Papers and Articles published by Members of the SECUSO Research Group

NoPhish App Evaluation: Lab and Retention Study

Author Gamze Canova, Melanie Volkamer, Clemens Bergmann, Benjamin Reinheimer
Date February 2015
Kind Inproceedings
PublisherInternet Society
Book titleNDSS Workshop on Usable Security 2015
LocationSan Diego
KeyTUD-CS-2015-0014
Research Areas CASED, Security, Usability and Society, Theoretische Informatik - Kryptographie und Computeralgebra, Secure Data, CYSEC
Abstract Phishing is a prevalent issue of today’s Internet. Previous approaches to counter phishing do not draw on a crucial factor to combat the threat - the users themselves. We believe user education about the dangers of the Internet is a further key strategy to combat phishing. For this reason, we developed an Android app, a game called –NoPhish–, which educates the user in the detection of phishing URLs. It is crucial to evaluate NoPhish with respect to its effectiveness and the users’ knowledge retention. Therefore, we conducted a lab study as well as a retention study (five months later). The outcomes of the studies show that NoPhish helps users make better decisions with regard to the legitimacy of URLs immediately after playing NoPhish as well as after some time has passed. The focus of this paper is on the description and the evaluation of both studies. This includes findings regarding those types of URLs that are most difficult to decide on as well as ideas to further improve NoPhish. 
Website http://www.internetsociety.org/sites/default/files/03_3_3.pdf
Full paper (pdf)
[Export this entry to BibTeX]

Important Copyright Notice:

The documents contained in these directories are included by the contributing authors as a means to ensure timely dissemination of scholarly and technical work on a non-commercial basis. Copyright and all rights therein are maintained by the authors or by other copyright holders, notwithstanding that they have offered their works here electronically. It is understood that all persons copying this information will adhere to the terms and constraints invoked by each author's copyright. These works may not be reposted without the explicit permission of the copyright holder.
A A A | Drucken Print | Impressum Impressum | Sitemap Sitemap | Suche Search | Kontakt Contact | Website Analysis: More Information
zum Seitenanfangzum Seitenanfang