Building Confidence not to be Phished through a Gamified Approach: Conceptualising User's Self-Efficacy in Phishing Threat Avoidance Behaviour

11/22/2018
by   Gitanjali Baral, et al.
0

Phishing attacks are prevalent and humans are central to this online identity theft attack, which aims to steal victims' sensitive and personal information such as username, password, and online banking details. There are many anti-phishing tools developed to thwart against phishing attacks. Since humans are the weakest link in phishing, it is important to educate them to detect and avoid phishing attacks. One can argue self-efficacy is one of the most important determinants of individual's motivation in phishing threat avoidance behavior, which has co-relation with knowledge. The proposed research endeavors on the user's self-efficacy in order to enhance the individual's phishing threat avoidance behavior through their motivation. Using social cognitive theory, we explored that various knowledge attributes such as observational (vicarious) knowledge, heuristic knowledge and structural knowledge contributes immensely towards the individual's self-efficacy to enhance phishing threat prevention behavior. A theoretical framework is then developed depicting the mechanism that links knowledge attributes, self-efficacy, threat avoidance motivation that leads to users' threat avoidance behavior. Finally, a gaming prototype is designed incooperating the knowledge elements identified in this research that aimed to enhance individual's self-efficacy in phishing threat avoidance behavior.

READ FULL TEXT
research
03/02/2022

Mobile device users' susceptibility to phishing attacks

The mobile device is one of the fasted growing technologies that is wide...
research
10/17/2017

Phish Phinder: A Game Design Approach to Enhance User Confidence in Mitigating Phishing Attacks

Phishing is an especially challenging cyber security threat as it does n...
research
08/07/2023

Sex differences in attitudes towards online privacy and anonymity among Israeli students with different technical backgrounds

Introduction. In this exploratory study, we proposed an experimental fra...
research
10/17/2018

When Human cognitive modeling meets PINs: User-independent inter-keystroke timing attacks

This paper proposes the first user-independent inter-keystroke timing at...
research
08/24/2021

Image-based Insider Threat Detection via Geometric Transformation

Insider threat detection has been a challenging task over decades, exist...
research
12/04/2022

Personal Green IT Use: Findings from a Literature Review

Research addressing the greening of internet user behaviours at hedonic ...

Please sign up or login with your details

Forgot password? Click here to reset