You are on page 1of 13

Behaviour & Information Technology

ISSN: 0144-929X (Print) 1362-3001 (Online) Journal homepage: https://www.tandfonline.com/loi/tbit20

User preference of cyber security awareness


delivery methods

Jemal Abawajy

To cite this article: Jemal Abawajy (2014) User preference of cyber security
awareness delivery methods, Behaviour & Information Technology, 33:3, 237-248, DOI:
10.1080/0144929X.2012.708787

To link to this article: https://doi.org/10.1080/0144929X.2012.708787

Published online: 01 Aug 2012.

Submit your article to this journal

Article views: 6217

View related articles

View Crossmark data

Citing articles: 98 View citing articles

Full Terms & Conditions of access and use can be found at


https://www.tandfonline.com/action/journalInformation?journalCode=tbit20
Behaviour & Information Technology, 2014
Vol. 33, No. 3, 237–248, http://dx.doi.org/10.1080/0144929X.2012.708787

User preference of cyber security awareness delivery methods


Jemal Abawajy*
School of Information Technology, Deakin University, Waurn Ponds, 3220 Australia
(Received 10 February 2012; final version received 21 June 2012)

Operating systems and programmes are more protected these days and attackers have shifted their attention to
human elements to break into the organisation’s information systems. As the number and frequency of cyber-attacks
designed to take advantage of unsuspecting personnel are increasing, the significance of the human factor in
information security management cannot be understated. In order to counter cyber-attacks designed to exploit
human factors in information security chain, information security awareness with an objective to reduce information
security risks that occur due to human related vulnerabilities is paramount. This paper discusses and evaluates the
effects of various information security awareness delivery methods used in improving end-users’ information security
awareness and behaviour. There are a wide range of information security awareness delivery methods such as web-
based training materials, contextual training and embedded training. In spite of efforts to increase information
security awareness, research is scant regarding effective information security awareness delivery methods. To this
end, this study focuses on determining the security awareness delivery method that is most successful in providing
information security awareness and which delivery method is preferred by users. We conducted information security
awareness using text-based, game-based and video-based delivery methods with the aim of determining user
preferences. Our study suggests that a combined delivery methods are better than individual security awareness
delivery method.
Keywords: information security; human factor; awareness delivery methods; social engineering; information security
programme

1. Introduction factor. A substantial proportion of security breaches


Organisations, irrespective of size or form, have originate from inside the organisation mainly due to
become increasingly dependent on information tech- the users’ ignorance or careless behaviours such as
nology to maintain competitive edge and improve sharing passwords and opening unknown e-mails and
services. At the same time, these organisations are attachments. These activities might potentially open up
facing information security risks from a vast array of the organisation to deliberate threats from hackers and
threats that range from spam emails to well organised jeopardise the assets of the organisation. The mistake
and complicated attacks such as malwares (malicious that enabled a hacker to infiltrate Google’s internal
software) that could steal, corrupt or destroy data as systems earlier this year is an example of how an
well as ruin or render systems unusable. The outcomes employee can undermine all the security counter-
of information security breaches can range from less measures that might be in place in an organisation
damaging such as productivity loss to the worst case (http://www.theregister.co.uk/2010/01/14/google_china_
that could lead to loss of sensitive information that attack_analysis/). The attack was successful because an
might lead to huge financial liabilities and losses, employee clicked on a link in a phishing email that
adversely affecting the reputation of the organisation. subsequently directed the employee to a website set up
In some cases, the organisations may never recover by the attackers, which then downloaded malware onto
from the incident at all or it may take quite a long time the employee’s computer.
to return to a normal pre-incident levels. Although significant information security risks
Attackers often choose the path of least resistance resulting from human factors are still of primary
which is mainly the unintentional vulnerabilities concern, organisations have and continue to invest in
created by the human factors. As a result, cyber technology-based information security solutions (e.g.
security threats that exploit human behaviour are firewalls, antivirus software, and intrusion detection
constantly evolving. In many information security system) to defend organisational assets. Certainly,
violations, people tend to be the major contributing technology-based information security solutions are

*Email: jemal@deakin.edu.au

Ó 2012 Taylor & Francis


238 J. Abawajy

very important part of information security pro- training courses) to improve users’ information secur-
grammes. However, the state-of-art technology-based ity performance. There have been some researches on
security solutions alone cannot provide the overall the efficiency of various information security delivery
security necessary to defend organisational assets from methods. However, research is scant regarding effec-
the wide variety of threats. As many aspects of current tive delivery method of information security aware-
information security systems rely on the users and their ness. Also, a side-by-side comparison of different
decisions, even state-of-art information security sys- awareness delivery methods is lacking (Cone et al.
tems can provide a false sense of strong protection 2007). Moreover, there is very little work that looked
against all attacks. As the information security at the security awareness delivery methods from the
intrusions and losses have escalated, so too have the recipients’ point of view. To address these gaps, this
number of information security laws and regulations. study focuses on determining what delivery method is
Moreover, the ever-growing body of information preferred by users and most successful in providing
security laws and regulations has made information information security awareness.
security a critical issue requiring the organisations to The rest of the paper is organised as follows: In
act decisively to improve information security. Thus, Section 2, we present the background information
organisations need to develop and promote an effective regarding information security programmes and the
information security programmes to counter these review of the information security awareness techni-
threats. ques. We also discuss social engineering attacks with
The number of layers of technological defences can emphases on phishing since we focus on information
be as strong as possible, but information security is security attacks that exploit user awareness vulner-
only as strong as its weakest link. Managing the abilities with particular emphases on phishing attacks.
human side of the information security just as carefully In Section 3, a classification of information security
as the technical side, therefore, is paramount to delivery methods is presented. In Section 4, the
decreasing information security threats due to hu- methodology used in this paper is described. Also, a
man-related vulnerabilities and improving an organi- description on how each delivery method was applied
sation’s overall IT security posture. As organisations and evaluated is discussed. The results of the study and
become more reliant on technology to achieve their the discussion are presented in Section 5 and Section 6
business objectives, it is critical to continuously respectively. The conclusion is presented in Section 7.
enhance the security awareness culture in organisations
and transform this culture into actual security con-
scious behaviours. There is ample evidence that, with 2. Background
the right security awareness, people can become an As information security becomes a central concern
organisation’s strongest defence against security across organisations, it is essential that sound informa-
threats (Kumaraguru et al. 2007). Therefore, organisa- tion security programme is implemented to ensure
tions must combat user awareness vulnerabilities with proper protection of the organisational assets. In this
effective information security awareness programmes section, we present the background information
in order to achieve an adequate security posture. regarding information security programmes and the
Information security awareness programme with the review of the current awareness techniques. We also
objectives to create a security-conscious environment discuss social engineering attacks with emphases on
by removing vulnerabilities associated with human phishing since we focus on information security attacks
behaviours is paramount for securing organisational that exploit user awareness vulnerabilities with parti-
assets. cular emphases on phishing attacks.
In this paper, we evaluate the various channels (e.g.
screen savers, interactive videos, emails/posters, news-
letters, class room training sessions, social media) 2.1. Information security awareness programme
through which security awareness can be delivered. Information security awareness can be defined as the
Although it is important for a security awareness level of comprehension that users have about the
programme to ensure that the appropriate topics are importance of information security best practices.
covered, the critical success factor for a security Generally, employees in any organisation have varying
awareness programme is the delivery methods (Shaw levels of security awareness. They are also increasingly
et al. 2009). There are many forms of information engaging in dangerous online activities such as social
security awareness delivery methods ranging from the networking, blogging and instant messaging with a
distribution of messages (e.g. via pamphlets, e-mails, considerable number of them unaware of their
intranet pages, screen savers, posters, mouse pads and exposure to security risks while doing so (Shaw et al.
pens) to formal presentations (e.g. lunch meetings, and 2009). Employee behaviour is the primary source of
Behaviour & Information Technology 239

costly data breaches. According to a recent survey of vulnerabilities, an increased concentration on informa-
IT security practitioners by Ponemon Institute, a tion security awareness is necessary. The main reason
privacy and information management research firm, to provide security awareness is to modify employees’
employee negligence or maliciousness is the main cause behaviour and attitude toward information security
of many data breaches (Ponemon Institute 2012). The management. Generally, an information security
survey indicates that 78% of respondents reported that awareness programmes are intended to create organi-
their organisations have experienced a data breach as a sational-wide security-minded cultures so that people
result of negligent or malicious employees or other work in a more secure manner and protect the assets of
insiders. Information security breaches can lead to their organisation. Information security awareness is
both direct cost (e.g. loss of intellectual property) and about establishing, promoting and maintaining good
indirect costs (e.g. loses of reputation and potential security habits as a critical element of an effective
loss in market share). information security management. The fundamental
There is ample evidence that security awareness goal of information security awareness is to create a
training is the most cost-effective form of security change in attitudes to bring about an overall change in
control (Albrechtsen and Hovden 2010). For example, the organisational culture. The cultural change is the
Dodge (2007) conducted experiment on the level of realisation that information security is critical because
awareness of a phishing attack after training. The a security failure has potentially adverse consequences
results show that the training was effective as the for everyone. Also, information security awareness
amount of students falling victim to the phishing scam aims to increase users understanding of how to follow
dropped. These results show that awareness levels can responsible computing practices and why it is neces-
be increased through interactive content. This also sary. This increased staff awareness should translate in
indicates that the medium through which awareness the reduction of the likelihood of accidental breaches
material is provided also plays a significant role. and increase the probability of suspicious activities
Similarly, Eminagaoglu et al. (2010) showed that being recognised and reported.
awareness campaigns can have a positive effect on Knapp et al. (2007) has identified a positive
reducing security threats. In their study, the results correlation between user information security aware-
showed that weak password usage was significantly ness programme and perceived security effectiveness.
decreased and users continually improved their aware- The success of information security programme
ness and complied with policies after under-going a ultimately depends on establishing a security positive
security awareness training course. As information environment, where the end-users understand and take
security awareness reduces both the number and the part in the behaviours that are expected of them. The
extent of information security breaches, this translates ideal information security programme is to make all
in reduction of both the direct and indirect costs that employees of an organisation to share responsibilities
result in information security breaches. for the security of information and information
Another major deriver to perform security aware- systems accessible to them. In order to combat user-
ness training is that information security threats from based vulnerabilities and improve the security aware-
organised crime are on the rise. Similarly, customers ness levels of users, a robust awareness programme is
are more sensitive to security issues than in the past. required to ensure that people understand their
Another reason is to comply with many regulations information security responsibilities, organisational
that mandate user awareness training programmes to policies, and how to properly use and protect the
be a critical part of the administrative foundation of a organisational assets. Also, to keep the users abreast
secure information processing environment. For ex- and refreshed, any awareness programme must be
ample, the Payment Card Industry Data Security ongoing and be an integral part of the organisational
Standard (PCI-DSS) mandates information security culture. Providing continuing security awareness is
awareness training for any business or organisation relatively cost-effective given the fact that a large data
that accepts credit cards or processes cardholder breach caused by one staff could cost an organisation
information. Information security awareness is also a millions in resources and diminish reputation. More-
critical element in increasing the level of staff aware- over, as information security awareness is a dynamic
ness and compliance with the information security process, any awareness should be continually mea-
policies, practices and relevant guidance related to sured and managed to keep current of changes in risk
their duties in the organisation. profiles (Kruger and Kearney 2006).
Increasing the information security awareness of Although the enormity of the problem associated
users is an important part of a holistic approach to with effective user security awareness is evident (Cone
information security management. In order to decrease et al. 2007), it is often an ignored element of an
information security threats caused by human-related organisation’s security programme. Since information
240 J. Abawajy

security is both a human and a technological problem, with the aim of inculcating truly positive work habit to
it is just as important to invest in the human-related better protect organisational assets and prevent in-
vulnerabilities such as user awareness and operator formation security incidents. The key to success in
carelessness (Abawajy et al. 2008). awareness is keeping the messages relevant and
consistent and at the same time make the delivery
mechanisms interesting to everyone (Kruger and
2.2. Social engineering attacks Kearney 2006). A major challenge with security
Social engineering is an important problem to address, awareness programmes is the lack of a fully developed
because it specifically targets the ‘people link’ that methodology to deliver them (Valentine 2006). Re-
information security officers are trying to strengthen. search on the delivery method of security awareness
In this paper, we will focus on information security training concluded that the delivery of security
attacks that exploit user awareness vulnerabilities with awareness information is just as important as ensuring
particular emphases on phishing attacks. Phishing is an that the information is relevant and consistent (Shaw
increasingly sophisticated attack in which cyber et al. 2009).
criminals use spoofed emails and fake web sites to
deceit people into giving up personal information
(Islam and Abawajy 2012). Phishing attacks exploit the 3. Information security awareness delivery methods
fact that users tend to trust email messages and web The main goal of a security awareness programme is to
sites based on cues that actually provide little or no raise employee information security awareness in an
meaningful trust information. They tend to target the organisation. As with any programme, the success of
most common activities (email and web) that the information security awareness programme will rely
majority of users spend substantial times on. Also, heavily on how the awareness information is delivered.
phishers are increasingly setting their sights on social There are many information security awareness
networking sites such as LinkedIn, Myspace, Face- delivery models. These models are capable of raising
book and Twitter. Some people may be aware of the awareness of employees about a wide array of
phishing, but they do not associate that awareness to cyber security problems that ranges from spam and
their own vulnerability or to strategies for identifying phishing to well organised attacks intended to corrupt
phishing attacks (Downs et al. 2006). The study also or disable systems. In this section, we will review the
suggests that while people can protect themselves from various information security awareness delivery meth-
familiar risks, they tend to have difficulties generalising ods commonly used to provide a context for subse-
what they know to unfamiliar risks. quent discussion of our work.
Lack of awareness of the dangers of reverse social
engineering attacks can result in an unsuspecting
employee disclosing company confidential information 3.1. Conventional delivery methods
or render sophisticated information security technolo- The conventional methods of delivering information
gies useless. Although automated systems can be used security awareness encompass electronic resources
to identify some fraudulent email and web sites, these and paper resources. Paper-based security awareness
systems are not completely accurate in detecting delivery methods include leaflets and posters with
phishing attacks (Sheng et al. 2007). For example, attention grabbing slogans on relevant topics
Valentine (2006) explained how he was able to walk (e.g. reminding users that passwords are not to be
into a retail chain store and obtained the keys to the shared) and newsletters (news clipping, memos and
store’s server room without even being asked to newsletters).
provide any type of identification. Technology-based Posters are commonly used to announce only one
solution alone could not provide bullet-proof line of topic at any given time. They are commonly displayed
defence against attacks that exploit human-related in areas where people gather such as cafeterias and
vulnerabilities such as phishing. Therefore, it is meeting rooms. They are used to highlight time-
necessary for organisations to have the tools to protect sensitive issues and remind people of very specific
people from such attacks as well as methods for raising actions that they can take to improve the organisa-
the people’s awareness not to fall for phishing attacks. tion’s security posture. Posters are also commonly used
Proper information security awareness is an effec- to serve as periodic information security reinforce-
tive way to defend against social engineering attacks. ment. One major concern with posters is that message
Continuous information security awareness is required may be overlooked.
to sustain a desirable level of information security Newsletter is a periodic (e.g. monthly or quarterly)
awareness (Abawajy and Taihoonn 2010). Also, the information security awareness channel. Newsletters
security awareness programme should be developed can be both in electronic or print format. One of the
Behaviour & Information Technology 241

primary purposes of the newsletters is to reinforce multimodal teaching methods over different geogra-
information security awareness programme. An ad- phical areas.
vantage of using newsletters is that they can convey a A number of organisations have developed blogs
number of messages at the same time as compared to a (i.e., online materials) for teaching people to identify
poster (Wilson and Hash 2003). However, newsletters phishing web sites accurately. eBay’s tutorial on
may only appeal to a select target group and requires spoofed emails (http://pages.ebay.com/education/
proper distribution mechanism. Also, there is no spooftutorial/), Microsoft’s Security tutorial on Phish-
guarantee to know if the staff have read the newsletter ing, the Phishing E-card from the US Federal Trade
and they have comprehended the contents of the Commission (http://www.ftc.gov/bcp/edu/pubs/consu-
newsletter. mer/alerts/alt127.htm), and a URL tutorial from the
MySecureCyberspace port. The effectiveness of some
of these online materials was examined and it was
3.2. Instructor-led delivery methods found that, while these materials could be improved,
A variety of formal presentations (e.g. brown-bag they are surprisingly effective when users actually read
seminars and class room style workshops) facilitated them (Kumaraguru et al. 2007).
by local or external information security experts is used Another online delivery method is the Web-based
to raise information security awareness of employees. computer security awareness training (WBT), which
These approaches are typically top-down and aim at offers user-friendly and flexible models that enable
having an impact on the individual level through an users to enhance security awareness at their own pace.
expert-based approach (i.e. instructor-led) directed at a It also provides the organisation with the ability to
large population. One of the advantages of instructor- train users to an enterprise-wide standard. Security
led delivery method is that the instructor is able to alert messages (e.g. screen savers, pre-logon messages,
perceive nonverbal student cues, modify instructional email messages) are an alternative way for raising
methods accordingly, and provide timely answers to information security awareness. Email is considered as
student questions. another key security awareness tool for delivering
Although often people express interest for class- awareness material (Wilson and Hash 2003).
room-based delivery method, it has its own drawbacks. Emails are used to highlight time-sensitive issues
It is fairly expensive and provides a ‘static solution for and remind people of very specific actions that they
a fluid problem’ Valentine (2006). As many users find it can take to improve the organisation’s security
to be boring and ineffective (Leach 2003), the success posture. One of the strengths of email is that it has
of this approach depends upon the ability of the the flexibility to convey one message or many. Email
instructor to engage the audience. It also tends to fail campaigns can also be directed at targeted audiences.
because it is based on rote and does not require users For example, the American Express warned their
to think about and apply information security con- customers of a phishing scheme that presents itself as
cepts (Cone et al. 2007). One way to address these a security measure by the company and asks for social
shortcomings is to use sharing experiences and knowl- security number, mother’s maiden name and date of
edge between the employees of an organisation birth. Although emails are cost effective means of
facilitated by participation, collective dialogues and awareness message delivery method, it may be under-
considerations, and group-work processes (Albrecht- mined due to volume of emails and spam. Also, it does
sen and Hovden 2010). This group-based sharing of not reach those without computers.
experiences and knowledge between employees and Screensavers bring information security message
information security professionals is important for the directly to the employees’ desktop and their daily work
information security work as it is likely to create environment. The advantage of the screensavers is that
common insight among employees. However, this everyone is guaranteed to see them at least once, which
approach assumes that the participants are knowl- make them an ideal channel for conveying essential
edgeable in the subject being discussed. security awareness messages in a minute or less.
A range of mobile learning platforms that provide
anytime and anywhere information security awareness
3.3. Online delivery methods to geographically diverse audiences have emerged.
There are many different forms of online security Social media is an example of using emerging
awareness delivery models. Online delivery methods technologies and new media for information security
include e-mail broadcasting, online synchronous and awareness. The popularity of social networks makes it
asynchronous discussion, information uploading, an ideal tool through which awareness can be created
blogging, animation, and multimedia. These delivery on existing and emerging security threats. One of the
methods are generally well suited for supporting advantages of the mobile learning based on social
242 J. Abawajy

media is that you can monitor if the recipients like the use search engines to find legitimate sites. A study that
message or not. compares the Anti-Phishing Phil with other types of
As noted in (Valentine 2006), one of the major training demonstrates that participants who played the
challenges with creating and implementing online game performed better in identifying phishing websites
security awareness programmes is the lack of a fully than participants who completed two other types of
developed methodology to deliver them and to training (Sheng et al. 2007). Liberty Mutual created
measure the true effectiveness of the programme. For some simple Flash-based game applications for em-
example, the disadvantage of WBT-based delivery ployees to play voluntarily (Rudis 2012). Players win
method includes (Cone et al. 2007): (i) users attempt the games by making correct security choices.
to complete the sessions with minimal time or thought; Although the games were voluntary, about 25% of
(ii) becomes monotonous; (iii) fails to challenge the Liberty Mutual employees played each game at least
user and (iv) provides no dialogue for further elabora- once (Rudis 2012).
tion. This could lead to lack of self-motivation or
feelings of isolation that can hinder success in the
delivery of the awareness. To address some of these 3.5. Video-based delivery methods
shortcomings, the WBT-based delivery method de- Educational videos play an important role as part of
signers may make the content engaging by including information security awareness programme. There is
graphics, assessments and animations. Another issue no need for a classroom trainer or have staff who
with WBT-based approach is that it can be expensive cannot be reached through e-learning courseware. One
to create training programmes. of the major issues raised with conventional delivery
methods is the problem of holding a trainees attention
sufficiently long to impart a message particularly when
3.4. Game-based delivery methods the topic is regarded by the trainees as potentially
Game-based delivery methods may offer an effective mundane. Online video is a medium that provides
alternative to, or supplement for, more traditional visual and audio learning for participants. Learners
modes of awareness. Online games combine graphics, can study independently and learn at their own pace
play and training concepts to create compelling and only what they need to know. Learners can also
training experiences. The benefit of game-based start and stop the training as their schedule permits
awareness delivery method is that it can challenge, because it is not time-dependant. Also, the interactive
motivate and engage the participants. Game-based feature makes the online video more effective than
delivery methods are highly interactive and can be used non-interactive techniques, but it is more expensive.
to support organisational security awareness objectives Moreover, the videos can be watched and re-watched
while engaging typical users. as needed, making the online training videos a flexible
Several game-based security awareness delivery and effective training choice.
methods have been used currently. CyberCIEGE
(Cone et al. 2007) is a game-based information security
awareness delivery method. Fung et al. (2008) per- 3.6. Simulation-based delivery methods
formed a comparative analysis of game-based and Simulation-based information security awareness de-
traditional classroom delivery methods. One group of livery methods have also been receiving some atten-
eight students was given the opportunity to play with tions. In a simulation-based delivery method, users are
the CyberCIEGE game and the other group of eight sent simulated phishing emails to test users’ vulner-
attended a short training session of one hour in a ability to phishing attacks and then follow-up with
traditional classroom setting. Results from the study training (Jagatic et al. 2007, Spagat 2009). At the end
indicated that 75% of the students taking classroom of the study, users are given materials that inform them
training shown significant improvement while only about phishing attacks and subsequent phishing emails
60% for the students in the game groups. The authors were used to assess progresses in phishing detection
explain the performance differences between the abilities of the users. A similar approach, called
groups to be due to the language and culture factors embedded training that teaches users about phishing
as the classroom training was conducted in Thai even during their regular use of email is described in
though the material is in English. The game players (Kumaraguru et al. 2007). A study that compared
had to interface with only English language. simulation-based and pamphlet-based delivery models
Another game-based awareness training system is concluded that users who were sent the simulated
the Anti-Phishing Phil that aims to teach users how to phishing emails and follow-up notification were better
distinguish phishing URLs from legitimate once, able to avoid subsequent phishing attacks than those
where to look for cues in web browsers, and how to who were given a pamphlet containing information on
Behaviour & Information Technology 243

how to combat phishing (NYSO; New York State accessible via a web browser. For the game-based
Office of Cyber Security & Critical Infrastructure model, we looked at a product that is easy to play and
Coordination 2005). built on solid learning science principles such that it
ensures high level of retention of content while playing
the game. For text-based awareness material, we
4. Methodology focused on materials that were short, to the point
The aim of this study is not to generalise, but to and easily accessible via a web browser.
interpret some users’ experiences of information Each delivery method covered the same security
security delivery methods. This is an exploratory study awareness topics and effort was made to make each
which seeks to find new insights, as there is no large session as comparable as possible across the three
and firm theoretical background on the subject of models. The selected training materials point out cues
information security awareness delivery methods. By for a phishing email and outlines simple actions that
comparing three different delivery models through users can take to protect themselves. For text-based
conducting experiments, data were collected and information security awareness delivery model, we
subjected to analyses. The design and analysis of this used a short web article that details phishing and
study draws on methodological experiences from those anti-phishing techniques including the use of illegiti-
used in Sheng et al. (2007). This research method mate emails (http://websearch.about.com/od/dailyweb
enabled us to manipulate different delivery methods searchtips/qt/dnt0810.htm). For video-based informa-
and to assess their influence on the effectiveness of tion security awareness delivery model, we used the
learning security awareness concepts and skills. ‘How to Avoid Phishing’ (http://www.5min.com/
Video/How-to-Avoid-Phishing-12254) video. The
Federal Trade Commission has released three 60-
4.1. Sample second videos to help alert consumers to phishing
A total of 60 voluntary participants were involved in scams.
this study. Since our research is qualitative in nature, For the game-based information security aware-
the size of the sample does not have to be large ness delivery method, we examined three different
(Saunders et al. 2003). The participants were chosen in systems namely Master of Security (http://www.kon
such a way that the demographic is a representative of gregate.com/games/gmentat/master-of-security), Anti-
the real settings. Each respondent completed pre- Phishing Phil (http://wombatsecurity.com/antiphish-
knowledge information questionnaires. Over 70% of ing_phil/index.html) and CyberCIEGE (Cone et al.
the participants are reported as currently working 2007). We finally decided to go with the Anti-
either in a full time or a part time job. All participants Phishing Phil software. The motivation for choosing
reported to have a private personal computer and use the Anti-Phishing Phil software is that it is very easy
computers at work and/or at home. About 20% of the to use with almost zero learning time. Phil is a fish
participants had received some form of formal security character that swims through the ocean searching for
training in the past while about 60% of the partici- worms. Each worm is associated with a real URL
pants indicated that they enjoy playing games at least (representing legitimate websites) or a fake URL
when playing for solely entertainment purposes. This (representing phishing websites). Phil’s job is to eat all
demographic is a representative of the real settings as the worms (which have legitimate URLs) and reject
IT users tend to possess varying and unequal levels of all the bait (which have phishing URLs) before
security awareness. running out of time. The player can move Phil
around the screen and when Phil moves near a worm,
the URL that is associated with the worm is
4.2. Selecting awareness delivery methods displayed. The users learn to analyse URLs and
Enhancing information security awareness levels of determine whether they are fraudulent or not. The
general users often depends on the delivery method game is split into four rounds, each of which is two
used. As discussed previously, there are many different minutes long. Upon completing a round, a feedback
information security awareness delivery methods. In screen is displayed, showing which choices you got
selecting the delivery methods, we made conscious right or wrong, and why your choices were right or
decisions to keep the time the subjects spend on the wrong.
activity to a minimum. Also, the materials should be
easy to comprehend by non-technical users while at the
same time not to cause undue frustration with 4.3. Data collection procedure
technical users. Most importantly, we decided that The aim of this study is to assess the effectiveness of
the material to be short, to the point and easily various information security awareness delivery
244 J. Abawajy

models as well as which delivery method is preferred by memorising the answers from the first set of questions
the subjects. The study communicated a range of and depending on his/her memory to answer the
information security message in various delivery second set. A sample email that was used in the post-
formats focusing on a phishing attack. The reason test s shown below:
for focusing on phishing attack is that it is a single
topic that has a wealth of information for both Reply-To: Director@cba.com.au
technical and non-technical users. Moreover, it is one To: BAlen@gmail.com
of the core techniques for exploiting the human side of
Dear valued Commonwealth Bank client,
information security that is constantly overlooked. We has discovered an unauthorised withdrawal of large
There is high level of user unfamiliarity with common sum from your account. Please click on the ‘‘My
phishing attacks suggesting educating users about Account’’ and go to the section of your NetBank home
online safety practices. People are a direct target for page to login and verify and update your account details
immediately.
the phishing scammers to get the private and sensitive
information. It is very difficult for the people to detect If you do not update your profile, your Netbank account
phishing websites and emails as they often look will be deactivated and deleted.
legitimate. Information security awareness is the Yours sincerely,
most important factor in mitigating phishing. By Managing Director
Commonwealth Bank of Australia, AFSL and
helping users develop secure habits, information
Australian credit licence 234945
security awareness programme leads to a secure work
environment and possibly halt security-related da-
mages before it starts. We selected 30 websites and 30 emails to test our
We run three information security awareness participants’ ability to identify phishing emails and web
sessions for phishing attacks using text-based, game- sites after each session. Similar approach was used in
based and video-based security awareness delivery (Sheng et al. 2007). In our case, the test also included
methods. These sessions inform people how to avoid information about the varied techniques used by those
falling for phishing attacks by providing them with who wish to exploit users and how the participants
information that explains what phishing is, the could protect themselves from phishing attacks. Half of
potential danger or the increasingly varied techniques the emails and websites we selected were phishing
used by those who wish to exploit users such as emails and websites. The websites included popular
fraudulent URLs embedded in emails. brands, legitimate web sites from popular financial
We randomly assigned the participants to one of institutions and online merchants as well as random
the three sessions – text-based, game-based and video- websites. We divided the emails and the websites into
based information security awareness. This allowed us three groups (G1, G2 and G3). Each group has five
to evenly assign 10 participants to each experimental phishing email/websites and five legitimate email/sites.
group. For example, one group started with the game- We randomised the order, in which the three groups
based awareness followed by the text-based delivery were presented so that 20 of the participants saw G1,
model, watch a short video and finally play the game and the next 20 of the participants saw G2 and the
again. Note that at any given time we have one group remaining 20 subjects saw G3. Participants are scored
that only receives game-based awareness session, one based on how well they can identify which emails/
group that only receives text-based awareness session websites are legitimate and which are not. We measured
and one group that receives video-based awareness false positives and false negatives before and after
session. training. A false positive occurs when a legitimate
After experiencing each different awareness deliv- email/website is wrongly judged as a phishing email/
ery method, we collected data to see if the awareness website. A false negative occurs when a phishing email/
method improved the knowledge of the participants website is mistakenly judged to be legitimate.
about phishing. Specifically, after each session, sub-
jects have to answer about 10 questions that assess
5. Results
their ability to distinguish legitimate URLs from
fraudulent ones, suspicious links in email messages, 5.1. Delivery methods relative performance
etc. For example, we tested the participants’ ability to Figure 1 presents the relative performance of the three
identify phishing web sites from a set of real and groups in the post-test compared to the pre-test cases.
phishing web sites at the end of a session. This helps The participants were scored based on how well they
the subjects to reflect on the knowledge they have can identify which emails are legitimate and which are
gained from the session they just completed. Two sets not. We used the scoring scheme employed in the Anti-
of questions were used to minimise the effect of Phishing Phil tool. Participants are rewarded with
Behaviour & Information Technology 245

100 points if they correctly identify good URLs or examples and discussions. For text-based and video-
correctly reject a bad one. They are slightly penalised based delivery methods, many of the participants did
for rejecting a good answer (false positive) by losing 10 reflect the new-found knowledge that phishing at-
points. They are penalised with 100 points deduction if tempts could also be sent via email as well as
they accept phishing attempts and is caught by illegitimate URLs. This shows that while the awareness
phishers (false negative). In this experiment, the total rate from the text-based delivery model did not
mark that a participant can achieve is 1000. We then increase as much as the other models, a broadening
normalised the score as follows: in the knowledge of anti-phishing techniques was
certainly evident through the text-based and video-
based delivery methods.
achieve
score ¼
10
5.1. Measuring changes in participants
where ‘achieve’ is the accumulated total score. As Ideally, an awareness programme must influence
shown in Figure 1, awareness rates increased in all behaviour changes that deliver measurable benefits.
three groups significantly from the pre-test values. In order to see how much the text-based and the video-
Prior to undertaking the security awareness training, based awareness delivery methods increased the know-
only half of the participants had an idea of what ledge of the participants about phishing, we admini-
phishing is. In pre-awareness training, we found that strated the game-based awareness model one last time.
users are generally aware of phishing threats. However, This would also separate personal thought of those
their knowledge on the identification and prevention of participants from what they had actually learnt.
phishing was very poor. After the awareness activities, Figure 2 shows the outcome of the experiment
awareness increased with about 30% of the partici- before and after the text-based and video-based
pants changing their original answer. For all delivery awareness activities. Note that the game-based delivery
methods, about 5% of the participants still lacked method consists of four rounds and each round focuses
knowledge on the identification and prevention of on a different class of phishing URLs. Also, each
phishing. round is timed to limit how long one can take to
The game-based delivery method has significantly consider the URLs. In each round of the game, four
lower false positives than the other delivery methods good worms and four phishing worms are randomly
for questions pertaining to websites. That is to say, selected from the 20 URLs in the data file for that
participants were able to establish website authenticity round. Players have to correctly recognise at least six
more quickly after playing the game as compared to out of eight URLs within two minutes to move on to
the other delivery methods. This is not surprising that the next round. From the graph, it is clear that both
the game focuses on teaching users how to distinguish the video-based and the text-based delivery methods
legitimate links from fraudulent ones and provide users improved the participants’ knowledge about phishing
with immediate opportunities to practice this proce- attacks. The results for each round improved approxi-
dure multiple times. mately by 50% on the second attempt of the game.
The subjects in the video-based group did well in Whilst these statistics present alarming support for
email-born phishing-related questions. This is mainly video and text-based security awareness training, one
due to visual presentation of email-born phishing

Figure 2. Impact of conventional methods of security


Figure 1. Relative performance of the delivery methods. awareness training.
246 J. Abawajy

cannot overlook the possibility that participants learnt have been a significant source of information security
by their mistakes after the first attempt and self-cor- risks and the result of breaches in information security
rected their answers on the second attempt to suit. leads to billions of dollars annually in individual and
corporate losses and even to crimes (Workman 2007).
Therefore, the significance of the human factors in
5.2. Delivery method preferences information security management cannot be under-
At the end of the study, we solicited response from the stated. Unfortunately, human element gets less atten-
participants as to their preferred awareness delivery tion compared to other elements within an
method. As shown in Figure 3, close to 8% of the organisation. Some organisations also fall short in
participants were undecided on their preferred informa- realising that the breakdown of IT security merely not
tion security awareness delivery method. Surprisingly, caused by technology failure itself but in many cases
the game-based delivery model only polled fewer than caused by human element. However, the significance of
5%. This was despite 60% of the respondents having people’s failure to take precautions against informa-
admitted to enjoying video games, a statistic that tion security threats have been largely ignored (Work-
showed most were familiar and comfortable with games man 2007).
at least when playing for solely entertainment purposes. It is imperative to minimise Human vulnerabilities
In contrast, over 50% of the participants prefer in order to improve organisational security posture.
video-based delivery model while text-based method The development of information security policies,
polled over 33%. The text-based and video-based standards, procedures, and guidelines is only the
delivery methods have fared better mainly due to the beginning of an effective information security pro-
clear, concise, and easier to follow information. The gramme. Since the most important organisational asset
preference of video-based delivery method as com- is the personnel, it is imperative that all employees
pared to the other two delivery models may be due to must have certain level of information security aware-
lack of interest when presented with a document to ness. It is critical for organisations to ensure that not
read or simply skimming through the document. Also, only should the average employee be aware about the
the preference of a video as information security threats facing the organisation but also understand
awareness delivery method may be due to being able to what needs to be done in case he/she notices a potential
better understand the ideas and concepts taught when issue. Information security conscious employees could
it is given in both a verbal and visual form. Moreover, play a significant role in minimising information
the text-based delivery model has a predetermined security risks and protecting the organisation’s critical
structure set by the author and, according to Bloom’s assets and valuable intellectual property. By expanding
taxonomy; the subjects are more focused to remember the base of employees who are more aware of
than to actually understand (i.e. ‘knowledge’). This information security risks, organisations can reduce
may explain why the text-based delivery model is fared the level of information security risks due to the
less to video-based model. human vulnerabilities. Without some level of employee
information security awareness, the information secur-
ity posture of an organisation will be incomplete. To
6. Discussion this end, information security awareness programmes
People are in many cases the last line of defence against must be designed with intention of creating organisa-
threats such as malicious code, disgruntled employees, tional-wide security-minded cultures so that people
and malicious third parties. Human vulnerabilities work in a more secure manner and protect the assets of
their organisation.
The information security delivery methods are the
critical prerequisites to improved security awareness
levels. Kumaraguru et al. (2007) found that generally
existing online anti-phishing training materials tend to
make users more cautious about opening and acting
upon email, but do not teach people how to determine
whether a website or email is fraudulent. In contrast,
our results show that the various delivery methods
examined in this paper appear to have been mostly
successful in aiding the participants with a clearer
understanding of what phishing is and how to best
minimise its dangers. As shown in Figure 1, video-
Figure 3. Delivery method preference. based group performed roughly as well as the text-
Behaviour & Information Technology 247

based training material in terms of website based (e.g. newsletter, video, seminar and lecture) so that
related questions, and better on email based questions. users receive many different messages (Shaw et al.
The results also suggest that the existing online 2009).
training materials are surprisingly effective in helping Since information security awareness delivery
users identify phishing websites when users actually method research is rather scarce, this study has
read the training materials. The game-based delivery provided insights on the effectiveness and the influence
method was able to provide knowledge as to what to of various information security awareness delivery
look for in the URL’s. In contrast, the text-based and methods on the end-users. While automated detection
the video-based awareness methods added the knowl- systems should be used as the first line of defence
edge that emails are the main carrier of phishing against phishing attacks, raising user awareness offers
attacks. This indicates that these three delivery models a complementary approach to help people better
should be used together to get the maximum benefits recognise fraudulent emails and websites. Thus,
out of the information security awareness programme. effective management of information security requires
It also seems that some people may be aware of a combination of technical and non-technical controls
phishing, but they do not associate that awareness to to manage risks to organisational assets. Although a
their own vulnerability or to strategies for identifying great deal of effort has been expanded on trying to
phishing attacks. This concurs with the findings in solve the phishing problem through automated detec-
Downs et al. (2006). tion and prevention system, little research has been
Even though organisations have started providing done in the area of training users to recognise and
decent information security awareness programmes, avoid phishing attacks (Kumaraguru et al. 2010). We
finding the appropriate ways to increase information believe that the study results and recommendations can
security awareness is an open research issue and this be applicable to every organisation or company that is
paper attempts to help towards this direction. It is of operating large amounts of information, and has a
course impossible to meet every individual’s personal high level of computer usage among their employees.
needs, although, it is substantiated that people learn Our results suggest information security awareness
and understand in several different ways of which some training is a powerful means of empowering people
tend to be more efficient. Also, our informal experi- with knowledge on focused topics. After completing
ences show that some users simply will not expend any the training almost all of the participants had the
effort to learn even the most basic mechanics of a correct idea about phishing and the dangers it poses
game. For these users, interactive training methods will both to the individual and to an organisation.
not be effective if they require anything more involved
that the repeated clicking of a mouse or pressing of an
enter key. This implies that, although a one-size-fits-all 7. Conclusion
information security awareness strategy may be easy In this paper, we studied two information security
on the organisation, it will not be effective in achieving awareness programme-related issues: (i) what delivery
the information security goals of the organisations. In approaches are effective in raising information security
addition, the risk areas could change as the informa- awareness level of people; and (ii) which delivery
tion risk profile changes. Thus, the delivery mechanism method is preferred by users. We looked at three
should also change as the risk areas change. Therefore, information security awareness delivery methods (i.e.
the key to success in awareness is keeping the messages text-based, game-based and video-based) in terms of
relevant and consistent, while varying the delivery their effectiveness in raising information security
mechanisms, to keep everyone interested. awareness and user preferences of the delivery method.
The study also suggests that information security Our results suggest information security awareness
awareness level can be increased and sustained through training is a powerful means of empowering people
multiple delivery methods. All three delivery methods, with knowledge on focused topics. After completing
if used wisely, can help in driving an organisation’s the training almost all of the participants had the
security awareness programme effectively. The conclu- correct idea about phishing and the dangers it poses
sion from this study suggests that game-based and both to the individual and to an organisation.
video-based delivery models can be a suitable non- Although the results suggest that video presentation
linear information security delivery methods when to be the most preferred security awareness training
learning to understand IT security and therefore also a delivery method, the training provided through the use
suitable alternative/complement to conventional linear of the various delivery methods used appear to have
instruction. This conclusion concurs with that of Shaw been mostly successful in aiding the participants with a
et al. (2009) which contend that security awareness clearer understanding of what phishing is and how to
information must be disseminated in different ways best minimise its dangers.
248 J. Abawajy

Further studies have been planned in the future. Islam, R. and Abawajy, J., 2012. A multi-tier phishing detec-
We plan to repeat this experiment by enlarging the tion and filtering approach. Journal of Network and
Computer Applications. DOI: 10.1016/j.jnca.2012.05.009.
population size, catch possible side effects during the Jagatic, T., et al., 2007. Social phishing. Communications of
learning experience such as satisfaction, gender and the ACM, 50 (10), 94–100.
age as well as educational level differences, and Knapp, K.J., et al., 2007. Information security effectiveness:
efficiency in terms of time-consumption versus ac- conceptualization and validation of a theory. Interna-
quired knowledge. Although many of the concepts tional Journal of Information Security and Privacy, 1 (2),
37–60.
included in cyber security awareness training are Kruger, H.A. and Kearney, W.D., 2006. A prototype for
universal, such training often must be tailored to assessing information security awareness. Computers &
address the policies and requirements of a particular Security, 25 (4), 289–296.
organisation. Therefore, one way to further our study Kumaraguru, P., et al., 2010. Teaching johnny not to fall for
is to look into how different companies have different phish. ACM Transactions on Internet Technology, 10 (2),
1–31.
needs, but the delivery model does not take into Kumaraguru, P., et al., 2007. Protecting people from
consideration this matter – thus generalising the phishing: the design and evaluation of an embedded
applicability of the model to all of the companies of training email system. In: Proceedings of the computer
different nature and sizes. human interaction (CHI 2007). New York, NY: ACM
Press, 905–914.
Leach, J., 2003. Improving user security behaviour. Compu-
Acknowledgements ters & Security, 22 (8), 685–692.
This work is partially supported by Securing Cyperspace New York State Office of Cyber Security & Critical
Faculty Research Cluster. The help of Maliha Omar is Infrastructure Coordination, 2005. Gone phishing: a
greatly appreciated. This work greatly benefited from the briefing on the anti-phishing exercise initiative for New
anonymous reviewers comments as well. York State Government. Aggregate exercise results for
public release.
References Ponemon Institute, 2012. The human factor in data protection
[online]. Ponemon Institute. Available from: http://www.
Abawajy, J. and Tai-hoon, K., 2010. Performance analysis of trendmicro.com/cloud-content/us/pdfs/security-intelligen
cyber security awareness delivery methods. In: Security ce/reports/rpt_trend-micro_ponemon-survey–2012.pdf
technology, disaster recovery and business continuity. [Accessed 9 June 2012].
Berlin, Germany: Spring-Verlag, 142–148. Rudis, B., 2012. Achievement unlocked: designing a compel-
Abawajy, J.H., Thatcher, K., and Tai-hoon, K., 2008. ling security awareness program. In: Security conference
Investigation of stakeholders’ commitment to informa- and training, 17–19 April, Boston.
tion security awareness programs. In: Proceedings of the Saunders, M.K., Lewis, P., and Thornhill, A., 2003.
2nd international conference on information security and Research methods for business students. 4th ed. Spain:
assurance (ISA 2008). Los Alamitos, CA: IEEE Com- Financial Time Press.
puter Society, 472–476. Shaw, R.S., et al., 2009. The impact of information richness
Albrechtsen, E. and Hovden, J., 2010. Improving informa- on information security awareness training effectiveness.
tion security awareness and behaviour through dialogue, Computers & Education, 52 (1), 92–100.
participation and collective reflection. An Intervention Sheng, S., et al., 2007. Anti-phishing phil: the design and
Study, Computer and Security, 29 (4), 432–445. evaluation of a game that teaches people not to fall for
Cone, B.D., et al., 2007. A video game for cyber security phish. In: Proceeding on symposium on usable privacy and
training and awareness. Computers & Security, 26 (1), 63– security (SOUPS’07). New York, NY: ACM Press, 88–
72. 99.
Dodge, R.C., 2007. Phishing for user security awareness. Spagat, E., 2009. Justice Department Hoaxes Employees.
Computers & Security, 26, 73–80. News Article [online]. Available from: http://news.yahoo.
Downs, J., Holbrook, M., and Cranor, L., 2006. Decision com/s/ap/20090129/ [Accessed 8 June 2012].
strategies and susceptibility to phishing. In: Proceedings Valentine, J.A., 2006. Enhancing the employee security
of the Second Symposium on Usable Privacy and Security awareness model. Computer Fraud & Security, 6, 17–19.
(SOUPS’06). New York, NY: ACM Press, 79–90. Wilson, M. and Hash, J., 2003. Building an information
Eminagaoglu, M., Ucar, E., and Eren, S., 2010. The positive technology security awareness and training program [on-
outcomes of information security awareness training in line]. National Institute of Standards and Technology.
companies – a case study. Information Security Technical http://www.itl.nist.gov/lab/bulletns/bltnoct03.htm [Ac-
Report, 4, 1–7. cessed 8 June 2012].
Fung, C.C., et al., 2008. Raising information security Workman, M., 2007. Gaining access with social engineering:
awareness in digital ecosystem with games – a pilot an empirical study of the threat. Information Systems
study in Thailand. In: 2nd IEEE international conference Security, 16 (6), 315–331.
on digital ecosystems and technologies (IEEE DEST
2008). Los Alamitos, CA: IEEE Press, 375–380.

You might also like