How persuasive is a phishing email? A phishing game for phishing awareness

[1]  Rossouw von Solms,et al.  Phishing for phishing awareness , 2013, Behav. Inf. Technol..

[2]  Claes Wohlin,et al.  Experimentation in Software Engineering , 2012, Springer Berlin Heidelberg.

[3]  Lina Zhou,et al.  Phishing environments, techniques, and countermeasures: A survey , 2017, Comput. Secur..

[4]  Luis González Abril,et al.  Trojan horses in mobile devices , 2010, Comput. Sci. Inf. Syst..

[5]  Lorrie Faith Cranor,et al.  Phinding Phish: An Evaluation of Anti-Phishing Toolbars , 2007, NDSS.

[6]  George Loukas,et al.  You Are Probably Not the Weakest Link: Towards Practical Prediction of Susceptibility to Semantic Social Engineering Attacks , 2016, IEEE Access.

[7]  Sebastian Pape,et al.  Social engineering defence mechanisms and counteracting training strategies , 2017, Inf. Comput. Secur..

[8]  Michel Walrave,et al.  You've got mail! Explaining individual differences in becoming a phishing target , 2018, Telematics Informatics.

[9]  Martin Novak,et al.  Game-Based Learning: How to Make Math More Attractive by Using of Serious Game , 2017, CSOC.

[10]  T. L. Janssen,et al.  Exploring game design for cybersecurity training , 2012, 2012 IEEE International Conference on Cyber Technology in Automation, Control, and Intelligent Systems (CYBER).

[11]  Ana Ferreira,et al.  Principles of Persuasion in Social Engineering and Their Use in Phishing , 2015, HCI.

[12]  Norman M. Sadeh,et al.  Learning to detect phishing emails , 2007, WWW '07.

[13]  George Loukas,et al.  Detecting semantic social engineering attacks with the weakest link: Implementation and empirical evaluation of a human-as-a-security-sensor framework , 2018, Comput. Secur..

[14]  Abhishek Singhal,et al.  A literature survey on social engineering attacks: Phishing attack , 2016, 2016 International Conference on Computing, Communication and Automation (ICCCA).

[15]  Nicole C. Krämer,et al.  To gamify or not to gamify? An experimental field study of the influence of badges on motivation, activity, and performance in an online learning course , 2018, Comput. Educ..

[16]  Jianmin Wang,et al.  Design and preliminary evaluation of a cyber Security Requirements Education Game (SREG) , 2017, Inf. Softw. Technol..

[17]  J. Burgoon,et al.  Interpersonal Deception Theory , 1996 .

[18]  Steve Love,et al.  Security awareness of computer users: A phishing threat avoidance perspective , 2014, Comput. Hum. Behav..

[19]  Sonia Chiasson,et al.  "Smells Phishy?": An educational game about online phishing scams , 2016, 2016 APWG Symposium on Electronic Crime Research (eCrime).

[20]  Marianne Junger,et al.  Priming and warnings are not effective to prevent social engineering attacks , 2017, Comput. Hum. Behav..

[21]  Jemal H. Abawajy,et al.  User preference of cyber security awareness delivery methods , 2014, Behav. Inf. Technol..

[22]  Rui Zhao,et al.  Design and evaluation of the highly insidious extreme phishing attacks , 2017, Comput. Secur..

[23]  Aidan F. Browne,et al.  Survey of Non-malicious User Actions that Introduce Network and System Vulnerabilities and Exploits , 2018, SoutheastCon 2018.

[24]  Min Wu,et al.  Do security toolbars actually prevent phishing attacks? , 2006, CHI.

[25]  Ana C. R. Paiva,et al.  Software Engineering Management Education through Game Design Patterns , 2016 .

[26]  Lorrie Faith Cranor,et al.  School of phish: a real-world evaluation of anti-phishing training , 2009, SOUPS.

[27]  Kristian Beckers,et al.  A Serious Game for Eliciting Social Engineering Security Requirements , 2016, 2016 IEEE 24th International Requirements Engineering Conference (RE).

[28]  George R. S. Weir,et al.  A Semi-automated Security Advisory System to Resist Cyber-Attack in Social Networks , 2018, ICCCI.

[29]  Pieter H. Hartel,et al.  Spear phishing in organisations explained , 2017, Inf. Comput. Secur..

[30]  Shamal Faily,et al.  Persona-centred information security awareness , 2017, Comput. Secur..

[31]  Maurice Hendrix,et al.  Blended Game-Based Learning Environments: Extending a Serious Game into a Learning Content Management System , 2011, 2011 Third International Conference on Intelligent Networking and Collaborative Systems.

[32]  Edgar R. Weippl,et al.  Advanced social engineering attacks , 2015, J. Inf. Secur. Appl..

[33]  Robert LaRose,et al.  Understanding online safety behaviors: A protection motivation theory perspective , 2016, Comput. Secur..

[34]  Rami Puzis,et al.  Detecting Organization-Targeted Socialbots by Monitoring Social Network Profiles , 2018 .

[35]  Björn Regnell,et al.  Is role playing in Requirements Engineering Education increasing learning outcome? , 2017, Requirements Engineering.

[36]  Mathias Ekstedt,et al.  Shaping intention to resist social engineering through transformational leadership, information security culture and awareness , 2016, Comput. Secur..

[37]  Lorrie Faith Cranor,et al.  Cantina: a content-based approach to detecting phishing web sites , 2007, WWW '07.

[38]  Steve Love,et al.  A game design framework for avoiding phishing attacks , 2013, Comput. Hum. Behav..

[39]  Lorrie Faith Cranor,et al.  Anti-Phishing Phil: the design and evaluation of a game that teaches people not to fall for phish , 2007, SOUPS '07.

[40]  Choon Lin Tan,et al.  A survey of phishing attacks: Their types, vectors and technical approaches , 2018, Expert Syst. Appl..

[41]  Georgios Kambourakis,et al.  CyberAware: A mobile game-based app for cybersecurity education and awareness , 2015, 2015 International Conference on Interactive Mobile Communication Technologies and Learning (IMCL).

[42]  Joey F. George,et al.  Deception in the Case of One Sender and Multiple Receivers , 2004 .

[43]  Hein S. Venter,et al.  Social engineering attack examples, templates and scenarios , 2016, Comput. Secur..

[44]  Nicholas Micallef,et al.  Changing users' security behaviour towards security questions: A game based learning approach , 2017, 2017 Military Communications and Information Systems Conference (MilCIS).

[45]  Philip E. T. Lewis,et al.  Research Methods for Business Students , 2006 .

[46]  Marie-Francine Moens,et al.  New filtering approaches for phishing email , 2010, J. Comput. Secur..

[47]  Maria Freese Game-Based Learning – An approach for improving collaborative airport management , 2016 .

[48]  Chaoyun Liang,et al.  Is game-based learning better in flow experience and various types of cognitive load than non-game-based learning? Perspective from multimedia and media richness , 2017, Comput. Hum. Behav..

[49]  Floris Bex,et al.  Improving software design reasoning-A reminder card approach , 2018, J. Syst. Softw..

[50]  Andrea Back,et al.  The dark side of social networking sites: Understanding phishing risks , 2016, Comput. Hum. Behav..

[51]  Heinz Mandl,et al.  How gamification motivates: An experimental study of the effects of specific game design elements on psychological need satisfaction , 2017, Comput. Hum. Behav..

[52]  Andrew D. Huberman,et al.  A midline thalamic circuit determines reactions to visual threat , 2018, Nature.

[53]  Tina Morlok,et al.  Sharing is (not) Caring - the Role of External Privacy in Users' Information Disclosure Behaviors on Social Network sites , 2016, PACIS.

[54]  Abdelmadjid Bouabdallah,et al.  Energy-efficient mechanisms in security of the internet of things: A survey , 2017, Comput. Networks.

[55]  Markus Jakobsson,et al.  Understanding Social Engineering Based Scams , 2016, Springer New York.

[56]  Ejaz Ahmed,et al.  Investigating the influence of the most commonly used external variables of TAM on students' Perceived Ease of Use (PEOU) and Perceived Usefulness (PU) of e-portfolios , 2016, Comput. Hum. Behav..

[57]  Marti A. Hearst,et al.  Why phishing works , 2006, CHI.

[58]  Jukka Vuorinen,et al.  Dissecting social engineering , 2013, Behav. Inf. Technol..

[59]  Ranjit Kumar,et al.  Research Methodology: A Step-by-Step Guide for Beginners , 1999 .

[60]  Tadayoshi Kohno,et al.  Control-Alt-Hack: the design and evaluation of a card game for computer security awareness and education , 2013, CCS.

[61]  Markus Jakobsson,et al.  Mind your SMSes: Mitigating social engineering in second factor authentication , 2017, Comput. Secur..

[62]  Jianmin Wang,et al.  Improving software security awareness using a serious game , 2019, IET Softw..

[63]  David A. Elizondo,et al.  A renewed approach to serious games for cyber security , 2015, 2015 7th International Conference on Cyber Conflict: Architectures in Cyberspace.

[64]  Lorrie Faith Cranor,et al.  Decision strategies and susceptibility to phishing , 2006, SOUPS '06.

[65]  Shian-Shyong Tseng,et al.  Automatic content generation for anti-phishing education game , 2011, 2011 International Conference on Electrical and Control Engineering.

[66]  Mohsen Guizani,et al.  The rise of ransomware and emerging security challenges in the Internet of Things , 2017, Comput. Networks.

[67]  Maayan Zhitomirsky-Geffet,et al.  Professional information disclosure on social networks: The case of Facebook and LinkedIn in Israel , 2016, J. Assoc. Inf. Sci. Technol..

[68]  Jason Steer,et al.  Defending against spear-phishing , 2017 .

[69]  Kai Petersen,et al.  Worldviews, Research Methods, and their Relationship to Validity in Empirical Software Engineering Research , 2013, 2013 Joint Conference of the 23rd International Workshop on Software Measurement and the 8th International Conference on Software Process and Product Measurement.

[70]  Meihua Qian,et al.  Game-based Learning and 21st century skills: A review of recent research , 2016, Comput. Hum. Behav..

[71]  Awais Rashid,et al.  Panning for gold: Automatically analysing online social engineering attack surfaces , 2017, Comput. Secur..

[72]  Rose F. Gamble,et al.  CyberPhishing: A Game-Based Platform for Phishing Awareness Testing , 2015, 2015 48th Hawaii International Conference on System Sciences.

[73]  Nalin Asanka Gamagedara Arachchilage,et al.  Design a mobile game for home computer users to prevent from “phishing attacks” , 2011, International Conference on Information Society (i-Society 2011).