메뉴 건너뛰기




Volumn 229, Issue , 2007, Pages 88-99

Anti-Phishing Phil: The design and evaluation of a game that teaches people not to fall for phish

Author keywords

Development and testing; Game design; Interactive learning; Learning science; Phishing; Security user education; Usable privacy and security

Indexed keywords

GAME DESIGN; INTERACTIVE LEARNING; LEARNING SCIENCE; PHISHING; SECURITY USER EDUCATION; USABLE PRIVACY AND SECURITY;

EID: 36849073159     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1280680.1280692     Document Type: Conference Paper
Times cited : (370)

References (40)
  • 1
    • 35548933551 scopus 로고    scopus 로고
    • Signal detection theory
    • Salkind, NJ, Ed, Thousand Oaks CA, Sage
    • Abdi, H. (2007). Signal detection theory. In: Salkind, NJ. (Ed.), Encyclopedia of Measurement and Statistics. Thousand Oaks (CA), Sage.
    • (2007) Encyclopedia of Measurement and Statistics
    • Abdi, H.1
  • 3
    • 84873948744 scopus 로고    scopus 로고
    • Retrieved Nov 9, 2006
    • Camtasia Studio. Retrieved Nov 9, 2006. http://www.tec.hsmith.com/ camtasia.asp.
    • Camtasia Studio
  • 4
    • 77953804362 scopus 로고    scopus 로고
    • Dhamija, R. and J. D. Tygar. 2005. The battle against phishing: Dynamic Security Skins. In Proceedings of the 2005 Symposium on Usable Privacy and Security (Pittsburgh, Pennsylvania, July 06 - 08, 2005). SOUPS '05, 93. ACM Press, New York, NY, 77-88. DOI= http://doi.acm.org/10.1145/1073001. 1073009.
    • Dhamija, R. and J. D. Tygar. 2005. The battle against phishing: Dynamic Security Skins. In Proceedings of the 2005 Symposium on Usable Privacy and Security (Pittsburgh, Pennsylvania, July 06 - 08, 2005). SOUPS '05, vol. 93. ACM Press, New York, NY, 77-88. DOI= http://doi.acm.org/10.1145/1073001. 1073009.
  • 5
    • 33745816410 scopus 로고    scopus 로고
    • Dhamija, R., J. D. Tygar. and M. Hearst. 2006. Why phishing works. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (Montréal, Québec, Canada, April 22 - 27, 2006). R. Grinter, T. Rodden, P. Aoki, E. Cutrell, R. Jeffries, and G. Olson, Eds. CHI '06. ACM Press, New York, NY, 581-590. DOI= http://doi.acm.org/10.1145/1124772. 1124861.
    • Dhamija, R., J. D. Tygar. and M. Hearst. 2006. Why phishing works. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (Montréal, Québec, Canada, April 22 - 27, 2006). R. Grinter, T. Rodden, P. Aoki, E. Cutrell, R. Jeffries, and G. Olson, Eds. CHI '06. ACM Press, New York, NY, 581-590. DOI= http://doi.acm.org/10.1145/1124772. 1124861.
  • 7
    • 34250737359 scopus 로고    scopus 로고
    • Downs, J., M. Holbrook and L. Cranor. 2006. Decision strategies and susceptibility to phishing. In Proceedings of the Second Symposium on Usable Privacy and Security (Pittsburgh, Pennsylvania, July 12 - 14, 2006). SOUPS '06, 149. ACM Press, New York, NY, 79-90. DOI= http://doi.acm.org/10.1145/ 1143120.1143131.
    • Downs, J., M. Holbrook and L. Cranor. 2006. Decision strategies and susceptibility to phishing. In Proceedings of the Second Symposium on Usable Privacy and Security (Pittsburgh, Pennsylvania, July 12 - 14, 2006). SOUPS '06, vol. 149. ACM Press, New York, NY, 79-90. DOI= http://doi.acm.org/10.1145/ 1143120.1143131.
  • 8
    • 35348858087 scopus 로고    scopus 로고
    • Retrieved March 7
    • eBay. Spoof Email Tutorial. Retrieved March 7, 2006, http://pages.ebay. com/education/spooftutorial/.
    • (2006) Spoof Email Tutorial
    • eBay1
  • 9
    • 84890718531 scopus 로고    scopus 로고
    • is pointless. Retrieved, Jan 13, 2007
    • Evers, J. Security Expert: User education is pointless. Retrieved, Jan 13, 2007, http://news.com.com/2100-7350_3-6125213.html.
    • Security Expert: User education
    • Evers, J.1
  • 10
    • 35348888363 scopus 로고    scopus 로고
    • Federal Trade Commission, Retrieved Nov 7
    • Federal Trade Commission. An E-Card for You game. Retrieved Nov 7, 2006, http://www.ftc.gov/bcp/con.line/ecards/phishing/index.html.
    • (2006) An E-Card for You game
  • 11
    • 84858496636 scopus 로고    scopus 로고
    • Federal Trade Commission, Retrieved Nov 7
    • Federal Trade Commission. How Not to Get Hooked by a Phishing Scam. Retrieved Nov 7, 2006, http://www.ftc.gov/bcp/edu/pubs/consumer/alerts/alt127. htm.
    • (2006) How Not to Get Hooked by a Phishing Scam
  • 12
    • 35348822468 scopus 로고    scopus 로고
    • Fostering E-Mail Security Awareness: The West Point Carronade
    • Retrieved March 22, 2006
    • Ferguson, A. J. 2005. Fostering E-Mail Security Awareness: The West Point Carronade. EDUCASE Quarterly. 2005, 1. Retrieved March 22, 2006, http://www.educause.edu/ir/library/pdf/eqm0517.pdf.
    • (2005) EDUCASE Quarterly , vol.2005 , pp. 1
    • Ferguson, A.J.1
  • 15
    • 34250765199 scopus 로고    scopus 로고
    • TrustBar: Protecting (even Naïve) Web Users from Spoofing and Phishing Attacks. Cryptology ePrint Archive
    • Report 2004/155
    • Herzberg, A., and Gbara, A. 2004. TrustBar: Protecting (even Naïve) Web Users from Spoofing and Phishing Attacks. Cryptology ePrint Archive, Report 2004/155. http://epr.int.iacr.org/2004/155.
    • (2004)
    • Herzberg, A.1    Gbara, A.2
  • 16
    • 84871232045 scopus 로고    scopus 로고
    • Social Phishing
    • To appear in, Retrieved March 7, 2006
    • Jagatic, T.,N. Johnson, M. Jakobsson and F. Menczer. Social Phishing. To appear in Communications of the ACM. Retrieved March 7, 2006, http://www.indiana.edu/~phishing/social-network-experiment/phishing-preprint. pdf.
    • Communications of the ACM
    • Jagatic, T.1    Johnson, N.2    Jakobsson, M.3    Menczer, F.4
  • 20
    • 0004035835 scopus 로고    scopus 로고
    • The MIT Press Cambridge, Massachusetts The MIT Press, Cambridge, Massachusetts, London, England, February
    • Klein, G. Sources of power : How people make decisions? The MIT Press Cambridge, Massachusetts The MIT Press, Cambridge, Massachusetts, London, England, February 1999.
    • (1999) Sources of power : How people make decisions
    • Klein, G.1
  • 21
    • 36849090201 scopus 로고    scopus 로고
    • Teaching Johnny not to fall for phish
    • Tech. rep, Carnegie Mellon University
    • Kumaraguru, P., Sheng, S., Acquisti, A., Cranor, L. F., and Hong, J. 2007. Teaching Johnny not to fall for phish. Tech. rep., Carnegie Mellon University. http://www.cylab.cmu.edu/files/cmucylab07003.pdf.
    • (2007)
    • Kumaraguru, P.1    Sheng, S.2    Acquisti, A.3    Cranor, L.F.4    Hong, J.5
  • 23
    • 36849076828 scopus 로고    scopus 로고
    • Macmillan, N.A., Creelman, C.D. 2005. Detection theory: user's guide (2nd edition).Mahwah (NJ): Erlbaum.
    • Macmillan, N.A., Creelman, C.D. 2005. Detection theory: user's guide (2nd edition).Mahwah (NJ): Erlbaum.
  • 25
    • 0003781450 scopus 로고    scopus 로고
    • New York Cambridge University Press
    • Mayer, R. E. Multimedia Learning. New York Cambridge University Press, 2001.
    • (2001) Multimedia Learning
    • Mayer, R.E.1
  • 28
    • 0000606137 scopus 로고    scopus 로고
    • The case for social agency in computer-based teaching: Do students learn more deeply when they interact with animated pedagogical agents?
    • Moreno, R., Mayer, R. E., Spires, H. A., and Lester, J. C. 2001. The case for social agency in computer-based teaching: Do students learn more deeply when they interact with animated pedagogical agents? Cognition and Instruction 19, 2, 177 - 213.
    • (2001) Cognition and Instruction , vol.19 , Issue.2 , pp. 177-213
    • Moreno, R.1    Mayer, R.E.2    Spires, H.A.3    Lester, J.C.4
  • 29
    • 0009414946 scopus 로고    scopus 로고
    • IRL, Retrieved Oct 15, 2006
    • MySecureCyberspace. Uniform Resource Locator (IRL). Retrieved Oct 15, 2006. http://www.mysecurecyberspace.com/encyclopedia/index/uniform-resource- locator-url-.html.
    • Uniform Resource Locator
    • MySecureCyberspace1
  • 30
    • 36849090670 scopus 로고    scopus 로고
    • New York State Office of Cyber Security & Critical Infrastructure Coordination. Gone Phishing, A Briefing on the Anti-Phishing Exercise Initiative for New York State Government. Aggregate Exercise Results for public release
    • New York State Office of Cyber Security & Critical Infrastructure Coordination. Gone Phishing... A Briefing on the Anti-Phishing Exercise Initiative for New York State Government. Aggregate Exercise Results for public release.
  • 32
    • 84859220647 scopus 로고    scopus 로고
    • Playing a game: The ecology of designing, building and testing games as educational activities
    • Association for the Advancement of Computing in Education
    • Repenning, A., and Lewis, C. Playing a game: The ecology of designing, building and testing games as educational activities. In ED-Media, World Conference on Educational Multimedia, Hypermedia & Telecommunications (2005), Association for the Advancement of Computing in Education.
    • (2005) ED-Media, World Conference on Educational Multimedia, Hypermedia & Telecommunications
    • Repenning, A.1    Lewis, C.2
  • 33
    • 0010057718 scopus 로고    scopus 로고
    • Semantic Attacks: The Third Wave of Network. Attacks
    • Retrieved Sep 2
    • Schneier, B. 2000. Semantic Attacks: The Third Wave of Network. Attacks. Crypto-Gram Newsletter. Retrieved Sep 2, 2006, http://www.schneier.com/ crypto-gram-0010.html#1.
    • (2000) Crypto-Gram Newsletter
    • Schneier, B.1
  • 34
    • 36849051994 scopus 로고    scopus 로고
    • Wu, M. Fighting Phishing at the User Interface. 2006. MIT PhD. thesis. http://groups.csail.mit.edu/uid/projects/phishing/minwuthesis.pdf.
    • Wu, M. Fighting Phishing at the User Interface. 2006. MIT PhD. thesis. http://groups.csail.mit.edu/uid/projects/phishing/minwuthesis.pdf.
  • 35
    • 34250786200 scopus 로고    scopus 로고
    • Wu, M., Miller R. C. and Little, G. 2006. Web Wallet: Preventing Phishing Attacks By Revealing User Intentions. In Proceedings of the Second Symposium on Usable Privacy and Security (Pittsburgh, Pennsylvania, July 12 - 14, 2006). SOUPS '06, 149. ACM Press, New York, NY, 79-90. DOI= http://doi.acm.org/10.1145/1143120.1143133.
    • Wu, M., Miller R. C. and Little, G. 2006. Web Wallet: Preventing Phishing Attacks By Revealing User Intentions. In Proceedings of the Second Symposium on Usable Privacy and Security (Pittsburgh, Pennsylvania, July 12 - 14, 2006). SOUPS '06, vol. 149. ACM Press, New York, NY, 79-90. DOI= http://doi.acm.org/10.1145/1143120.1143133.
  • 36
    • 33745867321 scopus 로고    scopus 로고
    • Wu, M., Miller, R. C., and Garfinkel, S. L. 2006. Do security toolbars actually prevent phishing attacks?. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (Montréal, Québec, Canada, April 22 - 27, 2006). R. Grinter, T. Rodden, P. Aoki, E. Cutrell, R. Jeffries, and G. Olson, Eds. CHI '06. ACM Press, New York, NY, 601-610. DOI= http://doi.acm.org/10.1145/1124772.1124863
    • Wu, M., Miller, R. C., and Garfinkel, S. L. 2006. Do security toolbars actually prevent phishing attacks?. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (Montréal, Québec, Canada, April 22 - 27, 2006). R. Grinter, T. Rodden, P. Aoki, E. Cutrell, R. Jeffries, and G. Olson, Eds. CHI '06. ACM Press, New York, NY, 601-610. DOI= http://doi.acm.org/10.1145/1124772.1124863
  • 37
    • 85084161317 scopus 로고    scopus 로고
    • Trusted Paths for Browsers
    • USENIX Association. Berkeley, CA, USA
    • Ye, Z. and S. Smith. 2002. Trusted Paths for Browsers. In Proceedings of the 11th USENIX Security Symposium. pp. 263 - 279. USENIX Association. Berkeley, CA, USA.
    • (2002) Proceedings of the 11th USENIX Security Symposium , pp. 263-279
    • Ye, Z.1    Smith, S.2
  • 38
    • 34250747969 scopus 로고    scopus 로고
    • Yee, K. P. and Sitaker K. 2006. PassPet: Convenient Password Management And Phishing Protection. In Proceedings of the Second Symposium on Usable Privacy and Security (Pittsburgh, Pennsylvania, July 12 - 14, 2006). SOUPS '06, 149. ACM Press, New York, NY, 79-90. DOI= http://doi.acm.org/10.1145/ 1143120.1143126.
    • Yee, K. P. and Sitaker K. 2006. PassPet: Convenient Password Management And Phishing Protection. In Proceedings of the Second Symposium on Usable Privacy and Security (Pittsburgh, Pennsylvania, July 12 - 14, 2006). SOUPS '06, vol. 149. ACM Press, New York, NY, 79-90. DOI= http://doi.acm.org/10.1145/ 1143120.1143126.
  • 40
    • 35348905575 scopus 로고    scopus 로고
    • J. Hong., and L. Cranor, and 2007. CANTINA: A Content-Based Approach to Detecting Phishing Websites
    • Banff, Alberta, Canada, May 8-12
    • Zhang, Y., J. Hong., and L. Cranor, and 2007. CANTINA: a Content-Based Approach to Detecting Phishing Websites. In Proceedings of the 16th International World Wide Web Conference (WWW2007), Banff, Alberta, Canada, May 8-12, 2007
    • (2007) Proceedings of the 16th International World Wide Web Conference
    • Zhang, Y.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.