How persuasive is a phishing email? A phishing game for phishing awareness
暂无分享,去创建一个
Affan Yasin | Rubia Fatima | Jianmin Wang | Lin Liu | Lin Liu | Jianmin Wang | Lin Liu | Jianmin Wang | Affan Yasin | R. Fatima
[1] Rossouw von Solms,et al. Phishing for phishing awareness , 2013, Behav. Inf. Technol..
[2] Claes Wohlin,et al. Experimentation in Software Engineering , 2012, Springer Berlin Heidelberg.
[3] Lina Zhou,et al. Phishing environments, techniques, and countermeasures: A survey , 2017, Comput. Secur..
[4] Luis González Abril,et al. Trojan horses in mobile devices , 2010, Comput. Sci. Inf. Syst..
[5] Lorrie Faith Cranor,et al. Phinding Phish: An Evaluation of Anti-Phishing Toolbars , 2007, NDSS.
[6] George Loukas,et al. You Are Probably Not the Weakest Link: Towards Practical Prediction of Susceptibility to Semantic Social Engineering Attacks , 2016, IEEE Access.
[7] Sebastian Pape,et al. Social engineering defence mechanisms and counteracting training strategies , 2017, Inf. Comput. Secur..
[8] Michel Walrave,et al. You've got mail! Explaining individual differences in becoming a phishing target , 2018, Telematics Informatics.
[9] Martin Novak,et al. Game-Based Learning: How to Make Math More Attractive by Using of Serious Game , 2017, CSOC.
[10] T. L. Janssen,et al. Exploring game design for cybersecurity training , 2012, 2012 IEEE International Conference on Cyber Technology in Automation, Control, and Intelligent Systems (CYBER).
[11] Ana Ferreira,et al. Principles of Persuasion in Social Engineering and Their Use in Phishing , 2015, HCI.
[12] Norman M. Sadeh,et al. Learning to detect phishing emails , 2007, WWW '07.
[13] George Loukas,et al. Detecting semantic social engineering attacks with the weakest link: Implementation and empirical evaluation of a human-as-a-security-sensor framework , 2018, Comput. Secur..
[14] Abhishek Singhal,et al. A literature survey on social engineering attacks: Phishing attack , 2016, 2016 International Conference on Computing, Communication and Automation (ICCCA).
[15] Nicole C. Krämer,et al. To gamify or not to gamify? An experimental field study of the influence of badges on motivation, activity, and performance in an online learning course , 2018, Comput. Educ..
[16] Jianmin Wang,et al. Design and preliminary evaluation of a cyber Security Requirements Education Game (SREG) , 2017, Inf. Softw. Technol..
[17] J. Burgoon,et al. Interpersonal Deception Theory , 1996 .
[18] Steve Love,et al. Security awareness of computer users: A phishing threat avoidance perspective , 2014, Comput. Hum. Behav..
[19] Sonia Chiasson,et al. "Smells Phishy?": An educational game about online phishing scams , 2016, 2016 APWG Symposium on Electronic Crime Research (eCrime).
[20] Marianne Junger,et al. Priming and warnings are not effective to prevent social engineering attacks , 2017, Comput. Hum. Behav..
[21] Jemal H. Abawajy,et al. User preference of cyber security awareness delivery methods , 2014, Behav. Inf. Technol..
[22] Rui Zhao,et al. Design and evaluation of the highly insidious extreme phishing attacks , 2017, Comput. Secur..
[23] Aidan F. Browne,et al. Survey of Non-malicious User Actions that Introduce Network and System Vulnerabilities and Exploits , 2018, SoutheastCon 2018.
[24] Min Wu,et al. Do security toolbars actually prevent phishing attacks? , 2006, CHI.
[25] Ana C. R. Paiva,et al. Software Engineering Management Education through Game Design Patterns , 2016 .
[26] Lorrie Faith Cranor,et al. School of phish: a real-world evaluation of anti-phishing training , 2009, SOUPS.
[27] Kristian Beckers,et al. A Serious Game for Eliciting Social Engineering Security Requirements , 2016, 2016 IEEE 24th International Requirements Engineering Conference (RE).
[28] George R. S. Weir,et al. A Semi-automated Security Advisory System to Resist Cyber-Attack in Social Networks , 2018, ICCCI.
[29] Pieter H. Hartel,et al. Spear phishing in organisations explained , 2017, Inf. Comput. Secur..
[30] Shamal Faily,et al. Persona-centred information security awareness , 2017, Comput. Secur..
[31] Maurice Hendrix,et al. Blended Game-Based Learning Environments: Extending a Serious Game into a Learning Content Management System , 2011, 2011 Third International Conference on Intelligent Networking and Collaborative Systems.
[32] Edgar R. Weippl,et al. Advanced social engineering attacks , 2015, J. Inf. Secur. Appl..
[33] Robert LaRose,et al. Understanding online safety behaviors: A protection motivation theory perspective , 2016, Comput. Secur..
[34] Rami Puzis,et al. Detecting Organization-Targeted Socialbots by Monitoring Social Network Profiles , 2018 .
[35] Björn Regnell,et al. Is role playing in Requirements Engineering Education increasing learning outcome? , 2017, Requirements Engineering.
[36] Mathias Ekstedt,et al. Shaping intention to resist social engineering through transformational leadership, information security culture and awareness , 2016, Comput. Secur..
[37] Lorrie Faith Cranor,et al. Cantina: a content-based approach to detecting phishing web sites , 2007, WWW '07.
[38] Steve Love,et al. A game design framework for avoiding phishing attacks , 2013, Comput. Hum. Behav..
[39] Lorrie Faith Cranor,et al. Anti-Phishing Phil: the design and evaluation of a game that teaches people not to fall for phish , 2007, SOUPS '07.
[40] Choon Lin Tan,et al. A survey of phishing attacks: Their types, vectors and technical approaches , 2018, Expert Syst. Appl..
[41] Georgios Kambourakis,et al. CyberAware: A mobile game-based app for cybersecurity education and awareness , 2015, 2015 International Conference on Interactive Mobile Communication Technologies and Learning (IMCL).
[42] Joey F. George,et al. Deception in the Case of One Sender and Multiple Receivers , 2004 .
[43] Hein S. Venter,et al. Social engineering attack examples, templates and scenarios , 2016, Comput. Secur..
[44] Nicholas Micallef,et al. Changing users' security behaviour towards security questions: A game based learning approach , 2017, 2017 Military Communications and Information Systems Conference (MilCIS).
[45] Philip E. T. Lewis,et al. Research Methods for Business Students , 2006 .
[46] Marie-Francine Moens,et al. New filtering approaches for phishing email , 2010, J. Comput. Secur..
[47] Maria Freese. Game-Based Learning – An approach for improving collaborative airport management , 2016 .
[48] Chaoyun Liang,et al. Is game-based learning better in flow experience and various types of cognitive load than non-game-based learning? Perspective from multimedia and media richness , 2017, Comput. Hum. Behav..
[49] Floris Bex,et al. Improving software design reasoning-A reminder card approach , 2018, J. Syst. Softw..
[50] Andrea Back,et al. The dark side of social networking sites: Understanding phishing risks , 2016, Comput. Hum. Behav..
[51] Heinz Mandl,et al. How gamification motivates: An experimental study of the effects of specific game design elements on psychological need satisfaction , 2017, Comput. Hum. Behav..
[52] Andrew D. Huberman,et al. A midline thalamic circuit determines reactions to visual threat , 2018, Nature.
[53] Tina Morlok,et al. Sharing is (not) Caring - the Role of External Privacy in Users' Information Disclosure Behaviors on Social Network sites , 2016, PACIS.
[54] Abdelmadjid Bouabdallah,et al. Energy-efficient mechanisms in security of the internet of things: A survey , 2017, Comput. Networks.
[55] Markus Jakobsson,et al. Understanding Social Engineering Based Scams , 2016, Springer New York.
[56] Ejaz Ahmed,et al. Investigating the influence of the most commonly used external variables of TAM on students' Perceived Ease of Use (PEOU) and Perceived Usefulness (PU) of e-portfolios , 2016, Comput. Hum. Behav..
[57] Marti A. Hearst,et al. Why phishing works , 2006, CHI.
[58] Jukka Vuorinen,et al. Dissecting social engineering , 2013, Behav. Inf. Technol..
[59] Ranjit Kumar,et al. Research Methodology: A Step-by-Step Guide for Beginners , 1999 .
[60] Tadayoshi Kohno,et al. Control-Alt-Hack: the design and evaluation of a card game for computer security awareness and education , 2013, CCS.
[61] Markus Jakobsson,et al. Mind your SMSes: Mitigating social engineering in second factor authentication , 2017, Comput. Secur..
[62] Jianmin Wang,et al. Improving software security awareness using a serious game , 2019, IET Softw..
[63] David A. Elizondo,et al. A renewed approach to serious games for cyber security , 2015, 2015 7th International Conference on Cyber Conflict: Architectures in Cyberspace.
[64] Lorrie Faith Cranor,et al. Decision strategies and susceptibility to phishing , 2006, SOUPS '06.
[65] Shian-Shyong Tseng,et al. Automatic content generation for anti-phishing education game , 2011, 2011 International Conference on Electrical and Control Engineering.
[66] Mohsen Guizani,et al. The rise of ransomware and emerging security challenges in the Internet of Things , 2017, Comput. Networks.
[67] Maayan Zhitomirsky-Geffet,et al. Professional information disclosure on social networks: The case of Facebook and LinkedIn in Israel , 2016, J. Assoc. Inf. Sci. Technol..
[68] Jason Steer,et al. Defending against spear-phishing , 2017 .
[69] Kai Petersen,et al. Worldviews, Research Methods, and their Relationship to Validity in Empirical Software Engineering Research , 2013, 2013 Joint Conference of the 23rd International Workshop on Software Measurement and the 8th International Conference on Software Process and Product Measurement.
[70] Meihua Qian,et al. Game-based Learning and 21st century skills: A review of recent research , 2016, Comput. Hum. Behav..
[71] Awais Rashid,et al. Panning for gold: Automatically analysing online social engineering attack surfaces , 2017, Comput. Secur..
[72] Rose F. Gamble,et al. CyberPhishing: A Game-Based Platform for Phishing Awareness Testing , 2015, 2015 48th Hawaii International Conference on System Sciences.
[73] Nalin Asanka Gamagedara Arachchilage,et al. Design a mobile game for home computer users to prevent from “phishing attacks” , 2011, International Conference on Information Society (i-Society 2011).