|
[1]
|
唐宇悦. 电子商务中消费者个人信息法律保护的困境及规制[J]. 电子商务评论, 2025, 14(10): 1645-1650.
|
|
[2]
|
Wang, P. and Lutchkus, P. (2023) Psychological Tactics of Phishing Emails. Issues in Information Systems, 24, 71-83.
|
|
[3]
|
APWG (2025) Phishing Activity Trends Report, 1st Quarter 2025. https://apwg.org/
|
|
[4]
|
Wang, J., Li, Y. and Rao, H.R. (2016) Overconfidence in Phishing Email Detection. Journal of the Association for Information Systems, 17, 759-783. [Google Scholar] [CrossRef]
|
|
[5]
|
McAlaney, J. and Hills, P.J. (2020) Understanding Phishing Email Processing and Perceived Trustworthiness through Eye Tracking. Frontiers in Psychology, 11, Article No. 1756. [Google Scholar] [CrossRef] [PubMed]
|
|
[6]
|
Chowdhury, N.H., Adam, M.T.P. and Skinner, G. (2019) The Impact of Time Pressure on Cybersecurity Behaviour: A Systematic Literature Review. Behaviour & Information Technology, 38, 1290-1308. [Google Scholar] [CrossRef]
|
|
[7]
|
周寒, 肖益. 文档型恶意软件攻击的原理分析与防御策略研究[J]. 网络安全技术与应用, 2025(10): 42-44.
|
|
[8]
|
Sarno, D.M. and Neider, M.B. (2021) So Many Phish, So Little Time: Exploring Email Task Factors and Phishing Susceptibility. Human Factors: The Journal of the Human Factors and Ergonomics Society, 64, 1379-1403. [Google Scholar] [CrossRef] [PubMed]
|
|
[9]
|
Patel, P., Sarno, D.M., Lewis, J.E., Shoss, M., Neider, M.B. and Bohil, C.J. (2019) Perceptual Representation of Spam and Phishing Emails. Applied Cognitive Psychology, 33, 1296-1304. [Google Scholar] [CrossRef]
|
|
[10]
|
Baryshevtsev, M. and McGlynn, J. (2020) Persuasive Appeals Predict Credibility Judgments of Phishing Messages. Cyberpsychology, Behavior, and Social Networking, 23, 297-302. [Google Scholar] [CrossRef] [PubMed]
|
|
[11]
|
Hu, Q., West, R. and Smarandescu, L. (2015) The Role of Self-Control in Information Security Violations: Insights from a Cognitive Neuroscience Perspective. Journal of Management Information Systems, 31, 6-48. [Google Scholar] [CrossRef]
|
|
[12]
|
Vishwanath, A., Herath, T., Chen, R., Wang, J. and Rao, H.R. (2011) Why Do People Get Phished? Testing Individual Differences in Phishing Vulnerability within an Integrated, Information Processing Model. Decision Support Systems, 51, 576-586. [Google Scholar] [CrossRef]
|
|
[13]
|
Williams, E.J., Hinds, J. and Joinson, A.N. (2018) Exploring Susceptibility to Phishing in the Workplace. International Journal of Human-Computer Studies, 120, 1-13. [Google Scholar] [CrossRef]
|
|
[14]
|
贾心怡, 刘伟. 国内个人投资者过度自信的前因分析——人格特质、社会阶层及认知能力[J]. 科技创业月刊, 2024, 37(12): 159-166.
|
|
[15]
|
Ifcher, J. and Zarghamee, H. (2014) Affect and Overconfidence: A Laboratory Investigation. Journal of Neuroscience, Psychology, and Economics, 7, 125-150. [Google Scholar] [CrossRef]
|
|
[16]
|
Frank, M., Jaeger, L. and Manuel Ranft, L. (2023) Using Contextual Factors to Predict Information Security Overconfidence: A Machine Learning Approach. Computers & Security, 125, Article ID: 103046. [Google Scholar] [CrossRef]
|
|
[17]
|
Ebert, N., Ackermann, K.A. and Bearth, A. (2022) When Information Security Depends on Font Size: How the Saliency of Warnings Affects Protection Behavior. Journal of Risk Research, 26, 233-255. [Google Scholar] [CrossRef] [PubMed]
|
|
[18]
|
Pan, S., Kwak, D., Kuem, J. and Kim, S.S. (2024) Roles of Feedback and Phishing Characteristics in Anti-Phishing Training Performance: Perspectives of Goal Setting and Skill Acquisition. Journal of the Association for Information Systems, 25, 1037-1078. [Google Scholar] [CrossRef]
|
|
[19]
|
李勋, 孙林辉, 朱鹏烨. 弹窗广告的视觉显著性对消费者注意的影响研究[J]. 人类工效学, 2021, 27(6): 33-40.
|
|
[20]
|
Jaeger, L. and Eckhardt, A. (2020) Eyes Wide Open: The Role of Situational Information Security Awareness for Security‐Related Behaviour. Information Systems Journal, 31, 429-472. [Google Scholar] [CrossRef]
|
|
[21]
|
Brüns, J.D. and Meißner, M. (2023) Show Me That You Are Advertising: Visual Salience of Products Attenuates Detrimental Effects of Persuasion Knowledge Activation in Influencer Advertising. Computers in Human Behavior, 148, Article ID: 107891. [Google Scholar] [CrossRef]
|
|
[22]
|
杨强, 蒋玉石, 申黎华, 等. 隐喻修辞对网络横幅广告注意效果的影响研究[J]. 管理工程学报, 2023, 37(2): 48-59.
|
|
[23]
|
Wang, Z., Li, G., Diao, Y. and Wang, N. (2024) Warning Deterrence or Knowledge Guidance? Research on Triggering Mechanism of Phishing Sensitivity. Computers & Security, 142, Article ID: 103875. [Google Scholar] [CrossRef]
|
|
[24]
|
Williams, E.J. and Polage, D. (2018) How Persuasive Is Phishing Email? The Role of Authentic Design, Influence and Current Events in Email Judgements. Behaviour & Information Technology, 38, 184-197. [Google Scholar] [CrossRef]
|
|
[25]
|
Cakici, N. and Zaremba, A. (2022) Salience Theory and the Cross-Section of Stock Returns: International and Further Evidence. Journal of Financial Economics, 146, 689-725. [Google Scholar] [CrossRef]
|
|
[26]
|
Yeari, M., Oudega, M. and van den Broek, P. (2016) The Effect of Highlighting on Processing and Memory of Central and Peripheral Text Information: Evidence from Eye Movements. Journal of Research in Reading, 40, 365-383. [Google Scholar] [CrossRef]
|
|
[27]
|
Milutinović, G., Ahonen-Jonnarth, U. and Seipel, S. (2021) Does Visual Saliency Affect Decision-Making? Journal of Visualization, 24, 1267-1285. [Google Scholar] [CrossRef]
|
|
[28]
|
Chun, M.M., Golomb, J.D. and Turk-Browne, N.B. (2011) A Taxonomy of External and Internal Attention. Annual Review of Psychology, 62, 73-101. [Google Scholar] [CrossRef] [PubMed]
|
|
[29]
|
Connor, C.E., Egeth, H.E. and Yantis, S. (2004) Visual Attention: Bottom-Up versus Top-Down. Current Biology, 14, R850-R852. [Google Scholar] [CrossRef] [PubMed]
|
|
[30]
|
Li, W., Guan, J. and Shi, W. (2021) Increasing the Load on Executive Working Memory Reduces the Search Performance in the Natural Scenes: Evidence from Eye Movements. Current Psychology, 42, 10234-10247. [Google Scholar] [CrossRef]
|
|
[31]
|
Hussein, N. (2023) Eye-Tracking in Association with Phishing Cyber Attacks: A Comprehensive Literature Review. 10th International Conference on Computer Networks & Communications (CCNET 2023), Vancouver, 25-26 February 2023, 71-85. [Google Scholar] [CrossRef]
|
|
[32]
|
Zhu, M., Yang, Y. and Hsee, C.K. (2018) The Mere Urgency Effect. Journal of Consumer Research, 45, 673-690. [Google Scholar] [CrossRef]
|
|
[33]
|
Wagner, B.C. and Petty, R.E. (2022) The Elaboration Likelihood Model of Persuasion: Thoughtful and Non-Thoughtful social Influence. In: Theories in Social Psychology, 2nd Edition, Wiley, 120-142.
|
|
[34]
|
Shah, D.V., Kwak, N., Schmierbach, M. and Zubric, J. (2004) The Interplay of News Frames on Cognitive Complexity. Human Communication Research, 30, 102-120. [Google Scholar] [CrossRef]
|
|
[35]
|
Canfield, C.I., Fischhoff, B. and Davis, A. (2016) Quantifying Phishing Susceptibility for Detection and Behavior Decisions. Human Factors: The Journal of the Human Factors and Ergonomics Society, 58, 1158-1172. [Google Scholar] [CrossRef] [PubMed]
|
|
[36]
|
Sheng, X., Felix, R., Saravade, S., Siguaw, J.A., Ketron, S.C., Krejtz, K., et al. (2020) Sight Unseen: The Role of Online Security Indicators in Visual Attention to Online Privacy Information. Journal of Business Research, 111, 218-240. [Google Scholar] [CrossRef]
|
|
[37]
|
Rajab, M. (2019) Visualisation Model Based on Phishing Features. Journal of Information & Knowledge Management, 18, Article ID: 1950010. [Google Scholar] [CrossRef]
|
|
[38]
|
Porta, M., Ravarelli, A. and Spaghi, F. (2013) Online Newspapers and Ad Banners: An Eye Tracking Study on the Effects of Congruity. Online Information Review, 37, 405-423. [Google Scholar] [CrossRef]
|
|
[39]
|
Frank, M.C., Vul, E. and Johnson, S.P. (2009) Development of Infants’ Attention to Faces during the First Year. Cognition, 110, 160-170. [Google Scholar] [CrossRef] [PubMed]
|
|
[40]
|
Pietrantonio, F., Botta, A., Zinno, S., Ventre, G., Gallo, L., Mancuso, L., et al. (2024) A Gaze-Based Analysis of Human Detection of Email Phishing. 2024 Silicon Valley Cybersecurity Conference (SVCC), Seoul, 17-19 June 2024, 1-8. [Google Scholar] [CrossRef]
|
|
[41]
|
Walther, D. and Koch, C. (2006) Modeling Attention to Salient Proto-Objects. Neural Networks, 19, 1395-1407. [Google Scholar] [CrossRef] [PubMed]
|
|
[42]
|
Wilson, R.T., Baack, D.W. and Till, B.D. (2015) Creativity, Attention and the Memory for Brands: An Outdoor Advertising Field Study. International Journal of Advertising, 34, 232-261. [Google Scholar] [CrossRef]
|
|
[43]
|
Menzel, T., Teubner, T., Adam, M.T.P. and Toreini, P. (2022) Home Is Where Your Gaze Is—Evaluating Effects of Embedding Regional Cues in User Interfaces. Computers in Human Behavior, 136, Article ID: 107369. [Google Scholar] [CrossRef]
|
|
[44]
|
Lawson, P., Pearson, C.J., Crowson, A. and Mayhorn, C.B. (2020) Email Phishing and Signal Detection: How Persuasion Principles and Personality Influence Response Patterns and Accuracy. Applied Ergonomics, 86, Article ID: 103084. [Google Scholar] [CrossRef] [PubMed]
|
|
[45]
|
Elazary, L. and Itti, L. (2008) Interesting Objects Are Visually Salient. Journal of Vision, 8, 1-15. [Google Scholar] [CrossRef] [PubMed]
|
|
[46]
|
Klompstra, L., Deka, P., Almenar, L., Pathak, D., Muñoz-Gómez, E., López-Vilella, R., et al. (2022) Physical Activity Enjoyment, Exercise Motivation, and Physical Activity in Patients with Heart Failure: A Mediation Analysis. Clinical Rehabilitation, 36, 1324-1331. [Google Scholar] [CrossRef] [PubMed]
|
|
[47]
|
Proctor, R.W. and Chen, J. (2015) The Role of Human Factors/Ergonomics in the Science of Security: Decision Making and Action Selection in Cyberspace. Human Factors: The Journal of the Human Factors and Ergonomics Society, 57, 721-727. [Google Scholar] [CrossRef] [PubMed]
|