2014
DOI: 10.1109/msp.2013.106
|View full text |Cite
|
Sign up to set email alerts
|

Going Spear Phishing: Exploring Embedded Training and Awareness

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

2
129
1

Year Published

2016
2016
2020
2020

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 191 publications
(147 citation statements)
references
References 4 publications
2
129
1
Order By: Relevance
“…There are only a few studies in the literature using embedded, simulated phishing in the user's normal computing environment during their normal work day: [4], [8], [16], and [17]. These studies were set in the real world using operationally-situated study settings, but were focused on investigating training materials and click rates, not on participant click-decision factors.…”
Section: A Background Researchmentioning
confidence: 99%
See 2 more Smart Citations
“…There are only a few studies in the literature using embedded, simulated phishing in the user's normal computing environment during their normal work day: [4], [8], [16], and [17]. These studies were set in the real world using operationally-situated study settings, but were focused on investigating training materials and click rates, not on participant click-decision factors.…”
Section: A Background Researchmentioning
confidence: 99%
“…These studies were set in the real world using operationally-situated study settings, but were focused on investigating training materials and click rates, not on participant click-decision factors. The studies described in [4] and [16] primarily looked at the efficacy of embedded awareness training. Those reported in [8] and [17] focused on the startling number of users who clicked in their respective operational environments.…”
Section: A Background Researchmentioning
confidence: 99%
See 1 more Smart Citation
“…This work focuses on context aware attacks and introduces a strategy for educating users by combining phishing IQ tests and class discussions. However not all potential victims have the advantage of formal classroom training and simply presenting the information in an email or a webpage is of limited effectiveness [14] To explore the effectiveness of embedded training, researchers conducted a large-scale experiment that tracked workers' reactions to a series of carefully crafted spear phishing emails and a variety of immediate training and awareness activities [15]. Based on behavioral science findings, the experiment included four different training conditions, each of which used a different type of message framing.…”
Section: Human Detectionmentioning
confidence: 99%
“…All the related works [6][7][8][9][10][11][12][13][14] show the effect of phishing and the need to counterattack this security threat. In fact, detecting phishing websites through visual similarity works well in general.…”
Section: Related Workmentioning
confidence: 99%