Jan 26, 2007 | Research library
This whitepaper discusses human vulnerabilities in full, including what they are, why they occur, how they can be mitigated, the challenges of mitigation and potential areas for further research.
Jan 26, 2007 | Research library
A paper on the factors that make phishing emails and web pages appear authentic and on the factors that make legitamate content appear dubious. Authors draw nine conclusions.
Jan 25, 2007 | Research library
Context-sensitive guidance (CSG) can help users make better security decisions. Applications with CSG ask the user to provide relevant context information. Based on such information, these applications then decide or suggest an appropriate course of action. However,...
Jan 15, 2007 | Journal article, Research library
As the problem of spam email increases, we examined users’ attitudes toward and experience with spam as a function of gender and age. College-age, working-age, and retirement-age men and women were surveyed. Most respondents strongly disliked receiving spam yet took...
Jan 15, 2007 | Research library
We argue that phishing IQ tests fail to measure susceptibility to phishing attacks. We conducted a study where 40 subjects were asked to answer a selection of questions from existing phishing IQ tests in which we varied the portion (from 25% to 100%) of the questions...
Jan 11, 2007 | Research library
This paper analyses 111 ‘Nigerian’ emails, concluding typical emails draw on a predictable form, purpose and tone designed to appeal to greed, charity, heroism, and other powerful and compelling emotions, and thus trick victims.