Comparison of different training methods impact on users ability to detect phishing
https://doi.org/10.5878/g6d9-7210
The data was collected in a simulated experiment with the purpose of studying how different types of cybersecurity training impacts users' ability to correctly identify phishing e-mail. For the experiment, an isolated e-mail world was developed and participants were given an inbox containing 5 legitimate e-mails and 6 phishing e-mails. They were asked to assume the persona of the inbox owner and then delete all e-mails they considered to be phishing. They were also asked to “think aloud” during the experiment. Their performance was monitored by an experiment supervisor using an eye tracker and continuous monitoring of the participants screen.
Data files
Data files
Documentation files
Documentation files
Citation and access
Citation and access
Method and outcome
Method and outcome
Administrative information
Administrative information
Topic and keywords
Topic and keywords
Metadata
Metadata
Version 1

University of Skövde