2007
DOI: 10.1007/978-3-540-77366-5_33
|View full text |Cite
|
Sign up to set email alerts
|

Phishing IQ Tests Measure Fear, Not Ability

Abstract: We argue that phishing IQ tests fail to measure susceptibility to phishing attacks. We conducted a study where 40 subjects were asked to answer a selection of questions from existing phishing IQ tests in which we varied the portion (from 25% to 100%) of the questions that corresponded to phishing emails. We did not find any correlation between the actual number of phishing emails and the number of emails that the subjects indicated were phishing. Therefore, the tests did not measure the ability of the subjects… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
18
0

Year Published

2007
2007
2019
2019

Publication Types

Select...
4
3
1

Relationship

1
7

Authors

Journals

citations
Cited by 42 publications
(18 citation statements)
references
References 9 publications
0
18
0
Order By: Relevance
“…Interview studies have been conducted to gain insights into users' mental models and decision processes [7,18]. Laboratory experimental studies where participants played a fictitious role and used personal information associated with that role have been used to test users' susceptibility to phishing attacks and evaluate the effectiveness of anti-phishing toolbars and training materials [2,6,14,19,20,21,31]. Laboratory experimental studies where participants used their own credentials have been used to evaluate the effectiveness of mutual authentication tools [30].…”
Section: User Study Methodsmentioning
confidence: 99%
“…Interview studies have been conducted to gain insights into users' mental models and decision processes [7,18]. Laboratory experimental studies where participants played a fictitious role and used personal information associated with that role have been used to test users' susceptibility to phishing attacks and evaluate the effectiveness of anti-phishing toolbars and training materials [2,6,14,19,20,21,31]. Laboratory experimental studies where participants used their own credentials have been used to evaluate the effectiveness of mutual authentication tools [30].…”
Section: User Study Methodsmentioning
confidence: 99%
“…Others have commented that education is not a feasible solution for phishing and other security attacks because security education "puts the burden on the wrong shoulder" [Nielsen 2004] and security is a secondary goal for users [Evers 2006]. Furthermore, evaluations of some security-related educational materials have found these materials to be ineffective [Anandpara et al 2007;Jackson et al 2007]. In general, we found that existing online anti-phishing training materials tend to make users more cautious about opening and acting upon email, but do not teach people how to determine whether a website or email is fradulent (See Section 4).…”
Section: Training Users Not To Fall For Attacksmentioning
confidence: 99%
“…Users are scored based on how well they can identify which emails are legitimate and which are not. However, while this approach raises awareness about phishing, a user study found that it is not an effective training method [Anandpara et al 2007]. Nonetheless, the idea of integrating self tests with other anti-phishing training materials warrants further examination.…”
Section: Training Users Not To Fall For Attacksmentioning
confidence: 99%
“…Typical users know to an even lesser extent that it may be clicked to display a certificate containing information about the purported identity of the website, along with information on the identity of the authority which is vouching for its identity. 1 The result is that when users visit phishing sites, the lack of appropriate cryptographic authentication is not noticed, and users tend to rely on indicators that they have come to trust in the non-digital world, such as the presence of brand logos and other look-and-feel branding intangibles, regardless of how inapplicable these indicators are as authenticators in the digital realm. A further, or more detailed explanation of the general phishing problem is beyond the scope of the current presentation, but interested readers are directed to [28] for comprehensive coverage of the issue.…”
Section: Why Phishing Workmentioning
confidence: 99%