Phishing
Thus the design of the current research prototype includes four lines of development:
Risk Context Analysis- Creating the ability to identify a user risk context from intrinsic (user activity, history, and known network entities) and extrinsic (system configuration, location, network details) factors.
Automatic Context Response- Automatically adapt system actions and configuration to the changing context, to reduce cognitive overload on the user by taking non-controversial actions without involving the human.
Metaphorical Risk Communication- Ability to convey risk factors of a particular context to the user in narrative form consistent with the users' mental model that will be quickly and effectively understood.
Intelligent Communication- Engaging the user effectively and infrequently, appropriately, and only for the time necessary to communicate.
Publications
Articles in journals or book chapters (4) |
-
Anne C. Tally,
Jacob Abbott,
Ashley Bochner,
Sanchari Das,
and Christena Nippert-Eng.
What Mid-Career Professionals Think, Know, and Feel About Phishing: Opportunities for University IT Departments to Better Empower Employees in Their Anti-Phishing Decisions.
Proc. ACM Hum.-Comput. Interact.,
7(CSCW1),
April 2023.
Keywords: anti-phishing training, work context, organizations, user studies, IT departments, workplace, phishing, human factors, anti-phishing policy, security, organizational security. [bibtex-entry] -
Sanchari Das,
Christena Nippert-Eng,
and L Jean Camp.
Evaluating user susceptibility to phishing attacks.
Information & Computer Security,
30(1):1--18,
2022.
Keywords: phishing, user studies. [bibtex-entry] -
Zheng Dong,
Apu Kapadia,
and L. Jean Camp.
Pinning & binning: Real time classification of certificates.
December 2013.
Keywords: Phishing, Network Engineering. [bibtex-entry] -
Alla Genkina and L. Jean Camp.
Social networks.
Phishing and countermeasures: Understanding the increasing problem of electronic identity theft, M. Jakobsson and S. Myers, Eds. Hoboken: John Wiley & Sons,
pp 523--550,
2007.
Note: Wiley Online Library.
Keywords: Phishing. [bibtex-entry]
Conference publications (7) |
-
Anne Clara Tally,
Jacob Abbott,
Ashley M Bochner,
Sanchari Das,
and Christena Nippert-Eng.
Tips, Tricks, and Training: Supporting Anti-Phishing Awareness among Mid-Career Office Workers Based on Employees’ Current Practices.
In Proceedings of the 2023 CHI Conference on Human Factors in Computing Systems,
CHI '23,
New York, NY, USA,
2023.
Association for Computing Machinery.
Keywords: phishing education, cybersecurity, informal learning, guerrilla learning, phishing, workplace, anti-phishing training, organizations, IT departments, security, work context, organizational security, qualitative user studies, human factors. [bibtex-entry] -
Vafa Andalibi,
Erfan Sadeqi Azer,
and L Jean Camp.
Criteria and Analysis for Human-Centered Browser Fingerprinting Countermeasures.
In Proceedings of the 55th Hawaii International Conference on System Sciences,
2022.
Keywords: phishing, user studies, global resilience. [bibtex-entry] -
Shakthidhar Gopavaram,
Jayati Dev,
Marthie Grobler,
DongInn Kim,
Sanchari Das,
and L Jean Camp.
Cross-National Study on Phishing Resilience.
In Proceedings of the Workshop on Usable Security and Privacy (USEC),
May 2021.
Keywords: Phishing. [bibtex-entry] -
Sanchari Das,
Jacob Abbott,
Shakthidhar Gopavaram,
Jim Blythe,
and L Jean Camp.
User-Centered Risk Communication for Safer Browsing.
In Proceedings of the First Asia USEC-Workshop on Usable Security, In Conjunction with the Twenty-Fourth International Conference International Conference on Financial Cryptography and Data Security,
2020.
Keywords: Phishing, Risk Communication, Privacy, Security. [bibtex-entry] -
Zheng Dong,
Apu Kapadia,
Jim Blythe,
and L. Jean Camp.
Beyond the lock icon: real-time detection of phishing websites using public key certificates.
In Electronic Crime Research (eCrime), 2015 APWG Symposium on,
pages 1--12,
May 2015.
IEEE.
Keywords: Phishing, E-Crime. [bibtex-entry] -
Zheng Dong,
Kevin Kane,
and L. Jean Camp.
Phishing in Smooth Waters: The State of Banking Certificates in the US.
In 2014 TPRC Conference Paper,
2014.
Keywords: Phishing, E-Crime. [bibtex-entry]
Posters and Presentations (3) |
-
DongInn Kim and L Jean Camp.
Block-Pi: Defending against Man In The Middle (MITM) Attacks at the Edge.
Society for Risk Analysis, SRA 2019, Buffalo NY,
June 2019.
Keywords: Phishing. [bibtex-entry] -
Sanchari Das,
DongInn Kim,
Timothy Kelley,
and L Jean Camp.
Grifting in the Digital Age, Analyzing Risk Communication Tools.
eCrime APWG 2018, Sandiego CA,
May 2018.
Keywords: Phishing. [bibtex-entry] -
Sanchari Das,
DongInn Kim,
Timothy Kelley,
and L Jean Camp.
Grifting in the Digital Age, Analyzing Risk Communication Tools.
Midwest Security Workshop 2018, Washington DC,
April 2018.
Keywords: Phishing. [bibtex-entry]