This paper explores how an organization can utilize its employees to combat phishing attacks collectively through coordinating their activities to create a human firewall. We utilize knowledge management research on knowledge sharing to guide the design of an experiment that explores a central reporting and dissemination platform for phishing attacks. The 2x2 experiment tests the effects of public attribution (to the first person reporting a phishing message) and validation (by the security team) of phishing messages on reporting motivation and accuracy. Results demonstrate that knowledge management techniques are transferable to organizational security and that knowledge management can benefit from insights gained from combating phishing. ...
This research seeks to derive and examine a multidimensional definition of information security awar...
Phishing is a social engineering scam that can cause data loss, reputational damages, identity theft...
Phishing is a major threat to organizational information security, with the employee being a critica...
This paper explores how an organization can utilize its employees to combat phishing attacks collect...
In this research, we examine the role of top management involvement in creating phishing awareness i...
Phishing, as a social engineering attack has become an increasing threat to organizations in cybersp...
Email is of critical importance as a communication channel for both business and personal matters. U...
Cybersecurity cannot be ensured with mere technical solutions. Hackers often use fraudulent emails t...
Phishing is a major cyber threat to organizations that can cause financial and reputational damage, ...
While security vendors have documented trends in phishing attacks across numerous industries, there ...
Phishing, as a social engineering attack has become an increasing threat to organizations in cybersp...
Problem: How can the effectiveness of a phishing attack be quantified and/or measured? Applications:...
To exploit the human as the "back door" to compromising well-protected information systems...
Cyber criminals use phishing emails in high-volume and spear phishing emails in low volume to achiev...
Phishing is a social engineering scam that can cause financial and reputational damages to people an...
This research seeks to derive and examine a multidimensional definition of information security awar...
Phishing is a social engineering scam that can cause data loss, reputational damages, identity theft...
Phishing is a major threat to organizational information security, with the employee being a critica...
This paper explores how an organization can utilize its employees to combat phishing attacks collect...
In this research, we examine the role of top management involvement in creating phishing awareness i...
Phishing, as a social engineering attack has become an increasing threat to organizations in cybersp...
Email is of critical importance as a communication channel for both business and personal matters. U...
Cybersecurity cannot be ensured with mere technical solutions. Hackers often use fraudulent emails t...
Phishing is a major cyber threat to organizations that can cause financial and reputational damage, ...
While security vendors have documented trends in phishing attacks across numerous industries, there ...
Phishing, as a social engineering attack has become an increasing threat to organizations in cybersp...
Problem: How can the effectiveness of a phishing attack be quantified and/or measured? Applications:...
To exploit the human as the "back door" to compromising well-protected information systems...
Cyber criminals use phishing emails in high-volume and spear phishing emails in low volume to achiev...
Phishing is a social engineering scam that can cause financial and reputational damages to people an...
This research seeks to derive and examine a multidimensional definition of information security awar...
Phishing is a social engineering scam that can cause data loss, reputational damages, identity theft...
Phishing is a major threat to organizational information security, with the employee being a critica...