The Proceedings of the Conference on Information Systems Applied Research 2009: §2366    Home    Papers/Indices    prev (§2365)    Next (§3124)
Fri, Nov 6, 11:30 - 11:55, Crystal 6     Paper (refereed)
Recommended Citation: Bekkering, E, D Hutchison, and L A Werner.  A Follow-up Study of Detecting Phishing Emails.  In The Proceedings of the Conference on Information Systems Applied Research 2009, v 2 (Washington DC): §2366. ISSN: 0000-0000.
CDpic

A Follow-up Study of Detecting Phishing Emails

thumb
Refereed6 pages
Ernst Bekkering    [a1] [a2]
Department of IS and Technology
Northeastern State University    [u1] [u2]
Tahlequah, Oklahoma, USA    [c1] [c2]

Dan Hutchison    [a1] [a2]
Department of IS and Technology
Northeastern State University    [u1] [u2]
Tahlequah, Oklahoma, USA    [c1] [c2]

Laurie A. Werner    [a1] [a2]
Department of Computer and Information Technology
Miami University Hamilton    [u1] [u2]
Hamilton, Ohio, USA    [c1] [c2]

Phishing continues to be an ongoing threat to online security. In a previous study, Werner and Courte (2008) demonstrated that training in detecting phishing emails helped students to feel that they were better able to deal with phishing attacks. This study follows up on that study and reports whether students were actually better at differentiating between phishing emails and legitimate emails after receiving training.

Keywords: phishing, information security, crimeware, computing literacy, prevention

Read this refereed paper in Adobe Portable Document (PDF) format. (6 pages, 345 K bytes)
Preview this refereed paper in Plain Text (TXT) format. (15 K bytes)

CDpic
Comments and corrections to
webmaster@isedj.org