A policy analysis of phishing countermeasures

[1]  Nick Feamster,et al.  Understanding the network-level behavior of spammers , 2006, SIGCOMM 2006.

[2]  Tyler Moore,et al.  Evil Searching: Compromise and Recompromise of Internet Hosts for Phishing , 2009, Financial Cryptography.

[3]  Lorrie Faith Cranor,et al.  Protecting people from phishing: the design and evaluation of an embedded training email system , 2007, CHI.

[4]  Jason I. Hong,et al.  A hybrid phish detection approach by identity discovery and keywords retrieval , 2009, WWW '09.

[5]  Niels Provos,et al.  A framework for detection and measurement of phishing attacks , 2007, WORM '07.

[6]  Richard E. Mayer,et al.  Multimedia Learning , 2001, Visible Learning Guide to Student Achievement.

[7]  Lorrie Faith Cranor,et al.  School of phish: a real-world evaluation of anti-phishing training , 2009, SOUPS.

[8]  Sean W. Smith,et al.  Trusted paths for browsers , 2002, TSEC.

[9]  Huseyin Cavusoglu,et al.  Configuration of Detection Software: A Comparison of Decision and Game Theory Approaches , 2004, Decis. Anal..

[10]  Ponnurangam Kumaraguru,et al.  Who falls for phish?: a demographic analysis of phishing susceptibility and effectiveness of interventions , 2010, CHI.

[11]  Lorrie Faith Cranor,et al.  A Framework for Reasoning About the Human in the Loop , 2008, UPSEC.

[12]  Dan Boneh,et al.  Stronger Password Authentication Using Browser Extensions , 2005, USENIX Security Symposium.

[13]  Lorrie Faith Cranor,et al.  Teaching Johnny not to fall for phish , 2010, TOIT.

[14]  Stefan Gorling,et al.  The Myth of User Education , 2006 .

[15]  Lorrie Faith Cranor,et al.  Phinding Phish: An Evaluation of Anti-Phishing Toolbars , 2007, NDSS.

[16]  John C. Mitchell,et al.  Client-Side Defense Against Web-Based Identity Theft , 2004, NDSS.

[17]  D. Mackinnon,et al.  Estimating Mediated Effects in Prevention Studies , 1993 .

[18]  Tyler Moore,et al.  Temporal Correlations between Spam and Phishing Websites , 2009, LEET.

[19]  A. Emigh,et al.  Online Identity Theft: Phishing Technology, Chokepoints and Countermeasures , 2005 .

[20]  Suku Nair,et al.  A comparison of machine learning techniques for phishing detection , 2007, eCrime '07.

[21]  J. Santelli,et al.  Adolescent health : understanding and preventing risk behaviors , 2009 .

[22]  Stuart E. Schechter,et al.  The Emperor's New Security Indicators , 2007, 2007 IEEE Symposium on Security and Privacy (SP '07).

[23]  Min Wu,et al.  Web wallet: preventing phishing attacks by revealing user intentions , 2006, SOUPS '06.

[24]  Tim Berners-Lee,et al.  Uniform Resource Locators , 1994 .

[25]  Marti A. Hearst,et al.  Why phishing works , 2006, CHI.

[26]  Lorrie Faith Cranor,et al.  Anti-Phishing Phil: the design and evaluation of a game that teaches people not to fall for phish , 2007, SOUPS '07.

[27]  Lorrie Faith Cranor,et al.  Decision strategies and susceptibility to phishing , 2006, SOUPS '06.

[28]  Gary Klein,et al.  Sources of Power: How People Make Decisions , 2017 .

[29]  Lorrie Faith Cranor,et al.  Improving phishing countermeasures: An analysis of expert interviews , 2009, 2009 eCrime Researchers Summit.

[30]  Clark N Quinn,et al.  Engaging Learning: Designing e-Learning Simulation Games , 2005 .

[31]  Markus Jakobsson,et al.  Invasive browser sniffing and countermeasures , 2006, WWW '06.

[32]  Tyler Moore,et al.  The Economics of Information Security , 2006, Science.

[33]  James C. Lester,et al.  The Case for Social Agency in Computer-Based Teaching: Do Students Learn More Deeply When They Interact With Animated Pedagogical Agents? , 2001 .

[34]  Norman M. Sadeh,et al.  Learning to detect phishing emails , 2007, WWW '07.

[35]  Christopher Krügel,et al.  On the Effectiveness of Techniques to Detect Phishing Sites , 2007, DIMVA.

[36]  Tyler Moore,et al.  The consequence of non-cooperation in the fight against phishing , 2008, 2008 eCrime Researchers Summit.

[37]  Bruce Schneier,et al.  Inside risks: semantic network attacks , 2000, CACM.

[38]  Lawrence A. Gordon,et al.  The economics of information security investment , 2002, TSEC.

[39]  Michael P. Gallaher,et al.  Private Sector Cyber Security Investment: An Empirical Analysis , 2006, WEIS.

[40]  Neil Salkind Encyclopedia of Measurement and Statistics , 2006 .

[41]  Adrian Perrig,et al.  Phoolproof Phishing Prevention , 2006, Financial Cryptography.

[42]  V. Reyna,et al.  Risk and Rationality in Adolescent Decision Making , 2006, Psychological science in the public interest : a journal of the American Psychological Society.

[43]  E. Weber,et al.  A Domain-Specific Risk-Taking (DOSPERT) Scale for Adult Populations , 2006, Judgment and Decision Making.

[44]  J. Doug Tygar,et al.  The battle against phishing: Dynamic Security Skins , 2005, SOUPS '05.

[45]  Hiroshi Nakajima,et al.  We learn better together: enhancing eLearning with emotional characters , 2005, CSCL.

[46]  Cormac Herley,et al.  A profitless endeavor: phishing as tragedy of the commons , 2009, NSPW '08.

[47]  M. Eric Johnson,et al.  Information Security in the Extended Enterprise: Some Initial Results From a Field Study of an Industrial Firm , 2005, WEIS.

[48]  Lorrie Faith Cranor,et al.  Cantina: a content-based approach to detecting phishing web sites , 2007, WWW '07.

[49]  Paul C. van Oorschot,et al.  On instant messaging worms, analysis and countermeasures , 2005, WORM '05.

[50]  Amir Herzberg,et al.  Protecting (even) Naïve Web Users, or: Preventing Spoofing and Establishing Credentials of Web Sites , 2004 .

[51]  Xuhua Ding,et al.  Anomaly Based Web Phishing Page Detection , 2006, 2006 22nd Annual Computer Security Applications Conference (ACSAC'06).

[52]  Lorrie Faith Cranor,et al.  You've been warned: an empirical study of the effectiveness of web browser phishing warnings , 2008, CHI.

[53]  James Paul Gee,et al.  What video games have to teach us about learning and literacy , 2007, CIE.

[54]  Lorrie Faith Cranor,et al.  An Empirical Analysis of Phishing Blacklists , 2009, CEAS 2009.

[55]  Stefan Savage,et al.  An inquiry into the nature and causes of the wealth of internet miscreants , 2007, CCS '07.

[56]  Ka-Ping Yee,et al.  Passpet: convenient password management and phishing protection , 2006, SOUPS '06.

[57]  Kristopher J Preacher,et al.  Asymptotic and resampling strategies for assessing and comparing indirect effects in multiple mediator models , 2008, Behavior research methods.

[58]  K. Koedinger,et al.  Comparing Instructional Strategies for Integrating Conceptual and Procedural Knowledge. , 2002 .

[59]  Min Wu,et al.  Do security toolbars actually prevent phishing attacks? , 2006, CHI.

[60]  Lorrie Faith Cranor,et al.  Getting users to pay attention to anti-phishing education: evaluation of retention and transfer , 2007, eCrime '07.

[61]  Eric A. Posner,et al.  Holding Internet Service Providers Accountable , 2006, Supreme Court Economic Review.

[62]  Alexander Repenning,et al.  Playing a Game: The Ecology of Designing, Building and Testing Games as Educational Activities , 2005 .

[63]  Aaron Emigh The Crimeware Landscape: Malware, Phishing, Identity Theft and Beyond , 2006, J. Digit. Forensic Pract..