S

A Naturalistic Methodology for Assessing Susceptibility to Social Engineering Through Phishing

Show simple item record

dc.contributor.author Kigen, Paula Musuva
dc.contributor.author Chepken, Christopher
dc.contributor.author Getao, Katherine
dc.date.accessioned 2021-06-28T20:08:45Z
dc.date.available 2021-06-28T20:08:45Z
dc.date.issued 2019-01-07
dc.identifier.uri http://erepo.usiu.ac.ke/11732/6577
dc.description A Journal article by Dr. Paula Musuva, a Lecturer in Forensic Information Technology at the School of Science and Technology in USIU- Africa Full Article: https://digitalcommons.kennesaw.edu/ajis/vol11/iss3/2 en_US
dc.description.abstract Phishing continues to be a prevalent social engineering attack. Attacks are relatively easy to setup and can target many people at low cost. This study presents a naturalistic field experiment that can be staged by organisations to determine their exposure. This exercise provides results with high ecological validity and can give organisations the information they need to craft countermeasures to social engineering risks. The study was conducted at a university campus in Kenya where 241 valid system users, also known as “insiders,” are targeted in a staged phishing experiment. The results show that 31.12% of the insiders are susceptible to phishing and 88% of them disclose passwords that grant access to attackers. This study outlines various ethical considerations that ensure such exercises do not present any actual harm. The design of data collection instruments is discussed in depth to allow organisations the opportunity to develop similar tools for routine threat assessment. en_US
dc.publisher DigitalCommons@Kennesaw State University en_US
dc.subject Naturalistic Methodology en_US
dc.subject Susceptibility en_US
dc.subject Social Engineering en_US
dc.subject Phishing en_US
dc.title A Naturalistic Methodology for Assessing Susceptibility to Social Engineering Through Phishing en_US
dc.type Article en_US


Files in this item

Files Size Format View

There are no files associated with this item.

This item appears in the following Collection(s)

Show simple item record

Search Repository


Browse

My Account