{"title":"了解钓鱼攻击发生时的用户行为","authors":"Yi Li, Kaiqi Xiong, Xiangyang Li","doi":"10.1109/ISI.2019.8823468","DOIUrl":null,"url":null,"abstract":"To study user security-related behaviors, we conduct an experimental study where participants take part in our experiments in a lab contained environment. We used a set of emails including phishing emails from the real world. We collect data including participants’ basic information and time measurement. We check whether or not factors such as intervention, phishing types, and incentive mechanisms play a major role in user behaviors when phishing attacks occur.","PeriodicalId":156130,"journal":{"name":"2019 IEEE International Conference on Intelligence and Security Informatics (ISI)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2019-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"4","resultStr":"{\"title\":\"Understanding User Behaviors When Phishing Attacks Occur\",\"authors\":\"Yi Li, Kaiqi Xiong, Xiangyang Li\",\"doi\":\"10.1109/ISI.2019.8823468\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"To study user security-related behaviors, we conduct an experimental study where participants take part in our experiments in a lab contained environment. We used a set of emails including phishing emails from the real world. We collect data including participants’ basic information and time measurement. We check whether or not factors such as intervention, phishing types, and incentive mechanisms play a major role in user behaviors when phishing attacks occur.\",\"PeriodicalId\":156130,\"journal\":{\"name\":\"2019 IEEE International Conference on Intelligence and Security Informatics (ISI)\",\"volume\":\"22 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2019-07-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"4\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2019 IEEE International Conference on Intelligence and Security Informatics (ISI)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ISI.2019.8823468\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2019 IEEE International Conference on Intelligence and Security Informatics (ISI)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ISI.2019.8823468","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Understanding User Behaviors When Phishing Attacks Occur
To study user security-related behaviors, we conduct an experimental study where participants take part in our experiments in a lab contained environment. We used a set of emails including phishing emails from the real world. We collect data including participants’ basic information and time measurement. We check whether or not factors such as intervention, phishing types, and incentive mechanisms play a major role in user behaviors when phishing attacks occur.