Effectiveness of and user preferences for security awareness training methodologies

被引:34
作者
Tschakert, Kai Florian [1 ]
Ngamsuriyaroj, Sudsanguan [1 ]
机构
[1] Mahidol Univ, Fac Informat & Commun Technol, Bangkok, Thailand
关键词
Computer science; Education; Cyber attack; Computer fraud; Computer security training; Information security; Phishing; Security awareness training; Cyber security;
D O I
10.1016/j.heliyon.2019.e02010
中图分类号
O [数理科学和化学]; P [天文学、地球科学]; Q [生物科学]; N [自然科学总论];
学科分类号
07 ; 0710 ; 09 ;
摘要
Phishing is a primary vector used in cyber-attacks, and current technical measures are not sufficient to reduce their success to an acceptable level. Empowering users to identify phishing emails is crucial; thus, anti-phishing training is essential. We investigate participant phishing susceptibility in a 2 x 2 mixed factorial design to determine if instructor-led classroom training, in addition to a multiple approach video-, game-, and text-based training package, offers a significant difference in susceptibility reduction compared with the absence of classroom training. The results suggest an insignificant improvement in reducing phishing susceptibility by incorporating classroom training. Furthermore, we observe a significant preference from the participants for one training method (i.e., classroom training) only if a decision for one particular method was required.
引用
收藏
页数:10
相关论文
共 46 条
[1]  
Aaron G., 2014, ANTIPHISHING WORK GR, V1, P2014
[2]  
AARP Academy, 2016, WHAT IS PHISH DO I P
[3]   User preference of cyber security awareness delivery methods [J].
Abawajy, Jemal .
BEHAVIOUR & INFORMATION TECHNOLOGY, 2014, 33 (03) :236-247
[4]  
Abawajy J, 2010, COMM COM INF SC, V122, P142
[5]   An Anti-Phishing Approach that Uses Training Intervention for Phishing Websites Detection [J].
Alnajim, Abdullah ;
Munro, Malcolm .
PROCEEDINGS OF THE 2009 SIXTH INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY: NEW GENERATIONS, VOLS 1-3, 2009, :405-410
[6]   Why phishing still works: User strategies for combating phishing attacks [J].
Alsharnouby, Mohamed ;
Alaca, Furkan ;
Chiasson, Sonia .
INTERNATIONAL JOURNAL OF HUMAN-COMPUTER STUDIES, 2015, 82 :69-82
[7]  
Anandpara V, 2007, LECT NOTES COMPUT SC, V4886, P362, DOI 10.1007/978-3-540-77366-5_33
[8]  
[Anonymous], R: What is R?
[9]  
[Anonymous], 2015, K KIWIHEAD CYBER BAN
[10]  
[Anonymous], 2016, COMPUT FRAUD SEC MAY