2007
DOI: 10.1016/j.cose.2006.10.009
|View full text |Cite
|
Sign up to set email alerts
|

Phishing for user security awareness

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

2
101
0
1

Year Published

2007
2007
2022
2022

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 200 publications
(104 citation statements)
references
References 2 publications
2
101
0
1
Order By: Relevance
“…Firstly, we conducted an overview analysis which was coded using PHP, MySQL and a charting API called Highcharts. 4 We gained an overview of our population sample, of the time spent in our study, and also of other individual page results such as the rate of success and failure for each page (i.e., detection score). Secondly, using IBM's SPSS software, 5 we applied an ANOVA (analysis of variance) test for every user feature to determine whether any statistically significant difference of means among groups existed; here, groups relate to categories of the independent variables, such as male and female.…”
Section: Discussionmentioning
confidence: 99%
See 1 more Smart Citation
“…Firstly, we conducted an overview analysis which was coded using PHP, MySQL and a charting API called Highcharts. 4 We gained an overview of our population sample, of the time spent in our study, and also of other individual page results such as the rate of success and failure for each page (i.e., detection score). Secondly, using IBM's SPSS software, 5 we applied an ANOVA (analysis of variance) test for every user feature to determine whether any statistically significant difference of means among groups existed; here, groups relate to categories of the independent variables, such as male and female.…”
Section: Discussionmentioning
confidence: 99%
“…After all of these efforts however, researchers still note that there is a lack of existing anti-phishing solutions considered as an optimum [3], while some believe that no static technical defence measure can solely mitigate the threat introduced by user behaviour [4]. The fact is that perpetrators of phishing attacks are continuously adapting their tricks to find novel ways of causing losses to individuals and organisations [5,6].…”
mentioning
confidence: 99%
“…The authors noticed a failure rate of 42% in the initial experiment and 12% in the latter experiment which reflects the effectiveness of the phishing awareness training. Another group conducted a similar two-phase phishing experiment at the United States Military Academy at West Point, New York [26]. Experiment results also showed the ability of the participants to better identify the phishing attacks after the training sessions.…”
Section: Phishing Attacks In Uaementioning
confidence: 99%
“…[19], [20], and [21]. However, to the best of our knowledge, Colella and Colombini [22] are the only authors who-briefly-discussed security awareness to address threats related to pervasive computing.…”
Section: Operational Interruptionmentioning
confidence: 99%
“…This shows the limitation of security awareness programs in effectively improving the intuitive behavior towards security risks, which further supports the use of the suggested approaches to improve SDSC. Dodge et al investigated the response of military cadets in USA to the phishing attack [20]. They sent phishing attacks to the students-without previous announcement of the exercise, evaluated the responses, and alerted students about the result of the test.…”
Section: Spread the Knowledge About Security Threatsmentioning
confidence: 99%