Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Review Help
Search
School of phish: a real-world evaluation of anti-phishing training
Kumaraguru P., Cranshaw J., Acquisti A., Cranor L., Hong J., Blair M., Pham T.  SOUPS 2009 (Proceedings of the 5th Symposium on Usable Privacy and Security, Mountain View, CA, Jul 15-17, 2009)1-12.2009.Type:Proceedings
Date Reviewed: Jan 19 2010

The well-designed “school of phish” experiment compares to what extent three groups, of about 170 participants each, fall for phishing scams. The control group received no training, one group was trained once, and the third group received two training sessions. The results indicate that training the participants reduces the likelihood that they will fall for phishing scams.

However, even after training, the number of participants who fall for phishing scams remains large--about 20 percent. The research demonstrates that participants are equally likely to fall for the scam, regardless of their demographics. Given that all of the participants in the experiment are either staff or students at Carnegie Mellon University, one fears that individuals randomly selected from the population at large would be even more likely to fall for phishing scams.

Case studies like the one presented here are unfortunately rare in the computer science literature. The paper represents an important first step (in the sense that it assesses the likelihood of victimization) toward a scientific study of evidence-based crime prevention. One might hope that the authors will take the next step, which would be to evaluate in randomized controlled trials how effective the “school of phish” actually is in reducing crime.

This study indicates that in spite of the significant attention received from the research community to date, phishing is still a serious problem that training alone will not solve. The paper is relevant to a wide audience interested in preventing cybercrime, which includes computer scientists, criminologists, policy makers, and members of law enforcement.

Reviewer:  Pieter Hartel Review #: CR137644 (1103-0316)
Bookmark and Share
 
Human Factors (H.1.2 ... )
 
 
Human Information Processing (H.1.2 ... )
 
 
Security and Protection (K.6.5 )
 
 
User/ Machine Systems (H.1.2 )
 
Would you recommend this review?
yes
no
Other reviews under "Human Factors": Date
A theory of computer semiotics
Andersen P., Cambridge University Press, New York, NY, 1990. Type: Book (9780521393362)
Aug 1 1992
An experimental comparison of tabular and graphic data presentation
Powers M., Lashley C., Sanchez P., Shneiderman B. International Journal of Man-Machine Studies 20(6): 545-566, 1984. Type: Article
May 1 1985
Organizing for human factors
Thomas J. (ed)  Human factors and interactive computer systems (, New York,461984. Type: Proceedings
May 1 1985
more...

E-Mail This Printer-Friendly
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy