Exploring the evidence for email phishing training: A scoping review

被引:2
|
作者
Marshall, Nina [1 ]
Sturman, Daniel [1 ]
Auton, Jaime C. [1 ]
机构
[1] Univ Adelaide, Sch Psychol, Adelaide, SA 5005, Australia
关键词
Phishing email; Phishing susceptibility; Training; Cybersecurity; Human cognition; SECURITY AWARENESS; BEHAVIOR; DESIGN; RECOGNITION; PERFORMANCE; SCIENCE; PEOPLE; USERS;
D O I
10.1016/j.cose.2023.103695
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Background: Phishing emails are a pervasive threat to the security of confidential information. To mitigate this risk, a range of training measures have been developed to target the human factors involved in phishing email susceptibility. Despite the widespread use of anti-phishing training programs, there is no clear understanding of the extent to which these approaches have been assessed. Objective: The primary aim of this scoping review was to identify and describe the nature of available training interventions and their measurable outcomes on user susceptibility, as reported in published articles. Methods: Systematic searches identified 42 studies that met the inclusion criteria. Each study was critically analysed, and a standardised data extraction spreadsheet used to systemise the data that informed the descriptive narrative review. Results: Findings revealed that near-term training impact is well documented, however evidence on the success of programs in driving sustained behavioral change is limited. Components of training design influencing the effectiveness of outcomes included training intensity, active approaches to learning, the provision of detailed feedback, and supplementing attentional awareness skills-based training with traditional cue-based approaches. Conclusions: Improved user resilience to phishing emails confirms the utility of training as an important defensive mechanism, although current approaches continue to leave trainees at risk.
引用
收藏
页数:16
相关论文
共 50 条
  • [31] Using phishing for user email security awareness
    Dodge, Ronald C.
    Ferguson, Aaron J.
    SECURITY AND PRIVACY IN DYNAMIC ENVIRONMENTS, 2006, 201 : 454 - +
  • [32] Discovering Phishing Dropboxes Using Email Metadata
    Moore, Tyler
    Clayton, Richard
    2012 ECRIME RESEARCHERS SUMMIT (ECRIME), 2012,
  • [33] A Methodology for Assessing the Resilience Against Email Phishing
    Magalhaes, Joao Paulo
    Pinto, Antonio
    2018 9TH INTERNATIONAL CONFERENCE ON INTELLIGENT SYSTEMS (IS), 2018, : 515 - 520
  • [34] Email, as a means of Phishing intrusion and computer fraud
    Fernandez, Yolanda Maribel Mercedes Chipana
    Escobedo, Miguel Angel Osco
    Ichpas, Ruben Quispe
    Ferniandez, Gaby Jessica Nieto
    Quispe, Gladys Beatriiz Garcia
    Cerna, Dante Aliaga
    REVISTA DE CLIMATOLOGIA, 2023, 23 : 1138 - 1148
  • [35] The roles of phishing knowledge, cue utilization, and decision styles in phishing email detection
    Sturman, Daniel
    Bell, Elliot A.
    Auton, Jaime C.
    Breakey, Georgia R.
    Wiggins, Mark W.
    APPLIED ERGONOMICS, 2024, 119
  • [36] Evaluation of Federated Learning in Phishing Email Detection
    Thapa, Chandra
    Tang, Jun Wen
    Abuadbba, Alsharif
    Gao, Yansong
    Camtepe, Seyit
    Nepal, Surya
    Almashor, Mahathir
    Zheng, Yifeng
    SENSORS, 2023, 23 (09)
  • [37] Automatically Generating Classifier for Phishing Email Prediction
    Ma, Liping
    Torney, Rosemary
    Watters, Paul
    Brown, Simon
    2009 10TH INTERNATIONAL SYMPOSIUM ON PERVASIVE SYSTEMS, ALGORITHMS, AND NETWORKS (ISPAN 2009), 2009, : 779 - 783
  • [38] Mindfulness and Phishing Email Detection Completed Research
    Roghanizad, Mahdi
    Choi, Ellen
    Mashatan, Atefeh
    Turetken, Ozgur
    DIGITAL INNOVATION AND ENTREPRENEURSHIP (AMCIS 2021), 2021,
  • [39] Exploring the role of digital technology for feedback exchange in clinical training: a scoping review
    Singaram, Veena S.
    Pillay, Rayishnee
    Mbobnda Kapche, Esther L.
    SYSTEMATIC REVIEWS, 2024, 13 (01)
  • [40] Email Phishing Detection with BLSTM and Word Embeddings
    Wolert R.
    Rawski M.
    International Journal of Electronics and Telecommunications, 2023, 69 (03) : 485 - 491