Over the past decade, cybercrime has increased dramatically, and a popular way to steal someone’s information is via phishing. There are three major ways to protect from a phishing attack: automatic filters, warnings, and user training. User training makes a good safety net for the few instances when filters fail to catch a security risk and warnings go unheeded. Training is most effective when feedback is given immediately and when it is simple and engaging. Phishermen often use psychological techniques in order to gain access to sensitive information, and conformity is a well-documented phenomenon that can cause people to make decisions and act in a way that they normally would not do. If phishermen were able to create an attack that triggered conformity, the effects of that conformity could potentially overpower the effects of training. This thesis will examine the effects of conformity in an online phishing context. We will examine whether training will cause people to be less likely to conform to a majority in an online setting.
|Commitee:||Neuschatz, Jeff, Price, Jodi|
|School:||The University of Alabama in Huntsville|
|School Location:||United States -- Alabama|
|Source:||MAI 56/02M(E), Masters Abstracts International|
|Subjects:||Psychology, Criminology, Continuing education|
|Keywords:||Conformity, Cybersecurity, Email, Phishing, Training, URL|
Copyright in each Dissertation and Thesis is retained by the author. All Rights Reserved
The supplemental file or files you are about to download were provided to ProQuest by the author as part of a
dissertation or thesis. The supplemental files are provided "AS IS" without warranty. ProQuest is not responsible for the
content, format or impact on the supplemental file(s) on our system. in some cases, the file type may be unknown or
may be a .exe file. We recommend caution as you open such files.
Copyright of the original materials contained in the supplemental file is retained by the author and your access to the
supplemental files is subject to the ProQuest Terms and Conditions of use.
Depending on the size of the file(s) you are downloading, the system may take some time to download them. Please be