preview

Annotated Bibliography

Decent Essays

Annotated Bibliography

Abbasi, A., Zahedi, F. M., & Chen, Y. (2012, June). Impact of anti-phishing tool performance on attack success rates. In Intelligence and Security Informatics (ISI), 2012 IEEE International Conference on (pp. 12-17). IEEE.
This study conducted an experiment which involved 400 plus participants to evaluate the accuracy of anti-phishing tools on a user’s ability to avoid phishing attacks. The experiment participants were either given a low or high accuracy tool and asked to make decisions on several phishing websites. The study found that the users who used the high accuracy tool performed better than the users using the low accuracy tool in terms of avoiding phishing attacks. Further, users of the high accuracy tool ignored …show more content…

The study mainly focused on visual triggers that help users in identifying deceptive emails. The authors found that visual triggers and deception indications affected the likelihood of a user t respond to a phishing email. The study measured the effects of a user’s knowledge of a scam email on phishing susceptibility and found that users with more knowledge surrounding email scams paid more attention to visual triggers and were less susceptible to phishing emails.

Mohebzada, J. G., El Zarka, A., Bhojani, A. H., & Darwish, A. (2012, March). Phishing in a university community: Two large scale phishing experiments. InInnovations in Information Technology (IIT), 2012 International Conference on(pp. 249-254). IEEE.
This study conducted a large scale phishing experiment in a university with more than 10,000 subjects. The initial phishing attack involved spoofed email that redirects a user to a website to change their password, both males and females in the experiment were equally deceived. The second part of the attack used a survey to harvest personal information, this found that 61% of the victims were males compared to only 39% …show more content…

F., & Downs, J. (2010, April). Who falls for phish?: a demographic analysis of phishing susceptibility and effectiveness of interventions. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (pp. 373-382). ACM.

Sheng et al. (2010) conducted a role play survey among over a thousand online respondents to study both the relationship between demographics and susceptibility to phishing and the effectiveness of anti-phishing education. This study analyzed demographics of people who fall prey to phishing attacks. The authors used an online survey and found that women were more likely to fall for phishing scams than men, further, people aged 18-25 were found to be more likely to be the victim of a phishing attack as compared to the general public.

Dhamija, R., Tygar, J. D., & Hearst, M. (2006, April). Why phishing works. InProceedings of the SIGCHI conference on Human Factors in computing systems (pp. 581-590). ACM.
This study looked at phishing from a cognitive perspective. The study found that lack of knowledge, visual deception and lack of attention contribute to the success of a phishing attack. Further, the study found that individuals tend to not utilize context cues such as address bar, status bar and security indicators. These individuals were instead frequently influenced by visual presentations of the phishing

Get Access