Use of phishing training to improve security warning compliance: Evidence from a field experiment

Weining Yang, Aiping Xiong, Jing Chen, Robert W. Proctor, Ninghui Li

Research output: Chapter in Book/Report/Conference proceedingConference contribution

8 Citations (Scopus)

Abstract

The current approach to protect users from phishing attacks is to display a warning when the webpage is considered suspicious. We hypothesize that users are capable of making correct informed decisions when the warning also conveys the reasons why it is displayed. We chose to use traffic rankings of domains, which can be easily described to users, as a warning trigger and evaluated the effect of the phishing warning message and phishing training. The evaluation was conducted in a field experiment. We found that knowledge gained from the training enhances the effectiveness of phishing warnings, as the number of participants being phished was reduced. However, the knowledge by itself was not sufficient to provide phishing protection. We suggest that integrating training in the warning interface, involving traffic ranking in phishing detection, and explaining why warnings are generated will improve current phishing defense.

Original languageEnglish (US)
Title of host publicationHoTSoS 2017 - Symposium and Bootcamp
Subtitle of host publicationHot Topics in the Science of Security
PublisherAssociation for Computing Machinery
Pages52-61
Number of pages10
ISBN (Electronic)9781450352741
DOIs
StatePublished - Apr 4 2017
Event4th Annual Symposium and Bootcamp on Hot Topics in the Science of Security, HoTSoS 2017 - Hanover, United States
Duration: Apr 4 2017Apr 5 2017

Publication series

NameACM International Conference Proceeding Series
VolumePart F127186

Conference

Conference4th Annual Symposium and Bootcamp on Hot Topics in the Science of Security, HoTSoS 2017
CountryUnited States
CityHanover
Period4/4/174/5/17

Fingerprint

Experiments
Compliance

All Science Journal Classification (ASJC) codes

  • Software
  • Human-Computer Interaction
  • Computer Vision and Pattern Recognition
  • Computer Networks and Communications

Cite this

Yang, W., Xiong, A., Chen, J., Proctor, R. W., & Li, N. (2017). Use of phishing training to improve security warning compliance: Evidence from a field experiment. In HoTSoS 2017 - Symposium and Bootcamp: Hot Topics in the Science of Security (pp. 52-61). (ACM International Conference Proceeding Series; Vol. Part F127186). Association for Computing Machinery. https://doi.org/10.1145/3055305.3055310
Yang, Weining ; Xiong, Aiping ; Chen, Jing ; Proctor, Robert W. ; Li, Ninghui. / Use of phishing training to improve security warning compliance : Evidence from a field experiment. HoTSoS 2017 - Symposium and Bootcamp: Hot Topics in the Science of Security. Association for Computing Machinery, 2017. pp. 52-61 (ACM International Conference Proceeding Series).
@inproceedings{e32fbcbec44e4605bb219c2473a04912,
title = "Use of phishing training to improve security warning compliance: Evidence from a field experiment",
abstract = "The current approach to protect users from phishing attacks is to display a warning when the webpage is considered suspicious. We hypothesize that users are capable of making correct informed decisions when the warning also conveys the reasons why it is displayed. We chose to use traffic rankings of domains, which can be easily described to users, as a warning trigger and evaluated the effect of the phishing warning message and phishing training. The evaluation was conducted in a field experiment. We found that knowledge gained from the training enhances the effectiveness of phishing warnings, as the number of participants being phished was reduced. However, the knowledge by itself was not sufficient to provide phishing protection. We suggest that integrating training in the warning interface, involving traffic ranking in phishing detection, and explaining why warnings are generated will improve current phishing defense.",
author = "Weining Yang and Aiping Xiong and Jing Chen and Proctor, {Robert W.} and Ninghui Li",
year = "2017",
month = "4",
day = "4",
doi = "10.1145/3055305.3055310",
language = "English (US)",
series = "ACM International Conference Proceeding Series",
publisher = "Association for Computing Machinery",
pages = "52--61",
booktitle = "HoTSoS 2017 - Symposium and Bootcamp",

}

Yang, W, Xiong, A, Chen, J, Proctor, RW & Li, N 2017, Use of phishing training to improve security warning compliance: Evidence from a field experiment. in HoTSoS 2017 - Symposium and Bootcamp: Hot Topics in the Science of Security. ACM International Conference Proceeding Series, vol. Part F127186, Association for Computing Machinery, pp. 52-61, 4th Annual Symposium and Bootcamp on Hot Topics in the Science of Security, HoTSoS 2017, Hanover, United States, 4/4/17. https://doi.org/10.1145/3055305.3055310

Use of phishing training to improve security warning compliance : Evidence from a field experiment. / Yang, Weining; Xiong, Aiping; Chen, Jing; Proctor, Robert W.; Li, Ninghui.

HoTSoS 2017 - Symposium and Bootcamp: Hot Topics in the Science of Security. Association for Computing Machinery, 2017. p. 52-61 (ACM International Conference Proceeding Series; Vol. Part F127186).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

TY - GEN

T1 - Use of phishing training to improve security warning compliance

T2 - Evidence from a field experiment

AU - Yang, Weining

AU - Xiong, Aiping

AU - Chen, Jing

AU - Proctor, Robert W.

AU - Li, Ninghui

PY - 2017/4/4

Y1 - 2017/4/4

N2 - The current approach to protect users from phishing attacks is to display a warning when the webpage is considered suspicious. We hypothesize that users are capable of making correct informed decisions when the warning also conveys the reasons why it is displayed. We chose to use traffic rankings of domains, which can be easily described to users, as a warning trigger and evaluated the effect of the phishing warning message and phishing training. The evaluation was conducted in a field experiment. We found that knowledge gained from the training enhances the effectiveness of phishing warnings, as the number of participants being phished was reduced. However, the knowledge by itself was not sufficient to provide phishing protection. We suggest that integrating training in the warning interface, involving traffic ranking in phishing detection, and explaining why warnings are generated will improve current phishing defense.

AB - The current approach to protect users from phishing attacks is to display a warning when the webpage is considered suspicious. We hypothesize that users are capable of making correct informed decisions when the warning also conveys the reasons why it is displayed. We chose to use traffic rankings of domains, which can be easily described to users, as a warning trigger and evaluated the effect of the phishing warning message and phishing training. The evaluation was conducted in a field experiment. We found that knowledge gained from the training enhances the effectiveness of phishing warnings, as the number of participants being phished was reduced. However, the knowledge by itself was not sufficient to provide phishing protection. We suggest that integrating training in the warning interface, involving traffic ranking in phishing detection, and explaining why warnings are generated will improve current phishing defense.

UR - http://www.scopus.com/inward/record.url?scp=85022009974&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=85022009974&partnerID=8YFLogxK

U2 - 10.1145/3055305.3055310

DO - 10.1145/3055305.3055310

M3 - Conference contribution

AN - SCOPUS:85022009974

T3 - ACM International Conference Proceeding Series

SP - 52

EP - 61

BT - HoTSoS 2017 - Symposium and Bootcamp

PB - Association for Computing Machinery

ER -

Yang W, Xiong A, Chen J, Proctor RW, Li N. Use of phishing training to improve security warning compliance: Evidence from a field experiment. In HoTSoS 2017 - Symposium and Bootcamp: Hot Topics in the Science of Security. Association for Computing Machinery. 2017. p. 52-61. (ACM International Conference Proceeding Series). https://doi.org/10.1145/3055305.3055310