Ahmad, Rufai; Terzis, Sotirios; Renaud, Karen - In: Information & Computer Security 32 (2024) 4, pp. 420-435
Purpose This study aims to investigate how phishers apply persuasion principles and construct deceptive URLs in mobile instant messaging (MIM) phishing. Design/methodology/approach In total, 67 examples of real-world MIM phishing attacks were collected from various online sources. Each example...