Phishing threat avoidance behaviour: An empirical investigation

被引:98
作者
Arachchilage, Nalin Asanka Gamagedara [1 ]
Love, Steve [2 ]
Beznosov, Konstantin [3 ]
机构
[1] Univ New S Wales, Australian Def Force Acad, UNSW Canberra, Australian Ctr Cyber Secur, Sydney, NSW 2052, Australia
[2] Glasgow Sch Art, Digital Design Studio, Glasgow, Lanark, Scotland
[3] Univ British Columbia, Vancouver, BC V5Z 1M9, Canada
关键词
Usable security; Security awareness; Phishing threats; Security education; Mobile learning; Game based learning; INFORMATION-TECHNOLOGY;
D O I
10.1016/j.chb.2016.02.065
中图分类号
B84 [心理学];
学科分类号
04 ; 0402 ;
摘要
Phishing is an online identity theft that aims to steal sensitive information such as username, password and online banking details from its victims. Phishing education needs to be considered as a means to combat this threat. This paper reports on a design and development of a mobile game prototype as an educational tool helping computer users to protect themselves against phishing attacks. The elements of a game design framework for avoiding phishing attacks were used to address the game design issues. Our mobile game design aimed to enhance the users' avoidance behaviour through motivation to protect themselves against phishing threats. A think-aloud study was conducted, along with a pre- and post-test, to assess the game design framework though the developed mobile game prototype. The study results showed a significant improvement of participants' phishing avoidance behaviour in their post-test assessment. Furthermore, the study findings suggest that participants' threat perception, safeguard effectiveness, self-efficacy, perceived severity and perceived susceptibility elements positively impact threat avoidance behaviour, whereas safeguard cost had a negative impact on it. (C) 2016 Elsevier Ltd. All rights reserved.
引用
收藏
页码:185 / 197
页数:13
相关论文
共 66 条
[1]   THE THEORY OF PLANNED BEHAVIOR [J].
AJZEN, I .
ORGANIZATIONAL BEHAVIOR AND HUMAN DECISION PROCESSES, 1991, 50 (02) :179-211
[2]  
Ajzen I., 1980, UNDERSTANDING ATTITU
[3]   Why phishing still works: User strategies for combating phishing attacks [J].
Alsharnouby, Mohamed ;
Alaca, Furkan ;
Chiasson, Sonia .
INTERNATIONAL JOURNAL OF HUMAN-COMPUTER STUDIES, 2015, 82 :69-82
[4]  
Amory A., 2003, South African Journal of Higher Education, V17, P206
[5]  
Anderson C. L., 2006, INT C INF SYST MILW, P1543
[6]  
[Anonymous], GLOBAL PHISHING SURV
[7]  
[Anonymous], 9 PAC AS C INF SYST
[8]  
[Anonymous], P 6 C DES INT SYST U
[9]  
[Anonymous], 2007, P SIGCHI C HUM FACT
[10]  
[Anonymous], 2006, P SIGCHI C HUM FACT, DOI 10.1145/1124772.1124861