Training to Mitigate Phishing Attacks Using Mindfulness Techniques

被引:150
作者
Jensen, Matthew L. [1 ,2 ]
Dinger, Michael [3 ]
Wright, Ryan T. [4 ]
Thatcher, Jason Bennett [5 ,6 ,7 ]
机构
[1] Univ Oklahoma, Management Informat Syst, Norman, OK 73019 USA
[2] Univ Oklahoma, Ctr Appl Social Res, Norman, OK 73019 USA
[3] Univ South Carolina Upstate, Johnson Coll Business & Econ, Management, Spartanburg, SC USA
[4] Univ Virginia, McIntire Sch Commerce, Charlottesville, VA 22903 USA
[5] Clemson Univ, Informat Syst, Clemson, SC 29631 USA
[6] Univ Copenhagen, Informat Technol, Copenhagen, Denmark
[7] Assoc Informat Syst, Atlanta, GA USA
基金
美国国家科学基金会;
关键词
information security; mindfulness; mindlessness; phishing; security training; signal detection; INFORMATION-SYSTEMS; DECISION-MAKING; STRESS REDUCTION; COGNITIVE FIT; MODELS; VULNERABILITY; INTERVENTION; RELIABILITY; PREVENTION; PEOPLE;
D O I
10.1080/07421222.2017.1334499
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Phishing attacks are at a record high and are causing billions of dollars in losses. To mitigate phishing's impact, organizations often use rule-based training to teach individuals to identify certain cues or apply a set of rules to avoid phishing attacks. The rule-based approach has improved organizational defenses against phishing; however, regular repetition of rule-based training may not yield increasing resistance to attacks. To expand the toolkit available to combat phishing attacks, we used mindfulness theory to develop a novel training approach that can be performed after individuals are familiar with rule-based training. The mindfulness approach teaches individuals to dynamically allocate attention during message evaluation, increase awareness of context, and forestall judgment of suspicious messages-techniques that are critical to detecting phishing attacks in organizational settings, but are unaddressed in rule-based instruction. To evaluate the efficacy of our approach, we compared rule-based and mindfulness training programs in a field study at a U.S. university that involved 355 students, faculty, and staff who were familiar with phishing attacks and received regular rule-based guidance. To evaluate the robustness of the training, we delivered each program in text-only or text-plus-graphics formats. Ten days later, we conducted a phishing attack on participants that used both generic and customized phishing messages. We found that participants who received mindfulness training were better able to avoid the phishing attack. In particular, improvement was observed for participants who were already confident in their detection ability and those who reported low e-mail mindfulness and low perceptions of Internet risk. This work introduces and provides evidence supporting a new approach that may be used to develop anti-phishing training.
引用
收藏
页码:597 / 626
页数:30
相关论文
共 93 条
[61]   GENRE REPERTOIRE - THE STRUCTURING OF COMMUNICATIVE PRACTICES IN ORGANIZATIONS [J].
ORLIKOWSKI, WJ ;
YATES, J .
ADMINISTRATIVE SCIENCE QUARTERLY, 1994, 39 (04) :541-574
[62]   Building effective online marketplaces with institution-based trust [J].
Pavlou, PA ;
Gefen, D .
INFORMATION SYSTEMS RESEARCH, 2004, 15 (01) :37-59
[63]   A COMMENT ON PRESENTING RESULTS FROM LOGIT AND PROBIT MODELS [J].
PETERSEN, T .
AMERICAN SOCIOLOGICAL REVIEW, 1985, 50 (01) :130-131
[64]   Information Security: Facilitating User Precautions Vis-a-Vis Enforcement Against Attackers [J].
Png, Ivan P. L. ;
Wang, Qiu-Hong .
JOURNAL OF MANAGEMENT INFORMATION SYSTEMS, 2009, 26 (02) :97-121
[65]  
Polites GL, 2013, MIS QUART, V37, P221
[66]   Conceptualizing models using multidimensional constructs: a review and guidelines for their use [J].
Polites, Greta L. ;
Roberts, Nicholas ;
Thatcher, Jason .
EUROPEAN JOURNAL OF INFORMATION SYSTEMS, 2012, 21 (01) :22-48
[67]  
Puhakainen P, 2010, MIS QUART, V34, P757
[68]   Phishing counter measures and their effectiveness - Literature review [J].
Purkait, Swapan .
Information Management and Computer Security, 2012, 20 (05) :382-420
[69]  
Roberts N., 2007, P 13 AM C INF SYST K, P1
[70]  
Savvas A., 2012, 91 CYBERATTACKS BEGI