Javascript must be enabled to continue!
Correction to: Better beware: comparing metacognition for phishing and legitimate emails
View through CrossRef
The article “Better beware: comparing metacognition for phishing and legitimate emails”, written by Casey Inez Canfield, Baruch Fischhoff and Alex Davis, was originally published electronically on the publisher’s internet portal (currently SpringerLink) on 20 July 2019 without open access.
Springer Science and Business Media LLC
Title: Correction to: Better beware: comparing metacognition for phishing and legitimate emails
Description:
The article “Better beware: comparing metacognition for phishing and legitimate emails”, written by Casey Inez Canfield, Baruch Fischhoff and Alex Davis, was originally published electronically on the publisher’s internet portal (currently SpringerLink) on 20 July 2019 without open access.
Related Results
Teachers’ Role in Chemistry Metacognition
Teachers’ Role in Chemistry Metacognition
Teachers’ role in chemistry metacognition describes what metacognition and chemistry metacognition are, their importance in chemistry education and how they can be taught or improv...
The need for education on phishing: a survey comparison of the UK and Qatar
The need for education on phishing: a survey comparison of the UK and Qatar
PurposeThis paper seeks to focus on identifying the need for education to enhance awareness of the e‐mail phishing threat as the most effective way to reduce the risk of e‐mail phi...
Deep Learning Based Phishing Websites Detection
Deep Learning Based Phishing Websites Detection
Phishing is a crime that involves the theft of confidential user information. Those targeted by phishing websites include individuals, small businesses, cloud storage providers, an...
Phishing Emails Detection in Cyber Security
Phishing Emails Detection in Cyber Security
As digital communication becomes increasingly integral to personal and corporate activities, phishing attacks have emerged as a prevalent threat, ingeniously mimicking legitimate s...
Comparative Investigation of Traditional Machine Learning Models and Transformer Models for Phishing Email Detection
Comparative Investigation of Traditional Machine Learning Models and Transformer Models for Phishing Email Detection
Phishing emails pose a significant threat to cybersecurity worldwide. There are already tools that mitigate the impact of these emails by filtering them, but these tools are only a...
Impact of Phishing Attack on Business
Impact of Phishing Attack on Business
Phishing attacks are a major threat to business, using tricks to manipulate employees into giving away sensitive information. This chapter explores how phishing attacks impact busi...
Phishing: A Way of Attacking the Privacy
Phishing: A Way of Attacking the Privacy
The Internet provides a fantastic platform for ordinary people to communicate. Criminal minds have figured out a means to steal personal information without having to meet the pers...
Review on Phishing Attack Detection using Recurrent Neural Network
Review on Phishing Attack Detection using Recurrent Neural Network
Phishing is a crime that involves the theft of personal information from users. Individuals, corporations, cloud storage, and government websites are all targets for the phishing w...

