Filters








39 Hits in 7.4 sec

Phishing IQ Tests Measure Fear, Not Ability [chapter]

Vivek Anandpara, Andrew Dingman, Markus Jakobsson, Debin Liu, Heather Roinestad
2007 Lecture Notes in Computer Science  
phishing IQ test) was an increased concern-not an increased ability.  ...  Therefore, the tests did not measure the ability of the subjects.  ...  Experiment We claim that phishing IQ tests do not work; phishing education makes one more paranoid and that phishing IQ tests measure this fear and not the ability to recognize phish.  ... 
doi:10.1007/978-3-540-77366-5_33 fatcat:qigyiatt6bcrzpaqlizjcswe5u

Mobile Users' Strategies for Managing Phishing Attacks

Rasha Salah El-Din, Paul Cairns, John Clark
2014 Journal of Management and Strategy  
phishing effective or successful and therefore how best to defend people from it.  ...  Phishing is the use of electronic media, like emails and SMS messages, to fraudulently elicit private information or obtain money under false pretence.  ...  The analysis also revealed that people mix between phishing and advertisements. This poses a risk for commercials and announcements from legitimate service providers.  ... 
doi:10.5430/jms.v5n2p70 fatcat:zlxf75xce5aqjagtkkwghs6rhi

Got Phished? Internet Security and Human Vulnerability

Sanjay Goel, Kevin Williams, Ersin Dincelli
2017 Journal of the AIS  
We manipulated the framing and content of email messages and tested the effects on users' susceptibility to phishing.  ...  The fear of losing or anticipation of gaining something valuable increased susceptibility to deception and vulnerability to phishing.  ...  Anandpara, Dingman, Jakobsson, Liu, and Roinestad (2007) contend that training individuals with phishing IQ tests is ineffective at improving susceptibility because it simply raises fears related to phishing  ... 
doi:10.17705/1jais.00447 fatcat:cvpdf5gncfffvpmrjrv6gnc4v4

Using Cartoons to Teach Internet Security

Sukamol Srikwan, Markus Jakobsson
2008 Cryptologia  
The current problem of online fraud is exasperated by the fact that most users make security decisions, such as whether to install a given piece of software or not, based on a very rudimentary understanding  ...  Last but not least, we want to thank Microsoft. This work was partially funded by the Microsoft Trusted Computing grant (2005).  ...  This approach, which can be thought of as an indirect educational approach, however, has been criticized [9] for not measuring the ability of the test taker as much as his or her fears of phishing.  ... 
doi:10.1080/01611190701743724 fatcat:ulxstpubmzhydnmpjevf2kklje

So long, and no thanks for the externalities

Cormac Herley
2009 Proceedings of the 2009 workshop on New security paradigms workshop - NSPW '09  
[53] find that users ignore the warnings provided by anti-phishing toolbars. Anandpara et al. [52] find that many phishing IQ tests measure fear but not ability to tell good sites from bad.  ...  The incremental cost of forcing users to choose an 8-character strong password, as opposed to allowing a 6-digit PIN, is hard to measure, but is certainly not zero.  ... 
doi:10.1145/1719030.1719050 dblp:conf/nspw/Herley09 fatcat:fdxvqwfy25fdblg6v3v5ng655m

Proceedings of the 15th annual Australian Conference on Personality and Individual Differences

Shane Costello
2017 Figshare  
When past research could not be located (e.g., not available in English), face validity indicators such as test name and task description were used to determine the CHC ability a particular test measured  ...  Five studies did not use a standardised cognitive or academic ability test as the criterion measure, three studies used an age-inappropriate child sample, and four studies were not written in English.  ... 
doi:10.6084/m9.figshare.4702291 fatcat:2uimbzsoxfgyfklxv4ganl7jju

A Situation Analysis on Cybercrime and its Economic Impact in Nigeria

Muhammad Ubale, Sulaiman Isyaku
2017 International Journal of Computer Applications  
fear the result of a hundred battles"  ...  Make it necessary to hire a different programmer to conduct different bug testing such as runtime error testing, program transformation testing, and other similar security tests.  ... 
doi:10.5120/ijca2017914788 fatcat:k5esu3f3cfd3bmyxir4m4cvnxm

To Deceive or Not to Deceive! Ethical Questions in Phishing Research

Rasha Salah El-Din
2012 unpublished
Controlled-Lab Studies Lab studies are often used to measure users' ability to detect phishing. It is also called 'Phishing IQ Tests'.  ...  That is due to the fact that many participants think the experiments are testing their abilities.  ... 
doi:10.14236/ewic/hci2012.72 fatcat:d7yuh5xy2jbpbdt7j44lbq4uoa

A Framework of Mobile Banking Adoption in India

Ashish Kumar, Sanjay Dhingra, Vikas Batra, Harish Purohit
2020 Journal of Open Innovation: Technology, Market and Complexity  
Along with the two constructs provided by TAM, four customer-oriented constructs have also been measured for this purpose.  ...  The scale thus adapted was tested for its reliability and validity by applying suitable tests. The measurement and structural models were tested using Smart PLS software.  ...  Self-Efficacy (SE) SE can be considered as "one's belief in one's ability to succeed in specific situations or accomplish a task."  ... 
doi:10.3390/joitmc6020040 fatcat:mxrph2wtqnamrcakskwd7eh6sm

Through the Net: Investigating How User Characteristics Influence Susceptibility to Phishing

Charlie Marriot
2018
take an online IQ test, giving the organisation access to a lot more of their data than they realised in the process (Clark, Adams, & Craven, 2018) .  ...  Research GapsPrevious studies have concentrated on testing individuals ability to discern phishing attacks from genuine emails or websites and little else.  ... 
doi:10.21427/d7gv4p fatcat:cnem5mkbhbb2lndsrlkdzsauhq

UNDERSTANDING MOBILE GOVERNMENT SUCCESS IN AN ARAB COUNTRY: FINDINGS FROM A QUALITATIVE STUDY

2018 Issues in Information Systems  
ACKNOWLEDGEMENTS This research was funded by Kuwait University, Research Grant IQ 01/17. The author acknowledges the Research Administration Project for its support.  ...  [Employee] While many interviewees expressed their fear when using the e.gov.kw and its mobile app, others did not express any fear risk perceptions: "I think that paying for online fines is not risky  ...  Privacy risks may be compromised by hacker phishing attacks.  ... 
doi:10.48009/2_iis_2018_185-198 fatcat:ythnsqipvbdclewtvaec6frx2a

Investigating the relationship between consumers' style of thinking and online victimization in scamming

Francesco Sofo, Michelle Berzins, Salvatore Ammirato, Antonio P. Volpentesta
2010 International Journal of Digital Content Technology and its Applications  
Thinking style profiles can be measured through specific inventories designed to test the preferences of an individual.  ...  By adopting infrastructural measures in conjunction with education and awareness strategies, internet users may feel empowered by their ability to safely enjoy the many benefits afforded by emerging technology  ... 
doi:10.4156/jdcta.vol4.issue7.4 fatcat:mx24h3j55jerdhikgus6viw55y

History of privacy [chapter]

Jan Holvast
2007 The History of Information Security  
It is not only privacy that is at stake but above all democracy.  ...  Not only is it a great concern that privacy is eroding but also that we are entering a surveillance society.  ...  The contents of communications are not covered by these measures.  ... 
doi:10.1016/b978-044451608-4/50028-6 fatcat:sadz4klisbbexcsgzy4ervrnz4

History of Privacy [chapter]

Jan Holvast
2009 IFIP Advances in Information and Communication Technology  
It is not only privacy that is at stake but above all democracy.  ...  Not only is it a great concern that privacy is eroding but also that we are entering a surveillance society.  ...  The contents of communications are not covered by these measures.  ... 
doi:10.1007/978-3-642-03315-5_2 fatcat:cylxn2kk5va35owrwoptr4c6cq

ICIMP 2013 The Eighth International Conference on Internet Monitoring and Protection ICIMP 2013 Committee ICMP Advisory Committee

Petre Dini, Michael Grottke, Go Hasegawa, Michael Grottke, Jonathan Blackledge, Matthias Brust, Christian Callegari, Ayad Keshlaf, Daniel Kumar, Andrew Kusiak, Muneer Masadeh, Bani Yassein (+15 others)
Forward The Eighth International Conference on Internet Monitoring and Protection (ICIMP 2013) held on   unpublished
Dedicated events focused on measurement, monitoring and lessons learnt in protecting the user.  ...  The creation of such high-quality conference program would not have been possible without their involvement.  ...  •Acustomdata file, which was prepared using a DARPA dump test file and some test files from the free license version of Traffic IQ Professional TM[21].• Snort version 2.9.1, and Bro version 1.5.1.The data  ... 
fatcat:kg2ufd2ggzfbvijwrbpyftzjnq
« Previous Showing results 1 — 15 out of 39 results