Stir in troubled waters: critical thinking skills to train on spam and phishing
Main Article Content
Abstract
Article Details
Authors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons CC BY 4.0 Attribution 4.0 International License.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access)
References
Aycock J. (2006), Teaching spam and spyware at the University of C@1g4ry, in Third Conference on Email and Anti- Spam (CEAS 2006), short paper, pp. 137-141.
Aycock J., Crawford H., de Graaf R. (2008), Spamulator: The Internet on a Laptop, ACM ITiCSE 2008, pp. 142-147.
Cajani F., Costabile G., Mazzaraco G. (2008), Phishing e furto d’identità digitale. Indagini informatiche e sicurezza bancaria, Giuffrè, Milano.
Caviglia F., Cerulli M., Davidzon I., Delfino M. (in stampa), Spam e phishing. Se le conosci, le eviti, in A. Andronico, L. Colazzo (a cura di), Didamatica 2009.
Caviglia F., Ferraris M. (2008), Il Web come ambiente di apprendimento: fuoco sul processo, in A. Andronico, T. Rosselli e V. Rossano (a cura di) Didamatica 2008 - Informatica per la Didattica, Laterza, Bari, Parte II; pp. 955-959.
Dhamija R., Tygar J.D., Hearst M. (2006), Why Phishing Works, in the Proceedings of the Conference on Human Factors in Computing Systems (CHI2006), April 22–27, 2006, Montréal, Québec, Canada.
Frank C.E., Werner L.A. (2007), Getting A Hook On Phishing, Information Systems Education Journal, 5 (36).
Gaggioli A. (2007), Spam, Il filo, Roma.
Kumaraguru P., Rhee Y., Acquisti A., Cranor L.F., Hong J., Nunge E. (2007), Protecting people from phishing: the design and evaluation of an embedded training email system, in CHI-07: Proceedings of the SIGCHI conference on Human factors in computing systems, 905-914. ACM Press: New York.
Kumaraguru P., Sheng S., Acquisti A., Cranor L.F., Hong J.I. (2008), PhishGuru: Lessons From a Real World Evaluation of Anti-Phishing Training. e-Crime Researchers Summit, Anti-Phishing Working Group, October 15 - 16, 2008, Atlanta, USA.
Kumaraguru P., Sheng S., Acquisti A., Cranor L.F., Hong J.I. (in stampa), Anti-Phishing Education, in Proceedings of The International Conference on ELearning in the Workplace.
Robila S.A., Ragucci J. (2006), Don’t be a Phish: Steps in User Education, in Proceedings ITiCSE, pp. 237-241.
Werner L.A., Courte J. (2008), Analysis of an Anti-Phishing Lab Activity, in Proceedings of ISECON 2008, v. 25 Phoenix.