... Research that satisfies the predetermined criteria is then excluded after collecting papers using the provided search strategy. The selected publications must satisfy all selection criteria but none of the exclusion criteria specified in Table I. [3], [4], [5], [1], [6], [7], [8], [9] , [2], [10], [11],[12], [13], [14], [15 ], [16] Companies 10 [3], [4], [17], [8], [2], [18], [19 ], [20], [21], [22] Mobile Device 7 [3], [4], [23], [8], [2], [24], [25 ] Email 2 [26], [27] Web Wallet 2 [28], [29] Facebook 1 [30] The website is the medium that is frequently utilized in phishing attempts, as can be seen from the table above. This is evident from the 30 studies, 16 of which exploit websites to conduct phishing assaults. ...