Exploring the evidence for email phishing training: A scoping review

被引:2
|
作者
Marshall, Nina [1 ]
Sturman, Daniel [1 ]
Auton, Jaime C. [1 ]
机构
[1] Univ Adelaide, Sch Psychol, Adelaide, SA 5005, Australia
关键词
Phishing email; Phishing susceptibility; Training; Cybersecurity; Human cognition; SECURITY AWARENESS; BEHAVIOR; DESIGN; RECOGNITION; PERFORMANCE; SCIENCE; PEOPLE; USERS;
D O I
10.1016/j.cose.2023.103695
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Background: Phishing emails are a pervasive threat to the security of confidential information. To mitigate this risk, a range of training measures have been developed to target the human factors involved in phishing email susceptibility. Despite the widespread use of anti-phishing training programs, there is no clear understanding of the extent to which these approaches have been assessed. Objective: The primary aim of this scoping review was to identify and describe the nature of available training interventions and their measurable outcomes on user susceptibility, as reported in published articles. Methods: Systematic searches identified 42 studies that met the inclusion criteria. Each study was critically analysed, and a standardised data extraction spreadsheet used to systemise the data that informed the descriptive narrative review. Results: Findings revealed that near-term training impact is well documented, however evidence on the success of programs in driving sustained behavioral change is limited. Components of training design influencing the effectiveness of outcomes included training intensity, active approaches to learning, the provision of detailed feedback, and supplementing attentional awareness skills-based training with traditional cue-based approaches. Conclusions: Improved user resilience to phishing emails confirms the utility of training as an important defensive mechanism, although current approaches continue to leave trainees at risk.
引用
收藏
页数:16
相关论文
共 50 条
  • [1] A New Email Phishing Training Website
    Al-hamar, Yousef
    Kolivand, Hoshang
    2020 13TH INTERNATIONAL CONFERENCE ON DEVELOPMENTS IN ESYSTEMS ENGINEERING (DESE 2020), 2020, : 263 - 268
  • [2] Exploring the diverse definitions of 'evidence': a scoping review
    Yu, Xuan
    Wu, Shouyuan
    Sun, Yajia
    Wang, Ping
    Wang, Ling
    Su, Renfeng
    Zhao, Junxian
    Fadlallah, Racha
    Boeira, Laura
    Oliver, Sandy
    Abraha, Yoseph G.
    Sewankambo, Nelson K.
    El-Jardali, Fadi
    Norris, Susan L.
    Chen, Yaolong
    BMJ EVIDENCE-BASED MEDICINE, 2024, 29 (01) : 37 - 43
  • [3] How persuasive is a phishing email? A phishing game for phishing awareness
    Fatima, Rubia
    Yasin, Affan
    Liu, Lin
    Wang, Jianmin
    JOURNAL OF COMPUTER SECURITY, 2019, 27 (06) : 581 - 612
  • [4] Phishing Email: Could We Get Rid of It? A Review on Solutions to Combat Phishing Emails
    Ali, Ghassan Ahmed
    EMERGING TRENDS IN INTELLIGENT COMPUTING AND INFORMATICS: DATA SCIENCE, INTELLIGENT INFORMATION SYSTEMS AND SMART COMPUTING, 2020, 1073 : 849 - 856
  • [5] "Alexa, What's a Phishing Email?": Training users to spot phishing emails using a voice assistant
    Sharevski, Filipo
    Jachim, Peter
    EURASIP JOURNAL ON INFORMATION SECURITY, 2022, 2022 (01)
  • [6] “Alexa, What’s a Phishing Email?”: Training users to spot phishing emails using a voice assistant
    Filipo Sharevski
    Peter Jachim
    EURASIP Journal on Information Security, 2022
  • [7] A Systematic Review of Deep Learning Techniques for Phishing Email Detection
    Kyaw, Phyo Htet
    Gutierrez, Jairo
    Ghobakhlou, Akbar
    ELECTRONICS, 2024, 13 (19)
  • [8] Cue Utilization, Phishing Feature and Phishing Email Detection
    Bayl-Smith, Piers
    Sturman, Daniel
    Wiggins, Mark
    FINANCIAL CRYPTOGRAPHY AND DATA SECURITY, FC 2020, 2020, 12063 : 56 - 70
  • [9] Fighting Phishing with Trusted Email
    Crain, Jordan
    Opyrchal, Lukasz
    Prakash, Atul
    FIFTH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY, AND SECURITY: ARES 2010, PROCEEDINGS, 2010, : 462 - 467
  • [10] Overconfidence in Phishing Email Detection
    Wang, Jingguo
    Li, Yuan
    Rao, H. Raghav
    JOURNAL OF THE ASSOCIATION FOR INFORMATION SYSTEMS, 2016, 17 (11): : 759 - 783