References
- Alseadoon, I., Chan, T., Foo, E., & Nieto, J. G. (2012). Who is more susceptible to phishing emails?: A Saudi Arabian study. ACIS 2012 : Proceedings of the 23rd Australasian Conference on Information Systems.
- Alseadoon, I., Othman, M.F.I., & Chan, T. (2015). What is the influence of users’ characteristics on their ability to detect phishing emails? Advanced Computer and Communication Engineering Technology, 315, 949-962. https://doi.org/10.1007/978-3-319-07674-4_89
- Alsharnouby, M., Alaca, F., & Chiasson, S. (2015). Why phishing still works: User strategies for combating phishing attacks. International Journal of Human-Computer Studies, 82(1), 69-82. https://doi.org/10.1016/j.ijhcs.2015.05.005
- Ayob, Z., & Weir, G. R. S. (2021). Is human behavior the real challenge in combating phishing. Advances in Intelligent Systems and Computing, 1291(1), 27–38. https://doi.org/10.1007/978-981-33-4062-6_3
- Babcock, S. E., & Wilson, C. A. (2020). Big Five model of personality. In B. J. Carducci, C. S. Nave, C. S. Nave (Eds.). The Wiley encyclopedia of personality and individual differences: Models and theories. (pp. 55-60). Wiley-Blackwell.
- Baki, S., Verma, R. M., & Gnawali, O. (2020). Scam augmentation and customization: Identifying vulnerable users and arming defenders. Proceedings of the 15th ACM Asia Conference on Computer and Communications Security, 236–247. https://doi.org/10.1145/3320269.3384753
- Barrick, M. R., & Mount, M. K. (1991). The Big Five personality dimensions and job performance. A meta-analysis. Personnel Psychology,44(1), 1–26. https://doi.org/10.1111/j.1744-6570.1991.tb00688.x
- Canham, M., Posey, C., & Constantino, M. (2022). Phish derby: Shoring the human shield through gamified phishing attacks. Frontiers in Education (Lausanne), 6. https://doi.org/10.3389/feduc.2021.807277
- Chen, H., & Magramo, K. (2024, February 4). Finance worker pays out $25 million after video call with deepfake ‘chief financial officer’. CNN. https://www.cnn.com/2024/02/04/asia/deepfake-cfo-scamhong-kong-intl-hnk/index.html
- Cho, J. H., Cam, H., & Oltramari, A. (2016). Effect of personality traits on trust and risk to phishing vulnerability: Modeling and analysis. 2016 IEEE International Multi-Disciplinary Conference on Cognitive Methods in Situation Awareness and Decision Support, CogSIMA 2016, 7–13. https://doi.org/10.1109/COGSIMA.2016.7497779
- Cialdini, R. B. (2021). Influence, new and expanded: The psychology of persuasion. Harper Business.
- Diman, A. P., & Rahman, T. K. A. (2023). Examining individual tendency to respond to phishing e-mails from the perspective of protection motivation theory. Journal of Education and Social Sciences, Vol. 25(1). 40-51.
- Eftimie, S., Moinescu, R., & Racuciu, C. (2022). Spear-phishing susceptibility stemming from personality traits. IEEE Access, 10, 73548–73561. https://doi.org/10.1109/ACCESS.2022.3190009
- FBI. (2021, March 17). IC3 releases 2020 Internet Crime Report. Federal Bureau of Investigation. https://www.fbi.gov/news/pressrel/press-releases/fbi-releases-the-internet-crime-complaint-center-2020-internet-crime-report-including-covid-19-scam-statistics
- Fruhlinger, J. (2020, March 9). Top cybersecurity facts, figures, and statistics. CSO Online. https://www.csoonline.com/article/3153707/top-cybersecurity-facts-figures-and-statistics.html
- Fruhlinger, J. (2022, April 12). What is phishing? Examples, types, and techniques. CSO Online. https://www.csoonline.com/article/514515/what-is-phishing-examples-types-and-techniques.html
- Ge, Y., Lu, L., Cui, X., Chen, Z., & Qu, W. (2021). How personal characteristics impact phishing susceptibility: The mediating role of mail processing. Applied Ergonomics, 97(1), 1103526-103526. https://doi.org/10.1016/j.apergo.2021.103526
- Gideon, S. (2024, July 11). Over 40% of top phishing scams at work come from HR related email subjects. Human Resources Online. https://www.humanresourcesonline.net/over-40-of-top-phishingscams-at-work-come-from-hr-related-email-subjects
- Goldberg, L. R. (1990). An alternative “description of personality”: The Big-Five factor structure. Journal of Personality and Social Psychology, 59(6), 1216–1229. https://doi.org/10.1037/0022-3514.59.6.1216
- Halevi, T., Lewis, J., & Memon, N. (2013). Phishing, personality traits and Facebook. arXiv.Org. https://doi.org/10.48550/arxiv.1301.7643
- Halevi, T., Memon, N., & Nov, O. (2015). Spear-phishing in the wild: A real-world study of personality, phishing self-efficacy and vulnerability to spear-phishing attacks. SSRN Electronic Journal. http://dx.doi.org/10.2139/ssrn.2544742
- IBM. (2024). Cost of a data breach report 2023. International Business Machines Corporation. https://www.ibm.com/reports/data-breach
- Lawson, P. A., Crowson, A. D., & Mayhorn, C. B. (2018). Baiting the hook: Exploring the interaction of personality and persuasion tactics in email phishing attacks. Advances in Intelligent Systems and Computing, 822, 401–406. https://doi.org/10.1007/978-3-319-96077-7_42
- Lawson, P., Pearson, C. J., Crowson, A., & Mayhorn, C. B. (2020). Email phishing and signal detection: How persuasion principles and personality influence response patterns and accuracy. Applied Ergonomics, 86, 103084–103084. https://doi.org/10.1016/j.apergo.2020.103084
- Lopez-Aguilar, P., & Solanas, A. (2021). The role of phishing victims’ neuroticism: Reasons behind the lack of consensus. International Journal of Information Security and Cybercrime, 10(2), 75–80. https://doi.org/10.19107/IJISC.2021.02.07
- Lopez-Aguilar, P., Patsakis, C., & Solanas, A. (2022). The role of extraversion in phishing victimization: A systematic literature review. 2022 APWG Symposium on Electronic Crime Research (eCrime), 2022, 1–10. https://doi.org/10.1109/eCrime57793.2022.10142078
- Mammadov, S. (2022). Big Five personality traits and academic performance: A meta-analysis. Journal of Personality, 90(2), 222–255. https://doi.org/10.1111/jopy.12663
- Pattinson, M., Jerram, C., Parsons, K., McCormac, A., & Butavicius, M. (2011). Managing phishing emails: A scenario-based experiment. Proceedings of the 5th International Symposium on Human Aspects of Information Security and Assurance, HAISA 2011, 75–85.
- Petrosyan, A. (2024, April 15). Number of phishing attack victims in the United States from 2018 to 2023. Statista. https://www.statista.com/statistics/1390362/phishing-victim-number-us/
- Petrosyan, A. (2024, November 5). Worldwide digital population. Statista. https://www.statista.com/statistics/617136/digital-population-worldwide/
- Rahman, A. U., Al-Obeidat, F., Tubaishat, A., Shah, B., Anwar, S., & Halim, Z. (2022). Discovering the correlation between phishing susceptibility causing data biases and Big Five personality traits using C-GAN. IEEE Transactions on Computational Social Systems, 1–9. https://doi.org/10.1109/TCSS.2022.3201153
- Rashid, F. Y. (2020, November 24). 8 types of phishing attacks and how to identify them. CSO. https://www.csoonline.com/article/3234716/8-types-of-phishing-attacks-and-how-to-identifythem.html
- Rowland, M. P. (2017, July 24). Two-thirds of the world’s seafood is over-fished – Here’s how you can help. Forbes. https://www.forbes.com/sites/michaelpellmanrowland/2017/07/24/seafood-sustainability-facts/
- Russell, C. L. (2005). An overview of the integrative research review. Progress in transplantation (Aliso Viejo, Calif.), 15(1), 8–13. https://doi.org/10.1177/152692480501500102
- Sarno, D. M., Harris, M. W., & Black, J. (2023). Which phish is captured in the net? Understanding phishing susceptibility and individual differences. Applied Cognitive Psychology, 37(4), 789–803. https://doi.org/10.1002/acp.4075
- Schretlen, D. J., van der Hulst, E.-J., Pearlson, G. D., & Gordon, B. (2010). A neuropsychological study of personality: Trait openness in relation to intelligence, fluency, and executive functioning. Journal of Clinical and Experimental Neuropsychology, 32(10), 1068–1073. https://doi.org/10.1080/13803391003689770
- Soleimani, M., & Kashani, H. B. (2024). Frozen or fine-tuned? Analyzing deep learning models and training strategies for optimizing Big Five personality traits prediction from text. 2024 10th International Conference on Artificial Intelligence and Robotics (QICAR), 11–16. https://doi.org/10.1109/QICAR61538.2024.10496606
- Sommestad, T., & Karlzen, H. (2019). A meta-analysis of field experiments on phishing susceptibility. eCrime Researchers Summit. https://doi.org/10.1109/eCrime47957.2019.9037502
- Torraco, R. J. (2016). Writing integrative literature reviews: Using the past and present to explore the future. Human Resource Development Review, 15(4), 404–428. https://doi.org/10.1177/1534484316671606
- Vishwanath, A. (2015). Examining the distinct antecedents of e-mail habits and its influence on the outcomes of a phishing attack. Journal of Computer-Mediated Communication, 20(5), 570–584. https://doi.org/10.1111/jcc4.12126
- Wilmot, M. P., & Ones, D. S. (2019). A century of research on conscientiousness at work. Proceedings of the National Academy of Sciences - PNAS, 116(46), 23004–23010. https://doi.org/10.1073/pnas.190843011
- Zielinski, D. (2023, November 30). Beware cybercriminals masquerading as HR professionals. SHRM. https://www.shrm.org/topics-tools/news/hr-magazine/beware-cybercriminals-masquerading-as-hr-professionals