From: Achieving a consensual definition of phishing based on a systematic review of the literature
Type | Extracted concept | Occurrence (N) | χ 2 | p |  |
---|---|---|---|---|---|
Asset | Mentioning information* | 105 | 83.27 | .00 | Â |
Actor | Mentions a target* | 87 | 44.61 | .00 | Â |
Activity | Phishing is digital* | 87 | 32.93 | .00 | Â |
Activity | Phishing is Internet-based* | 84 | 26.77 | .00 | Â |
Activity | Using deception* | 79 | 17.92 | .00 | Â |
Activity | Communication from target to offender | 64 | 1.99 | .16 | Â |
Activity | Communication from offender to target | 62 | 1.07 | .30 | Â |
Activity | Phishing is a criminal activity | 61 | 0.72 | .40 | Â |
Activity | Using impersonation | 60 | 0.43 | .51 | Â |
Activity | Phishing uses websites | 56 | 0.01 | .93 | Â |
Activity | Phishing uses messages | 51 | 1.07 | .30 | Â |
Actor | Mentions a trusted third party | 50 | 1.50 | .22 | Â |
Activity | Phishing is fraud* | 43 | 6.45 | .01 | Â |
Actor | Mentions an offender* | 40 | 9.64 | .00 | Â |
Activity | Using persuasion* | 30 | 24.86 | .00 | Â |
Activity | Mentions the later abuse of information* | 22 | 42.13 | .00 | Â |
Activity | Related to identity theft* | 20 | 47.16 | .00 | Â |
Activity | Related to social engineering* | 19 | 49.78 | .00 | Â |