Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
research-article

What Mid-Career Professionals Think, Know, and Feel About Phishing: Opportunities for University IT Departments to Better Empower Employees in Their Anti-Phishing Decisions

Published: 16 April 2023 Publication History

Abstract

Phishing attacks, in which deceptive messages purporting to be from a legitimate contact are used to trick recipients and acquire sensitive information for the purposes of committing fraud, are a substantial and growing problem for organizations. IT departments and professionals may put in place a variety of institutional responses to thwart such attacks, but an organization's susceptibility to phishing also depends on the decisions and actions of individual employees. These employees may have little phishing expertise but still need to react to such attempts on a daily basis. Based on 24 semi-structured interviews with mid-career office workers (70.8% women, averaging 44 years old, with a bachelor's degree or more) at two universities in the midwestern United States, we find that employees self-describe a wide range of levels of awareness of, and confidence, competency and investment in, the organization's proscribed anti-phishing policies and practices. These employees also describe variation in the ways they would prefer to increase their perceived performance levels in all of these areas. In this paper, we argue that in order to empower employees to be better collaborators in an organization's anti-phishing efforts, organizations should embrace a range of efforts akin to the range of expertise among the users themselves. We make four such empowering recommendations for organizations to consider incorporating into their existing anti-phishing policies and practices, including suggestions to 1) embrace educating non-expert users more fully on organizational processes and consequences, 2) provide employees with a standing one-to-one communication channel between them and an IT phishing point-of-contact, 3) keep employees in the loop once phishing reports are made, and 4) avoid testing employees with "gotcha" assessments.

References

[1]
Anne Adams and Martina Angela Sasse. 1999. Users Are Not the Enemy. Commun. ACM, Vol. 42, 12 (dec 1999), 40--46. https://doi.org/10.1145/322796.322806
[2]
Elham Al Qahtani, Yousra Javed, Heather Lipford, and Mohamed Shehab. 2020. Do Women in Conservative Societies (Not) Follow Smartphone Security Advice? A Case Study of Saudi Arabia and Pakistan. In 2020 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW). IEEE, Virtual, 150--159.
[3]
Eirik Albrechtsen and Jan Hovden. 2009. The information security digital divide between information security managers and users. Computers & Security, Vol. 28, 6 (2009), 476--490.
[4]
Eirik Albrechtsen and Jan Hovden. 2010. Improving information security awareness and behaviour through dialogue, participation and collective reflection. An intervention study. Computers & Security, Vol. 29, 4 (2010), 432--445.
[5]
Kholoud Althobaiti, Adam D G Jenkins, and Kami Vaniea. 2021a. A Case Study of Phishing Incident Response in an Educational Organization. Proc. ACM Hum.-Comput. Interact., Vol. 5, CSCW2, Article 338 (oct 2021), 32 pages. https://doi.org/10.1145/3476079
[6]
Kholoud Althobaiti, Nicole Meng, and Kami Vaniea. 2021b. I Don't Need an Expert! Making URL Phishing Features Human Comprehensible. In Proceedings of the 2021 CHI Conference on Human Factors in Computing Systems. Association for Computing Machinery, New York, NY, USA, Article 695, 17 pages. https://doi-org.proxyiub.uits.iu.edu/10.1145/3411764.3445574
[7]
SYARULNAZIAH Anawar, DURGA L Kunasegaran, MOHD Z Mas'ud, and NURUL A Zakaria. 2019. Analysis of phishing susceptibility in a workplace: a big-five personality perspectives. J Eng Sci Technol, Vol. 14, 5 (2019), 2865--2882.
[8]
Debi Ashenden and Darren Lawrence. 2016. Security dialogues: Building better relationships between security and business. IEEE Security & Privacy, Vol. 14, 3 (2016), 82--87.
[9]
Ben K Beitin. 2012. Interview and sampling 2 ed.). Sage Thousand Oaks, CA, Oakland, California. 243--254 pages.
[10]
Mark Blythe, Helen Petrie, and John A. Clark. 2011. F for Fake: Four Studies on How We Fall for Phish. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (Vancouver, BC, Canada) (CHI '11). Association for Computing Machinery, New York, NY, USA, 3469--3478. https://doi.org/10.1145/1978942.1979459
[11]
Pablo J Boczkowski. 1999. Mutual shaping of users and technologies in a national virtual community. Journal of Communication, Vol. 49, 2 (1999), 86--108.
[12]
Alan Booth. 1972. Sex and social participation. American Sociological Review, Vol. 37, 2 (1972), 183--193.
[13]
Glenn A Bowen. 2008. Naturalistic inquiry and the saturation concept: a research note. Qualitative research, Vol. 8, 1 (2008), 137--152.
[14]
Jan-Willem Bullee, Lorena Montoya, Marianne Junger, and Pieter Hartel. 2017. Spear phishing in organisations explained. Information & Computer Security, Vol. 25, 5 (2017).
[15]
Spencer Cahill. 2001. Notably gendered relations. John Benjamins Publishing Company, Amsterdam/Philadelphia. 75--97 pages.
[16]
Kelly Caine. 2016. Local Standards for Sample Size at CHI. In Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems (San Jose, California, USA) (CHI '16). Association for Computing Machinery, New York, NY, USA, 981--992. https://doi.org/10.1145/2858036.2858498
[17]
Tracey Caldwell. 2013. Spear-phishing: how to spot and mitigate the menace. Computer Fraud & Security, Vol. 2013, 1 (2013), 11--16.
[18]
Anthony Carella, Murat Kotsoev, and Traian Marius Truta. 2017. Impact of security awareness training on phishing click-through rates. In 2017 IEEE International Conference on Big Data (Big Data). IEEE, Boston, MA, USA, 4458--4466.
[19]
Fiona Carroll, John Ayooluwa Adejobi, and Reza Montasari. 2022. How good are we at detecting a phishing attack? Investigating the evolving phishing attack email and why it continues to successfully deceive society. SN Computer Science, Vol. 3, 2 (2022), 1--10.
[20]
Kathy Charmaz. 2014. Constructing grounded theory. SAGE Publications Ltd., London.
[21]
Weiru Chen, Yuming He, Xin Tian, and Wu He. 2021. Exploring Cybersecurity Education at the K-12 Level. In SITE Interactive Conference. Association for the Advancement of Computing in Education (AACE), Online, 108--114.
[22]
John Clayton and Stephen J Macdonald. 2013. The limits of technology: Social class, occupation and digital inclusion in the city of Sunderland, England. Information, Communication & Society, Vol. 16, 6 (2013), 945--966.
[23]
Cofense. 2016. Enterprise Phishing Susceptibility Report: An Inside Look at Employee Behavior Pertaining to Highly-Effective Phishing Scenarios. Technical Report. Cofense Global Network. 13 pages. https://cofense.com/wp-content/uploads/2017/10/PhishMe_EnterprisePhishingSusceptibilityReport_2015_Final.pdf
[24]
Lizzie Coles-Kemp, Debi Ashenden, and Kieron O'Hara. 2018. Why Should I? Cybersecurity, the Security of the State and the Insecurity of the Citizen. Politics and Governance, Vol. 6, 2 (2018), 41--48.
[25]
Jonathan Coppola and Deanna House. 2019. Suspicion in Phishing and Organization Risk. In SAIS 2019 Proceedings. Association for Information Systems AIS Electronic Library (AISeL), Umeå, Sweden, 1--6.
[26]
Anastasia Danilova, Alena Naiakshina, and Matthew Smith. 2020. One size does not fit all: a grounded theory and online survey study of developer preferences for security warning types. In 2020 IEEE/ACM 42nd International Conference on Software Engineering (ICSE). IEEE, Seoul, Korea (South), 136--148.
[27]
Sanchari Das, Andrew Kim, Zachary Tingle, and Christena Nippert-Eng. 2019. All about phishing: Exploring user research through a systematic literature review. In Proceedings of the Thirteenth International Symposium on Human Aspects of Information Security & Assurance (HAISA 2019). Springer, Nicosia, Cyprus, 198--202.
[28]
Sauvik Das, Joanne Lo, Laura Dabbish, and Jason I. Hong. 2018. Breaking! A Typology of Security and Privacy News and How It's Shared. In Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems (Montreal QC, Canada) (CHI '18). Association for Computing Machinery, New York, NY, USA, 1--12. https://doi.org/10.1145/3173574.3173575
[29]
Marco De Bona and Federica Paci. 2020. A real world study on employees' susceptibility to phishing attacks. In Proceedings of the 15th International Conference on Availability, Reliability and Security. ACM, Virtual Event - Ireland, 1--10.
[30]
Alejandra Diaz, Alan T Sherman, and Anupam Joshi. 2020. Phishing in an academic community: A study of user susceptibility and behavior. Cryptologia, Vol. 44, 1 (2020), 53--67.
[31]
Verena Distler, Matthias Fassl, Hana Habib, Katharina Krombholz, Gabriele Lenzini, Carine Lallemand, Lorrie Faith Cranor, and Vincent Koenig. 2021. A Systematic Literature Review of Empirical Methods and Risk Representation in Usable Privacy and Security Research. ACM Transactions on Computer-Human Interaction (TOCHI), Vol. 28, 6 (2021), 1--50.
[32]
Ronald C Dodge Jr, Curtis Carver, and Aaron J Ferguson. 2007. Phishing for user security awareness. computers & security, Vol. 26, 1 (2007), 73--80.
[33]
Paul Dourish, Rebecca E Grinter, Jessica Delgado De La Flor, and Melissa Joseph. 2004. Security in the wild: user strategies for managing security as an everyday, practical problem. Personal and Ubiquitous Computing, Vol. 8, 6 (2004), 391--401.
[34]
Martina Dove. 2020. The psychology of fraud, persuasion and scam techniques the psychology of fraud, persuasion and scam techniques. Routledge, London, England.
[35]
John D'Arcy and Anat Hovav. 2009. Does one size fit all? Examining the differential effects of IS security countermeasures. Journal of business ethics, Vol. 89, 1 (2009), 59--71.
[36]
Serge Egelman. 2013. My profile is my password, verify me! The privacy/convenience tradeoff of Facebook Connect. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems. ACM, Paris, France, 2369--2378.
[37]
Michael Fagan and Mohammad Maifi Hasan Khan. 2016. Why Do They Do What They Do?: A Study of What Motivates Users to (Not) Follow Computer Security Advice. In Twelfth Symposium on Usable Privacy and Security (SOUPS 2016). USENIX Association, Denver, CO, 59--75. https://www.usenix.org/conference/soups2016/technical-sessions/presentation/fagan
[38]
Chris Fennell and Rick Wash. 2019. Do stories help people adopt two-factor authentication? Studies, Vol. 1, 2 (2019), 3.
[39]
Aaron J Ferguson. 2005. Fostering e-mail security awareness: The West Point carronade. Educause Quarterly, Vol. 28, 1 (2005), 54--57.
[40]
Gallup (Firm). 2016. Women in America: work and life well-lived. Gallup, Washington, District of Columbia. http://hdl.voced.edu.au/10707/420373
[41]
Kevin Gallagher, Sameer Patil, and Nasir Memon. 2017. New Me: Understanding Expert and Non-Expert Perceptions and Usage of the Tor Anonymity Network. In Thirteenth Symposium on Usable Privacy and Security (SOUPS 2017). USENIX Association, Santa Clara, CA, 385--398. https://www.usenix.org/conference/soups2017/technical-sessions/presentation/gallagher
[42]
Vaibhav Garg, L Jean Camp, Katherine Connelly, and Lesa Lorenzen-Huber. 2012. Risk communication design: Video vs. text. In International Symposium on Privacy Enhancing Technologies Symposium. Springer, Vigo, Spain, 279--298.
[43]
Les Gasser. 1986. The integration of computing and routine work. ACM Transactions on Information Systems (TOIS), Vol. 4, 3 (1986), 205--225.
[44]
Nina Gerber, Verena Zimmermann, Birgit Henhapl, Sinem Emeröz, and Melanie Volkamer. 2018. Finally johnny can encrypt: But does this make him feel more secure?. In Proceedings of the 13th International Conference on Availability, Reliability and Security. ACM, Hamburg, Germany, 1--10.
[45]
Connie JG Gersick, Jane E Dutton, and Jean M Bartunek. 2000. Learning from academia: The importance of relationships in professional life. Academy of Management Journal, Vol. 43, 6 (2000), 1026--1044.
[46]
Melissa Gilbert. 2010. Theorizing digital and urban inequalities: Critical geographies of ?race', gender and technological capital. Information, communication & society, Vol. 13, 7 (2010), 1000--1018.
[47]
Amy Gonzales. 2016. The contemporary US digital divide: from initial access to technology maintenance. Information, Communication & Society, Vol. 19, 2 (2016), 234--248.
[48]
William J Gordon, Adam Wright, Robert J Glynn, Jigar Kadakia, Christina Mazzone, Elizabeth Leinbach, and Adam Landman. 2019. Evaluation of a mandatory phishing training program for high-risk employees at a US healthcare system. Journal of the American Medical Informatics Association, Vol. 26, 6 (2019), 547--552.
[49]
Kristen K Greene, Michelle P Steves, Mary F Theofanos, Jennifer Kostick, et al. 2018. User context: an explanatory variable in phishing susceptibility. In in Proceedings of the 2018 Workshop Usable Security. National Institute of Standards and Technology (NIST), San Diego, California, United States.
[50]
Anti-Phishing Working Group. 2021a. Phishing Activity Trends Report: 3rd Quarter. APWG. https://docs.apwg.org/reports/apwg_trends_report_q3_2021.pdf
[51]
Anti-Phishing Working Group. 2021b. Phishing Activity Trends Report: 4th Quarter. APWG. https://docs.apwg.org/reports/apwg_trends_report_q4_2020.pdf
[52]
Tzipora Halevi, Nasir Memon, and Oded Nov. 2015. Spear-phishing in the wild: A real-world study of personality, phishing self-efficacy and vulnerability to spear-phishing attacks. In Phishing Self-Efficacy and Vulnerability to Spear-Phishing Attacks (January 2, 2015). SSRN, Online, 1--10.
[53]
S Duke Han, Patricia A Boyle, Bryan D James, Lei Yu, and David A Bennett. 2016. Mild cognitive impairment and susceptibility to scams in old age. Journal of Alzheimer's Disease, Vol. 49, 3 (2016), 845--851.
[54]
Julie M. Haney and Wayne G. Lutters. 2018. "It's Scary...It's Confusing...It's Dull": How Cybersecurity Advocates Overcome Negative Perceptions of Security. In Proceedings of the Fourteenth USENIX Conference on Usable Privacy and Security (Baltimore, MD, USA) (SOUPS '18). USENIX Association, USA, 411--425.
[55]
Ryan Heartfield, George Loukas, and Diane Gan. 2016. You are probably not the weakest link: Towards practical prediction of susceptibility to semantic social engineering attacks. IEEE Access, Vol. 4 (2016), 6910--6928.
[56]
Ryan Heartfield, George Loukas, and Diane Gan. 2017. An eye for deception: A case study in utilizing the human-as-a-security-sensor paradigm to detect zero-day semantic social engineering attacks. In 2017 IEEE 15th international conference on software engineering research, management and applications (SERA). IEEE, London, UK, 371--378.
[57]
Cormac Herley. 2009. So long, and no thanks for the externalities: the rational rejection of security advice by users. In Proceedings of the 2009 workshop on New security paradigms workshop. ACM, New York, NY, United States, 133--144.
[58]
Masayuki Higashino. 2019. A Design of an Anti-Phishing Training System Collaborated with Multiple Organizations. In Proceedings of the 21st International Conference on Information Integration and Web-Based Applications & Services (Munich, Germany) (iiWAS2019). Association for Computing Machinery, New York, NY, USA, 589--592. https://doi.org/10.1145/3366030.3366086
[59]
Helen M Hodgetts and Dylan M Jones. 2006. Interruption of the Tower of London task: support for a goal-activation approach. Journal of Experimental Psychology: General, Vol. 135, 1 (2006), 103.
[60]
Tom N Jagatic, Nathaniel A Johnson, Markus Jakobsson, and Filippo Menczer. 2007. Social phishing. Commun. ACM, Vol. 50, 10 (2007), 94--100.
[61]
Mohammad S Jalali, Maike Bruckes, Daniel Westmattelmann, and Gerhard Schewe. 2020. Why employees (still) click on phishing links: investigation in hospitals. Journal of medical Internet research, Vol. 22, 1 (2020), e16775.
[62]
Bryan D James, Patricia A Boyle, and David A Bennett. 2014. Correlates of susceptibility to scams in older adults without dementia. Journal of elder abuse & neglect, Vol. 26, 2 (2014), 107--122.
[63]
Daniel Jampen, Gürkan Gür, Thomas Sutter, and Bernhard Tellenbach. 2020. Don't click: towards an effective anti-phishing training. A comparative literature review. Human-centric Computing and Information Sciences, Vol. 10, 1 (2020), 1--41.
[64]
Lori J Jarmon. 2014. Cracking the glass ceiling: A phenomenological study of women administrators in higher education. Ph.,D. Dissertation. Iowa State University.
[65]
Giti Javidi and Ehsan Sheybani. 2018. K-12 Cybersecurity education, research, and outreach. In 2018 IEEE Frontiers in Education Conference (FIE). IEEE, San Jose, CA, USA, 1--5.
[66]
Matthew Jensen, Alexandra Durcikova, and Ryan Wright. 2017. Combating phishing attacks: A knowledge management approach. In Proceedings of the 50th Hawaii International Conference on System Sciences. ScholarSpace, Hawaii.
[67]
Byung Cho Kim and Yong Wan Park. 2012. Security versus convenience? An experimental study of user misperceptions of wireless internet service quality. Decision Support Systems, Vol. 53, 1 (2012), 1--11.
[68]
Morgan Klaus Scheuerman, Katta Spiel, Oliver L Haimson, Foad Hamidi, and Stacy M Branham. 2019. HCI Guidelines for Gender Equity and Inclusivity. Version 1.1. https://www.morgan-klaus.com/gender-guidelines.html.
[69]
Ross Koppel, Tosha Wetterneck, Joel Leon Telles, and Ben-Tzion Karsh. 2008. Workarounds to barcode medication administration systems: their occurrences, causes, and threats to patient safety. Journal of the American Medical Informatics Association, Vol. 15, 4 (2008), 408--423.
[70]
Topias Koski. 2021. Increase in remote work: effects on phishing. Ph.,D. Dissertation. University of Jyväskylä.
[71]
Ponnurangam Kumaraguru, Justin Cranshaw, Alessandro Acquisti, Lorrie Cranor, Jason Hong, Mary Ann Blair, and Theodore Pham. 2009. School of phish: a real-world evaluation of anti-phishing training. In Proceedings of the 5th Symposium on Usable Privacy and Security. ACM, Mountain View, California, USA, 1--12.
[72]
Ponnurangam Kumaraguru, Yong Rhee, Alessandro Acquisti, Lorrie Faith Cranor, Jason Hong, and Elizabeth Nunge. 2007. Protecting People from Phishing: The Design and Evaluation of an Embedded Training Email System. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (San Jose, California, USA) (CHI '07). Association for Computing Machinery, New York, NY, USA, 905--914. https://doi.org/10.1145/1240624.1240760
[73]
Ponnurangam Kumaraguru, Steve Sheng, Alessandro Acquisti, Lorrie Faith Cranor, and Jason Hong. 2008. Lessons from a real world evaluation of anti-phishing training. In 2008 eCrime Researchers Summit. IEEE, Atlanta, GA, USA, 1--12.
[74]
Youngsun Kwak, Seyoung Lee, Amanda Damiano, and Arun Vishwanath. 2020. Why do users not report spear phishing emails? Telematics and Informatics, Vol. 48 (2020), 101343. https://doi.org/10.1016/j.tele.2020.101343
[75]
Daniele Lain, Kari Kostiainen, and Srdjan vC apkun. 2022. Phishing in organizations: Findings from a large-scale and long-term study. In 2022 IEEE Symposium on Security and Privacy (SP). IEEE, San Francisco, CA, USA, 842--859.
[76]
Airi Lampinen, Vilma Lehtinen, Asko Lehmuskallio, and Sakari Tamminen. 2011. We're in It Together: Interpersonal Management of Disclosure in Social Network Services. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (Vancouver, BC, Canada) (CHI '11). Association for Computing Machinery, New York, NY, USA, 3217--3226. https://doi.org/10.1145/1978942.1979420
[77]
Michael R Lehrfeld. 2014. Phishing E-Mails--Six Month Investigation into What People Click. Association Supporting Computer Users in Education, Vol. 1, 1 (2014), 62.
[78]
Zhihui Liu, Lina Zhou, and Dongsong Zhang. 2020. Effects of Demographic Factors on Phishing Victimization in the Workplace. In PACIS. Association for Information Systems (AIS), Dubai, UAE, 75.
[79]
Ponemon Institute LLC. 2021. The 2021 Cost of Phishing Study. ProofPoint. https://www.proofpoint.com/sites/default/files/analyst-reports/pfpt-us-ar-ponemon-2021-cost-of-phishing-study.pdf
[80]
Michaela Luecke and Judith Simon. 2014. A Self-Regulatory Approach to Behavioral Compliance with IS Security Policies--?Come on, Baby, do the Locomotion". AiSeL, Vol. 1, 1 (2014), 32.
[81]
Mark Mason et al. 2010. Sample size and saturation in PhD studies using qualitative interviews. Methods for Qualitative Management Research in the Context of Social Systems Thinking, Vol. 11, 3 (2010), 1--19.
[82]
Nora McDonald, Sarita Schoenebeck, and Andrea Forte. 2019. Reliability and inter-rater reliability in qualitative research: Norms and guidelines for CSCW and HCI practice. Proceedings of the ACM on human-computer interaction, Vol. 3, CSCW (2019), 1--23.
[83]
Lindsay Miarmi and Kenneth G DeBono. 2007. The Impact of Distractions on Heuristic Processing: Internet Advertisements and Stereotype Use 1. Journal of Applied Social Psychology, Vol. 37, 3 (2007), 539--548.
[84]
Harvey Molotch. 2014. Against Security: How We Go Wrong at Airports, Subways, and Other Sites of Ambiguous Danger-Updated Edition. Princeton University Press, Princeton, New Jersey.
[85]
Steve Morgan. 2021. Cybercrime to cost the world $10.5 trillion annually by 2025. https://cybersecurityventures.com/cybercrime-damages-6-trillion-by-2021/
[86]
Katelin A Moul. 2019. Avoid Phishing Traps. In Proceedings of the 2019 ACM SIGUCCS Annual Conference (New Orleans, LA, USA) (SIGUCCS '19). Association for Computing Machinery, New York, NY, USA, 199--208. https://doi.org/10.1145/3347709.3347774
[87]
Ajaya Neupane, Kiavash Satvat, Nitesh Saxena, Despina Stavrinos, and Haley Johnson Bishop. 2018. Do Social Disorders Facilitate Social Engineering? A Case Study of Autism and Phishing Attacks. In Proceedings of the 34th Annual Computer Security Applications Conference (San Juan, PR, USA) (ACSAC '18). Association for Computing Machinery, New York, NY, USA, 467--477. https://doi.org/10.1145/3274694.3274730
[88]
James Nicholson, Lynne Coventry, and Pamela Briggs. 2019. "If It's Important It Will Be A Headline": Cybersecurity Information Seeking in Older Adults. In Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems. Association for Computing Machinery, New York, NY, USA, 1--11. https://doi-org.proxyiub.uits.iu.edu/10.1145/3290605.3300579
[89]
Calvin Nobles. 2018. Botching human factors in cybersecurity in business organizations. HOLISTICA--Journal of Business and Public Administration, Vol. 9, 3 (2018), 71--88.
[90]
Norbert Nthala and Rick Wash. 2021. How Non-Experts Try to Detect Phishing Scam Emails. In Workshop on Consumer Protection. IEEE, Virtual, 7 pages.
[91]
Patrick G Nyeste and Christopher B Mayhorn. 2010. Training users to counteract phishing. Proceedings of the Human Factors and Ergonomics Society Annual Meeting, Vol. 54, 23 (2010), 1956--1960.
[92]
Justin Petelka, Yixin Zou, and Florian Schaub. 2019. Put Your Warning Where Your Link Is: Improving and Evaluating Email Phishing Warnings. In Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems (Glasgow, Scotland Uk) (CHI '19). Association for Computing Machinery, New York, NY, USA, 1--15. https://doi.org/10.1145/3290605.3300748
[93]
Clay Posey, Tom L Roberts, Paul Benjamin Lowry, and Ross T Hightower. 2014. Bridging the divide: A qualitative comparison of information security thought patterns between information security professionals and ordinary organizational insiders. Information & management, Vol. 51, 5 (2014), 551--567.
[94]
Ward Priestman, Tony Anstis, Isabel G Sebire, Shankar Sridharan, and Neil J Sebire. 2019. Phishing in healthcare organisations: Threats, mitigation and approaches. BMJ health & care informatics, Vol. 26, 1 (2019).
[95]
Issa Qabajeh, Fadi Thabtah, and Francisco Chiclana. 2018. A recent review of conventional vs. automated cybersecurity anti-phishing techniques. Computer Science Review, Vol. 29 (2018), 44--55. https://doi.org/10.1016/j.cosrev.2018.05.003
[96]
Emilee Rader, Rick Wash, and Brandon Brooks. 2012. Stories as Informal Lessons about Security. In Proceedings of the Eighth Symposium on Usable Privacy and Security (Washington, D.C.) (SOUPS '12). Association for Computing Machinery, New York, NY, USA, Article 6, 17 pages. https://doi.org/10.1145/2335356.2335364
[97]
Belle Rose Ragins and Doan E Winkel. 2011. Gender, emotion and power in work relationships. Human Resource Management Review, Vol. 21, 4 (2011), 377--393.
[98]
James W. Ragucci and Stefan A. Robila. 2006. Societal Aspects of Phishing. In 2006 IEEE International Symposium on Technology and Society. IEEE, Queens, NY, USA, 1--5. https://doi.org/10.1109/ISTAS.2006.4375893
[99]
Prashanth Rajivan, Pablo Moriano, Timothy Kelley, and L Jean Camp. 2017. Factors in an end user security expertise instrument. Information & Computer Security, Vol. 25, 2 (2017).
[100]
Elissa M. Redmiles, Sean Kross, and Michelle L. Mazurek. 2016a. How I Learned to Be Secure: A Census-Representative Survey of Security Advice Sources and Behavior. In Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security (Vienna, Austria) (CCS '16). Association for Computing Machinery, New York, NY, USA, 666--677. https://doi.org/10.1145/2976749.2978307
[101]
Elissa M. Redmiles, Sean Kross, and Michelle L. Mazurek. 2016b. How I Learned to Be Secure: A Census-Representative Survey of Security Advice Sources and Behavior. In Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security (Vienna, Austria) (CCS '16). Association for Computing Machinery, New York, NY, USA, 666--677. https://doi.org/10.1145/2976749.2978307
[102]
Lena Reinfelder, Robert Landwirth, and Zinaida Benenson. 2019. Security managers are not the enemy either. In Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems. ACM, New York, NY, United States, 1--7.
[103]
Benjamin Reinheimer, Lukas Aldag, Peter Mayer, Mattia Mossano, Reyhan Duezguen, Bettina Lofthouse, Tatiana Von Landesberger, and Melanie Volkamer. 2020. An investigation of phishing awareness and education over time: When and how to best remind users. In Sixteenth Symposium on Usable Privacy and Security (SOUPS 2020). USENIX, Virtual, 259--284.
[104]
Fabio Rizzoni, Sabina Magalini, Alessandra Casaroli, Pasquale Mari, Matt Dixon, and Lynne Coventry. 2022. Phishing simulation exercise in a large hospital: A case study. Digital Health, Vol. 8 (2022), 20552076221081716.
[105]
Laura Robinson, Jeremy Schulz, Grant Blank, Massimo Ragnedda, Hiroshi Ono, Bernie Hogan, Gustavo Mesch, Shelia R Cotten, Susan B Kretchmer, Timothy M Hale, et al. 2020. Digital inequalities 2.0: Legacy inequalities in the information age. First Monday, Vol. 25, 7 (2020).
[106]
Nic Sarginson. 2020. Securing your remote workforce against new phishing attacks. Computer Fraud & Security, Vol. 2020, 9 (2020), 9--12.
[107]
Yukiko Sawaya, Mahmood Sharif, Nicolas Christin, Ayumu Kubota, Akihiro Nakarai, and Akira Yamada. 2017. Self-Confidence Trumps Knowledge: A Cross-Cultural Study of Security Behavior. In Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems (Denver, Colorado, USA) (CHI '17). Association for Computing Machinery, New York, NY, USA, 2202--2214. https://doi.org/10.1145/3025453.3025926
[108]
Michael Schrage. 1997. The Squandered Computer: Evaluating the Business Alignment of Information Technologies. Harvard Business Review, Vol. 75, 5 (1997), 178--181.
[109]
Hamidreza Shahbaznezhad, Farzan Kolini, and Mona Rashidirad. 2021. Employees' behavior in phishing attacks: what individual, organizational, and technological factors matter? Journal of Computer Information Systems, Vol. 61, 6 (2021), 539--550.
[110]
Steve Sheng, Levi Broderick, Colleen Alison Koranda, and Jeremy J Hyland. 2006. Why johnny still can't encrypt: evaluating the usability of email encryption software. In Symposium On Usable Privacy and Security. Association for Computing Machinery (ACM), Pittsburgh, PA, 3--4.
[111]
Steve Sheng, Mandy Holbrook, Ponnurangam Kumaraguru, Lorrie Faith Cranor, and Julie Downs. 2010. Who Falls for Phish? A Demographic Analysis of Phishing Susceptibility and Effectiveness of Interventions. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (Atlanta, Georgia, USA) (CHI '10). Association for Computing Machinery, New York, NY, USA, 373--382. https://doi.org/10.1145/1753326.1753383
[112]
Steve Sheng, Bryant Magnien, Ponnurangam Kumaraguru, Alessandro Acquisti, Lorrie Faith Cranor, Jason Hong, and Elizabeth Nunge. 2007. Anti-Phishing Phil: The Design and Evaluation of a Game That Teaches People Not to Fall for Phish. In Proceedings of the 3rd Symposium on Usable Privacy and Security (Pittsburgh, Pennsylvania, USA) (SOUPS '07). Association for Computing Machinery, New York, NY, USA, 88--99. https://doi.org/10.1145/1280680.1280692
[113]
James Shires. 2018. Enacting expertise: Ritual and risk in cybersecurity. Politics and Governance, Vol. 6, 2 (2018), 31--40.
[114]
Robin W Simon and Anne E Barrett. 2010. Nonmarital romantic relationships and mental health in early adulthood: Does the association differ for women and men? Journal of Health and Social Behavior, Vol. 51, 2 (2010), 168--182.
[115]
Mikko Siponen, M Adam Mahmood, and Seppo Pahnila. 2014. Employees' adherence to information security policies: An exploratory field study. Information & management, Vol. 51, 2 (2014), 217--224.
[116]
GUNIKHAN SONOWAL. 2021. PHISHING AND COMMUNICATION CHANNELS a guide to identifying and mitigating phishing attacks. APRESS, S.l.
[117]
Nathalie Stembert, Arne Padmos, Mortaza S. Bargh, Sunil Choenni, and Frans Jansen. 2015. A Study of Preventing Email (Spear) Phishing by Enabling Human Intelligence. In 2015 European Intelligence and Security Informatics Conference. Institute of Electrical and Electronics Engineers (IEEE), Manchester, UK, 113--120. https://doi.org/10.1109/EISIC.2015.38
[118]
Jerry Chih-Yuan Sun, Shih-Jou Yu, Sunny SJ Lin, and Shian-Shyong Tseng. 2016. The mediating effect of anti-phishing self-efficacy between college students' internet self-efficacy and anti-phishing behavior and gender difference. Computers in Human Behavior, Vol. 59 (2016), 249--257.
[119]
Phyllis Tharenou. 2005. Does mentor support increase women's career advancement more than men's? The differential effects of career and psychosocial support. Australian Journal of management, Vol. 30, 1 (2005), 77--109.
[120]
S Bruce Thomson. 2010. Sample size and grounded theory. Thomson, SB (2010). Grounded Theory-Sample Size. Journal of Administration and Governance, Vol. 5, 1 (2010), 45--52.
[121]
Silas Formunyuy Verkijika. 2019. ?If you know what to do, will you take action to avoid mobile phishing attacks": Self-efficacy, anticipated regret, and gender. Computers in Human Behavior, Vol. 101 (2019), 286--296.
[122]
Jessica Vitak, Yuting Liao, Mega Subramaniam, and Priya Kumar. 2018. 'I Knew It Was Too Good to Be True" The Challenges Economically Disadvantaged Internet Users Face in Assessing Trustworthiness, Avoiding Scams, and Developing Self-Efficacy Online. Proceedings of the ACM on human-computer interaction, Vol. 2, CSCW (2018), 1--25.
[123]
Kathleen D Vohs, Roy F Baumeister, Brandon J Schmeichel, Jean M Twenge, Noelle M Nelson, and Dianne M Tice. 2018. Making choices impairs subsequent self-control: A limited-resource account of decision making, self-regulation, and active initiative. In Self-regulation and self-control. Routledge, London, 45--77.
[124]
Mengli Wang and Lipeng Song. 2021. An Incentive Mechanism for Reporting Phishing E-Mails Based on the Tripartite Evolutionary Game Model. Security and Communication Networks, Vol. 2021 (2021), 3394325.
[125]
David Warburton. 2020. Phishing Attacks Soar 220% During COVID-19 Peak as Cybercriminal Opportunism Intensifies. https://www.f5.com/company/news/features/phishing-attacks-soar-220--during-covid-19-peak-as-cybercriminal
[126]
Rick Wash. 2020. How Experts Detect Phishing Scam Emails. Proc. ACM Hum.-Comput. Interact., Vol. 4, CSCW2, Article 160 (oct 2020), 28 pages. https://doi.org/10.1145/3415231
[127]
Rick Wash and Molly M. Cooper. 2018. Who Provides Phishing Training? Facts, Stories, and People Like Me. In Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems. Association for Computing Machinery, New York, NY, USA, 1--12. https://doi-org.proxyiub.uits.iu.edu/10.1145/3173574.3174066
[128]
Rick Wash, Norbert Nthala, and Emilee Rader. 2021. Knowledge and Capabilities that $$Non-Expert$$ Users Bring to Phishing Detection. In Seventeenth Symposium on Usable Privacy and Security (SOUPS 2021). USENIX Association, Virtual, 377--396.
[129]
Zikai Alex Wen, Zhiqiu Lin, Rowena Chen, and Erik Andersen. 2019. What.Hack: Engaging Anti-Phishing Training Through a Role-Playing Phishing Simulation Game. Association for Computing Machinery, New York, NY, USA, 1--12. https://doi.org/10.1145/3290605.3300338
[130]
Tegg Westbrook. 2021. Home security and emergency response: The Convenience vs Security Trade-off. Salus Journal, Vol. 9, 1 (2021), 66--74.
[131]
Alma Whitten and J. D. Tygar. 1999. Why Johnny Can't Encrypt: A Usability Evaluation of PGP 5.0. In Proceedings of the 8th Conference on USENIX Security Symposium - Volume 8 (Washington, D.C.) (SSYM'99). USENIX Association, USA, 14.
[132]
Emma J Williams, Joanne Hinds, and Adam N Joinson. 2018. Exploring susceptibility to phishing in the workplace. International Journal of Human-Computer Studies, Vol. 120 (2018), 1--13.
[133]
Emma J Williams and Adam N Joinson. 2020. Developing a measure of information seeking about phishing. Journal of Cybersecurity, Vol. 6, 1 (2020), tyaa001.
[134]
Paul H Wright. 1982. Men's friendships, women's friendships and the alleged inferiority of the latter. Sex roles, Vol. 8, 1 (1982), 1--20.
[135]
Ryan Wright, Steven L Johnson, and Brent Kitchens. 2020. A Multi-Level Contextualized View of Phishing Susceptibility. Available at SSRN 3622310 (2020).
[136]
Angela M Young and David Hurlic. 2007. Gender enactment at work: The importance of gender and gender-related behavior to person-organizational fit and career decisions. Journal of Managerial Psychology, Vol. 22, 2 (2007), 168--187.
[137]
Yixin Zou, Abraham H Mhaidli, Austin McCall, and Florian Schaub. 2018. "Itextquoterightve Got Nothing to Lose": Consumerstextquoteright Risk Perceptions and Protective Actions after the Equifax Data Breach. In Fourteenth Symposium on Usable Privacy and Security (SOUPS 2018). USENIX Association, Baltimore, MD, 197--216. https://www.usenix.org/conference/soups2018/presentation/zou
[138]
Mary Ellen Zurko. 2005. User-centered security: Stepping up to the grand challenge. In 21st Annual Computer Security Applications Conference (ACSAC'05). IEEE, Tucson, AZ, USA, 14--pp.

Cited By

View all
  • (2025)Understanding practitioners’ challenges and requirements in the design, implementation, and evaluation of anti-phishing interventionsJournal of Systems and Software10.1016/j.jss.2025.112356225(112356)Online publication date: Jul-2025
  • (2024)Enhancing Personalised Cybersecurity Guidance for Older Adults in IrelandCompanion Publication of the 2024 Conference on Computer-Supported Cooperative Work and Social Computing10.1145/3678884.3681894(478-484)Online publication date: 11-Nov-2024
  • (2024)User-Centered Phishing Detection through Personalized Edge ComputingCompanion Publication of the 2024 Conference on Computer-Supported Cooperative Work and Social Computing10.1145/3678884.3681864(283-287)Online publication date: 11-Nov-2024
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image Proceedings of the ACM on Human-Computer Interaction
Proceedings of the ACM on Human-Computer Interaction  Volume 7, Issue CSCW1
CSCW
April 2023
3836 pages
EISSN:2573-0142
DOI:10.1145/3593053
Issue’s Table of Contents
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 16 April 2023
Published in PACMHCI Volume 7, Issue CSCW1

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. IT departments
  2. anti-phishing policy
  3. anti-phishing training
  4. human factors
  5. organizational security
  6. organizations
  7. phishing
  8. security
  9. user studies
  10. work context
  11. workplace

Qualifiers

  • Research-article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)159
  • Downloads (Last 6 weeks)19
Reflects downloads up to 28 Feb 2025

Other Metrics

Citations

Cited By

View all
  • (2025)Understanding practitioners’ challenges and requirements in the design, implementation, and evaluation of anti-phishing interventionsJournal of Systems and Software10.1016/j.jss.2025.112356225(112356)Online publication date: Jul-2025
  • (2024)Enhancing Personalised Cybersecurity Guidance for Older Adults in IrelandCompanion Publication of the 2024 Conference on Computer-Supported Cooperative Work and Social Computing10.1145/3678884.3681894(478-484)Online publication date: 11-Nov-2024
  • (2024)User-Centered Phishing Detection through Personalized Edge ComputingCompanion Publication of the 2024 Conference on Computer-Supported Cooperative Work and Social Computing10.1145/3678884.3681864(283-287)Online publication date: 11-Nov-2024
  • (2024)Securing the Web: Analysis of HTTP Security Headers in Popular Global WebsitesInformation Systems Security10.1007/978-3-031-80020-7_5(87-106)Online publication date: 16-Dec-2024
  • (2023)“It may take ages”: Understanding Human-Centred Lateral Phishing Attack Detection in OrganisationsProceedings of the 2023 European Symposium on Usable Security10.1145/3617072.3617116(344-355)Online publication date: 16-Oct-2023

View Options

Login options

Full Access

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media