5,405
Views
2
CrossRef citations to date
0
Altmetric
Original Articles

Examining Factors Impacting the Effectiveness of Anti-Phishing Trainings

ORCID Icon, , ORCID Icon & ORCID Icon

References

  • Heartfield R, Loukas G. A taxonomy of attacks and a survey of defence mechanisms for semantic social engineering attacks. ACM Comput Surveys (CSUR). 2016;48(3):37. doi:10.1145/2835375.
  • Luo X, Brody R, Seazzu A, Burd S. Social engineering: the neglected human factor for information security management. Info Resour Manage J (IRMJ). 2011;24(3):1–8. doi:10.4018/irmj.2011070101.
  • Orgill GL, Romney GW, Bailey MG, Orgill PM. The urgency for effective user privacy-education to counter social engineering attacks on secure computer systems. in Proceedings of the 5th conference on Information technology education. Salt Lake City, Utah, USA. 2004. ACM.
  • Gragg D. A multi-level defense against social engineering. SANS Reading Room. 2003;13. p. 15 – 36
  • Twitchell DP Social engineering in information assurance curricula. in Proceedings of the 3rd annual conference on Information security curriculum development. Kennesaw, Georgia, USA. 2006. ACM.
  • KnowBe4. Phishing. Available from: https://www.knowbe4.com/phishing
  • Jagatic TN, Johnson NA, Jakobsson M, Menczer F. Social phishing. Commun ACM. 2007;50(10):94–100. doi:10.1145/1290958.1290968.
  • Garera S, Provos N, Chew M, Rubin AD. A framework for detection and measurement of phishing attacks. in Proceedings of the 2007 ACM workshop on Recurring malcode. Alexandria, Virginia, USA. 2007. ACM.
  • Jakobsson M Modeling and preventing phishing attacks. in Financial Cryptography. Roseau, The Commonwealth of Dominica. 2005.
  • Symantec, Internet Security Threat Report. 2018. p. 64–77.
  • Hong J. The Current State of Phishing Attacks. In: Communications of the ACM. 2012;55(1): p. 74 – 81.
  • Sumner A, Yuan X. Mitigating Phishing Attacks: an Overview. in Proceedings of the 2019 ACM Southeast Conference. Kennesaw, Georgia, USA. 2019.
  • Zhang Y, Egelman S, Cranor L, Hong J. Phinding phish: evaluating anti-phishing tools. In: Proceedings of the NDSS Symposium. San Diego, California, USA. ISOC; 2006.
  • Mouton F, Leenen L, Venter HS. Social engineering attack detection model: seadmv2. in Cyberworlds (CW), 2015 International Conference on. Visby, Sweden. 2015. IEEE.
  • Sloan J. Phishing Mitigation for Small and Medium Businesses. 2020.
  • Kowalski K, Billings DM, Kowalski K. Self-Assessment and the DiSC. J Conti Educ Nursing. 2019;50(8):347–48. doi:10.3928/00220124-20190717-04.
  • Jones CS, Hartley NT. Comparing correlations between four-quadrant and five-factor personality assessments. Am J Business Educ. 2013;6:459–70.
  • Liang H, Xue Y. Avoidance of information technology threats: a theoretical perspective. MIS quart. 2009;33(1):71–90. doi:10.2307/20650279.
  • Carpenter D, Young DK, Barret P, McLeod A. Refining technology threat avoidance theory. Comm Assoc Info Sys. 2019;44:380 – 407.
  • Annetta LA. Video games in education: why they should be used and how they are being used. Theory Pract. 2008;47(3):229–39. doi:10.1080/00405840802153940.
  • Papastergiou M. Digital game-based learning in high school computer science education: impact on educational effectiveness and student motivation. Comput Educ. 2009;52(1):1–12. doi:10.1016/j.compedu.2008.06.004.
  • Alkhamis E, Renaud K. The Design and Evaluation of an Interactive Social Engineering Training Programme.In: Tenth International Symposium on Human Aspects of Information Security & Assurance. Frankfurt, Germany. 2016. p. 125 – 134.
  • Sheng S, Magnien B, Kumaraguru P, Acquisti A, Cranor LF, Hong J, Nunge E. Anti-phishing phil: the design and evaluation of a game that teaches people not to fall for phish. in Proceedings of the 3rd symposium on Usable privacy and security. Pittsburgh, Pennsylvania, USA. 2007. ACM.
  • Kumaraguru P, Rhee Y, Sheng S, Hasan S, Acquisti A, Cranor LF, Hong J. Getting users to pay attention to anti-phishing education: evaluation of retention and transfer. in Proceedings of the anti-phishing working groups 2nd annual eCrime researchers summit. Pittsburgh, Pennsylvania, USA. 2007. ACM.
  • Kumaraguru P, Sheng S, Acquisti A, Cranor LF, Hong J. Teaching Johnny not to fall for phish. ACM Transac Internet Technol (TOIT). 2010;10(2):7. doi:10.1145/1754393.1754396.
  • Bowen BM, Devarajan R, Stolfo S. Measuring the human factor of cyber security. in 2011 IEEE International Conference on Technologies for Homeland Security (HST). Waltham, Massachusetts, USA. 2011. IEEE.
  • McBride M, Carter L, Warkentin M. Exploring the role of individual employee characteristics and personality on employee compliance with cybersecurity policies. RTI Int Instit Homeland Security Sol. 2012;5:1.
  • Johnston AC, Warkentin M. Fear appeals and information security behaviors: an empirical study. MIS quart. 2010;34(3):549–66. doi:10.2307/25750691.
  • Arachchilage NAG, Love S. A game design framework for avoiding phishing attacks. Comput Human Behav. 2013;29(3):706–14. doi:10.1016/j.chb.2012.12.018.
  • Canham M, Posey C, Strickland D, Constantino M. Phishing for Long Tails: examining Organizational Repeat Clickers and Protective Stewards. SAGE Open. 2021;11(1):2158244021990656. doi:10.1177/2158244021990656.
  • Sheng S, Holbrook M, Kumaraguru P, Cranor L, Downs J.Who falls for phish?: a demographic analysis of phishing susceptibility and effectiveness of interventions. in Proceedings of the SIGCHI Conference on Human Factors in Computing Systems. Atlanta, Georgia, USA. 2010. ACM.
  • Alam S, El-Khatib K. Phishing susceptibility detection through social media analytics. in Proceedings of the 9th International Conference on Security of Information and Networks. Newark, New Jersey, USA. 2016. ACM.
  • Mohebzada JG, Zarka AE, Bhojani AH, Darwish A.Phishing in a university community: two large scale phishing experiments. in 2012 international conference on innovations in information technology (IIT). Abu Dhabi, United Arab Emirates. 2012. IEEE.
  • Anwar M, He W, Yuan X. Employment status and cybersecurity behaviors. in 2016 International Conference on Behavioral, Economic and Socio-cultural Computing (BESC). Durham, North Carolina, USA. 2016. IEEE.
  • Cho J-H, Cam H, Oltramari A. Effect of personality traits on trust and risk to phishing vulnerability: modeling and analysis. in Cognitive Methods in Situation Awareness and Decision Support (CogSIMA), 2016 IEEE International Multi-Disciplinary Conference on. San Diego, California, USA. 2016. IEEE.
  • Halevi T, Lewis J, Memon N, Phishing, personality traits and Facebook. arXiv preprint arXiv:1301.7643, 2013.
  • Ferreira A, Lenzini G. An analysis of social engineering principles in effective phishing. in 2015 Workshop on Socio-Technical Aspects in Security and Trust. Verona, Italy. 2015. IEEE.
  • Williams EJ, Hinds J, Joinson AN. Exploring susceptibility to phishing in the workplace. Int J Hum Comput Stud. 2018;120:1–13. doi:10.1016/j.ijhcs.2018.06.004.
  • Zielinska O, Welk A, Mayhorn CB, Murphy-Hill E.he persuasive phish: examining the social psychological principles hidden in phishing emails. in Proceedings of the Symposium and Bootcamp on the Science of Security. Pittsburgh, Pennsylvania, USA. 2016. ACM.
  • Cialdini RB. Influence: the psychology of persuasion. New York: Williams Morrow. 2007. Vol. 55.
  • Personality Traits Measured by the DISC Test. [ cited 2019; DISC Personality Questions]. Available from: http://prfwebsite.com/disc-pts/questions_trait_measured_V2.html.
  • Anwar M, He W, Ash I, Yuan X, Li L, Xu L. Gender difference and employees‘ cybersecurity behaviors. Comput Human Behav. 2017;69:437–43. doi:10.1016/j.chb.2016.12.040.