space constraints it was not possible to further detail
and analyse obtained results.
Another limitation of this work was the fact that
only one reviewer was available to perform all the co-
ding. With all the disadvantages this can have, there
is also some advantages since this was a qualitative
coding analysis, it is most likely that the same person
will categorise similar data in the same way. Also to
notice that results are biased or limited by the content
of the abstracts, which, sometimes, may not clearly
state what is really presented within the full article.
However, analyse other parts of the paper such as the
introduction or the conclusion would make the pro-
cess even more time consuming and complex.
Finally, although the used method was still cum-
bersome and time consuming, if there is the possi-
bility of using a complete set of qualitative analysis
software, automatic importing data and detailed ana-
lysis features, the process will be much faster which
then can leave more time for coding as well as cate-
gory generation and structuring.
5 CONCLUSION
This paper gives an overview of phishing research
trends over a ten year period based on the review of
abstracts only. According to obtained results and sub-
sequent analysis, the authors believe that it is clear
that no single solution can be found for the phis-
hing threat. Future research needs to focus on socio-
technical and integrated solutions that can reflect a
comprehensive understanding of both human compu-
ter interactions and users’ unique characteristics as
well as the application and proper testing of advanced,
resilient and human adaptable security technology so-
lutions.
Future work includes performing more detailed
analysis using a more complete qualitative software
that can provide more views on the results and possi-
ble relations that have escaped on the first analysis.
ACKNOWLEDGEMENTS
This research is supported by NanoSTIMA - Macro-
to-Nano Human Sensing: Towards Integrated Multi-
modal Health Monitoring and Analytics (NORTE-01-
0145-FEDER-000016).
REFERENCES
Boodaei, M. (2011). Mobile users three times more vulne-
rable to phishing attacks. Accessed March 2015.
Bursztein, E., Benko, B., Margolis, D., Pietraszek, T., Ar-
cher, A., Aquino, A., Pitsillidis, A., and Savage, S.
(2014). Handcrafted fraud and extortion: Manual ac-
count hijacking in the wild. In Proc. of 2014 Conf. on
Internet Measurement Conference (IMC ’14), pages
347–358, New York, NY, USA. ACM.
Dutton, J. (2015). The psychology behind why we fall for
phishing scams. Accessed March 2015.
Eaves, Y. (2001). A synthesis technique for grounded
theory data analysis. Journal of Advanced Nursing,
35(5):654–63.
Harrison, B., Vishwanath, A., Jie, N., and Ragov, R. (2015).
Examining the impact of presence on individual phis-
hing victimization. In Hawaii International Confe-
rence on System Sciences.
Hong, J. (2012). The state of phishing attacks. Commun.
ACM, 55(1):74–81.
Ma, Q. (2013). The process and characteristics of phishing
attacks: A small international trading company case
study. Journal of Technology Research, 4:1.
Provalis, R. (2017). Qda miner lite - free qualitative
data analisys software. Accessed on 27 July 2017:
https://provalisresearch.com/products/qualitative-
data-analysis-software/freeware/.
Purkait, S. (2012). Phishing counter measures and their ef-
fectiveness - literature review. Information Manage-
ment and Computer Security, 20(5):382–420. cited
By 23.
Schultz, T. (2011). Preface. White paper - Annual Review
of Entomology.
Zeydan, H., Selamat, A., and Salleh, M. (2014). Current
state of anti-phishing apapproach and revealing com-
petencies. Journal of theoretical applied information
technology, 70(3):507–515.
ICISSP 2018 - 4th International Conference on Information Systems Security and Privacy
232