skip to main content
10.1145/3027063.3048412acmconferencesArticle/Chapter ViewAbstractPublication PageschiConference Proceedingsconference-collections
extended-abstract

What.Hack: Learn Phishing Email Defence the Fun Way

Published:06 May 2017Publication History

ABSTRACT

As information security systems become increasingly sophisticated and reliable, humans are rapidly becoming the weakest link in the security pipeline. Technological countermeasures can only be deployed if the humans depending upon them are aware of how to use them, and hackers are beginning to take advantage of the knowledge gap that exists in this area. The recent DNC hackings during the 2016 US presidential election are evidence of this, as staff were tricked into sharing passwords which granted access to confidential information by fake Google security emails. Vulnerabilities such as these are due in part to insufficient and tiresome training when it comes to information security. A potential solution is the introduction of more engaging training methods, which teach information security in an active and entertaining way. To this end, we introduce the game What.Hack to teach information security and defense methods for social engineering threats.

Skip Supplemental Material Section

Supplemental Material

sgc1015-file3.mp4

mp4

83.9 MB

References

  1. Gupta BB Atawneh S. Meulenberg A. & Almomani E. Almomani, A. 2013. A survey of phishing email filtering techniques. In IEEE communications surveys & tutorials, Vol. 15.Google ScholarGoogle Scholar
  2. Brown A. L & Cocking R. R Bransford, J. D. 1999. How people learn: Brain, mind, experience, and school. National Academy Press.Google ScholarGoogle Scholar
  3. Lerner A. Shostack A. & Kohno T. Denning, T. 2013. Control-Alt-Hack: the design and evaluation of a card game for computer security awareness and education. In ACM CCS.Google ScholarGoogle Scholar
  4. C. Herley. 2012. Why do nigerian scammers say they are from nigeria?. In WEIS.Google ScholarGoogle Scholar
  5. J. Hong. 2012. The state of phishing attacks. In Communications of the ACM, Vol. 55. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. 3909 LLC Lucas P. 2013. Papers, Please: a dystopian document thriller. http://store.steampowered.com/app/ 239030/Google ScholarGoogle Scholar
  7. N. A. Macmillan. 2002. Signal detection theory. In Stevens' handbook of experimental psychology. Google ScholarGoogle ScholarCross RefCross Ref
  8. Magnien B. Kumaraguru P. Acquisti A. Cranor L. F. Hong J. & Nunge E. Sheng, S. 2007. Anti-phishing phil: the design and evaluation of a game that teaches people not to fall for phish. In ACM SOUPS.Google ScholarGoogle Scholar
  9. Wikipedia. 2017. Podesta emails. http://en.wikipedia.org/ w/index.php?title=Podesta%20emails&oldid=759435543.Google ScholarGoogle Scholar

Index Terms

  1. What.Hack: Learn Phishing Email Defence the Fun Way

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Conferences
      CHI EA '17: Proceedings of the 2017 CHI Conference Extended Abstracts on Human Factors in Computing Systems
      May 2017
      3954 pages
      ISBN:9781450346566
      DOI:10.1145/3027063

      Copyright © 2017 Owner/Author

      Permission to make digital or hard copies of part or all of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for third-party components of this work must be honored. For all other uses, contact the Owner/Author.

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 6 May 2017

      Check for updates

      Qualifiers

      • extended-abstract

      Acceptance Rates

      CHI EA '17 Paper Acceptance Rate1,000of5,000submissions,20%Overall Acceptance Rate6,164of23,696submissions,26%

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader