corona-virus affected company staff†to deliver malicious payload. Mail Guard. https://www.mailguard.com.au/blog/warning-email-scam-uses-list-of-corona-virus-affected-company-staff-to-deliver-malicious-payload.
    Paper not yet in RePEc: Add citation now
  28. Dunford R., Su Q., Tamang E., (2014). The Pareto principle. The Plymouth Student Scientist, 7(1), 140–148.
    Paper not yet in RePEc: Add citation now
  29. Elo S., Kääriäinen M., Kanste O., Pölkki T., Utriainen K., Kyngäs H., (2014). Qualitative content analysis: A focus on trustworthiness. SAGE Open, 4(1). https://doi.org/10.1177/2158244014522633.
    Paper not yet in RePEc: Add citation now
  30. Elo S., Kyngäs H., (2008). The qualitative content analysis process. Journal of Advanced Nursing, 62(1), 107–115.
    Paper not yet in RePEc: Add citation now
  31. Goel S., Williams K., Dincelli E., (2017). Got phished? Internet security and human vulnerability. Journal of the Association for Information Systems, 18(1), Article 2.
    Paper not yet in RePEc: Add citation now
  32. Gomes V., Reis J., Alturas B., (2020, June 24–27). Social engineering and the dangers of phishing [Conference Session]. 2020 15th Iberian Conference on Information Systems and Technologies (CISTI). https://ieeexplore.ieee.org/document/9140445.
    Paper not yet in RePEc: Add citation now
  33. Graneheim U. H., Lindgren B.-M., Lundman B., (2017). Methodological challenges in qualitative content analysis: A discussion paper. Nurse Education Today, 56, 29–34.
    Paper not yet in RePEc: Add citation now
  34. Grosfeld-Nir A., Ronen B., Kozlovsky N., (2007). The Pareto managerial principle: When does it apply? International Journal of Production Research, 45(10), 2317–2325.
    Paper not yet in RePEc: Add citation now
  35. Harrison B., Svetieva E., Vishwanath A., (2016). Individual processing of phishing emails: How attention and elaboration protect against phishing. Online Information Review, 40(2), 265–281.
    Paper not yet in RePEc: Add citation now
  36. Harwood T. G., Garry T., (2003). An overview of content analysis. The Marketing Review, 3(4), 479–498.
    Paper not yet in RePEc: Add citation now
  37. Hawdon J., Parti K., Dearden T. E., (2020). Cybercrime in America amid COVID-19: The initial results from a natural experiment. American Journal of Criminal Justice, 45, 546–562.
    Paper not yet in RePEc: Add citation now
  38. Heartfield R., Loukas G., Gan D., (2016). You are probably not the weakest link: Towards practical prediction of susceptibility to semantic social engineering attacks. IEEE Access, 4, 6910–6928.
    Paper not yet in RePEc: Add citation now
  39. Holt T. J., Bossler A. M., (2013). Examining the relationship between routine activities and malware infection indicators. Journal of Contemporary Criminal Justice, 29, 420–436. https://doi.org/10.1177/1043986213507401.
    Paper not yet in RePEc: Add citation now
  40. Hsieh H.-F., Shannon S. E., (2005). Three approaches to qualitative content analysis. Qualitative Health Research, 15(9), 1277–1288.
    Paper not yet in RePEc: Add citation now
  41. Hu Y., Wang D., Pang K., Xu G., Guo J., (2015). The effect of emotion and time pressure on risk decision-making. Journal of Risk Research, 18(5), 637–650.

  42. Huberman A. M., Miles M., Saldana J., (2014). Qualitative data analysis: A methods sourcebook. SAGE.
    Paper not yet in RePEc: Add citation now
  43. Jansen J., (2015, June 3). Studying safe online banking behaviour: A protection motivation theory approach [Conference Session]. The Ninth International Symposium on Human Aspects of Information Security & Assurance (HAISA 2015, June 3). https://www.semanticscholar.org/paper/Studying-Safe-Online-Banking-Behaviour%3A-A-Theory-Jansen/1cdfca4fc6d8d69ef2690efb446d7c641fc5cf16.
    Paper not yet in RePEc: Add citation now
  44. Jansen J., Leukfeldt R., (2016). Phishing and malware attacks on online banking customers in the Netherlands: A qualitative analysis of factors leading to victimization. International Journal of Cyber Criminology, 10(1), 79–91.
    Paper not yet in RePEc: Add citation now
  45. Jansen J., van Schaik P., (2018). Persuading end users to act cautiously online: A fear appeals study on phishing. Information & Computer Security, 26(3), 264–276.
    Paper not yet in RePEc: Add citation now
  46. Kahneman D., (2011). Thinking, fast and slow. Macmillan.
    Paper not yet in RePEc: Add citation now
  47. Kashif M., Javed M. K., Pandey D., (2020). A surge in cyber-crime during COVID-19. Indonesian Journal of Social and Environmental Issues, 1(2), 48–52.
    Paper not yet in RePEc: Add citation now
  48. Kim D., Hyun Kim J., (2013). Understanding persuasive elements in phishing e-mails: A categorical content and semantic network analysis. Online Information Review, 37(6), 835–850.
    Paper not yet in RePEc: Add citation now
  49. Kim I., Kuljis J., (2010). Applying content analysis to web-based content. Journal of Computing and Information Technology, 18(4), 369–375.
    Paper not yet in RePEc: Add citation now
  50. Kondracki N. L., Wellman N. S., Amundson D. R., (2002). Content analysis: Review of methods and their applications in nutrition education. Journal of Nutrition Education and Behavior, 34(4), 224–230.
    Paper not yet in RePEc: Add citation now
  51. Korpela K., (2015). Improving cyber security awareness and training programs with data analytics. Information Security Journal: A Global Perspective, 24(1–3), 72–77.
    Paper not yet in RePEc: Add citation now
  52. Krippendorff K., (2004). Content analysis: An introduction to its methodology. SAGE.
    Paper not yet in RePEc: Add citation now
  53. Krombholz K., Hobel H., Huber M., Weippl E., (2015). Advanced social engineering attacks. Journal of Information Security and Applications, 22, 113–122.
    Paper not yet in RePEc: Add citation now
  54. Leukfeldt E. R., (2014). Phishing for suitable targets in the Netherlands: Routine activity theory and phishing victimization. Cyberpsychology, Behavior, and Social Networking, 17(8), 551–555.
    Paper not yet in RePEc: Add citation now
  55. Liang H., Xue Y., (2010). Understanding security behaviors in personal computer usage: A threat avoidance perspective. Journal of the Association for Information Systems, 11(7), 394–413.
    Paper not yet in RePEc: Add citation now
  56. Luo X. R., Zhang W., Burd S., Seazzu A., (2013). Investigating phishing victimization with the heuristic–systematic model: A theoretical framework and an exploration. Computers & Security, 38, 28–38.
    Paper not yet in RePEc: Add citation now
  57. Lutsky N., (1995). When is “obedience†obedience? Conceptual and historical commentary. Journal of Social Issues, 51(3), 55–65.
    Paper not yet in RePEc: Add citation now
  58. Lyons K., (2020, April 16). Google saw more than 18 million daily malware and phishing emails related to COVID-19 last week. The Verge. https://www.theverge.com/2020/4/16/21223800/google-malware-phishing-covid-19-coronavirus-scams.
    Paper not yet in RePEc: Add citation now
  59. Maheswaran D., Chaiken S., (1991). Promoting systematic processing in low-motivation settings: Effect of incongruent information on processing and judgment. Journal of Personality and Social Psychology, 61(1), 13–25.
    Paper not yet in RePEc: Add citation now
  60. Mayring P., (2015). Qualitative content analysis: Theoretical background and procedures. In Bikner-Ahsbahs A., Knipping C., Presmeg N., (Eds.), Approaches to qualitative research in mathematics education (pp. 365–380). Springer.
    Paper not yet in RePEc: Add citation now
  61. McCrohan K. F., Engel K., Harvey J. W., (2010). Influence of awareness and training on cyber security. Journal of Internet Commerce, 9(1), 23–41.
    Paper not yet in RePEc: Add citation now
  62. Miles M. B., Huberman A. M., (1994). Qualitative data analysis: An expanded sourcebook. SAGE.
    Paper not yet in RePEc: Add citation now
  63. Mishra M., Gaurav A. J., Jain A., (2012). A preventive anti-phishing technique using code word. International Journal of Computer Science and Information Technologies, 3(3), 4248–4250.
    Paper not yet in RePEc: Add citation now
  64. Moore T., Clayton R., (2012, October). Discovering phishing dropboxes using email metadata [Conference Session]. eCrime Researchers Summit (eCrime), 2012. https://www.researchgate.net/publication/261038322_Discovering_phishing_dropboxes_using_email_metadata.
    Paper not yet in RePEc: Add citation now
  65. Moretti F., van Vliet L., Bensing J., Deledda G., Mazzi M., Rimondini M., Zimmermann C., Fletcher I., (2011). A standardized approach to qualitative content analysis of focus group discussions from different countries. Patient Education and Counseling, 82(3), 420–428.
    Paper not yet in RePEc: Add citation now
  66. Naidoo R., (2020). A multi-level influence model of COVID-19 themed cybercrime. European Journal of Information Systems, 29(3), 306–321.
    Paper not yet in RePEc: Add citation now
  67. Newman G. R., Clarke R. V., (2013). Superhighway robbery. Routledge.
    Paper not yet in RePEc: Add citation now
  68. Nirmal K., Ewards S. V., Geetha K., (2010, December 3–50). Maximizing online security by providing a 3 factor authentication system to counter-attack “phishing†[Conference Session]. Emerging Trends in Robotics and Communication Technologies (INTERACT), 2010 International Conference. https://ieeexplore.ieee.org/document/5706185.
    Paper not yet in RePEc: Add citation now
  69. Oliveira D., Rocha H., Yang H., Ellis D., Dommaraju S., Muradoglu M., Weir D., Soliman A., Lin T., Ebner N., (2017, May 2). Dissecting spear phishing emails for older vs young adults: On the interplay of weapons of influence and life domains in predicting susceptibility to phishing [Conference Session]. 2017 CHI Conference on Human Factors in Computing Systems. https://dl.acm.org/doi/10.1145/3025453.3025831.
    Paper not yet in RePEc: Add citation now
  70. Onwuegbuzie A. J., Dickinson W. B., (2008). Mixed methods analysis and information visualization: graphical display for effective communication of research results. Qualitative Report, 13(2), 204–225.
    Paper not yet in RePEc: Add citation now
  71. Park G., Taylor J. M., (2015). Using syntactic features for phishing detection. arXiv preprint arXiv:1506.00037. https://arxiv.org/abs/1506.00037.
    Paper not yet in RePEc: Add citation now
  72. Patton M. Q., (2002). Qualitative research & evaluation methods (3rd ed.). SAGE.
    Paper not yet in RePEc: Add citation now
  73. Peltier T. R., (2006). Social engineering: Concepts and solutions. Information Security Journal, 15(5), 13–21.
    Paper not yet in RePEc: Add citation now
  74. Rahman M. A., Zaman N., Asyhari A. T., Al-Turjman F., Bhuiyan M. Z. A., Zolkipli M., (2020). Data-driven dynamic clustering framework for mitigating the adverse economic impact of Covid-19 lockdown practices. Sustainable Cities and Society, 62. https://doi.org/10.1016/j.scs.2020.102372.
    Paper not yet in RePEc: Add citation now
  75. Review—Navigating cybersecurity during a pandemic: Latest malware and threat actors. (2020, April 22). News Lagoon. https://newslagoon.com/en/review-navigating-cybersecurity-during-a-pandemic-latest-malware-and-threat-actors/16206.
    Paper not yet in RePEc: Add citation now
  76. Riley A., (2019). Agent Tesla Keylogger is now a top phishing threat. Cofense. https://cofense.com/agent-tesla-keylogger-now-top-phishing-threat/.
    Paper not yet in RePEc: Add citation now
  77. Ruiz D., (2020, April 2). Cybercriminals exploit coronavirus with wave of new scams. Isbuzz. https://www.informationsecuritybuzz.com/articles/cybercriminals-exploit-coronavirus-with-wave-of-new-scams/.
    Paper not yet in RePEc: Add citation now
  78. Sandelowski M., (1993). Theory unmasked: The uses and guises of theory in qualitative research. Research in Nursing & Health, 16(3), 213–218.
    Paper not yet in RePEc: Add citation now
  79. Saqib N. U., Chan E. Y., (2015). Time pressure reverses risk preferences. Organizational Behavior and Human Decision Processes, 130, 58–68.

  80. Schreier M., (2012). Qualitative content analysis in practice. SAGE.
    Paper not yet in RePEc: Add citation now
  81. Schuetz S., Lowry P. B., Thatcher J., (2016, August 24). Defending against spear-phishing: Motivating users through fear appeal manipulations [Conference Session]. PACIS 2016. https://aisel.aisnet.org/pacis2016/74/.
    Paper not yet in RePEc: Add citation now
  82. Sharma K., (2010). An anatomy of phishing messages as deceiving persuasion: a categorical content and semantic network study. EDPACS, 42(6), 1–19.
    Paper not yet in RePEc: Add citation now
  83. Silic M., Back A., (2016). The dark side of social networking sites: Understanding phishing risks. Computers in Human Behavior, 60, 35–43.
    Paper not yet in RePEc: Add citation now
  84. Stemler S., (2000). An overview of content analysis. Practical Assessment, Research, and Evaluation, 7(1), Article 17.
    Paper not yet in RePEc: Add citation now
  85. Sumner A., Hoy C., Ortiz-Juarez E., (2020). Estimates of the impact of COVID-19 on global poverty (WIDER Working Paper Series, Working Paper No. 2020-43). World Institute for Development Economic Research (UNU-WIDER).

  86. Thayer A., Evans M., McBride A., Queen M., Spyridakis J., (2007). Content analysis as a best practice in technical communication research. Journal of Technical Writing & Communication, 37(3), 267–279.
    Paper not yet in RePEc: Add citation now
  87. Thomas J., Harden A., (2008). Methods for the thematic synthesis of qualitative research in systematic reviews. BMC Medical Research Methodology, 8(1), Article 45.
    Paper not yet in RePEc: Add citation now
  88. Tillyer M. S., Engel R. S., Lovins B., (2012). Beyond Boston: Applying theory to understand and address sustainability issues in focused deterrence initiatives for violence reduction. Crime & Delinquency, 58(6), 973–997.
    Paper not yet in RePEc: Add citation now
  89. Tillyer M. S., Kennedy D. M., (2008). Locating focused deterrence approaches within a situational crime prevention framework. Crime Prevention and Community Safety, 10(2), 75–84.
    Paper not yet in RePEc: Add citation now
  90. Vahia I. V., Blazer D. G., Smith G. S., Karp J. F., Steffens D. C., Forester B. P., Tampi R., Agronin M., Jeste D. V., Reynolds C. F., (2020). COVID-19, mental health and aging: A need for new knowledge to bridge science and service. The American Journal of Geriatric Psychiatry: Official Journal of the American Association for Geriatric Psychiatry, 28(7), 695–697. https://doi.org/10.1016/j.jagp.2020.03.007.
    Paper not yet in RePEc: Add citation now
  91. Vaismoradi M., Turunen H., Bondas T., (2013). Content analysis and thematic analysis: Implications for conducting a qualitative descriptive study. Nursing & Health Sciences, 15(3), 398–405.

  92. Vance A., Eargle D., Ouimet K., Straub D., (2013, January 7–10). Enhancing password security through interactive fear appeals: A web-based field experiment [Conference Session]. 2013 46th Hawaii International Conference on System Sciences. https://ieeexplore.ieee.org/document/6480204.
    Paper not yet in RePEc: Add citation now
  93. Vishwanath A., Herath T., Chen R., Wang J., Rao H. R., (2011). Why do people get phished? Testing individual differences in phishing vulnerability within an integrated, information processing model. Decision Support Systems, 51(3), 576–586.
    Paper not yet in RePEc: Add citation now
  94. Wang J., Herath T., Chen R., Vishwanath A., Rao H. R., (2012). Phishing susceptibility: An investigation into the processing of a targeted spear phishing email. IEEE Transactions on Professional Communication, 55(4), 345–362.
    Paper not yet in RePEc: Add citation now
  95. Williams E. J., Beardmore A., Joinson A. N., (2017). Individual differences in susceptibility to online influence: A theoretical review. Computers in Human Behavior, 72, 412–421.
    Paper not yet in RePEc: Add citation now
  96. Williams K. C., (2012). Fear appeal theory. Research in Business and Economics Journal, 5, 63–82.
    Paper not yet in RePEc: Add citation now
  97. Witte K., (1992). Putting the fear back into fear appeals: The extended parallel process model. Communications Monographs, 59(4), 329–349.
    Paper not yet in RePEc: Add citation now
  98. Workman M., (2008). Wisecrackers: A theory-grounded investigation of phishing and pretext social engineering threats to information security. Journal of the American Society for Information Science and Technology, 59(4), 662–674.

  99. World Health Organization. (2020). Beware of criminals pretending to be WHO. https://www.dakotaprairiebank.com/beware-of-criminals-pretending-to-be-who/.
    Paper not yet in RePEc: Add citation now
  100. Wright R. T., Jensen M. L., Thatcher J. B., Dinger M., Marett K., (2014). Research Note—Influence techniques in phishing attacks: An examination of vulnerability and resistance. Information Systems Research, 25(2), 385–400.

  101. Xiong J., Lipsitz O., Nasri F., Lui L. M. W., Gill H., Phan L., Chen-Li D., Iacobucci M., Ho R., Majeed A., McIntyre R. S., (2020). Impact of COVID-19 pandemic on mental health in the general population: A systematic review. Journal of Affective Disorders, 277, 55–64. https://doi.org/10.1016/j.jad.2020.08.001.
    Paper not yet in RePEc: Add citation now
  102. Young D. L., Goodie A. S., Hall D. B., Wu E., (2012). Decision making under time pressure, modeled in a prospect theory framework. Organizational Behavior and Human Decision Processes, 118(2), 179–188.

  103. Zhang W., Luo X., Burd S. D., Seazzu A. F., (2012, January 4–7). How could I fall for that? Exploring phishing victimization with the heuristic-systematic model [Conference Session]. 2012 45th Hawaii International Conference on System Sciences. https://ieeexplore.ieee.org/document/6149302.
    Paper not yet in RePEc: Add citation now
  104. Zhang Y., Wildemuth B., (2009). Qualitative analysis of content. In Wildemuth B., (Ed.), Applications of social research methods to questions in information and library science (pp. 308–319). Libraries Unlimited.
    Paper not yet in RePEc: Add citation now
  105. Zwilling M., Klien G., Lesjak D., Wiechetek Š., Cetin F., Basim H. N., (2020). Cyber security awareness, knowledge and behavior: A comparative study. Journal of Computer Information Systems, 1–16. https://doi.org/10.1080/08874417.2020.1712269.
    Paper not yet in RePEc: Add citation now

Cocites

Documents in RePEc which have cited the same bibliography

  1. Shedding Light on the Dark: The Impact of Legal Enforcement on Darknet Transactions. (2024). He, Shu ; Chan, Jason ; Qiao, Dandan ; Whinston, Andrew.
    In: Information Systems Research.
    RePEc:inm:orisre:v:35:y:2024:i:1:p:145-164.

    Full description at Econpapers || Download paper

  2. Search engine optimization poisoning: A cybersecurity threat analysis and mitigation strategies for small and medium-sized enterprises. (2024). Le, Tran Duc ; Le-Dinh, Thang ; Uwizeyemungu, Sylvestre.
    In: Technology in Society.
    RePEc:eee:teinso:v:76:y:2024:i:c:s0160791x24000186.

    Full description at Econpapers || Download paper

  3. The demand for protection and the persistently high rates of gun violence among young black males. (2024). Kotowski, Maciej ; Evans, William N.
    In: Journal of Public Economics.
    RePEc:eee:pubeco:v:234:y:2024:i:c:s0047272724000501.

    Full description at Econpapers || Download paper

  4. Analysing the impact of taxi violence on commuters in South Africa. (2022). Mmakwena, Modipa.
    In: Technium Social Sciences Journal.
    RePEc:tec:journl:v:27:y:2022:i:1:p:899-911.

    Full description at Econpapers || Download paper

  5. Broken windows policing and crime: Evidence from 80 Colombian cities. (2022). Tobn, Santiago ; Vanegas-Arias, Martn ; Norza, Ervyn ; Meja, Daniel.
    In: Chapters.
    RePEc:elg:eechap:19378_4.

    Full description at Econpapers || Download paper

  6. Psychological Aspects of the Organization€™s Information Security in the Context of Socio-engineering Attacks. (2022). Tulupieva, T V.
    In: Administrative Consulting.
    RePEc:acf:journl:y:2022:id:1893.

    Full description at Econpapers || Download paper

  7. Computer Malware Classification, Factors, and Detection Techniques: A Systematic Literature Review (SLR). (2022). Ahmad, Sunila Fatima ; Tanveer, Mishal ; Hussain, Asad ; Iqbal, Ansa Sameen.
    In: International Journal of Innovations in Science & Technology.
    RePEc:abq:ijist1:v:4:y:2022:i:3:p:899-918.

    Full description at Econpapers || Download paper

  8. Can Precision Policing Reduce Gun Violence? Evidence from “Gang Takedowns” in New York City. (2021). Laforest, Michael ; Kaplan, Jacob ; Chalfin, Aaron.
    In: Journal of Policy Analysis and Management.
    RePEc:wly:jpamgt:v:40:y:2021:i:4:p:1047-1082.

    Full description at Econpapers || Download paper

  9. How Phishers Exploit the Coronavirus Pandemic: A Content Analysis of COVID-19 Themed Phishing Emails. (2021). Yenal, Serkan ; Akdemir, Naci.
    In: SAGE Open.
    RePEc:sae:sagope:v:11:y:2021:i:3:p:21582440211031879.

    Full description at Econpapers || Download paper

  10. Social Media and the Variable Impact of Violence Reduction Interventions: Re-Examining Focused Deterrence in Philadelphia. (2021). Hyatt, Jordan M ; Densley, James A ; Roman, Caterina G.
    In: Social Sciences.
    RePEc:gam:jscscx:v:10:y:2021:i:5:p:147-:d:541322.

    Full description at Econpapers || Download paper

  11. Defining, evaluating, preparing for and responding to a cyber Pearl Harbor. (2021). Straub, Jeremy.
    In: Technology in Society.
    RePEc:eee:teinso:v:65:y:2021:i:c:s0160791x21000749.

    Full description at Econpapers || Download paper

  12. Driving university brand value through social media. (2021). Nguyen, Phan Dinh ; Thuy, Lobel Trong ; Baker, John.
    In: Technology in Society.
    RePEc:eee:teinso:v:65:y:2021:i:c:s0160791x21000634.

    Full description at Econpapers || Download paper

  13. Problem‐oriented policing for reducing crime and disorder: An updated systematic review and meta‐analysis. (2020). Petersen, Kevin ; Hinkle, Joshua C ; Weisburd, David ; Telep, Cody W.
    In: Campbell Systematic Reviews.
    RePEc:wly:camsys:v:16:y:2020:i:2:n:e1089.

    Full description at Econpapers || Download paper

  14. Reviewing Cyber Security Social Engineering Training and Awareness Programs—Pitfalls and Ongoing Issues. (2019). Aldawood, Hussain ; Skinner, Geoffrey.
    In: Future Internet.
    RePEc:gam:jftint:v:11:y:2019:i:3:p:73-:d:214791.

    Full description at Econpapers || Download paper

  15. Physical safety and security: policies, spending and outcomes 2015-2020. (2019). Lacey, Nicola Mary ; Louise, Kerris Maya.
    In: LSE Research Online Documents on Economics.
    RePEc:ehl:lserod:121549.

    Full description at Econpapers || Download paper

  16. Physical safety and Security: Policies, spending and outcomes 2015-2020. (2019). Lacey, Nicola ; Cooper, Kerris.
    In: CASE - Social Policies and Distributional Outcomes Research Papers.
    RePEc:cep:spdorp:05.

    Full description at Econpapers || Download paper

  17. Open-source intelligence for risk assessment. (2018). Cappa, Francesco ; Hayes, Darren R.
    In: Business Horizons.
    RePEc:eee:bushor:v:61:y:2018:i:5:p:689-697.

    Full description at Econpapers || Download paper

  18. Searching For Influential Actors in Co-Offending Networks: The Recruiter. (2017). Ariel, Barak ; Englefield, Ashley .
    In: International Journal of Social Science Studies.
    RePEc:rfa:journl:v:5:y:2017:i:5:p:24-45.

    Full description at Econpapers || Download paper

  19. Observations on the technology and economics of digital emissions. (2017). Schull, Jonathan ; Wagner, Jeffrey ; Rickard, Amelia.
    In: Technology in Society.
    RePEc:eee:teinso:v:48:y:2017:i:c:p:28-32.

    Full description at Econpapers || Download paper

  20. .

    Full description at Econpapers || Download paper

  21. Keeping promises: A systematic review and a new classification of gang control strategies. (2013). Bouchard, Martin ; Descormiers, Karine ; Wong, Jennifer S. ; Gravel, Jason ; Morselli, Carlo.
    In: Journal of Criminal Justice.
    RePEc:eee:jcjust:v:41:y:2013:i:4:p:228-242.

    Full description at Econpapers || Download paper

Coauthors

Authors registered in RePEc who have wrote about the same topic

Report date: 2025-10-04 10:18:25 || Missing content? Let us know

CitEc is a RePEc service, providing citation data for Economics since 2001. Last updated August, 3 2024. Contact: Jose Manuel Barrueco.