1,360
Views
2
CrossRef citations to date
0
Altmetric
Research Article

Learning not to take the bait: a longitudinal examination of digital training methods and overlearning on phishing susceptibility

, &
Pages 238-262 | Received 24 Aug 2019, Accepted 10 May 2021, Published online: 20 Jun 2021
 

ABSTRACT

As phishing becomes increasingly sophisticated and costly, interventions that improve and prolong resistance to attacks are needed. Previous research supported digital training as a method to reduce phishing susceptibility. However, the effects of training degrade with time. Therefore, we investigate overlearning as an approach that may increase skill retention through repetition and developing automaticity. We performed a longitudinal experiment crossing overlearning with anti-phishing digital training (rule-based, mindfulness, and control). Participants were tested using email identification tests (immediately following and 10 weeks after training) and mock phishing messages delivered to their inboxes (1 week and 8 weeks following training). Results showed that compared to rule-based training, mindfulness training resulted in significantly greater retention in terms of better email discrimination and less susceptibility to phishing attacks but similar levels of caution towards phishing after 2 months. Overlearning resulted in significantly less susceptibility to phishing attacks and more caution towards phishing compared to no overlearning but did not impact the digital training approaches. Even so, mindfulness was more beneficial compared to overlearning. Altogether, the results demonstrate the stability of the benefits of mindfulness training over time in terms of mitigating phishing susceptibility without influencing the chances of missing legitimate emails.

Disclosure statement

No potential conflict of interest was reported by the author(s).

Supplementary material

Supplemental data for this article can be accessed here.

Notes

1. Wombat Security ThreatSim® Phishing Simulations available at https://www.wombatsecurity.com.

2. Mock phishing scores were moderately skewed, with skewness values of −1.55 at Time 1 and −1.49 at Time 2. Because our sample size (n = 453) was twice the size at which the impact of skewness begins to diminish (n = 200; Hair et al., Citation2005), our analysis used untransformed data to allow for easier interpretation of the results.

3. No group-level data was collected based on participants’ assignment to their respective training and overlearning conditions (i.e., there was a lack of dependence and interaction among participants within each respective study condition) or produced through individual-level data aggregation to predict individual performance.

Additional information

Funding

This research was supported by a grant from the NSF Social and Economic Division, Project# 1421580. The views and conclusions contained herein are those of the authors and should not be interpreted as representing the official policies or endorsements, either expressed or implied, of NSF or the U.S. Government.

Log in via your institution

Log in to Taylor & Francis Online

PDF download + Online access

  • 48 hours access to article PDF & online version
  • Article PDF can be downloaded
  • Article PDF can be printed
USD 61.00 Add to cart

Issue Purchase

  • 30 days online access to complete issue
  • Article PDFs can be downloaded
  • Article PDFs can be printed
USD 337.00 Add to cart

* Local tax will be added as applicable

Related Research

People also read lists articles that other readers of this article have read.

Recommended articles lists articles that we recommend and is powered by our AI driven recommendation engine.

Cited by lists all citing articles based on Crossref citations.
Articles with the Crossref icon will open in a new tab.