Please use this identifier to cite or link to this item: https://doi.org/10.21256/zhaw-26525
Full metadata record
DC FieldValueLanguage
dc.contributor.authorSutter, Thomas-
dc.contributor.authorBozkir, Ahmet Selman-
dc.contributor.authorGehring, Benjamin-
dc.contributor.authorBerlich, Peter-
dc.date.accessioned2023-01-05T09:12:46Z-
dc.date.available2023-01-05T09:12:46Z-
dc.date.issued2022-09-16-
dc.identifier.issn2169-3536de_CH
dc.identifier.urihttps://digitalcollection.zhaw.ch/handle/11475/26525-
dc.description.abstractPhishing attacks are still seen as a significant threat to cyber security, and large parts of the industry rely on anti-phishing simulations to minimize the risk imposed by such attacks. This study conducted a large-scale anti-phishing training with more than 31000 participants and 144 different simulated phishing attacks to develop a data-driven model to classify how users would perceive a phishing simulation. Furthermore, we analyze the results of our large-scale anti-phishing training and give novel insights into users’ click behavior. Analyzing our anti-phishing training data, we find out that 66% of users do not fall victim to credential-based phishing attacks even after being exposed to twelve weeks of phishing simulations. To further enhance the phishing awareness-training effectiveness, we developed a novel manifold learning-powered machine learning model that can predict how many people would fall for a phishing simulation using the several structural and state-of-the-art NLP features extracted from the emails. In this way, we present a systematic approach for the training implementers to estimate the average “convincing power” of the emails prior to rolling out. Moreover, we revealed the top-most vital factors in the classification. In addition, our model presents significant benefits over traditional rule-based approaches in classifying the difficulty of phishing simulations. Our results clearly show that anti-phishing training should focus on the training of individual users rather than on large user groups. Additionally, we present a promising generic machine learning model for predicting phishing susceptibility.de_CH
dc.language.isoende_CH
dc.publisherIEEEde_CH
dc.relation.ispartofIEEE Accessde_CH
dc.rightshttp://creativecommons.org/licenses/by-nc-nd/4.0/de_CH
dc.subjectMachine learningde_CH
dc.subjectPhishingde_CH
dc.subjectPhishing awarenessde_CH
dc.subjectHuman factorde_CH
dc.subjectPredictive modelde_CH
dc.subjectInformation securityde_CH
dc.subjectHuman computer interactionde_CH
dc.subjectDifficulty estimationde_CH
dc.subject.ddc005: Computerprogrammierung, Programme und Datende_CH
dc.subject.ddc150: Psychologiede_CH
dc.titleAvoiding the hook : influential factors of phishing awareness training on click-rates and a data-driven approach to predict email difficulty perceptionde_CH
dc.typeBeitrag in wissenschaftlicher Zeitschriftde_CH
dcterms.typeTextde_CH
zhaw.departementSchool of Engineeringde_CH
zhaw.organisationalunitInstitut für Informatik (InIT)de_CH
dc.identifier.doi10.1109/ACCESS.2022.3207272de_CH
dc.identifier.doi10.21256/zhaw-26525-
zhaw.funding.euNode_CH
zhaw.originated.zhawYesde_CH
zhaw.pages.end100565de_CH
zhaw.pages.start100540de_CH
zhaw.publication.statuspublishedVersionde_CH
zhaw.volume10de_CH
zhaw.publication.reviewPeer review (Publikation)de_CH
zhaw.webfeedInformation Securityde_CH
zhaw.funding.zhawOptiPhish – Effective and Measurable Phishing Awareness Trainingde_CH
zhaw.author.additionalNode_CH
zhaw.display.portraitYesde_CH
Appears in collections:Publikationen School of Engineering

Files in This Item:
File Description SizeFormat 
2022_Sutter-etal_Influential-factors-of-Phishing-awareness-training.pdf4.28 MBAdobe PDFThumbnail
View/Open
Show simple item record
Sutter, T., Bozkir, A. S., Gehring, B., & Berlich, P. (2022). Avoiding the hook : influential factors of phishing awareness training on click-rates and a data-driven approach to predict email difficulty perception. IEEE Access, 10, 100540–100565. https://doi.org/10.1109/ACCESS.2022.3207272
Sutter, T. et al. (2022) ‘Avoiding the hook : influential factors of phishing awareness training on click-rates and a data-driven approach to predict email difficulty perception’, IEEE Access, 10, pp. 100540–100565. Available at: https://doi.org/10.1109/ACCESS.2022.3207272.
T. Sutter, A. S. Bozkir, B. Gehring, and P. Berlich, “Avoiding the hook : influential factors of phishing awareness training on click-rates and a data-driven approach to predict email difficulty perception,” IEEE Access, vol. 10, pp. 100540–100565, Sep. 2022, doi: 10.1109/ACCESS.2022.3207272.
SUTTER, Thomas, Ahmet Selman BOZKIR, Benjamin GEHRING und Peter BERLICH, 2022. Avoiding the hook : influential factors of phishing awareness training on click-rates and a data-driven approach to predict email difficulty perception. IEEE Access. 16 September 2022. Bd. 10, S. 100540–100565. DOI 10.1109/ACCESS.2022.3207272
Sutter, Thomas, Ahmet Selman Bozkir, Benjamin Gehring, and Peter Berlich. 2022. “Avoiding the Hook : Influential Factors of Phishing Awareness Training on Click-Rates and a Data-Driven Approach to Predict Email Difficulty Perception.” IEEE Access 10 (September): 100540–65. https://doi.org/10.1109/ACCESS.2022.3207272.
Sutter, Thomas, et al. “Avoiding the Hook : Influential Factors of Phishing Awareness Training on Click-Rates and a Data-Driven Approach to Predict Email Difficulty Perception.” IEEE Access, vol. 10, Sept. 2022, pp. 100540–65, https://doi.org/10.1109/ACCESS.2022.3207272.


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.