메뉴 건너뛰기




Volumn , Issue , 2007, Pages 905-914

Protecting people from phishing: The design and evaluation of an embedded training email system

Author keywords

Email; Embedded training; Phishing; Situated learning; Usable privacy and security

Indexed keywords

COMPUTER CRIME; ELECTRONIC MAIL; SECURITY OF DATA; WEBSITES;

EID: 35348906237     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1240624.1240760     Document Type: Conference Paper
Times cited : (230)

References (40)
  • 2
    • 0002004285 scopus 로고    scopus 로고
    • Anderson, J. R., M. R. Lynne and Herbert A. Simon. 1996. Situated Learning and Education. Educational Researcher. Vo. 25, No.4, pp. 5-11.
    • Anderson, J. R., M. R. Lynne and Herbert A. Simon. 1996. Situated Learning and Education. Educational Researcher. Vo. 25, No.4, pp. 5-11.
  • 3
    • 34548344520 scopus 로고    scopus 로고
    • Anti-Phishing Working Group
    • Anti-Phishing Working Group. Phishing Activity Trends Report. 2006. http://www.antiphishing.org/reports/apwg_report_jan_2006.pdf.
    • (2006) Phishing Activity Trends Report
  • 4
    • 35348816136 scopus 로고    scopus 로고
    • Anti-Phishing Working group, http://www.antiphishing.org/. Retrieved on Sept 20, 2006.
    • Anti-Phishing Working group, http://www.antiphishing.org/. Retrieved on Sept 20, 2006.
  • 5
    • 0032165140 scopus 로고    scopus 로고
    • Integrating textual and pictorial information via pop-up windows: An experimental study
    • 11
    • Betrancourt, M. and A. Bisseret. 1998. Integrating textual and pictorial information via pop-up windows: an experimental study. Behaviour and Information Technology. Volume 17, Number 5, pp. 263-273(11).
    • (1998) Behaviour and Information Technology , vol.17 , Issue.5 , pp. 263-273
    • Betrancourt, M.1    Bisseret, A.2
  • 7
    • 33745816410 scopus 로고    scopus 로고
    • Dhamija, R., Tygar, J. D., and Hearst, M. 2006. Why phishing works. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (Montréal, Québec, Canada, April 22-27, 2006). R. Grinter, T. Rodden, P. Aoki, E. Cutrell, R. Jeffries, and G. Olson, Eds. CHI '06. ACM Press, New York, NY, 581-590. DOI= http://doi.acm.org/10.1145/1124772. 1124861.
    • Dhamija, R., Tygar, J. D., and Hearst, M. 2006. Why phishing works. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (Montréal, Québec, Canada, April 22-27, 2006). R. Grinter, T. Rodden, P. Aoki, E. Cutrell, R. Jeffries, and G. Olson, Eds. CHI '06. ACM Press, New York, NY, 581-590. DOI= http://doi.acm.org/10.1145/1124772. 1124861.
  • 8
    • 77953804362 scopus 로고    scopus 로고
    • Dhamija, R. and Tygar, J. D. 2005. The battle against phishing: Dynamic Security Skins. In Proceedings of the 2005 Symposium on Usable Privacy and Security (Pittsburgh, Pennsylvania, July 06-08, 2005). SOUPS '05, 93. ACM Press, New York, NY, 77-88. DOI= http://doi.acm.org/10.1145/1073001.1073009.
    • Dhamija, R. and Tygar, J. D. 2005. The battle against phishing: Dynamic Security Skins. In Proceedings of the 2005 Symposium on Usable Privacy and Security (Pittsburgh, Pennsylvania, July 06-08, 2005). SOUPS '05, vol. 93. ACM Press, New York, NY, 77-88. DOI= http://doi.acm.org/10.1145/1073001.1073009.
  • 10
    • 34250737359 scopus 로고    scopus 로고
    • Downs, J. S., Holbrook, M. B., and Cranor, L. F. 2006. Decision strategies and susceptibility to phishing. In Proceedings of the Second Symposium on Usable Privacy and Security (Pittsburgh, Pennsylvania, July 12-14, 2006). SOUPS '06, 149. ACM Press, New York, NY, 79-90. DOI= http://doi.acm.org/10.1145/1143120.1143131.
    • Downs, J. S., Holbrook, M. B., and Cranor, L. F. 2006. Decision strategies and susceptibility to phishing. In Proceedings of the Second Symposium on Usable Privacy and Security (Pittsburgh, Pennsylvania, July 12-14, 2006). SOUPS '06, vol. 149. ACM Press, New York, NY, 79-90. DOI= http://doi.acm.org/10.1145/1143120.1143131.
  • 11
    • 35348858087 scopus 로고    scopus 로고
    • Retrieved December 30
    • eBay. Spoof Email Tutorial. Retrieved December 30, 2006. http://pages.ebay.com/education/spooftutorial/
    • (2006) Spoof Email Tutorial
    • eBay1
  • 12
    • 35348908949 scopus 로고    scopus 로고
    • eBay Toolbar. Retrieved December 30, 2006. http://pages.ebay.com/ ebay_toolbar/
    • eBay Toolbar. Retrieved December 30, 2006. http://pages.ebay.com/ ebay_toolbar/
  • 13
    • 33745943068 scopus 로고    scopus 로고
    • Using pop-up windows to improve multimedia learning
    • Erhel, S. and E. Jamet. 2006. Using pop-up windows to improve multimedia learning. Journal of Computer Assisted Learning, Volume 22, Number 2. pp. 137-147.
    • (2006) Journal of Computer Assisted Learning , vol.22 , Issue.2 , pp. 137-147
    • Erhel, S.1    Jamet, E.2
  • 14
    • 35348888363 scopus 로고    scopus 로고
    • Federal Trade Commission, Retrieved December 30
    • Federal Trade Commission. An E-Card for You game. Retrieved December 30, 2006. http://www.ftc.gov/bcp/conline/ecards/phishing/index.html.
    • (2006) An E-Card for You game
  • 15
    • 35348908309 scopus 로고    scopus 로고
    • Federal Trade Commission, Retrieved December 30
    • Federal Trade Commission. Phishing Alerts. Retrieved December 30, 2006. http://www.ftc.gov/bcp/conline/pubs/alerts/phishingalrt.htm
    • (2006) Phishing Alerts
  • 16
    • 35348822468 scopus 로고    scopus 로고
    • Fostering E-Mail Security Awareness: The West Point Carronade
    • Ferguson, A. J. 2005. Fostering E-Mail Security Awareness: The West Point Carronade. EDUCASE Quarterly. http://www.educause.edu/ir/library/pdf/ eqm0517.pdf.
    • (2005) EDUCASE Quarterly
    • Ferguson, A.J.1
  • 17
    • 35348841507 scopus 로고    scopus 로고
    • Fette, I., N. Sadeh and A. Tomasic. Learning to Detect Phishing Emails. June 2006. ISRI Technical report, CMU-ISRI-06-112. http://reports-archive.adm. cs.cmu.edu/anon/isri2006/CMU-ISRI-06-112.pdf.
    • Fette, I., N. Sadeh and A. Tomasic. Learning to Detect Phishing Emails. June 2006. ISRI Technical report, CMU-ISRI-06-112. http://reports-archive.adm. cs.cmu.edu/anon/isri2006/CMU-ISRI-06-112.pdf.
  • 18
    • 34147138124 scopus 로고    scopus 로고
    • Social Phishing
    • To appear in the, Retrieved March 7
    • Jagatic, T.,N. Johnson, M. Jakobsson and F. Menczer. Social Phishing. To appear in the Communications of the ACM. Retrieved March 7, 2006, http://www.indiana.edu/~phishing/social-network-experiment/phishing-preprint. pdf.
    • (2006) Communications of the ACM
    • Jagatic, T.1    Johnson, N.2    Jakobsson, M.3    Menczer, F.4
  • 19
    • 34249852316 scopus 로고    scopus 로고
    • Jakobsson, M. and Ratkiewicz, J. 2006. Designing ethical phishing experiments: a study of (ROT13) rOnl query features. In Proceedings of the 15th international Conference on World Wide Web (Edinburgh, Scotland, May 23-26, 2006). WWW '06. ACM Press, New York, NY, 513-522. DOI= http://doi.acm.org/10.1145/1135777.1135853
    • Jakobsson, M. and Ratkiewicz, J. 2006. Designing ethical phishing experiments: a study of (ROT13) rOnl query features. In Proceedings of the 15th international Conference on World Wide Web (Edinburgh, Scotland, May 23-26, 2006). WWW '06. ACM Press, New York, NY, 513-522. DOI= http://doi.acm.org/10.1145/1135777.1135853
  • 21
    • 35348839581 scopus 로고    scopus 로고
    • Trust modeling for online transactions: A phishing scenario
    • Oct 30, Nov 1, Ontario, Canada
    • Kumaraguru, P., A. Acquisti and L. Cranor. 2006. Trust modeling for online transactions: A phishing scenario. Proceedings of Privacy Security Trust, Oct 30 - Nov 1, 2006, Ontario, Canada
    • (2006) Proceedings of Privacy Security Trust
    • Kumaraguru, P.1    Acquisti, A.2    Cranor, L.3
  • 23
    • 35348886089 scopus 로고    scopus 로고
    • Retrieved Sept 20
    • Mail Frontier. Phishing IQ. http://survey.mailfrontier.com/survey/ quiztest.html.Retrieved Sept 20, 2006
    • (2006) Phishing IQ
    • Frontier, M.1
  • 24
    • 0003781450 scopus 로고    scopus 로고
    • New York Cambridge University Press
    • Mayer, R.E. Multimedia Learning. 2001. New York Cambridge University Press.
    • (2001) Multimedia Learning
    • Mayer, R.E.1
  • 25
    • 33845297553 scopus 로고
    • Animations Need Narrations: An Experimental Test of a Dual Coding Hypothesis
    • Mayer, R.E. and R B. Anderson. 1991 Animations Need Narrations: An Experimental Test of a Dual Coding Hypothesis. Journal of Educational Psychology. Volume 83, Number 4. pp. 484-490.
    • (1991) Journal of Educational Psychology , vol.83 , Issue.4 , pp. 484-490
    • Mayer, R.E.1    Anderson, R.B.2
  • 28
    • 35348866139 scopus 로고    scopus 로고
    • Retrieved September 10, 2006
    • Netcraft. Retrieved September 10, 2006. http://news.netcraft.com/
    • Netcraft
  • 29
    • 35348826688 scopus 로고    scopus 로고
    • Gone Phishing
    • New York State Office of Cyber Security & Critical Infrastructure Coordination, Aggregate Exercise Results for public release
    • New York State Office of Cyber Security & Critical Infrastructure Coordination. 2005. Gone Phishing... A Briefing on the Anti-Phishing Exercise Initiative for New York State Government. Aggregate Exercise Results for public release.
    • (2005) A Briefing on the Anti-Phishing Exercise Initiative for New York State Government
  • 30
    • 35348905509 scopus 로고    scopus 로고
    • Richmond, R. Hackers set up attacks on home PCs, financial firms: study. Retrieved September 25, 2006. http://www.marketwatch.com/News/Story/Story.aspx? dist=newsfinder&siteid=google&guid=%7B92615073-95B6-452E-A3B9- 569BEACF91E8%7D&keyword=
    • Richmond, R. Hackers set up attacks on home PCs, financial firms: study. Retrieved September 25, 2006. http://www.marketwatch.com/News/Story/Story.aspx? dist=newsfinder&siteid=google&guid=%7B92615073-95B6-452E-A3B9- 569BEACF91E8%7D&keyword=
  • 32
    • 35348847124 scopus 로고
    • Schmeck, R. R, Ed, New York: Plenum Press
    • Schmeck, R. R. (Ed) 1988. Learning styles and strategies. New York: Plenum Press.
    • (1988) Learning styles and strategies
  • 34
    • 35348835979 scopus 로고    scopus 로고
    • September 10
    • SpamAssasin. Retrieved September 10, 2006. http://spamassassin.apache. org/
    • (2006)
  • 35
    • 35348836583 scopus 로고    scopus 로고
    • September 10
    • SpoofGuard. Retrieved September 10, 2006, http://crypto.stanford.edu/ SpoofGuard/
    • (2006)
  • 36
    • 35348816749 scopus 로고    scopus 로고
    • September 10
    • SpoofStick. Retrieved September 10, 2006. http://www.spoofstick.com/
    • (2006)
  • 37
    • 35348861828 scopus 로고    scopus 로고
    • September 10
    • SquirrelMail. Retrieved September 10, 2006. http://www.squirrelmail.org/
    • (2006)
  • 38
    • 33745867321 scopus 로고    scopus 로고
    • Wu, M., Miller, R. C., and Garfinkel, S. L. 2006. Do security toolbars actually prevent phishing attacks?. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (Montréal, Québec, Canada, April 22-27, 2006). R. Grinter, T. Rodden, P. Aoki, E. Cutrell, R. Jeffries, and G. Olson, Eds. CHI '06. ACM Press, New York, NY, 601-610. DOI= http://doi.acm.org/10.1145/1124772.1124863.
    • Wu, M., Miller, R. C., and Garfinkel, S. L. 2006. Do security toolbars actually prevent phishing attacks?. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (Montréal, Québec, Canada, April 22-27, 2006). R. Grinter, T. Rodden, P. Aoki, E. Cutrell, R. Jeffries, and G. Olson, Eds. CHI '06. ACM Press, New York, NY, 601-610. DOI= http://doi.acm.org/10.1145/1124772.1124863.
  • 39
    • 85084161317 scopus 로고    scopus 로고
    • Ye, Z. and Sean S. Trusted Paths for Browsers. 2002. Proceedings of the 11th USENIX Security Symposium. pp. 263-279. USENIX Association. Berkeley, CA, USA.
    • Ye, Z. and Sean S. Trusted Paths for Browsers. 2002. Proceedings of the 11th USENIX Security Symposium. pp. 263-279. USENIX Association. Berkeley, CA, USA.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.