Powered by OpenAIRE graph
Found an issue? Give us feedback
addClaim

Can Phishing Education Enable Users To Recognize Phishing Attacks?.

Authors: Alghamdi, Hanaa;

Can Phishing Education Enable Users To Recognize Phishing Attacks?.

Abstract

Phishing attacks have increased rapidly and caused many drastic damages and losses for internet users‟ .The purpose of this research is to investigate on effectiveness of phishing education and training to help users identify different forms of phishing threats. The study has been conducted through developing a phishing quiz mobile application which includes four kinds of phishing threats. It tested the ability of users to recognize spoofed emails, SMS phishing (SMshing), scam phone calls (Vishing), and phishing through social media networks. A comprehensive literature review was discussed to investigate on the research area, understand the research problem, support the proposed research work and identify the research gap to contribute in the body of knowledge. The aim of the study is to measure users‟ ability of recognizing phishing threats and evaluate the effectiveness of online anti-phishing educational materials. To achieve this objective, a phishing quiz mobile application has been designed to conduct pre- and post-test experiment to see if there is a significant difference in mean pre- and post-results of participants after phishing education and training materials. The study also addressed the phishing quiz mobile application design and its contents. The research findings revealed that the results of 43 subjects after imparting phishing education to participants, there observed no significant change in the test results. The research discussed factors that may affect the results e.g. difficulty in understanding the phishing educational materials. However, further investigation is needed to tackle these problems and several of avenues for further research are considered.

Country
Ireland
Keywords

Security training, Phishing Attack; Social Engineering; Security training; Spam; Phishing Education., 330, Social Engineering, Phishing Attack, Phishing Education, Computer Engineering, Spam, 004

  • BIP!
    Impact byBIP!
    selected citations
    These citations are derived from selected sources.
    This is an alternative to the "Influence" indicator, which also reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically).
    0
    popularity
    This indicator reflects the "current" impact/attention (the "hype") of an article in the research community at large, based on the underlying citation network.
    Average
    influence
    This indicator reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically).
    Average
    impulse
    This indicator reflects the initial momentum of an article directly after its publication, based on the underlying citation network.
    Average
Powered by OpenAIRE graph
Found an issue? Give us feedback
selected citations
These citations are derived from selected sources.
This is an alternative to the "Influence" indicator, which also reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically).
BIP!Citations provided by BIP!
popularity
This indicator reflects the "current" impact/attention (the "hype") of an article in the research community at large, based on the underlying citation network.
BIP!Popularity provided by BIP!
influence
This indicator reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically).
BIP!Influence provided by BIP!
impulse
This indicator reflects the initial momentum of an article directly after its publication, based on the underlying citation network.
BIP!Impulse provided by BIP!
0
Average
Average
Average
Green
Upload OA version
Are you the author of this publication? Upload your Open Access version to Zenodo!
It’s fast and easy, just two clicks!