Open access repository

Home Open access repository

In 2014, we launched our open-access repository which offers full text access to conference proceedings from many of our events including the INC and HAISA series. These papers are free to access and distribute (subject to citing the source).

» Openaccess proceedings » Thirteenth International Symposium on Human Aspects of Information Security & Assurance (HAISA 2019)

Thirteenth International Symposium on Human Aspects of Information Security & Assurance (HAISA 2019)

Thirteenth International Symposium on Human Aspects of Information Security & Assurance (HAISA 2019)
Nicosia, Cyprus, July 15-16, 2019
ISBN: 978-0244-19096-5

Title: All About Phishing: Exploring User Research through a Systematic Literature Review
Author(s): Sanchari Das, Andrew Kim, Zachary Tingle, Christena Nippert-Eng
Reference: pp189-202
Keywords: Authentication, Phishing, User Studies, Systematic Literature Review, Usable Privacy and Security.
Abstract: Phishing is a well-known cybersecurity attack that has rapidly increased in recent years. It poses legitimate risks to businesses, government agencies, and all users due to sensitive data breaches, subsequent financial and productivity losses, and social and personal inconvenience. Often, these attacks use social engineering techniques to deceive end-users, indicating the importance of user-focused studies to help prevent future attacks. We provide a detailed overview of phishing research that has focused on users by conducting a systematic literature review of peer-reviewed academic papers published in ACM Digital Library. Although published work on phishing appears in this data set as early as 2004, we found that of the total number of papers on phishing (N = 367) only 13.9% (n = 51) focus on users by employing user study methodologies such as interviews, surveys, and in-lab studies. Even within this small subset of papers, we note a striking lack of attention to reporting important information about methods and participants (e.g., the number and nature of participants), along with crucial recruitment biases in some of the research.
Download count: 688

How to get this paper:

Download a free PDF copy of this paperBuy this book at Lulu.com

PDF copy of this paper is free to download. You may distribute this copy providing you cite this page as the source.