3.1. Publications
A total of 308 articles on phishing and the human factor were published in the Web of Science database from 2006–2024.
Figure 1 illustrates a rising trend in scholarly publications addressing this topic. A noteworthy surge in publications has been observed from 2015 onwards. This escalation may be attributed to the Sony Pictures Entertainment Hack, which occurred at the end of 2014, involving a sophisticated phishing campaign and malware deployment leading to the theft of vast amounts of data, including unreleased films, employee personal information, internal emails, and other sensitive documents. The incident caused significant financial and reputational damage to Sony and highlighted the risks of phishing in compromising organizational security. This steady increase in publications can also be attributed to the onset of the pandemic in early 2020, which resulted in individuals being confined to their homes and, consequently, generating numerous attack vectors and vulnerabilities. The 2020 Annual Cybersecurity Report [
27] states that phishing continued to be a popular threat during the pandemic due to its simplicity and high success rate; it is thus understandable that the number of articles on this topic has risen since then.
The bibliometric analysis contributes to the existing body of literature by providing a comprehensive overview of research trends, key publications, and influential authors in the domain of phishing and human factors. By identifying the most impactful works and examining collaboration patterns, this study offers valuable insights that can guide future research and policy development in cybersecurity.
The 308 articles received a total of 4214 citations, with an average of 13.68 citations per article. A dip in citations from the year 2011 was observed. This may be due to a combination of factors, including citation lag, where newly published articles take time to accumulate citations. Additionally, a shift in research trends during that period may have reduced the relevance of earlier articles, resulting in fewer citations. The sharp increase in 2009–2010 may reflect a temporary surge in interest or highly impactful articles, followed by a return to average citation rates in subsequent years.
Table 2 showcases the top ten articles on phishing and the human factor, based on citations per year (CPY). These studies are among the most influential in the field, shaping current research. The decision to rank articles based on CPY was made to account for the inherent advantage older articles have in accumulating citations over time. CPY provides a more balanced view by normalising citation counts according to the number of years since the article’s publication, thereby highlighting the annual impact of each work. This metric is especially useful in revealing the influence of newer articles, which may not have had enough time to gather as many total citations but still have significant annual contributions to the field.
The most cited article (264 citations) is by Sheng et al. [
28], which explores the connection between demographics and phishing susceptibility and evaluates the efficacy of diverse anti-phishing educational materials through a role-play survey with 1001 online participants.
The listed articles cover a range of aspects related to phishing vulnerability. For example, Vishwanath et al. [
30] delved into the psychological processing of phishing attempts, while Williams et al. [
33] examined factors that influence employee susceptibility to phishing attacks in the workplace settings. Alsharnouby et al. [
32] addressed the persistent effectiveness of phishing, highlighting ongoing challenges in user education and cybersecurity implementation.
These top-cited works demonstrate the field’s interdisciplinary nature, combining insights from psychology, information systems, and human–computer interaction. This approach is evident in both empirical investigations (e.g., Parsons et al. [
29]) and theoretical explorations (e.g., Herley [
31]). Such interdisciplinary focus is crucial for developing comprehensive models of phishing susceptibility that incorporate cognitive, emotional, social, and technological factors. This bibliometric analysis builds upon these studies by synthesizing their contributions and identifying key themes and trends that have emerged over time.
The citations also highlight significant advancements, such as the effectiveness of embedded training programs in increasing awareness and reducing susceptibility to spear-phishing attacks [
34] and the development of models that examine how suspicion, cognition, and automatic responses contribute to phishing vulnerability [
35]. However, they also point to gaps in research, particularly the need for further exploration into how individuals process targeted spear-phishing emails [
36] and into the psychological mechanisms that underpin phishing susceptibility. These gaps reveal the importance of refining both educational strategies and cognitive models to improve long-term phishing prevention efforts. By highlighting these gaps, the present study contributes to the existing literature by pinpointing underexplored areas that warrant further investigation. Specifically, the analysis of keyword trends and collaboration networks provides insights into emerging topics and potential interdisciplinary collaborations that can advance the field.
Consequently, from the standpoint of human factors, key studies on phishing point to the impact of psychological characteristics, demographic factors, and individual experiences on user susceptibility. They bring to light the ongoing difficulties in training and awareness initiatives, underlining the necessity for a deeper comprehension of trust dynamics and the development of enduring prevention tactics to efficiently counteract phishing threats. These studies emphasize the critical need to incorporate knowledge from psychology and human behaviour into cybersecurity measures.
3.3. Authors
Figure 3 presents the quantity of articles and the extent of author collaboration. This does not include solo authors since collaboration can only be assessed with multiple authors. The “No collaboration” category indicates the number of articles with authors from the same institution. “National collaboration” represents authors from the same country but different institutions. Finally, “International collaboration” refers to the number of articles written by authors from various countries.
The collaboration patterns in phishing and human factor research from 2006 to 2024 reveal a dynamic and evolving landscape. Overall, there has been a general increase in all types of collaborations over the years, indicating growing interest and research activity in this field. “No collaboration” peaked in 2019 with 18 publications, showing fluctuations but generally increasing from 2006 to 2019 before declining, possibly indicating a shift towards more collaborative research. “National collaboration” demonstrated the most consistent growth, peaking in 2023 with 16 publications. “International collaboration”, while generally lower than the other categories, showed sporadic growth with notable increases in 2015 and 2020, suggesting potential for increased global cooperative efforts.
Figure 3 shows a shift in collaboration patterns over time. The early years (2006–2012) were dominated by no collaboration or national collaboration. The middle years (2013–2019) saw growth across all categories, with solo research often leading. Recent years (2020–2024) show a more balanced distribution between collaboration types, with national collaboration frequently taking the lead. Notably, 2020 saw a significant spike in international collaborations, possibly due to the global focus on cybersecurity during the COVID-19 pandemic. The year 2023 had the highest number of national collaborations, suggesting strong within-country research networks. These trends suggest a maturing research field in phishing and human factors, with a growing emphasis on collaborative work, particularly at the national level, as researchers increasingly work together to address complex challenges in cybersecurity.
It is important to acknowledge that the increase in collaborations observed in phishing and human factors research may be part of a broader trend in scientific research. However, phishing and human factors research exhibit unique aspects that may influence its collaboration patterns differently compared to other fields. The interdisciplinary nature of this research area, which combines elements from psychology, sociology, human–computer interaction, and cybersecurity, necessitates collaboration across diverse disciplines. This requirement for interdisciplinary expertise may lead to distinct collaboration dynamics. For example, researchers may collaborate nationally to leverage shared language, cultural understanding, and easier coordination when integrating insights from social sciences into technical cybersecurity measures.
Additionally, phishing attacks often exploit cultural and psychological factors specific to certain populations. National collaborations may be particularly valuable for understanding local contexts, social norms, and user behaviours that influence phishing susceptibility. Researchers working within the same country can more readily access relevant participant pools and tailor interventions to the specific needs of their population.
International collaborations, while increasingly important due to the global nature of phishing threats, may present challenges unique to research on phishing and human factors. Differences in language, cultural norms, ethical considerations, and legal regulations regarding human-subject research can make international collaboration more complex in this field compared to more technically focused areas like network security. These factors may contribute to the observed prevalence of national collaborations over international ones in the research on phishing and human factors.
Moreover, the need to develop culturally sensitive anti-phishing strategies underscores the importance of national research efforts. While technical solutions in network security may be broadly applicable across different contexts, interventions addressing human factors in phishing often require a deep understanding of local cultural nuances.
In summary, while the increase in collaborations in research on phishing and human factors aligns with general trends in scientific research, the unique interdisciplinary and cultural aspects of this field shape its specific collaboration patterns. Recognizing these nuances is crucial for fostering effective collaborations that can address the complex challenges posed by phishing attacks.
This study distinguishes between citation, co-citation, and bibliographic coupling networks to highlight their differences. Both bibliographic coupling and co-citation represent indirect relationships and might offer less precise information regarding the relatedness of articles [
39]. A citation link connects two items when one cites the other. It is important to note that VOSviewer treats citation links as undirected, meaning that it does not differentiate between a citation from item A to item B and one from item B to item A. A bibliographic coupling link exists between two items when they both reference the same document. In contrast, a co-citation link occurs when two items are both cited by the same document [
37].
Figure 4 visualizes the co-authorship network of key researchers in the field of phishing and human factors, weighted by normalized citations. Each node represents an author, with larger nodes indicating more normalized citations received by that author’s co-authored work. The closer the nodes are, the more frequently these authors collaborate, and the different colours represent distinct clusters of collaboration, signifying various research communities.
At the centre of the map is Vishwanath, A, whose work on phishing vulnerability, cognitive models of suspicion, and social media deception has had a profound influence in the field. Vishwanath’s studies, particularly on how habitual online behaviours and individual psychological differences impact phishing susceptibility, are highly cited, making Vishwanath a key player in the phishing research landscape. Co-authors such as Harrison, B and Ng, YJ are part of the same purple cluster, showing their significant contributions to understanding how cognitive and personality factors, such as suspicion and automaticity, influence users’ susceptibility to phishing. The research themes of Vishwanath’s group also extend into exploring email habits, media habits, and the role of personality traits like self-regulation and cognitive biases in phishing detection, thus addressing both individual and contextual factors that contribute to susceptibility to phishing.
Rao, HR, appearing in the green cluster, is another major contributor with a focus on information assurance, cybersecurity policies, and privacy. Rao’s research, often in collaboration with authors like Wang, J and Chen, R, addresses email authentication, self-efficacy in phishing detection, and information processing models to understand user behaviour in cybersecurity contexts. Their work has pioneered efforts in visual email authentication, integrating cognitive effort and decision aids to reduce phishing vulnerability. This cluster illustrates the interdisciplinary efforts bridging human behaviour, policy compliance, and technical interventions.
Wang, J is another key figure closely connected to Rao, with significant contributions to phishing detection, coping mechanisms in phishing threats, and cybersecurity compliance policies. This collaboration, reflected in the strong ties between their nodes, emphasises the cross-disciplinary approach needed to address phishing from both technical and behavioural perspectives. Their joint work on the extended parallel process model (EPPM) for phishing detection highlights how users process and respond to phishing attacks, emphasising self-efficacy and cognitive strategies.
Chen, R (blue cluster), often a bridge between Rao’s group and Vishwanath’s, also plays a key role in phishing research. Chen’s work emphasises phishing susceptibility and the design of phishing deception indicators, linking technical phishing detection systems with human-centred security strategies. Collaborators like Lin, Z and Andersen, E further this interdisciplinary connection by focusing on human–computer interactions and usability in phishing contexts.
In contrast, Li, Y, highlighted in the orange cluster on the far right of the map, leads a specialised group focused on fraud detection, cybersecurity threat models, and large-scale data analysis. This cluster is relatively isolated from the more behaviourally focused clusters of Vishwanath and Rao, suggesting a more technical research orientation. Li’s work, including machine learning for phishing detection and cognitive behaviour modelling, reflects a deep technical expertise in identifying and mitigating phishing attacks on a large scale. Herath, T, positioned in the brown cluster near Rao, represents more niche contributions within user behaviour and phishing detection. Herath’s work often emphasises the rational rejection of security advice and user behaviour, as seen in their collaboration with Rao and Vishwanath, and their contributions are critical in understanding how users interact with phishing defences.
When viewed alongside the author collaboration trends in
Figure 3, which shows the growth of national and international collaborations over time,
Figure 4 offers a detailed view of specific co-authorship relationships driving the field forward. For example, the strong collaboration between Vishwanath, A; Rao, HR; and Wang, J reflects not only the interdisciplinary nature of phishing research but also the critical importance of collaborative networks in addressing both technical and human factors in cybersecurity.
The relative isolation of certain clusters, such as the technical group of Li, Y, from the central clusters indicates potential gaps in collaboration between highly technical and behaviourally focused research. Li, Y and their team could benefit from greater integration with behavioural scientists to develop more holistic solutions to phishing detection. Conversely, behavioural clusters like Vishwanath’s may gain from incorporating advanced detection technologies that Li and their team have developed.
In
Figure 5, each circle represents an author, with larger circles indicating a higher number of publications. The proximity between two circles (authors) signifies the strength of their relationship based on bibliographic coupling [
38]. This means that authors positioned closer together in the visualization tend to cite the same publications, while those situated further apart generally do not share common cited works [
40]. This network visualisation was generated by employing the bibliographic coupling method with authors as the unit of analysis. The size of each author node is weighted by citations, with larger circles indicating a higher citation count. The association strength normalisation method was used to normalize the bibliographic coupling links, ensuring that the proximity between authors reflects the strength of their shared citations rather than just the raw number of citations. The clustering resolution was adjusted to highlight distinct research communities, which are represented by different colour clusters, making it easier to identify groups of researchers working on similar topics. The distance between authors in the map reflects the extent to which they cite similar works.
The map highlights various clusters representing distinct research communities, with prominent clusters centred around influential authors like Vishwanath, Wang, and Rao, demonstrating their significant contributions and influence. While bibliographic coupling does not directly indicate co-authorship, it reflects intellectual proximity and the likelihood of thematic alignment in their research. Authors such as Rajivan, Caputo, and Parsons are positioned close to one another, reflecting that they are engaged in similar bodies of literature, even if they may not have collaborated directly. The shared intellectual foundation, as represented by strong links between them, suggests potential for future collaboration and indicates that their work addresses common research problems, which is vital for the evolution of anti-phishing strategies. This network structure is a valuable tool for understanding how research fields evolve and for identifying potential collaborators who share common research interests.
Figure 6 displays a co-citation map that visualizes the authors who are most frequently cited together. In this map, authors that are closer to each other and have stronger connecting links have been cited together more often in various publications. Co-citation occurs when two documents are both cited by a common third document [
41,
42]. The analysis of co-citation operates under the assumption that two papers cited together share a strong relationship and should, therefore, be grouped together. Each circle or node on the map represents an author, and the connections (links) between these nodes signify co-citation relationships among authors. The proximity between two authors on the map roughly indicates the extent of their relatedness based on co-citations [
43].
Looking at the clusters in
Figure 6, the green cluster is anchored by the author Kumaraguru, the yellow cluster is anchored by Vishwanath, and the blue cluster is anchored by Jakobsson. Kumaraguru’s work on user education and awareness programs frequently attracts significant scholarly attention, forming a pivotal point in the green cluster. Vishwanath’s centrality in the yellow cluster further reinforces their foundational role in phishing research. Jakobsson has made significant contributions to understanding and mitigating social engineering attacks, anchoring the blue cluster and emphasizing their role in shaping best practices in cybersecurity. As these authors anchor their respective clusters, other authors within these clusters tend to conduct research on the same topics or sub-topics, as they are frequently cited together. This thematic grouping helps identify sub-disciplines within phishing and human factors, providing a clearer picture of the field’s landscape and guiding future research directions.
Table 4 shows the top 30 most influential authors in this field of study based on the total number of citations. Vishwanath is the most influential author, with a total of 476 citations from eight publications. Vishwanath’s work has significantly advanced the understanding of psychological factors influencing phishing susceptibility, contributing to the development of user-centric security measures [
40]. Similarly, Rao’s extensive research has provided valuable insights into information assurance and cybersecurity practices. By highlighting these key contributors, the present study helps delineate the intellectual structure of the field and identifies seminal works that have shaped current research trajectories. The most publications of a single author are nine. Rao, having published a total of nine articles, is the most productive.
3.6. Keywords
It is of value to identify emerging research fronts to pinpoint research endeavours within a specific scientific domain [
22].
Figure 10 presents a map of keywords that co-occur. The original search criterion in our data query (“Phishing”) was excluded from the keywords. Additionally, the keywords were checked for spelling differences and erroneous information. For example, differences in American vs. British English and wording of keywords were standardised. A thesaurus file was created and included in the analysis to take the differences into account. Based on the co-occurrence analysis of keywords in the field of phishing and human factor literature, several key themes and research directions emerge.
The largest cluster (red cluster) in
Figure 10 focuses on the practical aspects of anti-phishing efforts, emphasizing training, user studies, and the development of usable security measures. This cluster highlights the importance of human factors in cybersecurity, particularly in the context of online banking. The light-blue cluster broadens the scope to include various forms of cyber threats and the role of user awareness and education in mitigating these risks. The blue and orange clusters delve into the psychological aspects of phishing susceptibility, exploring personality traits, cognitive processes, and decision-making models. This psychological focus is complemented by the yellow cluster, which examines theoretical frameworks such as the Protection Motivation Theory and the Theory of Planned Behaviour in the context of information security.
To generate this map, VOSviewer employed a co-occurrence analysis of keywords, using full counting as the method to consider each occurrence of the keywords equally, regardless of how many documents they appeared in. Keywords that met the minimum threshold of appearing in at least three documents were included. For normalization, the association strength method was applied, which ensures that the strength of the relationships between keywords is proportionally balanced based on their co-occurrence frequency.
The purple and pink clusters address demographic factors like age and gender in phishing susceptibility, while other clusters explore the broader context of online scams, deception techniques, and human behaviour on the internet. The inclusion of machine learning and information processing suggests an emerging trend towards incorporating advanced technological solutions in phishing detection and prevention.
The keyword analysis reveals a comprehensive and interdisciplinary approach to phishing research, encompassing technological solutions, psychological insights, and educational strategies. The field appears to be moving towards a more nuanced understanding of phishing susceptibility, considering individual differences, cognitive processes, and the broader context of online behaviour. This suggests that effective anti-phishing strategies will likely require a combination of technological innovations, targeted education, and interventions tailored to individual psychological and demographic factors. Each cluster and the corresponding keywords can be found in
Table 7.
It is important to note that some synonyms or closely related terms appear in different clusters (e.g., “user behaviour” in cluster 5 and “human behaviour” in cluster 6). This occurrence is due to the way the clustering algorithm in VOSviewer groups keywords based on their co-occurrence patterns. Even though these terms are similar, they may co-occur with different sets of keywords in the literature, reflecting distinct contexts or research focuses. For instance, “user behaviour” might be associated with studies on user interactions with security interfaces, while “human behaviour” could relate to broader psychological aspects influencing phishing susceptibility. The presence of such overlaps indicates the interdisciplinary and interconnected nature of phishing research. This overlap provides valuable insights into the nuanced ways similar concepts are explored across different research themes.
The most frequent author keywords were used to understand the trend topics over the years for each cluster. The size of the x indicates the number of times each keyword has appeared for each year; the larger the size, the more frequent the term. An example of a trend chart—here for cluster 1—can be seen in
Figure 11. This cluster focuses on user-centric aspects of security, with keywords like “security awareness”, “security behaviour”, and “user study” emphasizing the role of users in phishing prevention. Technical terms such as “detection accuracy” and “cognitive modelling” indicate an integration of psychological and computational approaches. Recently, “user study” and “usable security” have gained prominence, reflecting a shift towards understanding and enhancing user interaction with security systems. However, there has been a decline in the mention of “cognitive modelling” and “design”, suggesting a move towards more empirical, user-focused studies.
Cluster 2 centres around broader security concerns such as “cyber-attack”, “cybercrime”, and “privacy”, alongside foundational terms like “education” and “awareness”. The increasing attention to “cybercrime” and “cyber-attack” highlights the growing complexity and scale of phishing threats. Meanwhile, the keyword “website” has appeared less frequently in recent years, possibly due to the evolution of web security standards and practices. Cluster 3 is heavily focused on psychological factors, including “personality traits”, “dark triad”, and “systematic processing”, reflecting an interest in understanding individual differences in phishing susceptibility. Emerging topics like “social network” and “heuristic-systematic processing model” suggest a rising interest in how social dynamics and cognitive processes influence phishing behaviour. However, the “five factor model” seems to have received less attention recently, possibly overshadowed by more nuanced psychological models. Cluster 4 blends technical and social aspects, with terms like “computer security”, “social engineering”, and “trust”. It also includes behavioural theories such as “protection motivation theory” and “theory of planned behaviour”. The continuing focus on “social engineering” highlights its significance, particularly as it intersects with technical security measures. In contrast, “computer security” as a standalone term has become less frequent, likely due to the integration of more specific and advanced concepts in cybersecurity.
Cluster 5 is concerned with specific attack vectors like “spear-phishing” and demographic factors like “aging” and “trait”, alongside general behavioural aspects such as “user behaviour”. The increased use of keywords “spear-phishing” and “susceptibility” indicates a focus on targeted phishing attacks and understanding vulnerabilities. The term “survey” is less prominent, suggesting a shift towards more diverse methodologies beyond surveys. Cluster 6 focuses on the human side of security, with keywords like “psychology”, “human behaviour”, and “training”. Broader terms like “security” and “internet” are also included. The increased attention to “training” highlights the importance of educational initiatives in enhancing security. However, the term “online scams” has seen fewer mentions in recent years, possibly due to a shift towards more specific forms of online threats. Cluster 7 explores cognitive and decision-making processes, including “cognition”, “decision-making”, and “signal detection theory”, as well as human–technology interaction through “human-computer interaction”. The rising attention to “signal detection theory” and “human-computer interaction” reflects the growing complexity of phishing detection and prevention strategies. In contrast, “metacognition” appears less frequently, possibly due to a shift towards more applied cognitive theories.
Cluster 8 centres on deception techniques, with keywords like “deception”, “persuasion”, and “influence techniques”. The inclusion of “field experiment” indicates an empirical approach to studying phishing. The growing attention to “online deception” and “persuasion” reflects the sophisticated tactics used in modern phishing campaigns. However, “field experiment” seems less frequent, suggesting a possible shift towards other experimental or observational methods. Cluster 9 emphasizes technological approaches to phishing prevention, including “cybersecurity”, “machine learning”, and “information processing” while also addressing psychological factors like “optimism bias”. The increase of “machine learning” and “phishing susceptibility” as keywords highlights the use of advanced technologies and psychological insights in combating phishing. Conversely, “information processing” appears less frequently, possibly due to its integration into more specific applications like machine learning. Cluster 10 explores demographic factors in security, with keywords like “age”, “gender”, and “cybersecurity awareness” alongside “security risk”, reflecting an interest in risk perception. The increased attention to “cybersecurity awareness”, especially in the context of demographic differences, underscores the importance of tailored educational initiatives. The declining frequency of “age” suggests a possible shift towards more complex demographic analyses. Finally, cluster 11 focuses on user protection, with terms like “user protection”, “internet security”, and “identity theft”. The declining frequency of “identity theft” may reflect a broader integration of identity-related concerns into general security practices.
By analysing keywords and their co-occurrence, emerging research themes were identified, such as the integration of machine learning in phishing detection and the exploration of individual psychological traits affecting susceptibility. This detailed examination of research trends contributes to the existing literature by pinpointing areas that require further investigation and by suggesting potential interdisciplinary collaborations.