DOI:10.1080/0144929X.2011.632650 - Corpus ID: 5472217
Phishing for phishing awareness
@article{Jansson2013PhishingFP, title={Phishing for phishing awareness}, author={Kenny Olof Robert Jansson and Rossouw von Solms}, journal={Behaviour \& Information Technology}, year={2013}, volume={32}, pages={584 - 593}, url={https://api.semanticscholar.org/CorpusID:5472217}}- K. JanssonR. V. Solms
- Published inBehavior and Information…1 June 2013
- Computer Science, Psychology
Whether simulating phishing attacks together with embedded training can contribute towards cultivating users’ resistance towards ‘phishing attacks’ is to be ascertained.
132 Citations
Human Factors in Phishing Attacks: A Systematic Literature Review
- Giuseppe DesoldaLauren S. FerroAndrea MarrellaT. CatarciM. Costabile
- 2022
Computer Science, Psychology
A systematic literature review conducted to draw a “big picture” of the most important research works performed on human factors and phishing helps in understanding how human factors should be considered to defend against phishing attacks.
Phishing Attack Awareness Among College Students
- Alvin KennethBernard Bryan HayashiNadia
- 2023
Computer Science, Psychology
2023 3rd International Conference on Electronic…
An email phishing technique that asked respondents to change their password on an email account was used to find out awareness of phishing attacks on college students and showed that a small percentage of a certain amount of people are still unaware ofphishing attacks and fell into the attacker's trap.
Simulated Phishing Attack and Embedded Training Campaign
- W. YeohHe HuangWang-Sheng LeeFadi Al JafariRachel Mansson
- 2022
Computer Science, Psychology
An in-depth case study on a large phishing awareness campaign is conducted and it is revealed that phishing Awareness is a learning process through which individuals’ behavior can be strengthened by reinforcement and punishment.
Reinforcing Cybersecurity Awareness through Simulated Phishing Attacks: Findings from an HEI Case Study
Strategic implications for the structuring of cybersecurity education in higher education institutions are envisioned, along with the development of customized, adaptive learning modules that envision to identified skill gaps and strengthen the overall resilience of the digital infrastructure.
Email Phishing Susceptibility in a Public School Setting: Identifying at Risk Educators
- Michael HortonH. Wimmer
- 2017
Education, Computer Science
Results conclude that the variance in the amount of time spent on the Internet is a factor in the susceptibility of victims to a phishing style attack.
Phishing and Organisational Learning
- Wayne D. KearneyH. Kruger
- 2013
Computer Science, Education
This paper describes a practical phishing experiment that was conducted at a large organisation and shows how a learning process was initiated and how security incidents such as phishing can be used successfully for both single and double-loop learning.
Spear phishing in a barrel: Insights from a targeted phishing campaign
- Alan J. BurnsM. E. JohnsonDeanna D. Caputo
- 2019
Computer Science, Business
The results indicate that training users with individual loss messaging might increase the effectiveness of the training, and potential evidence that organizational training can lead to increased overall spear phishing awareness, even for those not directly trained is found.
Influencing Outcomes and Behaviors in Simulated Phishing Exercises
- Steven McElweeGeorge MurphyPaul Shelton
- 2018
Computer Science, Business
It is found that behavior-based controls were more successful in reducing susceptibility to phishing, primarily when implemented as targeted training that was repeated multiple times.
PHISHING ATTACK
- M. ScholarAssistente Professor
Computer Science, Law
This abstract delves into the diverse tactics employed by cyber criminals, including email spoofing, domain impersonation, and psychological manipulation, to orchestrate successful phishing campaigns, and underscores the critical importance of understanding and mitigating phishing attacks in today's digital landscape.
A Framework to Protect Against Phishing Attacks
- Y. A. YounisMohamed S. Musbah
- 2020
Computer Science
Proceedings of the 6th International Conference…
A framework to protect againstphishing attacks by enhancing the users' awareness to detect phishing attacks is presented, which has two major components, which are animation videos for training awareness and gamification part to assess the delivered knowledge.
...
25 References
Identity Theft - Empirical evidence from a Phishing Exercise
The findings of this phishing experiment are presented where alarming results on the staff behavior are shown and educational and awareness activities pertaining to email environments are of utmost importance to manage the increased risks of identity theft.
Teaching Johnny not to fall for phish
- P. KumaraguruSteve ShengAlessandro AcquistiL. CranorJason I. Hong
- 2010
Computer Science, Education
TOIT
The results suggest that, while automated detection systems should be used as the first line of defense against phishing attacks, user education offers a complementary approach to help people better recognize fraudulent emails and websites.
Phishing for user security awareness
- R. DodgeC. CarverA. J. Ferguson
- 2007
Computer Science, Education
Measuring Resistance to Social Engineering
- Hågen HasleYngve KristiansenKetil KintelE. Snekkenes
- 2005
Computer Science
A real life SE experiment involving 120 participants has been completed and suggests that SE may indeed represent an Achilles heel, and there needs to be a SE resistance metric.
Fostering E-Mail Security Awareness: The West Point Carronade
- A. J. Ferguson
- 2005
Computer Science, Education
An e-mail security awareness exercise called the West Point Carronade was designed and developed as a proof-ofconcept response to this need to make sure cadets were practicing good e- Mail security, and was designed to point out this security awareness deficiency.
Social Engineering: Towards A Holistic Solution
- K. JanssonR. V. Solms
- 2010
Computer Science
SAISMC
This paper is to present guidance in the form of a flowchart which should give employees some guidance on how to act when faced with a potential Social Engineering attack, and should reduce the risk related to Social Engineering significantly.
School of phish: a real-world evaluation of anti-phishing training
- P. KumaraguruJustin CranshawT. Pham
- 2009
Computer Science
Results of this study show that users trained with PhishGuru retain knowledge even after 28 days; adding a second training message to reinforce the original training decreases the likelihood of people giving information to phishing websites; and training does not decrease users' willingness to click on links in legitimate messages.
Social Engineering and its Countermeasures
- Douglas P. Twitchell
- 2009
Computer Science
A taxonomy for classifying social engineering attacks along four dimensions is introduced: who or what the targets are, what media are used, how the attacks fit in an attack cycle, and the techniques used to execute the attacks.
Handbook of Research on Social and Organizational Liabilities in Information Security
- Manish GuptaR. Sharman
- 2008
Computer Science, Sociology
The Handbook of Research on Social and Organizational Liabilities in Information Security offers a critical mass of insightful, authoritative articles on the most salient contemporary issues of managing social and human aspects of information security.
Related Papers
Showing 1 through 3 of 0 Related Papers