Tips, Tricks, and Training: Supporting Anti-Phishing Awareness among Mid-Career Office Workers Based on Employees' Current Practices

被引:6
作者
Tally, Anne C. [1 ]
Abbott, Jacob [1 ]
Bochner, Ashley [1 ]
Das, Sanchari [2 ]
Nippert-Eng, Christena [1 ]
机构
[1] Indiana Univ, Bloomington, IN 47405 USA
[2] Univ Denver, Denver, CO USA
来源
PROCEEDINGS OF THE 2023 CHI CONFERENCE ON HUMAN FACTORS IN COMPUTING SYSTEMS, CHI 2023 | 2023年
关键词
phishing; phishing education; informal learning; guerrilla learning; organizations; organizational security; anti-phishing training; qualitative user studies; IT departments; workplace; work context; human factors; security; cybersecurity; SECURITY; WORKPLACE; SELECTION; EMAIL; GAME;
D O I
10.1145/3544548.3580650
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Preventing workplace phishing depends on the actions of every employee, regardless of cybersecurity expertise. Based on 24 semi-structured interviews with mid-career office workers (70.8% women, averaging 44 years old) at two U.S. universities, we found that less than 21% of our participants had any formal anti-phishing training. Much of what our participants know about phishing comes from informal sources that emphasize "tips" and "tricks" like those found in conversations with friends, news stories, newsletters, social media, and podcasts. These informal channels provide opportunities for IT professionals wishing to enhance employees' anti-phishing awareness by better aligning the delivery of expert advice with employees' current practices and desires. We provide four recommendations designed to embrace "guerrilla learning" by distributing anti-phishing educational resources across the workplace and workday in part to encourage the delivery of more accurate information in more informal and incidental ways, and greater dialogue between anti-phishing training instructors and learners.
引用
收藏
页数:13
相关论文
共 105 条
[1]   SURPRISE [J].
Adler, Jonathan E. .
EDUCATIONAL THEORY, 2008, 58 (02) :149-173
[2]  
Al-Daeef MM., 2017, P WORLD C ENG
[3]   Phishing environments, techniques, and countermeasures: A survey [J].
Aleroud, Ahmed ;
Zhou, Lina .
COMPUTERS & SECURITY, 2017, 68 :160-196
[4]   A Multi-Classifier Network-Based Crypto Ransomware Detection System: A Case Study of Locky Ransomware [J].
Almashhadani, Ahmad O. ;
Kaiiali, Mustafa ;
Sezer, Sakir ;
O'Kane, Philip .
IEEE ACCESS, 2019, 7 :47053-47067
[5]   An Anti-Phishing Approach that Uses Training Intervention for Phishing Websites Detection [J].
Alnajim, Abdullah ;
Munro, Malcolm .
PROCEEDINGS OF THE 2009 SIXTH INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY: NEW GENERATIONS, VOLS 1-3, 2009, :405-410
[6]  
[Anonymous], 2010, FORUM QUAL SOZIALFOR
[7]  
[Anonymous], 2010, FORUM QUAL SOZIALFOR, DOI DOI 10.17169/FQS-11.3.1428
[8]  
Anti-Phishing Working Group, 2021, Phishing Activity Trends Report, 1st Quarter 2021
[9]   A game design framework for avoiding phishing attacks [J].
Arachchilage, Nalin Asanka Gamagedara ;
Love, Steve .
COMPUTERS IN HUMAN BEHAVIOR, 2013, 29 (03) :706-714
[10]  
Bada Maria, 2020, Emerging Cyber Threats and Cognitive Vulnerabilities, P73, DOI DOI 10.1016/B978-0-12-816203-3.00004-6