36 research outputs found

    Don’t click : towards an effective anti-phishing training. A comparative literature review

    Get PDF
    Email is of critical importance as a communication channel for both business and personal matters. Unfortunately, it is also often exploited for phishing attacks. To defend against such threats, many organizations have begun to provide anti-phishing training programs to their employees. A central question in the development of such programs is how they can be designed sustainably and effectively to minimize the vulnerability of employees to phishing attacks. In this paper, we survey and categorize works that consider different elements of such programs via a clearly laid-out methodology, and identify key findings in the technical literature. Overall, we find that researchers agree on the answers to many relevant questions regarding the utility and effectiveness of anti-phishing training. However, we identified influencing factors, such as the impact of age on the success of anti-phishing training programs, for which mixed findings are available. Finally, based on our comprehensive analysis, we describe how a well-founded anti-phishing training program should be designed and parameterized with a set of proposed research directions

    Open Data

    No full text

    DR1 - LC6 Open Data Sharing

    No full text
    OSF project for DR1 LC6 assignment at the Bern University of Applied Sciences

    Selbstüberschätzung von Bewerbern kann erkannt und gemessen werden

    Full text link
    Im Rahmen eines Forschungsprojektes an der Universität Zürich wurde die so genannte Überkonfidenz in Bezug auf den Bewerbungsprozess untersucht. Die meisten der dazu befragten HR-Experten kannten zwar nicht den Begriff, wohl aber das Phänomen. Und diesem lässt sich mit relativ einfachen Mitteln auf die Spur kommen

    Didactical Issues of a Remote Network Laboratory

    No full text
    This paper will not focus on the technical architectural issues; they are described in "Architectural Issues of a Remote Network Laboratory" (Steinemann et al. 2002
    corecore