ABSTRACT
In this paper, we begin by discussing the challenges associated with phishing email simulations. In part, we note how challenging it is to achieve realism in such a simulation and what this may mean for the results obtained. Next, we detail a real-world phishing simulation that targeted participants involved in an unrelated research project.
- M. Dupuis. Cyber security for everyone: An introductory course for non-technical majors. Journal of Cybersecurity Education, Research, and Practice, 2017(1, Article 3), 2017.Google Scholar
- M. Dupuis and R. Crossler. The compromise of one's personal information: Trait affect as an antecedent in explaining the behavior of individuals. In Proceedings of the 52nd Hawaii International Conference on System Sciences, page 4841--4850. IEEE, 2019.Google ScholarCross Ref
- B. Harrison, E. Svetieva, and A. Vishwanath. Individual processing of phishing emails. Online Information Review, 40:265--281, Apr. 2016.Google ScholarCross Ref
- S. Kleitman. It's the deceiver and the receiver: Individual differences in phishing susceptibility and false positives with item profiling, Oct. 2018.Google Scholar
- R. C. Miller and M. Wu. Fighting Phishing at the User Interface, page 275--292. O'Reilly, 2005.Google Scholar
Index Terms
- Clickthrough Testing for Real-World Phishing Simulations
Recommendations
How Experts Detect Phishing Scam Emails
CSCWPhishing scam emails are emails that pretend to be something they are not in order to get the recipient of the email to undertake some action they normally would not. While technical protections against phishing reduce the number of phishing emails ...
Mitigating Phishing Attacks: An Overview
ACM SE '19: Proceedings of the 2019 ACM Southeast ConferenceSocial engineering is the process of getting a person to provide a service or complete a task that may give away private or confidential information. Phishing is the most common type of social engineering. In phishing, an attacker poses as a trustworthy ...
Status Update on Phishing Emails Awareness: Jordanian Case
ICEMIS'21: The 7th International Conference on Engineering & MIS 2021Abstract—This study is a response to the rapid proliferation of high-risk phishing emails, representing one of the most dangerous cybercrimes and the primary medium for the deception of online users. This study aims to investigate the various ...
Comments