{"id":23,"date":"2016-11-18T18:10:14","date_gmt":"2016-11-18T18:10:14","guid":{"rendered":"http:\/\/wp.lancs.ac.uk\/cyberpsy-projects\/?page_id=23"},"modified":"2016-11-18T18:10:14","modified_gmt":"2016-11-18T18:10:14","slug":"trainability-of-phishing-email-features","status":"publish","type":"page","link":"http:\/\/wp.lancs.ac.uk\/cyberpsy-projects\/trainability-of-phishing-email-features\/","title":{"rendered":"Trainability of Phishing Email Features"},"content":{"rendered":"<p>Catching Phish: Differences in the Trainability of Phishing Email Features<br \/>\nDale Hunt. 2014<\/p>\n<p>This study aimed to identify whether some features of phishing email are more trainable than others. Various email features were categorised into 3 groups; the Email Subject group, the Email Body group and the Universal Resource Locator (URL) group. Thirty-eight participants were tested on their ability to recognize these features of fraudulent email before and after taking part in a non-interactive training method. There was a significant increase in the ability to recognize fraudulent URL\u2019s after receiving the training compared to the other 2 email feature groups. The research suggests that there may be a difference in the way people should be trained to detect fraudulent URL\u2019s and other phishing email features. It also hints at how a simple, non-interactive approach of anti-phishing training may be beneficial when training users how to spot fraudulent URL\u2019s, however further study is needed to confirm this<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Catching Phish: Differences in the Trainability of Phishing Email Features Dale Hunt. 2014 This study aimed to identify whether some features of phishing email are&#8230;<\/p>\n","protected":false},"author":620,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-23","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"http:\/\/wp.lancs.ac.uk\/cyberpsy-projects\/wp-json\/wp\/v2\/pages\/23","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/wp.lancs.ac.uk\/cyberpsy-projects\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"http:\/\/wp.lancs.ac.uk\/cyberpsy-projects\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"http:\/\/wp.lancs.ac.uk\/cyberpsy-projects\/wp-json\/wp\/v2\/users\/620"}],"replies":[{"embeddable":true,"href":"http:\/\/wp.lancs.ac.uk\/cyberpsy-projects\/wp-json\/wp\/v2\/comments?post=23"}],"version-history":[{"count":1,"href":"http:\/\/wp.lancs.ac.uk\/cyberpsy-projects\/wp-json\/wp\/v2\/pages\/23\/revisions"}],"predecessor-version":[{"id":24,"href":"http:\/\/wp.lancs.ac.uk\/cyberpsy-projects\/wp-json\/wp\/v2\/pages\/23\/revisions\/24"}],"wp:attachment":[{"href":"http:\/\/wp.lancs.ac.uk\/cyberpsy-projects\/wp-json\/wp\/v2\/media?parent=23"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}