메뉴 건너뛰기




Volumn 10, Issue 2, 2010, Pages

Teaching johnny not to fall for phish

Author keywords

Email; Embedded training; Instructional principles; Learning science; Phishing; Situated learning; Usable privacy and security

Indexed keywords

INSTRUCTIONAL PRINCIPLES; LEARNING SCIENCE; PHISHING; SITUATED LEARNING; USABLE PRIVACY;

EID: 77953569639     PISSN: 15335399     EISSN: 15576051     Source Type: Journal    
DOI: 10.1145/1754393.1754396     Document Type: Article
Times cited : (294)

References (82)
  • 2
    • 77953574852 scopus 로고    scopus 로고
    • ACCOUNT GUARD
    • ACCOUNT GUARD. 2006. Account Guard. http://pages.ebay.com/ebay-toolbar/.
    • (2006)
  • 3
    • 0043232732 scopus 로고    scopus 로고
    • Users are not the enemy
    • DOI=http://doi.acm.org/10.1145/322796.322806
    • ADAMS, A. AND SASSE, M. A. 1999. Users are not the enemy. Comm. ACM 42, 12, 40-46. DOI=http://doi.acm.org/10.1145/322796.322806.
    • (1999) Comm. ACM 42 , vol.12 , pp. 40-46
    • Adams, A.1    Sasse, M.A.2
  • 4
    • 0036210232 scopus 로고    scopus 로고
    • An effective metacognitive strategy: Learning by doing and explaining with a computer-based cognitive tutor
    • ALEVEN, V. AND KOEDINGER, K. R. 2002. An effective metacognitive strategy: learning by doing and explaining with a computer-based cognitive tutor. Cogn. Sci. 26, 2, 147-179.
    • (2002) Cogn. Sci. 26 , vol.2 , pp. 147-179
    • Aleven, V.1    Koedinger, K.R.2
  • 9
    • 77953592060 scopus 로고    scopus 로고
    • ANTI-PHISHING WORKING GROUP
    • ANTI-PHISHING WORKING GROUP. 2007. Anti-Phishing Working Group. http://www.antiphishing.org/.
    • (2007)
  • 10
    • 0001119971 scopus 로고
    • Maintenance of knowledge: Questions about memory we forgot to ask
    • BAHRICK, H. P. 1979. Maintenance of knowledge: Questions about memory we forgot to ask. J. Exper. Psych. 108, 3, 296-308.
    • (1979) J. Exper. Psych. 108 , vol.3 , pp. 296-308
    • Bahrick, H.P.1
  • 12
    • 85047672328 scopus 로고    scopus 로고
    • When and where do we apply what we learn? A taxonomy for far transfer
    • BARNETT, S. M. AND CECI, S. J. 2002. When and where do we apply what we learn? a taxonomy for far transfer. Psych. Bull. 128, 612-637.
    • (2002) Psych. Bull. 128 , pp. 612-637
    • Barnett, S.M.1    Ceci, S.J.2
  • 13
    • 0002213688 scopus 로고    scopus 로고
    • Rethinking transfer: A simple proposal with multiple implications
    • A. Iran-Nejad and P. D. Pearson., Eds. American Educational Research Association (AERA), Washington, DC
    • BRANSFORD, J. D. AND SCHWARTZ, D. L. 2001. Rethinking transfer: A simple proposal with multiple implications. In Review of Research in Education, A. Iran-Nejad and P. D. Pearson., Eds. Vol. 24, American Educational Research Association (AERA), Washington, DC, 61-100.
    • (2001) Review of Research in Education , vol.24 , pp. 61-100
    • Bransford, J.D.1    Schwartz, D.L.2
  • 14
    • 77953560298 scopus 로고    scopus 로고
    • Embedded training intelligent tutoring systems (ITS) for the future combat systems (FCS) command and control (C2) vehicle
    • BURMESTER, G. M., STOTTLER, D., AND HART, J. L. 2005. Embedded training intelligent tutoring systems (ITS) for the future combat systems (FCS) command and control (C2) vehicle. Tech. rep., Defense Technical Information Center. http://www.stottlerhenke.com/papers/IITSEC-02-ITSFCS.pdf.
    • (2005) Tech. Rep., Defense Technical Information Center
    • Burmester, G.M.1    Stottler, D.2    Hart, J.L.3
  • 18
    • 0004134359 scopus 로고    scopus 로고
    • COMMITTEE ON DEVELOPMENTS IN THE SCIENCE OF LEARNING AND NATIONAL RESEARCH COUNCIL National Academies Press
    • COMMITTEE ON DEVELOPMENTS IN THE SCIENCE OF LEARNING AND NATIONAL RESEARCH COUNCIL. 2000. How People Learn: Bridging Research and Practice. National Academies Press.
    • (2000) How People Learn: Bridging Research and Practice
  • 20
    • 0030362821 scopus 로고    scopus 로고
    • Intrinsic motivation and the process of learning: Beneficial effects of contextualization, personalization, and choice
    • CORDOVA, D. I. AND LEPPER, M. R. 1996. Intrinsic motivation and the process of learning: Beneficial effects of contextualization, personalization, and choice. J. Educ. Psych. 88, 4, 715-730.
    • (1996) J. Educ. Psych. 88 , vol.4 , pp. 715-730
    • Cordova, D.I.1    Lepper, M.R.2
  • 24
    • 77953577889 scopus 로고    scopus 로고
    • EBAY. 2006. Spoof email tutorial. http://pages.ebay.com/education/ spooftutorial.
    • (2006) Spoof Email Tutorial
  • 27
    • 33748985945 scopus 로고    scopus 로고
    • Online identity theft: Phishing technology, chokepoints and countermeasures
    • October
    • EMIGH, A. 2005. Online identity theft: Phishing technology, chokepoints and countermeasures. Tech. rep., Radix Labs. October. http://www.antiphishing. org/Phishing-dhs-report.pdf.
    • (2005) Tech. Rep., Radix Labs
    • Emigh, A.1
  • 29
    • 35348888363 scopus 로고    scopus 로고
    • FEDERAL TRADE COMMISSION. 2006a. An e-card for you game. http://www.ftc.gov/bcp/conline/ecards/phishing/index.html.
    • (2006) An E-Card for You Game
  • 30
    • 79952526821 scopus 로고    scopus 로고
    • How not to get hooked by a phishing scam
    • FEDERAL TRADE COMMISSION. 2006b. How not to get hooked by a phishing scam. Consumer alert news. http://www.ftc.gov/bcp/edu/pubs/consumer/alerts/ alt127.htm.
    • (2006) Consumer Alert News
  • 31
    • 35348822468 scopus 로고    scopus 로고
    • Fostering e-mail security awareness: The west point carronade
    • FERGUSON, A. J. 2005. Fostering e-mail security awareness: The west point carronade. EDUCASE Quart. 1. http://www.educause.edu/ir/library/pdf/eqm0517. pdf.
    • (2005) EDUCASE Quart. 1
    • Ferguson, A.J.1
  • 33
    • 34548172244 scopus 로고    scopus 로고
    • Stopping a phishing attack, even when the victims ignore warnings
    • FLORENCIO, D. AND HERLEY, C. 2005. Stopping a phishing attack, even when the victims ignore warnings. Tech. rep., Microsoft.
    • (2005) Tech. Rep., Microsoft
    • Florencio, D.1    Herley, C.2
  • 34
    • 0026127152 scopus 로고
    • Immediate and delayed transfer of training effects in statistical reasoning
    • FONG, G. T. AND NISBETT, R. E. 1991. Immediate and delayed transfer of training effects in statistical reasoning. J. Exper. Psych. 120, 34-45.
    • (1991) J. Exper. Psych. 120 , pp. 34-45
    • Fong, G.T.1    Nisbett, R.E.2
  • 35
    • 0006791169 scopus 로고
    • The measurement of transfer of training
    • GAGNE, R. M., FOSTER, H., AND CROWLEY, M. E. 1948. The measurement of transfer of training. Psych. Bull. 45, 2, 97-130.
    • (1948) Psych. Bull. 45 , vol.2 , pp. 97-130
    • Gagne, R.M.1    Foster, H.2    Crowley, M.E.3
  • 43
    • 35348877312 scopus 로고    scopus 로고
    • Syngress Publishing, Canada
    • JAMES, L. 2005. Phishing Exposed. Syngress Publishing, Canada.
    • (2005) Phishing Exposed
    • James, L.1
  • 45
    • 77953572516 scopus 로고    scopus 로고
    • Problem-based embedded training: An instructional methodology for embedded training using mixed and virtual reality technologies
    • KIRKLEY, J. R. AND ET AL. 2003. Problem-based embedded training: An instructional methodology for embedded training using mixed and virtual reality technologies. In Proceedings of the Interservice/Industry Training, Simulation, and Education Conference (I/ITSEC). http://www.iforces.org/downloads/problem- based.pdf.
    • (2003) Proceedings of the Interservice/Industry Training, Simulation, and Education Conference (I/ITSEC)
    • Kirkley, J.R.1
  • 51
    • 77953583932 scopus 로고    scopus 로고
    • MAIL FRONTIER. 2006. Mailfrontier phishing IQ test. http://survey. mailfrontier.com/survey/quiztest.html.
    • (2006) Mailfrontier Phishing IQ Test
  • 54
    • 33144464259 scopus 로고    scopus 로고
    • Fostering the intelligent novice: Learning from errors with metacognitive tutoring
    • MATHAN, S. A. AND KOEDINGER, K. R. 2005. Fostering the intelligent novice: Learning from errors with metacognitive tutoring. Educ. Psych. 40, 4, 257-265.
    • (2005) Educ. Psych. 40 , vol.4 , pp. 257-265
    • Mathan, S.A.1    Koedinger, K.R.2
  • 55
    • 0003781450 scopus 로고    scopus 로고
    • Cambridge University Press, Cambidge, UK
    • MAYER, R. E. 2001. Multimedia Learning. Cambridge University Press, Cambidge, UK.
    • (2001) Multimedia Learning
    • Mayer, R.E.1
  • 56
    • 58149205843 scopus 로고
    • The instructive animation: Helping students build connections between words and pictures in multimedia learning
    • MAYER, R. E. AND ANDERSON, R. B. 1992. The instructive animation: Helping students build connections between words and pictures in multimedia learning. J. Educ. Psych. 84, 4, 444-452.
    • (1992) J. Educ. Psych. 84 , vol.4 , pp. 444-452
    • Mayer, R.E.1    Anderson, R.B.2
  • 57
    • 0344837787 scopus 로고    scopus 로고
    • Understanding the potential of teachable moments: The case of smoking cessation
    • MCBRIDE, C. M., EMMONS, K. M., AND LIPKUS, I. M. 2003. Understanding the potential of teachable moments: the case of smoking cessation. Health Educ. Resear. 18, 2, 156-170.
    • (2003) Health Educ. Resear. 18 , vol.2 , pp. 156-170
    • Mcbride, C.M.1    Emmons, K.M.2    Lipkus, I.M.3
  • 58
    • 0000442605 scopus 로고    scopus 로고
    • The transfer paradox: Effects of contextual interference on retention and transfer performance of a complex cognitive skill
    • MERRIENBOER, J. V., DE CROOCK, M., AND JELSMA, O. 1997. The transfer paradox: Effects of contextual interference on retention and transfer performance of a complex cognitive skill. Percept. Motor Skills 84, 784-786.
    • (1997) Percept. Motor Skills 84 , pp. 784-786
    • Merrienboer, J.V.1    De Croock, M.2    Jelsma, O.3
  • 59
    • 77953559000 scopus 로고    scopus 로고
    • MICROSOFT CORPORATION. 2006. Consumer awareness page on phishing. http://www.microsoft.com/athome/security/email/phishing.mspx.
    • (2006) Consumer Awareness Page on Phishing
  • 61
    • 0033137475 scopus 로고    scopus 로고
    • Cognitive principles of multimedia learning: The role of modality and contiguity
    • MORENO, R. AND MAYER, R. E. 1999. Cognitive principles of multimedia learning: The role of modality and contiguity. J. Educ. Psych. 91, 358-368.
    • (1999) J. Educ. Psych. 91 , pp. 358-368
    • Moreno, R.1    Mayer, R.E.2
  • 62
    • 77953560642 scopus 로고    scopus 로고
    • URL
    • MYSECURECYBERSPACE. 2007. Uniform resource locator (URL). http://www.mysecurecyberspace.com/encyclopedia/index/uniform-resource-locator- url-.html.
    • (2007) Uniform Resource Locator
  • 63
    • 77953599876 scopus 로고    scopus 로고
    • NETCRAFT. 2006. Netcraf. http://toolbar.netcraft.com/.
    • (2006) Netcraf
  • 66
    • 34548331875 scopus 로고    scopus 로고
    • Don't be a phish: Steps in user education
    • DOI 10.1145/1140124.1140187, Working Group Reports on ITiCSE on Innovation and Technology in Computer Science Education 2006
    • ROBILA, S. A. AND RAGUCCI, J. W. 2006. Don't be a phish: steps in user education. In Proceedings of the 11th Annual SIGCSE Conference on Innovation and Technology in Computer Science Education (ITICSE'06). ACM Press, New York, NY, 237-241. DOI=http://doi.acm.org/10.1145/1140124.1140187. (Pubitemid 47344419)
    • (2006) Working Group Reports on ITiCSE on Innovation and Technology in Computer Science Education 2006 , pp. 237-241
    • Robila, S.A.1    Ragucci, J.W.2
  • 67
    • 0346706306 scopus 로고    scopus 로고
    • One hundred years of forgetting: A quantitative description of retention
    • RUBIN, D. C. AND WENZEL, A. E. 1996. One hundred years of forgetting: A quantitative description of retention. Psych. Rev. 103, 4, 734-760.
    • (1996) Psych. Rev. 103 , vol.4 , pp. 734-760
    • Rubin, D.C.1    Wenzel, A.E.2
  • 69
    • 84965393809 scopus 로고
    • New conceptualizations of practice: Common principles in three paradigms suggest new concepts for training
    • SCHMIDT, R. A. AND BJORK, R. A. 1992. New conceptualizations of practice: Common principles in three paradigms suggest new concepts for training. Psych. Sci. 3, 4, 207-217.
    • (1992) Psych. Sci. 3 , vol.4 , pp. 207-217
    • Schmidt, R.A.1    Bjork, R.A.2
  • 70
    • 0010057718 scopus 로고    scopus 로고
    • Semantic attacks: The third wave of network attacks
    • SCHNEIER, B. 2000. Semantic attacks: The third wave of network attacks. Crypto-Gram Newsletter. http://www.schneier.com/crypto-gram-0010.html#1.
    • (2000) Crypto-Gram Newsletter
    • Schneier, B.1
  • 72
    • 77953604049 scopus 로고    scopus 로고
    • SENDER POLICY FRAMEWORK
    • SENDER POLICY FRAMEWORK. 2006. Sender Policy Framework. http://www.openspf.org/.
    • (2006) Sender Policy Framework
  • 76
    • 77953565874 scopus 로고    scopus 로고
    • SPOOFGUARD. 2006. Spoofguard. http://crypto.stanford.edu/SpoofGuard/.
    • (2006) Spoofguard
  • 77
    • 77953598259 scopus 로고    scopus 로고
    • SPOOFSTICK. 2006. Spoofstick. http://www.spoofstick.com/.
    • (2006) Spoofstick
  • 78
    • 19944372231 scopus 로고    scopus 로고
    • Ph.D. thesis, Carnegie Mellon University
    • WHITTEN, A. 2004. Making security usable. Ph.D. thesis, Carnegie Mellon University.
    • (2004) Making Security Usable
    • Whitten, A.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.