2018
DOI: 10.1007/978-3-030-05587-5_44
|View full text |Cite
|
Sign up to set email alerts
|

Simulating Phishing Email Processing with Instance-Based Learning and Cognitive Chunk Activation

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

2
8
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
3
2
1

Relationship

1
5

Authors

Journals

citations
Cited by 7 publications
(12 citation statements)
references
References 6 publications
2
8
0
Order By: Relevance
“…However, they only needed to find enough evidence of suspicion to correctly classify a phishing email. This seems to support a similar strategy used in the simulation study of nomultitasking users as reported in [6].…”
Section: Figure 4 Clustering Of Participants In the Multitasking Consupporting
confidence: 84%
“…However, they only needed to find enough evidence of suspicion to correctly classify a phishing email. This seems to support a similar strategy used in the simulation study of nomultitasking users as reported in [6].…”
Section: Figure 4 Clustering Of Participants In the Multitasking Consupporting
confidence: 84%
“…For clarity, the following sections outline the methodology only relevant to the subset of data used for the presented research. Other analyses on these data can be found in Shonman, Li, Zhang, and Dahbura (2018); Zhang, Singh, Li, Dahbura, and Xie (2018).…”
Section: Methodsmentioning
confidence: 99%
“…Our model of email sorting (in Shonman et al 2018 and in Section 3.2 below) adapts this work to describe step-by-step (cue-by-cue) processing of a suspicious email, adding additional parameters to introduce more complexity to each email judgment.…”
Section: Literature Reviewmentioning
confidence: 99%
“…In addition to predicting potential issues such as errors in decision making or delays in reaching a task goal, computational cognitive modeling sheds light into plausible causes, based on emerging cognitive conditions, to provide guidance toward an effective remedy. This paper builds upon our team's two recent efforts: a simulation study using computational cognitive modeling to examine cybersecurity decision-making (Shonman et al 2018) and a recent empirical study of users classifying emails as legitimate or phishing (Zhang et al 2018). The current work offers two contributions to this ongoing investigation:  We refine our original ACT-R-based cognitive model of phishing detection (Shonman et al 2018) by adding two model parameters to the original three, which lend greater complexity to our representations of both user perception of a suspect email and a user's past experience with phishing and legitimate emails.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation