메뉴 건너뛰기




Volumn , Issue , 2009, Pages

School of phish: A real-world evaluation of anti-phishing training

Author keywords

Email; Embedded training; Phishing; Real world studies; Usable privacy and security

Indexed keywords

EMAIL; EMBEDDED TRAINING; PHISHING; REAL-WORLD STUDIES; USABLE PRIVACY AND SECURITY;

EID: 70350714542     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1572532.1572536     Document Type: Conference Paper
Times cited : (217)

References (21)
  • 2
    • 0030201356 scopus 로고    scopus 로고
    • Interpersonal deception theory
    • D. B. Buller and J. K. Burgoon. Interpersonal deception theory. Communication Theory, 6(3):203-242, 1996.
    • (1996) Communication Theory , vol.6 , Issue.3 , pp. 203-242
    • Buller, D.B.1    Burgoon, J.K.2
  • 5
    • 70350708035 scopus 로고    scopus 로고
    • E. Ellis, L. Worthington, and M. Larkin. Research synthesis on effective teaching principles and the design of quality tools for educators. Technical report, National center to improve the tools of educators, 1994.
    • E. Ellis, L. Worthington, and M. Larkin. Research synthesis on effective teaching principles and the design of quality tools for educators. Technical report, National center to improve the tools of educators, 1994.
  • 6
    • 35348822468 scopus 로고    scopus 로고
    • Fostering E-Mail Security Awareness: The West Point Carronade
    • A. J. Ferguson. Fostering E-Mail Security Awareness: The West Point Carronade. EDUCASE Quarterly, (1), 2005.
    • (2005) EDUCASE Quarterly , vol.1
    • Ferguson, A.J.1
  • 11
    • 70350726627 scopus 로고    scopus 로고
    • P. Kumaraguru, S. Sheng, A. Acquisti, L. Cranor, and J. Hong. Under review
    • P. Kumaraguru, S. Sheng, A. Acquisti, L. Cranor, and J. Hong. Under review.
  • 14
    • 70350714695 scopus 로고    scopus 로고
    • Fighting Phishing at the User Interface
    • August, and, Eds, Security and Usability: Designing Secure Systems that People Can Use
    • R. C. Miller and M. Wu. Fighting Phishing at the User Interface. O'Reilly, August 2005. In Lorrie Cranor and Simson Garfinkel (Eds.) Security and Usability: Designing Secure Systems that People Can Use.
    • (2005) O'Reilly
    • Miller, R.C.1    Wu, M.2
  • 16
    • 77649143468 scopus 로고
    • Risk aversion revisited
    • September
    • R. A. Morin and A. Fernandez Suarez. Risk aversion revisited. Journal of Finance, 38(4):1201-16, September 1983.
    • (1983) Journal of Finance , vol.38 , Issue.4 , pp. 1201-1216
    • Morin, R.A.1    Fernandez Suarez, A.2
  • 17
    • 70350743379 scopus 로고    scopus 로고
    • New York State Office of Cyber Security & Critical Infrastructure Coordination. Gone phishing. . . a briefing on the anti-phishing exercise initiative for new york state government. Aggregate Exercise Results for public release., 2005.
    • New York State Office of Cyber Security & Critical Infrastructure Coordination. Gone phishing. . . a briefing on the anti-phishing exercise initiative for new york state government. Aggregate Exercise Results for public release., 2005.
  • 18
    • 84965393809 scopus 로고
    • New conceptualizations of practice: Common principles in three paradigms suggest new concepts for training
    • July
    • R. A. Schmidt and R. A. Bjork. New conceptualizations of practice: Common principles in three paradigms suggest new concepts for training. Psychological Science, 3(4):207-217, July 1992.
    • (1992) Psychological Science , vol.3 , Issue.4 , pp. 207-217
    • Schmidt, R.A.1    Bjork, R.A.2
  • 20
    • 84869648148 scopus 로고    scopus 로고
    • employees. News article, January
    • E. Spagat. Justice department hoaxes employees. News article, January 2009. http://news.yahoo.com/s/ap/20090129/ ap-on-go-ca-st-pe/justice-hoax.
    • (2009) Justice department hoaxes
    • Spagat, E.1
  • 21
    • 3843130753 scopus 로고    scopus 로고
    • Where did they go wrong? an analysis of the failure of knowledgeable internet consumers to detect deception over the internet
    • March
    • G. Stefano. Where did they go wrong? an analysis of the failure of knowledgeable internet consumers to detect deception over the internet. Group Decision and Negotiation, 13:149-172, March 2004.
    • (2004) Group Decision and Negotiation , vol.13 , pp. 149-172
    • Stefano, G.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.