scholarly journals Anti-Phishing Awareness Delivery Methods

2021 ◽  
Vol 11 (6) ◽  
pp. 7944-7949
Author(s):  
A. Darem

Phishing attacks are increasingly exploited by cybercriminals, they become more sophisticated and evade detection even by advanced technical countermeasures. With cybercriminals resorting to more sophisticated phishing techniques, strategies, and different channels such as social networks, phishing is becoming a hard problem to solve. Therefore, the main objective for any anti-phishing solution is to minimize phishing success and its consequences through complementary means to advanced technical countermeasures. Specifically, phishing threats cannot be controlled by technical controls alone, thus it is imperative to complement cybersecurity programs with cybersecurity awareness programs to successfully fight against phishing attacks. This paper provides a review of the delivery methods of cybersecurity training programs used to enhance personnel security awareness and behavior in terms of phishing threats. Although there are a wide variety of educational intervention methods against phishing, the differences between the cybersecurity awareness delivery methods are not always clear. To this end, we present a review of the most common methods of workforce cybersecurity training methods in order for them to be able to protect themselves from phishing threats.

2020 ◽  
Vol 338 ◽  
pp. 189-200
Author(s):  
Ildikó Legárd

Many researchers and experts in the field of information security agree that the user is the weakest link in an organization’s chain of information security. Even if the system’s and the stored data’s physical and logical protection is well developed, the human factor exposes security to significant risk. The effective protection against the threats is to provide security awareness through implementing a well-developed and successful Information Security Awareness Program. Although organizations are able to recognize the importance of information security awareness, the implementation of the awareness programs can be difficult. The aim of this study is to help organizations to develop an effective Information Security Awareness Program tailored to the characteristics of the organization. The paper presents how we can build a program that influences and improves the user’s knowledge, attitude and behavior the most towards information security and makes positive changes in the security culture of an organization. To achieve that goal, the study identifies the key elements of the implementation, compares traditional awareness programs with modern trainings and highlights the importance of communication channels and methods. There is no single solution to improve information security, the essay summarizes and shows the most effective techniques that experts can use in order to seize the user’s attention toward information security, to establish credibility and trust, and to motivate action.


2016 ◽  
Vol 34 (5) ◽  
pp. 412-416 ◽  
Author(s):  
Cara M. Brock ◽  
Christopher M. Herndon

Introduction: Currently more than 5800 hospice organizations operate in the United States.1 Hospice organizations are required by the Centers for Medicare and Medicaid Services (CMS) to use volunteers for services provided to patients.2 Although CMS regulates the amount of hours hospice volunteers should provide, there are currently no national requirements for objectives of training.3 The purpose of this study was to gather information from a sample of hospices regarding volunteer coordinator background, current training for volunteers, importance of training objectives, and any comments regarding additional objectives. Methods: Representative state hospice organizations were contacted by e-mail requesting their participation and distribution of the survey throughout their member hospices. The survey asked demographical questions, along with ratings of training components based on perceived level of importance and time spent on each objective. Results: A total of 90 surveys were received, and the response rate was undeterminable. Results showed the majority of hospices were nonprofit, had less than 100 currently trained volunteers, and maintained an average daily patient census of less than 50. Questions regarding training programs indicated that most use live lecture methods of approximately 19 hours or less in duration. Overall, responding hospice organizations agreed that all objectives surveyed were important in training volunteers. Conclusion: The small number of respondents to this survey makes generalization nationwide difficult, however it is a strong starting point for the development of further surveys on hospice volunteer training and achieving a standardized set of training objectives and delivery methods.


Author(s):  
Rishesh Kumar Gupta

The present paper focuses on Cyber Security Awareness Campaign’s lacking in many rural and urban area of India and Changing behavior requires more information security awareness programs and we extract essential components from Social media and with appropriate procedural and technological work. We can use it for an awareness campaign. Large amount of raw data that has been viewed by users in the form of text, videos, photos and audio. The outcome showed that the delivery methods improves the awareness on the general population.


Author(s):  
Anandharaman Pattabiraman ◽  
Sridhar Srinivasan ◽  
Kaushik Swaminathan ◽  
Manish Gupta

It has been very evident from data breaches from last few years that attackers are increasingly targeting the path of least resistance to compromise the security of organizations. Cyber security threats that exploit human behavior are becoming sophisticated and difficult to prevent against. At the same time humans are the countermeasures that can adapt swiftly to changing risk landscape than technological and procedural countermeasures. Organizations are implementing and enhancing their security awareness and training programs in an attempt to ensure that risks from human elements, which pose the greatest risks, are mitigated. The chapter conducts a thorough literature review in the area of security awareness and training and presents a classification scheme and a conceptual research model to provide insights into the existing body of knowledge in the area. Trends and analyses are also presented from the reviewed papers, which can be of importance to organizations in improving their security awareness programs. The insights from the study can be leveraged to build a strong human wall against both internal and external threats that are fast evolving and causing tremendous amount of loss.


2012 ◽  
Vol 16 (4) ◽  
pp. 165-168 ◽  
Author(s):  
Yu Andy Wu ◽  
Carl S. Guynes ◽  
John Windsor

A critical component of security design is security awareness programs. Implemented effectively, security awareness programs enable organizational members to understand the organizations security posture, their responsibilities, and courses of action in the face of security incidents (Purser, 2004). Awareness training programs should be designed as an initiative to foster organizational learning. In addition to the widely used training methods built with traditional or computer-based media, organizational learning tools, such as cognitive maps, are recommended in training to build security awareness as one type of distributed cognition.


Salmand ◽  
2020 ◽  
Vol 15 (3) ◽  
pp. 324-337
Author(s):  
Amin Mirzaei ◽  
◽  
Ali Ramezankhani ◽  
Parisa Taheri Tanjani ◽  
Mohtasham Ghaffari ◽  
...  

Objectives: Health literacy is one of the most important social determinants of elderly health. This study aimed to determine the effectiveness of the educational intervention on knowledge, attitude, and nutritional behaviors of the elderly with adequate health literacy and inadequate health literacy. Methods & Materials: An experimental study was conducted with 192 people 60 years and older in Ilam Province, Iran, from May to September 2016. The elderly were assigned into four groups (48 subjects in each group), including two intervention groups with adequate and inadequate health literacy and two control groups with sufficient and insufficient health literacy. The elderly nutrition education program consisted of four lecture sessions with questions and answers, along with an elderly nutrition manual for the intervention group. The level of health literacy among the elderly was assessed using functional health literacy in adults. The level of knowledge, attitude, and nutritional behaviors was assessed using a researcher-made questionnaire in two stages before and two months after the educational intervention. The SPSS V. 21 was used for data analysis. Descriptive statistics and the Chi-square, paired t test, and Fisher exact test were used for data analysis. Results: The Mean±SD age of the men was 61.24±2.38 years, and the mean±SD age of women was 61.35±2.45 years. The majority of men with adequate health literacy were men (84.37%), while the proportion of men and women in those with inadequate health literacy was almost the same. All participants with adequate health literacy and 89.58% of those with inadequate health literacy were married. After the educational intervention, the mean scores of knowledge, attitude, and behavior in the intervention group with adequate health literacy increased significantly (P≤0.013, P≤0.015, and P<0.001, respectively). In the intervention group with inadequate health literacy, only the knowledge mean score after the intervention showed a significant increase (P≤0.035). However, there was no significant change in the mean scores of knowledge, attitude, and behavior in both control groups (P>0.05). Conclusion: According to the study Results, the effectiveness of the educational intervention in relation to nutrition of the elderly is significantly influenced by the level of health literacy.


Sign in / Sign up

Export Citation Format

Share Document