TY - GEN
T1 - Timing of Feedback After Phishing Simulations
T2 - 45th International Conference on Information Systems, ICIS 2024
AU - Yin, Dezhi
AU - Mullarkey, Matthew T.
AU - de Vreede, Gert Jan
AU - Limayem, Moez
N1 - Publisher Copyright:
© 2024 International Conference on Information Systems. All Rights Reserved.
PY - 2024
Y1 - 2024
N2 - Given the frequent occurrence and danger of phishing attacks for individuals and organizations, a growing literature has examined the antecedents of users' phishing susceptibility and effective training interventions. In this research, we focus on feedback after phishing simulations as a novel training method to efficiently reduce user vulnerability without a requirement for their motivation or time to complete lengthy trainings. With a focus on feedback timing, we distinguish between immediate feedback for users who fail phishing simulations (so-called embedded training) and delayed feedback for all users, and we test their relative and combined effects on users' phishing vulnerability over time via a randomized field experiment. This research contributes to the phishing and cybersecurity literature by verifying phishing simulations as a training opportunity in themselves, challenging the assumed effectiveness of embedded training, and distinguishing the impacts of two types of feedback interventions.
AB - Given the frequent occurrence and danger of phishing attacks for individuals and organizations, a growing literature has examined the antecedents of users' phishing susceptibility and effective training interventions. In this research, we focus on feedback after phishing simulations as a novel training method to efficiently reduce user vulnerability without a requirement for their motivation or time to complete lengthy trainings. With a focus on feedback timing, we distinguish between immediate feedback for users who fail phishing simulations (so-called embedded training) and delayed feedback for all users, and we test their relative and combined effects on users' phishing vulnerability over time via a randomized field experiment. This research contributes to the phishing and cybersecurity literature by verifying phishing simulations as a training opportunity in themselves, challenging the assumed effectiveness of embedded training, and distinguishing the impacts of two types of feedback interventions.
KW - cyber security
KW - delayed feedback
KW - embedded training
KW - feedback
KW - Phishing attacks
KW - phishing simulations
KW - social engineering
UR - https://www.scopus.com/pages/publications/105010824531
UR - https://www.scopus.com/pages/publications/105010824531#tab=citedBy
M3 - Conference contribution
AN - SCOPUS:105010824531
T3 - 45th International Conference on Information Systems, ICIS 2024
BT - 45th International Conference on Information Systems, ICIS 2024
Y2 - 15 December 2024 through 18 December 2024
ER -