Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security 2015
DOI: 10.1145/2810103.2813660
|View full text |Cite
|
Sign up to set email alerts
|

A Multi-Modal Neuro-Physiological Study of Phishing Detection and Malware Warnings

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

1
47
0

Year Published

2016
2016
2024
2024

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 40 publications
(48 citation statements)
references
References 22 publications
1
47
0
Order By: Relevance
“…[266] 4 [225], [229], [247], [265] 2 [233], [252] 1 [219] No 6 [10], [230], [238], [249], [250], [258] 3 [242], [260], [263] Webpage Yes 5 [204], [239], [245], [253], [261] No 4 [203], [212], [236], [264] 3 [211], [213], [216] 3 [61], [217], [ [232] in [211] and [214] used Functional Magnetic Resonance Imaging (fMRI) and Electroencephalogram (EEG) to measure brain's electrical activity and an eye-tracker to have a better understanding of users' decision-making process. They used both existing phishing websites (by downloading and hosting them on their own network) and manually created ones.…”
Section: Selected User Study Literaturementioning
confidence: 99%
“…[266] 4 [225], [229], [247], [265] 2 [233], [252] 1 [219] No 6 [10], [230], [238], [249], [250], [258] 3 [242], [260], [263] Webpage Yes 5 [204], [239], [245], [253], [261] No 4 [203], [212], [236], [264] 3 [211], [213], [216] 3 [61], [217], [ [232] in [211] and [214] used Functional Magnetic Resonance Imaging (fMRI) and Electroencephalogram (EEG) to measure brain's electrical activity and an eye-tracker to have a better understanding of users' decision-making process. They used both existing phishing websites (by downloading and hosting them on their own network) and manually created ones.…”
Section: Selected User Study Literaturementioning
confidence: 99%
“…There are several user studies comparing phishing/spoofed and genuine websites, e.g., [2,3,10,32,25,45], a few works on comparing phishing and legitimate emails [34,24] (although there are several studies that examine various aspects of interaction with phishing emails alone, e.g., [11,12], which are well summarized in [25]), and quite a few on the effectiveness of training programs, e.g., [7,28,38]. The work on training programs is not directly within the scope of this research.…”
Section: Related Workmentioning
confidence: 99%
“…The work on training programs is not directly within the scope of this research. Work is scant on emails containing malware, but effectiveness of malware warnings was studied in [32]. Most studies have been conducted in laboratory settings, notable exceptions to this are [7,25,23,46].…”
Section: Related Workmentioning
confidence: 99%
“…Phishing detection schemes [38][39][40][41][42][43][44][45] that detect a phishing website, either through a web browser on the client side or via specific software at the host, or solutions that detect phishing at the server side are better than phishing prevention and user training schemes. This is because they have a minimal reliance on novice Internet users.…”
Section: Phishing Detection Schemesmentioning
confidence: 99%