Defending against Spear Phishing: Motivating Users through Fear appeal Manipulations
نویسندگان
چکیده
Phishing is a pervasive form of online fraud that causes billions in losses annually. Spear phishing is a highly targeted and successful type of phishing that uses socially engineered emails to defraud most of its recipients. Unfortunately, anti-phishing training campaigns struggle with effectively fighting this threat— partially because users see security as a secondary priority, and partially because users are rarely motivated to undergo lengthy training. An effective training approach thus needs to be non-disruptive and brief as to avoid being onerous, and yet, needs to inspire dramatic behavioral change. This is a tremendous, unsolved challenge that we believe can be solved through a novel application of theory: Using fear appeals and protection-motivation theory (PMT), we outline how brief training can educate users and evoke protection motivation. We further invoke construal-level theory (CLT) to explain how fear appeals can stimulate threat perceptions more quickly and more powerfully. This research-in-progress study further proposes a field experiment to verify the effectiveness of our proposed training approach in an ecologically valid environment. Overall, we (1) improve training based on PMT and CLT, (2) expand PMT for guiding fear appeal design; and (3) demonstrate a full application of CLT.
منابع مشابه
An Initial Study on Personalized Filtering Thresholds in Defending Sequential Spear Phishing Attacks
Different from spam and regular phishing attacks, spear phishing attacks target a small group of people, and the attackers usually make elaborate plans before attacking. There is existing work on classifying spear phishing emails where a threshold value is used to balance misclassified normal emails and misclassified malicious emails. However, most existing systems use a uniform threshold for a...
متن کاملA Design for an Anti-spear-phishing System Aycock
Phishing is a widespread and effective computer-mediated social attack. Phishers have proven highly adaptable in terms of exploiting new communications channels – witness ‘vishing’ and ‘SMiShing’ – and are becoming increasingly sophisticated. At the same time, research has shown that current anti-phishing measures are less than adequate. One concern in terms of malicious software is targeted at...
متن کاملMaking cues Salient: the Role of Security Awareness in shaping Threat and Coping Appraisals
The number of phishing e-mails sent to users’ inboxes at organizations increases every year, putting users under constant threat of data or identity theft. In finding ways to motivate users to protect themselves and their organization from such threats, IS security researchers using protection motivation theory (PMT) have made notable contributions to the relationship between appraisal processe...
متن کاملBreaching the Human Firewall: Social engineering in Phishing and Spear-Phishing Emails
We examined the influence of three social engineering strategies on users’ judgments of how safe it is to click on a link in an email. The three strategies examined were authority, scarcity and social proof, and the emails were either genuine, phishing or spear-phishing. Of the three strategies, the use of authority was the most effective strategy in convincing users that a link in an email was...
متن کاملOptimal Personalized Filtering Against Spear-Phishing Attacks
To penetrate sensitive computer networks, attackers can use spear phishing to sidestep technical security mechanisms by exploiting the privileges of careless users. In order to maximize their success probability, attackers have to target the users that constitute the weakest links of the system. The optimal selection of these target users takes into account both the damage that can be caused by...
متن کامل