Timing of Feedback After Phishing Simulations: Evidence from a Randomized Field Experiment

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

Given the frequent occurrence and danger of phishing attacks for individuals and organizations, a growing literature has examined the antecedents of users' phishing susceptibility and effective training interventions. In this research, we focus on feedback after phishing simulations as a novel training method to efficiently reduce user vulnerability without a requirement for their motivation or time to complete lengthy trainings. With a focus on feedback timing, we distinguish between immediate feedback for users who fail phishing simulations (so-called embedded training) and delayed feedback for all users, and we test their relative and combined effects on users' phishing vulnerability over time via a randomized field experiment. This research contributes to the phishing and cybersecurity literature by verifying phishing simulations as a training opportunity in themselves, challenging the assumed effectiveness of embedded training, and distinguishing the impacts of two types of feedback interventions.

Original languageEnglish
Title of host publication45th International Conference on Information Systems, ICIS 2024
ISBN (Electronic)9781958200131
StatePublished - 2024
Event45th International Conference on Information Systems, ICIS 2024 - Bangkok, Thailand
Duration: 15 Dec 202418 Dec 2024

Publication series

Name45th International Conference on Information Systems, ICIS 2024

Conference

Conference45th International Conference on Information Systems, ICIS 2024
Country/TerritoryThailand
CityBangkok
Period15/12/2418/12/24

Keywords

  • cyber security
  • delayed feedback
  • embedded training
  • feedback
  • Phishing attacks
  • phishing simulations
  • social engineering

Fingerprint

Dive into the research topics of 'Timing of Feedback After Phishing Simulations: Evidence from a Randomized Field Experiment'. Together they form a unique fingerprint.

Cite this