The Millennial Cybersecurity Project

advertisement
The Millennial Cybersecurity
Project
Improving Awareness of and Modifying
Risky Behavior in Cyberspace
29 September 2012
Authors
Noel P. Greis, Center for Logistics and Digital Strategy
Monica L. Nogueira, Center for Logistics and Digital Strategy
Susan Kellogg, Information Technology Department
Kenan-Flagler Business School
The University of North Carolina at Chapel Hill
Prepared for:
Department of Homeland Security
U.S. Department of Homeland Security
Washington, D.C. 20528
www.dhs.gov
Contract No. 4-312-0202782
Prepared by:
RTI International–Institute for Homeland Security Solutions
Research Triangle Park, North Carolina
This document is in the public domain and may be used and reprinted without special
permission. Citation of the source is appreciated.
None of the investigators have any affiliations or financial involvement that conflicts with the
material presented in this report.
Suggested citation: Greis, N.P.; Nogueira, M.L.; and Kellogg, S. The Millennial Cybersecurity
Project: Improving Awareness of and Modifying Risky Behavior in Cyberspace. Final Report.
Institute for Homeland Security Solutions, 29 September 2012.
(Prepared by RTI International–Institute for Homeland Security Solutions under contract
4-312-0202782)
This report is based on research conducted under the Institute for Homeland Security
Solutions (IHSS) under contract to the Department of Homeland Security, Washington, DC.
(Contract 4-312-0202782). The findings and conclusions in this document are those of the
author(s), who are responsible for its contents; the findings and conclusions do not
necessarily represent the views of the Department of Homeland Security. Therefore, no
statement in this article should be construed as an official position of the Department of
Homeland Security.
ii
Table of Contents
Executive Summary .................................................................................................................................... 1
Statement of Problem ................................................................................................................................. 3
Background ................................................................................................................................................. 3
1.
Lack of Awareness of Organizational Cybersecurity Policies ..................................................... 4
2.
Limited Adherence to Organizational Cybersecurity Policies ..................................................... 4
3.
Need for New Approaches that Build Awareness of Risky Cyber Behaviors ............................. 4
Conceptual Approach ................................................................................................................................. 5
1.
Avatars and Digital (Self) Representations ................................................................................. 6
2.
Digital Messaging......................................................................................................................... 6
3.
Real-TimePperformance Feedback............................................................................................. 7
Methods and Results .................................................................................................................................. 8
Experiment 1: Understanding Millennial Attitudes about Cybersecuirty .............................................. 8
Policies Regarding Firewalls, Antivirus, and OS Updates ........................................................ 11
Password Behaviors .................................................................................................................. 11
Problems Due to Risky Behaviors ............................................................................................. 11
Experiment 2: Determining Baseline Risky Behaviors in Millennials ................................................. 11
Phishing Email Behaviors .......................................................................................................... 11
Password Generation Behaviors ............................................................................................... 11
Experiment 3: Modifying Risky Behavior in Millennials ...................................................................... 11
Modifying Risky Behavior in Phishing Emails ........................................................................... 11
Modifying Risky Behaviors in Passowrd Creation and Use ...................................................... 27
Recommendations .................................................................................................................................... 38
Conclusions and Future Directions........................................................................................................... 39
References ................................................................................................................................................ 40
iii
List of Figures
Figure 1. Millennial Cybersecurity Project Conceptual Model ................................................................... 6
Figure 5. Distribution of Clues Selected by Millennials for Phishing Email Decision .............................. 15
Figure 6. Distribution of Baseline Password Length Behavior ................................................................. 17
Figure 7. Distribution of Baseline Password Complexity Behavior .......................................................... 18
Figure 8. Example of Avatar-Based Phishing Email Strategy Email ....................................................... 19
Figure 9. Example of Avatar “Positive” Reinforcement Email.................................................................. 21
Figure 10. Experimental Results of Intervention for Phishing Email Behavior ........................................ 24
Figure 11. Performance Feedback for Intervention 1 .............................................................................. 29
Figure 12. Intervention Feedback for Intervention 2 ................................................................................ 30
Figure 13. Example of Password Strategy “Messaging” with Avatar....................................................... 31
Figure 14. Example of Animated Strategy “Messaging” .......................................................................... 32
Figure 15. Post-Intervention Password Length Improvement by Group ................................................. 35
Figure 16. Post-Intervention Password Complexity Improvement by Group........................................... 35
Figure 17. Distribution of Individual Password Complexity Score Improvement ..................................... 36
Figure 18. Distribution of Password Complexity Score Improvement ..................................................... 37
Figure 19. Comparison of Pre-Intervention and Post-Intervention Password Complexity Scores
by Group.................................................................................................................................. 37
iv
List of Tables
Table 1. UNC Cybersecurity Policies ......................................................................................................... 8
Table 2. Experimental Design for Phishing Email Experiment ................................................................ 12
Table 3. Lists of Clues for identifying Phishing Emails ............................................................................ 13
Table 4. Results of Phishing Email Experiment Stratified by Sender Type ............................................. 13
Table 5. Results of Phishing Email Experiment Stratified by Gender and Sender Type ........................ 14
Table 6. Results of Phishing Email Experiment Stratified by Sender Type (Millennials) ........................ 15
Table 7. Experimental Design for Phishing Email Experiment ................................................................ 22
Table 8. Results of Phishing Email Experiment (First 24 Hours after Delivery) ...................................... 23
Table 9. Risky vs. Best Practices for Password Creation and Use ......................................................... 28
Table 10. Overview of Experimental Design for Password Experiment .................................................. 33
Table 11. Distribution of Repeated Password Behavior by Group .......................................................... 38
v
Executive Summary
Millennials are the first “always connected” generation ensconced within an ecosystem of
digital devices from iphones and iPads to tablets and laptops. They bring these devices and
behaviors into the places where they study and work which can expose organizations to
security vulnerabilities. Millennials are reported to lack awareness of and demonstrate limited
adherence to organizational security policies which highlights the need for new approaches
that build awareness of risky behaviors in cyberspace. The goal of the Millennial Cybersecurity
Project is to improve our understanding of millennials awareness of cybersecurity threats , to
identify risky behaviors that put organizations at risk, and to explore new digitally-mediated
tools to modify risky behaviors in cyberspace.
The underlying premise of the Millennial Cybersecurity Project is that the best way to
communicate with millennials is through the language of technology. Most organizations today
employ communications strategies that are better suited to previous generations. Instead of
more traditional text-based materials and face-to-face interactions, this project demonstrates
that risky behaviors can be reduced by moving from more traditional approaches to digitallymediated and interactive online approaches that are more aligned with millennial familiarity
and comfort with “messaging” that is short and simple—and supported by graphics and
symbols for fast and easy comprehension. In particular we demonstrate the effectiveness of 1)
the use of real-time feedback of (lack of) conformance with security best practices, 2) the
online reinforcement of best practices by encoding them in a “strategy” that is delivered
digitally, and 3) the use of avatars or other digital (self) representations to personalize the
messaging.
While stereotypes portray millennials as risk-seeking and blithely unaware of threats to
and policies regarding cybersecurity, our results reveal a broad range of attitudes from highly
aware and competent to completely uninformed and dangerous. These behavioral categories
tend to transcend traditional boundaries of gender and age. Survey results of millennial
business students and staff at the Kenan-Flagler Business School revealed that among the
more vulnerable behaviors are password creation and use, and ability to recognize and
respond properly to phishing emails. Self-reported risky password and phishing behaviors by
millennials were confirmed by experiment.
The Millennial Cybersecurity Project demonstrated that digitally-mediated interventions
can both reinforce positive identification of phishing emails and reduce associated risky
behaviors. Phishing emails are increasingly difficult to spot as senders get better at portraying
themselves as legitimate. Further, while millennials rely on a number of standard clues to
catch phishing emails, they often overlook clues if the sender appears to come from a trusted
source. In online experiments, only 68% of millennials correctly identified phishing emails as
legitimate while 32% incorrectly identified phishing emails as legitimate. The presence of a
1
trustworthy sender and a realistic corporate logo were most useful in identifying legitimate
emails, while suspicious links and unknown senders clued millennials as to fraudulent emails.
Millennials that experienced real-time feedback about their skill at identifying phishing emails
and who received best practice phishing “strategies” from avatars improved their ability to
identify suspicious emails from low-and medium-trust senders.
Millennials, however,
consistently overlooked standard clues in phishing emails from high-trust senders.
Risky behaviors regarding password creation and use were also reduced after online
interventions. Two types of interventions were tested. The first intervention provided real-time
feedback about password “strength” while the second intervention supplemented feedback
about password strength with a password “strategy” that encoded best practices for password
creation—both delivered by a personalized avatar. The strategy offered guidelines for creating
passwords that are long and complex and that repeat patterns in a memorable way for us on
for different devices. The password is a “front door” into an organization’s accumulated
confidential and competitive information. However, self-reported and observed password
behaviors confirmed that millennials fail to use best practices in managing their passwords,
thereby putting the organizations where they work and study at risk. Both interventions
achieved reductions in risky behaviors related to password strength, suggesting that
awareness and behavioral training programs that integrate real-time, online interactions with
students about their cyber behaviors are worth further experimentation and development.
2
Statement of Problem
Millennials are reported to prize freedom and innovation over security and stability and,
thus, may expose business to cyber vulnerabilities—especially small and medium-sized
enterprises that do not have the resources to adequately protect against unsafe technology
use by millennials. The workplace attitudes and behaviors of the millennials have been the
focus of several high-profile surveys in the last several years. These surveys, combined with
anecdotes, have reinforced stereotypes of risky behavior in a number of domains including
cyberspace. The Millennial Cybersecurity Project1 conducted a set of experiments to
determine the effectiveness of interventions such as the use of avatars and other digital (self)
representations for message personalization, real-time digital feedback about observed risky
behaviors, and messaging of policies and best practices in formats and language that are
more aligned with how millennials communicate with others and experience the world. The
project’s underlying premise is that cybersecurity awareness initiatives for millennials might be
improved when messaging is accomplished digitally and in formats consistent with digital
devices such as personal computers, cell phones, and mobile devices rather than more
traditional media such as paper hand -outs and face-to-face communications and lectures. To
test this premise the Millennial Cybersecurity Project conducted three studies to determine: 1)
millennial awareness of and self-reported behavior regarding policies and best practices of
cyber behavior; 2) millennial baseline performance regarding risky behaviors in cyberspace
related to organizational policy; and 3) post-intervention reductions in risky behaviors after
technology-mediated interventions that raise awareness about observed specific risky
behaviors and inform about best practices. The goal of the Millennial Cybersecurity Project is
to provide insights into millennial behaviors and possible tools for behavior modification so as
to better inform awareness training practices, improve millennial adherence to cybersecurity
policies, and reduce risky behaviors in cyberspace.
Background
Born after 1980 and the first generation to come of age in the new millennium, millennials
are the first “always connected” generation [1, 2, 22]. Growing up in the age of digital
technology and social media, they treat their multi-tasking hand-held gadgets like a body part.
For millennials, technology provides a new ecosystem for their social lives that increasingly
merges with their work lives. Technology-mediated messaging—from emails to product
advertisements—is becoming the dominant mode of communication with this generation. At
the same time millennials have a greater degree of trust in the virtual world that is not shared
by older generations—especially the baby boomers. For many millennials, this increasing trust
1
The URL address for the website is: http://cybersafe.unc.edu
3
of technology and feelings of security in the virtual world have led to a dissolution of
conventional boundaries between private and public and a tendency to overlook risks
associated with technology use [10, 11].
New cyber threats resulting from risky behaviors by millennials are the result of the
convergence of three trends. First, the millennials’ workplace is no longer defined by the four
walls of their organization. Rather millennials make less of a distinction between work and
play—working on the road, at home, and even on vacation. Second, technology has mo ved
from hard-wired systems to wireless mobile technologies including smartphones, notebooks,
and iPads (among others) for work-related tasks. In addition, collaboration is the dominant
mode of work and play using social networking, online chats, and othe r technologies. These
factors, combined with millennials’ indiscriminate use of these technologies, exposes
businesses to new and greater vulnerabilities. Several points can be made:
1. Lack of Awareness of Organizational Cybersecurity Policies
In a 2010 survey of millennials by Accenture, o nly 40 percent reported that their employers
have published detailed policies related to posting work or client information on public web sites.
Further, only 34 percent of millennials said they were aware of their company's cybersecurity
policy. Approximately 31 percent of millennials said they don’t know if their company has such
a policy, 17 percent said their employer hasn’t published such a policy, 6 percent said that
whatever policy their company has published is too complex to understand, and 6 percent said
they will post work or client information on public sites regardless of any policy, at least when
communicating with colleagues [2].
2. Limited Adherence to Organizational Cybersecurity Policies
Studies have also shown that millennials routinely bypass corporate approvals and policies
when using various devices and technologies. Equal numbers of millennials report that they
have accessed online collaborative tools (75 percent) and online applications (71 percent) from
free public websites when those technologies were not available at work or not meeting their
expectation. Approximately 45 percent of millennials use social networking web sites at work,
regardless of whether their organization or company prohibits their use [20].
3. Need for New Approaches that Build Awareness of Risky Cyber Behaviors
Organizations from the White House 2 and large multinationals to SMEs and non-profit
organizations are searching for strategies to accommodate millennial attitudes toward
technology and cybersecurity, and to reconcile these attitudes with need for enterprise security,
data privacy, and regulatory compliance [4, 6, 12, 13, 16, 21, 27]. The university, and in
particular the Kenan-Flagler Business School, offers an excellent microcosm of the millennial
2
In October 2011, the White House held many events and activities along with federal, state, and local
government, the private sector, and international partners as part of National Cybersecurity Month.
4
generation. Kenan-Flagler students will become employers and managers in a range of
companies and industries. These students can be expected to be aware of organizational
perspectives towards cybersecurity, yet many demonstrate many of the risky generational
behaviors that create vulnerabilities in an organization’s cyber environment.
Risky behavior permeates almost all human activity. When asked to compare the level of
risk between various alternatives, evidence shows that people’s choices are based on their
knowledge of the threat and how they feel about it, i.e. their level of anxiety, concern, or fear.
Risk assessment by experts is based on objective information about a threat to a given
subject, knowledge of the level of exposure of the subject, and estimation of the probability that
the subject will be impacted by the adverse outcome of the threat. To calculate risk, experts
utilize measurable norms vetted by other professionals and their representative associations.
General public perceptions are commonly subjective and may not match experts’ views, being
guided by personal experiences, circumstances and, like experts, highly influenced by the
standards of their groups of peers. Studies have shown that millennials are “risk seekers,” e.g.
enjoying extreme sports, while older people tend to be risk averse.
The challenge for organizations is to turn millennial affinity for technology into new tools to
build awareness of cybersecurity vulnerabilities and to modify behavior so as to reduce those
vulnerabilities [27]. The contributions of this project are multiple. First, the results of this study
confirmed that millennials engage in risky cyber behaviors in the workplace (i.e. university),
thereby validating previously self-reported survey results. Further technology-mediated
interventions were shown by experiment to be effective in reducing risky behaviors, suggesting
opportunities for new tools for behavior modification in cyberspace. Based on the results of
the Millennial Cybersecurity Project, employment screening could be tailored to include
measures of risky behavior that eliminate inappropriate employment candidates, or to select
candidates whose behaviors are more easily modified within the workplace.
Conceptual Approach
The Millennial Cybersecurity Project explores the premise that the best way to
communicate with millennials is to use the language of technology [8, 20, 23, 25]. We address
the broad question as to whether digitally encoded and delivered interventions that target risky
behaviors by millennials is more effective in reducing risky behavior than traditional classroom
approaches that include printed informational materials and even traditional emails. These
questions are important since cybersecurity policies today tend to be delivered by “babyboomer” managers and professors using methods that may not be as effective communication
vehicles for millennials.
Our conceptual model is provided in Figure 1. The model suggests that each millennial
5
can be associated with a baseline level of awareness of and adherence to organizational
policies about cybersecurity, and that this awareness is associated with a set of baseline
behaviors. Our premise is that an intervention, delivered digitally and in real time , can raise the
awareness of and adherence to best practice policies regarding cyber behavior and thereby
reduce future risky behaviors in cyberspace concerning password generation a nd phishing
emails.
Figure1. Millennial Cybersecurity Project Conceptual Model
We explore three specific modes of technology-mediated interaction with millennials to
reduce risky behavior. These interactions are combined to create customized “interventions”
associated with password and phishing email behavior. The three digital interactions are:
1) Avatars and Digital (Self) Representations. The effectiveness of avatars and other
digital (self) representation technologies have been the focus of a new stream of
research to modify personal behavior [5, 18]. In virtual environments an avatar is
defined as “a perceptible digital representation whose behaviors reflect those executed,
typically in real time, by a specific human being” [3]. The theory is that in the anonymity
of the online environment, people are de-individuated and will adhere to a new identity
that is inferred from avatars, in many cases from their own avatars. The phenomenon
in which people infer their expected behaviors and attitudes from observing their
avatar’s appearance is known as the Proteus Effect after the Greek god who could
change shape. This phenomenon, first described by researchers at Stanford University,
occurs when a subject transfers expectations or understanding of their avatar’s
behavior to their own real-world behavior [29] and has been documented in
experiments elsewhere [7, 14, 19, 26, 29, 30].
2) Digital Messaging. The emergence of the digital environment and new technologies
for interpersonal interactions within that environment has changed how people
6
communicate with one another—not only the way they shape information into
“messages” but also the frequency of communications and the mode of communication
according to device. We refer to digital “messaging” as a (usually) short communication
transmitted by words, signals, or other graphical means from one person or group to
another in a digital format that can include graphical representations of concepts and
ideas. The digital messaging trend among millennials is towards shorter, more
frequent, and more interactive communications where the messages can be parsed
quickly and easily. In the digital world, an emphasis on “short” and “simple” is
increasingly dictated by the device—long texts are reduced to phrases and graphics to
convey both factual information and emotion. Tweets, for example, cannot exceed 140
characters. And millennials are frequent users of emoticons—the abbreviated smiley
and other faces by which they alert a responder to the tenor or temper of a statement.
3) Real-Time Performance Feedback. Modification of personal behavior through
feedback of performance is well-documented in the academic literature and, while there
are exceptions, most studies confirm a positive relationship between feedback and
improved performance. In the typical classroom, for example, personal feedback from
the teacher or professor has been shown to reduce disruptive behavior in elementary
school children and improve academic performance, respectively. New digital
technologies have broadened the potential for online feedback as a tool for enhanced
learning and real-time feedback of performance has been explored in a number of
domains from athletics [15] to business [17[ to medicine [24].
The Millennial Cybersecurity Project addresses three research questions, each of which is
discussed in the pages which follow:
1) Our model suggests that each millennial can be associated with a baseline level of
awareness of and adherence to an organization’s policies about cybersecurity.
Specifically, how a ware are millennials at the Kenan-Flagler Business School of
university policies regarding cybersecurity and what is their self-reported level of
behavior regarding these policies?
2) While there have been many studies of millennials as to their behaviors and attitudes
toward cybersecurity [1, 2, 22], there have been few that validate these self-reports with
empirical evidence of risky behaviors. Specifically, what are the baseline cybersecurity
behaviors of Kenan-Flagler millennials regarding password generation and phishing
emails and do they align with self-reported behaviors?
3) The success of approaches to modify risky behavior in cyberspace depends on how
and whether the information is encoded and delivered (i.e. “messaged”) in a digital
format that is more aligned with how millennials consume and create information.
Specifically, can risky behavior regarding password generation and phishing emails by
Kenan-Flagler millennials be reduced by interventions that are delivered online and in
7
real time—and that include one or more of the above technology-mediated digital
interactions?
Methods and Results
Experiment 1: Understanding Millennial Attitudes about Cybersecurity
To establish the level of awareness about cybersecurity threats and behaviors of UNC’s
Kenan-Flagler millennial students a baseline survey was used to gather data about students’
attitudes toward UNC’s Information Security Policies and cybersecurity in general. The
surveys collected three categories of question:
1) descriptive information about the
respondent; 2) self-reported conformance with seven UNC cybersecurity policies shown in
Table 1; and 3) self-reported problems resulting from potentially risky behavior in cyberspace.
Surveys were collected during three different student events in August 2011 shown below:
Table 1. UNC Cybersecurity Policies 3
Collection
Method
UNC Policy
Email
Phishing links/attachment
Email
Phishing for personal info
Online
Social Engineering
Online
Password generation
Daemon
OS critical updates
Daemon
Antivirus updates
Daemon
Firewall status
Kenan-Flagler BSBA Orientation. Full day
orientation event for incoming BSBA junior students
to the Kenan-Flagler Business School on August
20, 2011.
Kenan-Flagler MBA Welcome Reception.
Welcome Reception for incoming MBA students
and Master of Accounting students to the KenanFlagler Business School on August 23, 2011.
Kenan-Flagler ITS Laptop Cleanup Day.
Bimonthly event on August 25, 2011 where all
Kenan-Flagler students learn about cybersecurity.
A total of 189 anonymous surveys were collected of which 134 were from millennials and
49 from non-millennial students and staff. 4. The baseline survey showed that UNC millennials:
1) lack a comprehensive and consistent methodology for password usage; 2) have difficulty
identifying emails with social engineering attacks such as phishing and scam emails; and 3)
show a general lack of awareness of certain best practices necessary to assure a safe
experience in cyberspace. Figure 2 shows the reported frequency by gender and age group of
3
The initial project scope included all seven policies. However, bas ed on limitations at UNC regarding privacy
and the loading of daemon soft ware on students’ laptops, the revised scope includes only the first four policy
categories (phishing emails and password generation/social engineering).
4
Six participants did not provide their age group and were excluded from the sample.
8
selected risky behaviors and behaviors related to password usage. Figure 3 illustrates the
distribution by gender of 1) self-reported cybersecurity behaviors related to UNC policies, and
2) self-reported negative experiences related to risky behaviors.
Figure 2. Distribution of Some Risky Cyber Behaviors by Age Group and Gender
Figure 3. Cybersecurity Behaviors and Experiences Self-Reported on Surveys
Specific observations include:
Policies Regarding Firewalls, Antivirus, and OS Updates. Survey results indicate that a
majority of millennials comply with UNC policies regarding Firewalls, Antivirus, and OS
Updates but that there are some differences between genders for some behaviors :
a) Majority report use of antivirus and automatic updates (86% for males and 76% for
females);
9
b) Majority report automatic update of operating system (81% for males and 71% for
females). Approximately 40% of males reported also performing manual updates
versus only 19% of females.
c) Majority report active firewall in use (74% for males and 57% for females), however,
35% of females didn’t know if their computer had a firewall compared with only 15% of
males.
Password Behaviors. Millennials reported inconsistent behavior regarding password use—
specifically the use of the same password for some computers or systems and different
passwords for others. These conflicting behaviors suggest that students may lack awareness
of best practices regarding password use across technologies/systems. Females, in particular,
may engage in more risky behavior than males when choosing passwords due to lack of
awareness of best practices:
a) Approximately 76% of males reported using the same password on some of their
computer systems and different passwords on other computers compared with 89%
for females;
b) Approximately 36% of males reported using the same password on all their systems
compared with 30% reported by females.
c) Approximately 60% of males and females report the use of different passwords in all
their systems/technologies.
d) Given the above variability of behaviors regarding password usage, it is not
inconsistent that a majority of millennials reported forgetting passwords. Males
showed a higher incidence of forgetfulness (62%), compared with only 38% for
women.
Problems Due to Risky Behaviors. An unexpectedly large fraction of millennials reported
experiencing problems with their computers after engaging in certain online behaviors.
Differences were observed between males and females. However, it is not clear whether
these differences are due to riskier male behavior—or whether males are more knowledgeable
than females on this particular issue.
a) Approximately 32% of both males and females experienced problems after visits to
unsecure web sites;
b) Approximately, 32% of males reported experiencing problems with computer virus
attacks against 24% of females.
c) Approximately 28% of males and only 10% of women reported attacks by spyware
and malware. These results suggest that millennials may lack a clear understanding
of the difference between spyware and malware attacks, since almost exactly the
same answers were provided for the questions targeting these two problems.
10
d) A small number of students reported problems with social engineering websites after
providing personal information (9% of males and 6% of females). Even though these
are small numbers, they may have significant impact on an organization’s vulnerability
since a network is only as strong as its weakest link.
e) Approximately equal numbers of males and females reported problems after receiving
illegitimate emails, i.e. phishing email or email scam (21% for females and 17% for
males).
The results of the baseline survey indicate that millennials are aware of best practices
about how to protect one’s system through the use of firewall, antivirus and operating system
updates. However, results suggest that millennials are not as knowledgeable regarding the
dangers of inadequate password usage or risky practices in cyberspace that can create
vulnerabilities, for example phishing emails. Reported behaviors suggest that male millennials
are somewhat more knowledgeable than female millennials. However, males also appear to
experience more problems due, perhaps, to higher engagement in riskier online behaviors
than their female counterparts.
Experiment 2: Determining Baseline Risky Behaviors in Millennials
In Experiment 2 we investigated baseline cybersecurity behaviors regarding phishing
emails and password generation, and explored whether these results confirm the self -reported
behaviors discussed in the last section.
Studies have shown that young people, including millennials, tend to be inaccurate when
self-reporting behavior. In addition, this inaccuracy may be exacerbated when there is a
negative connotation associated to the behavior reported, as it is the case with risky cyber
behaviors.
Phishing Email Behaviors
Description. This experiment compared the ability of millennials and non-millennials to
identify phishing emails as fraudulent or legitimate based on the level of sophistication of the
phishing technique and the purported sender of the email—and explored which clues were
considered in the decision-making process. We explore, first, the premise that observed
behavior regarding phishing emails is determined by how skilled millennials are in identifying
clues that determine fraudulence. Second, we explore whether the level of ascribed trust in an
email sender is directly related to the likelihood that a millennial will open a phishing email.
Millennials may perceive potentially fraudulent emails from people and organizations to which
they have strong social connections such as Facebook and LinkedIn as more trustworthy than
similar emails from “arms-length” organizations. That is, millennials will tend to overlook clues
11
of fraudulence and ascribe more trust to an email when it is believed to come from a source
such as Facebook or LinkedIn.
Experimental Design. A web-based experiment was designed, developed 5, and
implemented for a sample of more than 100 millennial (undergraduate and MBA) students and
staff at the Kenan-Flagler Business School. The purpose of the experiment was to compare
the observed behaviors of millennials and non-millennials regarding phishing emails (opening
the emails, clicking on links and attachments, forwarding to others, and sharing of personal
information). The experiment was conducted during the Kenan-Flagler Security Day on
February 23, 2012. The usable sample was comprised of 56 millennials and 44 nonmillennials (52 females and 48 males).
Study participants were shown a sequence of three screens. On the first screen,
participants were shown one of eight emails and asked to indicate whether it was fraudulent or
legitimate. Once a participant has indicated whether the email is fraudulent or legitimate, he or
she is provided with a list of clues representing commonly accepted best practices for
identifying legitimate and fraudulent phishing emails. The participant is then asked to indicate
which of those clues, if any, helped in the decision process. The lists of clues are provided in
Table 3 below. The third screen asked participants for their millennial status (i.e. 17 or under,
18 to 31, older than 31) and gender. Each email was characterized by one of two levels of
trust (financial organization versus social network) and degree of phishing sophistication
(obvious clues versus subtle clues).
The 2-way experimental design is shown on the Table 2 below.
Table 2. Experimental Design for Phishing Email Experiment
Trust Level
LOW TRUST
(Financial
Organizations)
Email Sender
Obvious Clues
Subtle Clues
BANK OF AMERICA
Misspellings, Incorrect
Grammar, etc.
Erroneous links, Out-of-date
forms, Multiple Recipients,
etc.
PAYP AL
Misspellings, Incorrect
Grammar, etc.
Erroneous links, Out-of-date
forms, Multiple Recipients,
etc.
LINKEDIN
Misspellings, Incorrect
Grammar, etc.
Erroneous links, Out-of-date
forms, Multiple Recipients,
etc.
FACEBOOK
Misspellings, Incorrect
Grammar, etc.
Erroneous links, Out-of-date
forms, Multiple Recipients,
etc.
HIGH TRUS T
(Social Networks)
5
Survey instruments designed and implemented using Qualtrics.
12
Table 3. Lists of Clues for Identifying Phishing Emails
Clues of Legitimate Email
Clues of Phishing Email
Trustworthy sender
Unknown sender
Addressed directly to me
Never dealt with this company
Presence of corporate logo
List of recipients indicates mass email
Presence of security certification padlock
List of recipients seems suspicious
Recognize embedded link addresses
Contains suspicious link
[Correct language] 6
Too many grammatical/misspelling errors
[Plausible contents]7
Suspicious contents resemble known email
scams
Results. We first comment on results for the entire sample of millennials and nonmillennials based on results in Table 4. A broad inability to identify phishing emails was
observed. Only 68% of sample correctly identified emails as phishing , against 32% who
incorrectly indicated phishing emails were legitimate. Emails from financial organizations were
correctly identified with slightly more skill (52%) than emails from social networks (48%).
Table 4. Results of Phishing Email Experiment Stratified by Sender Type
Trust Level
Sender
Correct
Answers (% )
Incorrect
Answers (% )
Total
LOW TRUST
(Financial
Organizations)
BANK OF AMERICA
20
6
26
PAYP AL
17
9
26
HIGH TRUS T
(Social Networks)
FACEBOOK
18
7
25
LINKEDIN
13
10
23
68
32
100
TOTAL
The stratification of the results by ge nder and sender type, shown in Table 5, indicates
that of those participants correctly identifying phishing emails, females (62%) were moderately
better than males (38%) if the sender was a financial organization. Since the Kenan-Flagler
6
While noticeably incorrect language can serve as a good indicator of a phishing email, correct language is not
particularly helpful on determining t he legitimacy of a message. Thus, this clue did not appear on the list of clues
presented to participants after their decision on the test email legitimacy.
7
Similarly, while suspicious contents should raise concerns about email’s legitimacy, plausible contents per se is
not a clear sign of an email authenticity. For this reason, this clue was omitted from the list shown to participants.
13
staff is mostly female—and they work on administrative tasks related to financial
documentation—these results may be skewed by their knowledge of standard norms for
financial communications. Males did comparatively better discerning social networking
phishing emails (58%) than females (42%).
Table 5. Results of Phishing Email Experiment Stratified by Gender and Sender Type
Gender
FEMALE
MALE
Sender Type
Correct
Answers (% )
Incorrect
Answers (% )
Totals
Financial Organization
23
9
32
Social Network
13
7
20
Financial Organization
14
6
20
Social Network
18
10
28
68
32
100
TOTAL
Participants relied on a range of clues to correctly identify phishing emails as fraudulent
or legitimate as shown in Figure 4. Overall, 158 clues, or reasons, were selected by
participants from the lists in Table 3 above. Interestingly, the top two reasons cited in deciding
that an email was a fake were related to recognition and/or trust of the sender and any
embedded links. This seems to indicate that if people are better trained in recognizing unsafe
links and learn to trust messages from unknown sources less, then their ability to identify
phishing emails may improve significantly.
Figure 4. Distribution of Clues Selected By Participants For Phishing Email Decision
14
When only millennials were included in the sample, the results were similar to the results
for the sample as a whole (i.e. both millennials and non-millennials). As shown in Table 6, for
the 66 millennials in the sample, nearly 70% correctly identified phishing emails as either
legitimate or fraudulent.
The identification of sender—financial organization of social
networking site—did not appear to affect the ability of millennials to identify phishing emails.
Table 6. Results of Phishing Email Experiment Stratified by Sender Type (Millennials)
Sender Type
Sender
Correct
Answers (% )
Incorrect
Answers (% )
Totals (% )
LOW TRUST
(Financial
Organization)
BANK OF AMERICA
17%
6%
23%
PAYPAL
17%
11
27%
HIGH TRUS T
(Social Network)
FACEBOOK
21%
6%
27%
LINKE DIN
14%
9%
23%
69%
31%
100%
TOTAL
Participants relied on a range of clues to correctly identify phishing emails . The results
shown in Figure 5 indicate that, while the overall range of reasons cited for correctly identifying
phishing emails is comparable of that of the entire sample, the most frequently cited reason for
Figure 5. Distribution of Clues Selected By Millennials For Phishing Email Decision
15
incorrectly identifying a phishing email as legitimate does not follow the same pattern. For
millennials, the presence of the corporate logo on the email was the most frequently cited
reason (29%) millennials incorrectly identified an email as legitimate; “trustworthy sender” was
the second most cited reason (26%). This choice should not come as a surprise since the
millennials participating in this study are all business students and staff from UNC’s KenanFlagler Business School. This finding reinforces that “trust” is a crucial factor governing
people’s judgment in cyberspace and indicates that behavior modification based on “t rust”
should be differentiated based on the target group profile.
Password Generation Behaviors
Description. A second online experiment was designed, developed, 8 and implemented to
determine a baseline of observed behaviors regarding password generation (password length,
complexity, memorability, customization, and re-use on different systems). The experiment
assessed participants’ ability to create new passwords during “online” visits to two websites—
one a UNC web site and the other a retail website. This password generation baseline
experiment consisted of 112 millennial (undergraduate, MBA, and MAC) students and nonmillennial staff at the Kenan-Flagler Business School.
Results. Results were analyzed with respect to password length, complexity, and
repeated use of same “string” in both passwords—including entering the same password
twice.
a. Password Length Results
The mandatory minimal password length for all users of the Kenan-Flagler computer
network is 8 characters. Therefore, it was expected that, due to habit, the millennials would
have passwords 8 or more characters long. Thus, it was not surprising that t he mean length
computed for both Password 1 and Password 2 was 10 characters. Figure 6 provides the
distribution of the length of Password 1 and Password 2 which serves as the baseline for our
subsequent experiment on modification of risky password behavior. Note that a few outliers
appear in this distribution, i.e. passwords more than 15 characters long. Although very long
passwords are useful for high security systems, i.e. common practice for routers’ passwords is
26 characters long, it is not clear why a student would use such a long password for this
experiment, except for “beating the system” and to receive the maximum score.
b. Password Complexity Results
Besides mandating passwords at least 8 characters long, Kenan-Flagler passwords must
meet the standard minimum requirements for “traditional” passwords and contain at least one
of each of these sets of characters: lowercase letters, uppercase letters, digits, and special
symbols. The strength of a password can be measured based on the combination of use of
8
Customized software and website were developed in-house using Java and PHP technologies.
16
these characters by a password meter algorithm. A password meter takes into account not
only which types of characters are used to form a password, but also the sequence in which
they appear and the length of the password to compute a pass word complexity score—a
measure of the password’s strength. Following the minimum guidelines does not provide a
guarantee that the password generated will have a high complexity score but ensures a certain
level of protection. It was interesting to verify whether participants’ password complexity
behavior would be influenced by the practices mandated by UNC, as it had happened for the
password length behavior—and whether these practices would help them generate passwords
with high complexity scores.
Figure 6. Distribution of Baseline Password Length Behavior
Frequency Count
30
Password 1
25
Password 2
20
15
10
5
0
6
7
8
9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31
Password Length
The distribution of the complexity scores for the baseline Password 1 and Password 2 is
presented in Figure 7. The mean computed for the password complexity scores obtained in
this experiment was 60, which serves as the breakpoint between a “good” and “strong”
password on the password meter program used in this experiment. Overall, the baseline
distribution shows that password complexity behavior for a large number of Kenan-Flagler
millennials is acceptable.
c. Password Repeated Use Results
To better protect an individual’s multiple computer accounts and to avoid compromising
all accounts simultaneously, security experts recommend that users generate different
passwords for different systems. This is one of the UNC information security policies
considered in this study. Risky behavior associated with repeated use of a single password in
more than one system was tested by comparing Password 1 and Password 2. We found that
36 students, or 32% of the sample, entered the same password for the two different websites
they were shown. All those who did not repeat the password were millennials, of which twothirds were males and one-third were female. Regarding to affiliation, 61% of those who
17
repeated passwords were MBA students, 19% BSBA students, 6% MAC students, 8%
indicated no affiliation to Kenan-Flagler, and 6% were staff.
Figure 7. Distribution of Baseline Password Complexity Behavior
25
Frequency Count
Password 1
Password2
20
15
10
5
0
0-10
10-20
20-30
30-40
40-50
50-60
60-70
70-80
80-90
90-100
Password Complexity Score
Experiment 3: Modifying Risky Behavior in Millennials
In Experiment 3 we explore the effectiveness of digitally-mediated interventions in
modifying risky behavior by millennials regarding password generation and phishing emails.
For each behavior an “intervention” was designed that fuses digital messaging of a
“strategy”—to include the use of an avatar for personalized delivery as appropriate—and
feedback to the millennial about the riskiness of his or her observed behaviors.
Modifying Risky Behavior in Phishing Emails
Description. An intervention experiment was designed, developed9 and implemented to
test millennial ability to recognize phishing emails and to improve their behavior appropriately
(do not open email, do not open any attachments, do not send any personal information). The
goal of the intervention was to modify risky behavior by reinforcing a “safe” strategy for
recognizing and handling phishing emails from suspicious sources. As shown in Figure 8, the
phishing strategy is comprised of a set of features or clues and appropriate actions to take if
the email is suspected to be phishing—accompanied by an avatar to personalize the
messaging.
9
Surveys were developed in Qualtrics.
18
Figure 8. Example of Avatar-Based Phishing Email Strategy Email
19
Actions correspond to accepted best possible practices. For example, some clues (fishy
subject, suspicious sender, etc.) should be examined before opening an email; others can be
examined only afterward opening (suspicious links, etc.). The intervention consists of a
personalized reinforcement for correct responses and personalized remedial reinforcement for
incorrect responses—in each case the intervention is accompanied by a “messaging” of the
phishing strategy.
Reinforcement emails are personalized according to the behavior of the millennial. For
example, if the millennial did not open the phishing email, a positive reinforcement for “correct”
behavior was sent; If the millennial opened the phishing email and clicked on a bad link, a
reinforcement email for “incorrect” behavior was sent alerting the millennial that he or she had
been observed opening a phishing email and clicking on a suspicious link. Examples of
reinforcement emails for correct and incorrect behavior are provided in Figure 9. The
reinforcement email at the top of Figure 9 was sent to a millennial who incorrectly opened a
phishing email and clicked on a link; the reinforcement email in the middle was sent to a
millennial who opened the phishing email but did not click on the bad link; the reinforcement
email at the bottom was sent to a millennial who neither opened nor clicked.
Experimental Design. This 2-way experiment explored whether millennials are more
likely to open phishing emails from senders with a higher trust level and whether they can
discern a sophisticated phishing email with subtle clues such as erroneous links, out-of-date
forms, and suspicious attachments from phishing emails with obvious clues such as
misspellings, requests for personal information, multiple recipients, and incorrect grammar.
We were also interested in knowing whether millennials are more inclined to overlook clues if
the source of the email “appears” to come from a “high-trust” sender. For example, a low-trust
sender would be an organization that does not have any personal connection to the millennial
and may not even be an organization that is familiar to the individual. Examples might be a
recognized scam-type email from a source in Nigeria or some other source of dubious
heritage. A high-trust email would “appear” to come from a sender with whom the recipient is
familiar or with whom the recipient has exchanged emails in the past. Examples might be
Facebook, LinkedIn, or even UNC.
Table 7 provides an overview of the experimental design and the types of emails
according to trust level. Over the course of three weeks, students were sent a series of six
phishing emails, two for each of three levels of trust. Emails contained several types of clues
as to whether those were indeed a phishing email as described above. In addition, to test
response to “social engineering” attacks some emails requested that students provide personal
information in return for a service, reward, information, etc. Sample emails for low, medium
and high trust are provided in Appendix A to this document.
20
Figure 9. Example of Avatar “Positive” Reinforcement Email
21
Table 7. Experimental Design for Phishing Email Experiment
Trust
Level
Delivery
Order
Email Sender and Description
INTERVENTION GROUP
1
LOW
TRUST
CONTROL GROUP
NACHA – The Electronic Payments Association
Intervention and Reinforcement
2
American Bankers Association (ABA)
Intervention and Reinforcement
Intervention and Reinforcement
4
HIGH
TRUST
No Email
Triangle Carolina Mornings
No Email
6
No Email
Free Tickets from Chapel Hill Cinema Grill
Intervention and Reinforcement
5
No Email
NC QUICK PASS
3
MEDIUM
TRUST
No Email
No Email
Free Tickets from UNC Athletics Association
The experiment included a control group and an intervention group. The control group
received a text email describing the standard policies regarding acceptable online behavior
from the Kenan-Flagler IT department, but did not receive any “messaging” of the phishing
strategy or any personalized avatar-based reinforcement interventions in response to their
behavior. The second group received reinforcement interventions as described above and
shown in Figure 9 as well as with an avatar-delivered strategy “message” as shown in Figure
8. The reinforcement email was personalized to their observed level of performance . People
that did not open a phishing email were given positive reinforcement congratulating them on
correct behavior, while people who opened a phishing email were alerted to their incorrect
behavior.
Results. Table 8 summarizes the results of intervention on observed phishing behavior
during the first 24 hours after the test phishing emails were sent. Student responses were
automatically tracked through subscription to a third-party email tracking service. For each
phishing email, Table 8 reports several metrics (i.e. number of times the email was read,
whether it was forwarded to others, whether links or attachments were clicked, and whether
unsolicited and solicited replies were sent from students). A total of 63 millennials participated
in this experiment divided between the “intervention” group that received interventions and the
“control” group that received no intervention.
22
Table 8. Results of Phishing Email Experiment (First 24 Hours after Delivery)
Type
Intervention Group
Control Group
Tracking Statistics
FIRST EXPERIMENT: NACHA – The Electronic Payments Association
LOW
TRUST
Read email
Forwarded
Clicked link1
Clicked link2
Unsolicited email
78.6%
28.6%
50.0%
28.6%
7.1%
Read email
Forwarded
Clicked link1
Clicked link2
Unsolicited email
67.3%
28.6%
34.7%
12.2%
4.1%
#Email read
#Forwarded
#Links clicked
#Unsolicited email
120
22
71
4
SECOND EXPERIMENT: American Bankers Association (ABA)
Read email
Forwarded
Clicked link1
Clicked link2
Solicited email back
50%
0%
0%
0%
0%
Read email
Forwarded
Clicked link1
Clicked link2
Solicited email back
38.8%
6.1%
0%
0%
0%
#Email read
#Forwarded
#Links clicked
#Emailed back
33
3
0
0
THIRD EXPERIMENT: NC QUICK PASS
MEDIUM
TRUST
Read email
Forwarded
Clicked link1
Clicked link2
Clicked attachment
Unsolicited email
28.6%
0%
0%
0%
0%
0%
Read email
Forwarded
Clicked link1
Clicked link2
Clicked attachment
Unsolicited email
61.2%
12.2%
0%
6.1%
20.4%
0%
#Email read
#Forwarded
#Links clicked
#Clicked attachment
#Unsolicited email
61
6
3
10
0
FOURTH EXPERIMENT: Chapel Hill Cinema Grill
Read email
Forwarded
28.6%
7.1%
Solicited email back
55.1% #Email read
6.1% #Forwarded
2.0% #Solicited email
back
FIFTH EXPERIMENT: Triangle Carolina Mornings
HIGH
TRUST
0%
Read email
Forwarded
Solicited email back
Read email
Forwarded
Clicked link1
57.1%
14.3%
7.1%
Read email
Forwarded
Clicked link1
Clicked link2
Clicked attachment
Unsolicited email
7.1%
14.3%
7.1%
Clicked link2
Clicked attachment
Unsolicited email
51.0% #Email read
2.0% #Forwarded
0% #Links clicked
4.1% #Clicked attachment
0%
0% #Unsolicited email
46
4
1
60
3
6
2
1
SIXTH EXPERIMENT: UNC Athletics Department
Read email
Forwarded
Clicked link
Clicked attachment
Solicited email back
78.6%
78.6%
28.6%
0%
0%
0%
Read email
75.5% #Email read
Forwarded
Clicked link
Clicked attachment
Solicited email back
16.3%
6.1%
10.2%
6.1%
23
#Forwarded
#Links clicked
#Clicked attachment
#Emailed back
107
12
5
5
3
Initial inspection of the results suggests that the intervention had a quantitative and
positive effect in modifying millennials’ behavior upon receiving phishing emails. The rate at
which each of the phishing emails was opened for both the intervention and control groups is
shown in Figure 10. The read rate is computed as the number of times the phishing email
was opened/read by each group during the first 24 hours after each email was delivered. To
better understand the observed behaviors, we focus on three behaviors corresponding to low,
medium and high trust behavior indicated by the arrows in Figure 10 :
Figure 10. Experimental Results of Intervention for Phishing Email Behavior
a. Low-Trust Phishing Emails
An overwhelmingly large—and worrisome—fraction of both the intervention (80%) and
control groups (70%) opened and read the first phishing email from NACHA—The Electronic
Payments Association—an assumedly unknown sender 10. The email, which reported a
problem with a recent payment, contained a number of clues that should have alerted
millennials that it was a fake. Once open, millennials recognized the email as phishing when
they repeatedly received a “SERVER NOT FOUND” error message after clicking on links
embedded in the email. Many millennials contacted Kenan-Flagler IT HelpDesk staff with
questions about phishing and virus infection, and requests for computer “clean-up”. The large
response to the email was unanticipated, as was the response in alerting IT. The IT staff was
10
We assume that the sender is not well known by millennials becaus e, although NACHA is a real organization, it
is fairly obscure to the general public.
24
instructed to “play along” and not to disclose that this email was part of an experiment. They
provided feedback to students’ enquiries following standard departmental procedures. Several
millennials replied to the phishing email asking for further information regarding their “rejected
transaction”. Although the Millennial Cybersecurity Project was heavily publicized to KenanFlagler students, staff, and faculty during the campaign to solicit volunteers, among all 63
participants of this experiment only one millennial speculated that this first phishing email was
part of the study and contacted IT Helpdesk to confirm this hypothesis.
An intervention consisting of a reinforcement email encoding the “safe” phishing strategy
and a personalized message was sent to the intervention group 24 hours after the phishing
email was delivered and before the delivery of the second phishing email from .the American
Bankers Association (ABA). Although no intervention was sent to the control group, we
observed a pronounced reduction (almost 30% for both groups) in the number of instances in
which the second phishing email was opened and read, as well as a sharp drop in other risky
behaviors. We hypothesize that more than one factor may have contributed to this observation.
First, the control group may have reduced their risky behavior due to the fact that this email
repeated the “financial” theme of the first email. This may have increased millennials’
suspicions, who then decided to not open or explore the email further. Second, as can be
seen in the example emails provided in Appendix A, this phishing email is distinguished from
the first email in that it contains a request for personal information from the recipient—a well
known “give away” of email scams. Third, members of the control group who contacted IT Help
Desk after the first phishing email were reminded of best practices and may have acted more
cautiously immediately afterward.
b. Medium-Trust Phishing Emails
The positive impact of the intervention in reducing risky behavior can be discerned more
clearly for the medium-trust emails. The third phishing email is from NC Quick Pass, a prepaid account used for all (unmanned) electronic toll collection in North Carolina. Services are
fairly new having started only last year. A strong state-wide advertisement campaign was
launched to inform the public about the program and required procedures for enrollment. All
registered drivers in the state, which include a large number of millennials in this study, can
therefore be assumed to have some knowledge and interest in learning which roads are now
subject to a toll fee collection. Thus, the response to this phishing email was expected to be
higher than that of the low-trust emails for the control group. If the intervention was effective
we would expect that the intervention group would exhibit less risky behavior. This expectati on
was confirmed by the data; the increase in risky behavior occurred for the control group but not
for the intervention group. Specifically, the number of emails read by the control group
increased from 39% for the ABA email to 61% for the NC Quick Pass one, while the number of
emails read by the intervention group decreased from 50% for the ABA email to 29% for the
NC Quick Pass email. These opposing trends are seen as positive support for that intervention
and reinforcement feedback are able to modify risky phishing behavior through raised
25
awareness of best practices. While some millennials in the intervention group still opened the
phishing email, none clicked on the embedded link or attachment. Besides opening the email,
20% of the control group still missed the clues and clicked on the “invoice” attached while 6%
clicked on a (suspicious) link to access the NC Quick Pass website.
Low read rates persisted when the two groups were sent the fourth email from Chapel Hill
Cinema Grill. This email tried to persuade millennials to provide personal information—
promising free movie tickets to a (fictitious) local theater. A company logo was also added to
the message since results from Experiment 2 suggested that logos strengthen millennials’
level of trust and appeal to their preference for visually appealing symbols. Results showed
the same trend as the previous email. The intervention group read only 29% of emails while
the control group read 55% of the emails. One millennial from the control group provided the
sender with the requested personal information (c.f. mailing address and UNC class in order to
receive the promised free tickets).
c. High-Trust Phishing Emails.
The high-trust emails were designed to further test whether interventions are effective in
reducing risky behaviors for emails from high-trust senders. The fifth email from fictitious
sender Triangle Carolina Mornings was designed to elicit high trust among millennial students
at UNC because it described a Kenan-Flagler student club. Recall that, in Experiment 2 we
observed that millennials were inclined to overlook usual clues when they receive an email
from a high-trust sender. Consistent with the previous four emails, the intervention group
received a reinforcement email and phishing strategy “message” 24 hours after the initial
delivery of the phishing email and prior to the delivery of the fifth phishing email.
Results indicated that intervention was only partially successful in preventing millennials
from opening the phishing email. Among the intervention group, especially, the clues with
which millennials had identified phishing emails in previous tests were overlooked. The number
of students from the intervention group who opened the email increased from 29% on the
Cinema Grill email to 57%, while the no intervention group slipped from 55% to 51%. These
results are attributed to the level of high trust associated with this phishing (c.f. as shown on
the example provided on Appendix A, the phishing email’s subject line read Kenan-Flagler
Networking Event, which appealed to new students who had just arrived at the Business
School for the summer session. Again, one millennial sent an unsolicited reply to the sender
reporting an error when trying to open the “attached” Meeting Agenda and requesting a new
copy.
The sixth and last high-trust email was sent to millennials without any prior reinforcement.
The phishing email from UNC Athletics Department included the possibility of receiving free
tickets to UNC games—a credible and highly desired situation by millennials. We anticipated
that this email would present millennials with an irresistible offer and attract a large number of
participants into opening the email and providing the personal information requested. Of the
26
intervention group, the number opening the email increased from 57% to 79%. Of the control
group, the number opening the email also increased from 51% to 76%. The results obtained
were not surprising, given the attractiveness of the email, but still interesting. In addition, 6%
of the control group attempted to click on embedded links, 10% attempted to click on the
attachment, and 6% emailed back for tickets, while the intervention group presented no ne of
these risky behaviors. Three millennials in the control group replied to the request for personal
information while none replied in the intervention group.
We draw the following preliminary conclusions from the results observed on the risky
phishing behavior illustrated by Figure 7:
1) The level of trust of the sender of the email, as evident from the sender’s email
address and the subject of the email, is a determining factor in millennials’ decision to
open a phishing email;
2) There appears to be a limit on the effectiveness of the intervention (reinforcement and
messaging of strategy with avatars) in modifying risky cybersecurity be haviors;
3) Although limited, the results show that the combined use of a strategy and avatars
had a positive impact which seemed to have some persistent results;
4) The results are sufficiently positive results to warrant a larger study aimed at verifying
whether the intervention can be improved and whether it would be as effective with
other millennials, i.e. non-business students.
Modifying Risky Behaviors in Password Creation and Use
Description. An online experiment was designed, developed and implemented to
compare the effectiveness of different interventions in modifying behaviors relative to the
creation of passwords and their use by millennials. UNC millennials know the basics of
generating a complex password but the large majority do not know strategies for creating
passwords that are easy to remember and strong (i.e. difficult to “crack”), and that can be
customized for multiple sites. This leads to risky behaviors such as writing down the
passwords on paper or choosing simple passwords and/or using the same password for
multiple sites. The goal of the experiment was to test millennials’ ability to generate passwords
that are difficult to “crack” and to develop a strategy for creating multiple passwords for multiple
uses that are both easy to remember and difficult to “crack.”
There are best practice standards for password length and complexity, but use pattern
and memorability are intertwined parameters that are more difficult to standardize. Experts
agree that using the same password everywhere is risky because, even if that is a very strong
password—long and complex, if it is ‘cracked’ the information it guards will be exposed on all
systems at once. On the other hand, using different passwords everywhere which are lengthy
and complex may produce a less memorable password and lead to the adoption of risky
27
behaviors, such as writing it down to avoid forgetting it. Table 9 summarizes risky versus best
practices standards for these four parameters that are key elements of creating a strong
password.
Table 9. Risky vs. Best Practices Behaviors for Password Creation and Use
Password Cyber Behaviors
PARAMETER
RISKY PRACTICES
BEST PRACTICES
Memorability
Lack of customization
(hard to remember)
Customized
(easy to remember)
Length
Short (<8 characters)
Long (>=8 characters)
Complexity
Simple, easy to crack
(<60 score)
Complex, hard to crack
(>=60 score)
Use Pattern
Same everywhere
Different everywhere
In this experiment, we develop two interventions: 1) messaging of a “safe” password
strategy; and 2) providing real-time feedback about password generation performance, as
described below:
a) Intervention 1: Real-Time Feedback. Intervention 1 comprises reinforcement
messaging that contains real-time feedback about the millennial’s password
generation performance. Millennials are provided with the complexity scores for the
passwords they generated in a tabular format. These scores are not accompanied by
a reinforcement message from an avatar. No information about password strategy is
provided. Millennials try to improve their scores without clear guideli nes as to best
practices. An example of Intervention 1 is provided in Figure 11.
b) Intervention 2: Real-Time Feedback + Password Strategy “Messaging” + Avatar.
Intervention 2 comprises a message that contains real-time performance feedback
and a “strategy” for improving password skill. This performance feedback is
accompanied by a reinforcement message from an avatar of a hacker. An example of
performance feedback message for Intervention 2 is provided in Figure 12. A
strategy is based on the concept of a “paraphrase” which has the quality of being
easier to remember than traditional (random) passwords. A paraphrase consists of the
first letter of each word on a phrase, song, poem, or sentence. When choosing a
paraphrase a person should make sure to select some phrase that can be easily
remember but not easily associated with them by other people. For example, one
should not select as their paraphrase their favorite saying which hangs on a plaque
above their desks. Paraphrases should still meet the requirements for traditional
passwords, including be 8 to 26 characters in length, and include at least one
28
character of at least three of the following sets: lowercase letters: a-z, uppercase
letters: A-Z, digits: 0-9, and special symbols: ? . , _ - % + = $ !. As shown in Figure 13,
the strategy developed for this experiment entails the following four “steps” : 1) choose
a password base (c.f. the first line of a memorable song) ; 2) make it longer (c.f. add
the next line or repeat); 3) make it more complex (c.f. add numbers and special
characters); and 4) customize for different sites. This strategy is delivered by an
avatar. The use of the cyberwoman and hacker avatars attempts to convey to
millennials the subliminal message of “good behavior” and “bad/risky behavior” by
associating cyberwoman with the password strategy that conforms with the best
practices for password creation while linking the hacker’s feedback message about
how risky it is to use weak passwords as the hacker is actively seeking to find easy
passwords to “crack”. The strategy is delivered in real-time using a sequence of
animated screens corresponding to each strategy step. Figure 14 illustrates the
animated strategy messaging
Figure 11. Performance Feedback for Intervention 1
29
Figure 12. Intervention Feedback for Intervention 2
30
Figure 13. Example of Password Strategy “Messaging” with Avatar
31
Figure 14. Example of Animated Strategy “Messaging”
32
Experimental Design. The high-level experimental design is provided on Table 10. The
sample included 112 millennials; 54 received Intervention 1 and 58 received Intervention 2.
Millennials log-on to an experimental web site comprised of a series of screens. The first
screen requests demographic information such as age (i.e. 17 or under, 18 to 31, older than
31) and gender. The next two screens ask millennials to provide passwords for each of the
web sites shown in Table 10. After creating passwords for the first two websites to determine
baseline performance, students are shown an intervention. Password experiments are online
so the intervention can be provided “on the fly”, or instantaneously as the person goes through
the experiment. The different groups receive different reinforcement messages. One half of
the group received Intervention 1 or real-time performance feedback of complexity scores; the
other half received Intervention 2 or real-time reporting of scores delivered by an avatar
followed by the strategy messaging.
Table 10. Overview of Experimental Design for Password Experiment
Type Of Experiment
PHASE
INTERVENTION 1
INTERVENTION 2
DEMOGRAPHI CS
ASSESSMENT
Log-On
Personal Demographics
Log-On
Personal Demographics
First Website
UNC Alumni Association
First Website
UNC Alumni Association
Second Website
Second Website
ASDA Online Shopping Site
ASDA Online Shopping Site
Real-Time Performance
Feedback
Real-Time Performance
Feedback With
Strategy+Avatar
Third Website
Third Website
Great Southern Travel Site
Great Southern Travel Site
Fourth Website
Fourth Website
Netflix Movie Site
Netflix Movie Site
BAS ELI NE
PASSWORD
ASSESSMENT
PASSWORD
STRATEGY FOR
MULTIPLE SITES
Final Reporting of Scores
Intervention 1 group is shown only the complexity scores computed for their passwords.
Besides their complexity scores, Intervention 2 group receives customized feedback message
delivered by a “hacker avatar” to motivate the student to make a greater effort to create
stronger passwords, as well as the scores for the passwords they submitted. The following
several screens deliver the password strategy. After the scores are shown, the password
33
strategy “message” provides instructions to create a stronger password. The millennials are
then asked to provide two more passwords, at the completion of which they are again shown
their scores and any improvements are noted. As each password is entered, it is automatically
recorded by the system for subsequent analysis according to the dimensions of the strategy
(i.e. length, complexity, repetition of strings). A sample sequence of screen shots as seen by
the millennials is provided in Appendix B.
Results. Results with respect to password length, complexity, and repeated use of same
password during the experiment are analyzed next.
a. Password Length
Both types of intervention improved millennials password length, with the strategy+avatar
intervention resulting in significantly more students with improved scores. A straightforward
way to measure password length improvement is to compare the average length of preintervention passwords 1 and 2 against the average length of post-intervention passwords 3
and 4. Using this approach, a student is considered to have improved his/her behavior
performance with respect to password length, after been shown the intervention, if the average
length of passwords 3 and 4 is greater than the average length of passwords 1 and 2. We
found that 75% of the students in the Intervention 2 group—those whose feedback/
reinforcement message contained the strategy with avatars—have improved their password
length against only 46% of the students in the Intervention 1 group—those who only received
password complexity scoring. By the same token, a student’s behavior performance regarding
password length is considered worse, if the average length of the post-intervention passwords
3 and 4 is smaller than the average length of the pre -intervention passwords 1 and 2. We
found that only 17% of students in Intervention group 2 showed a worse behavior against 33%
of Intervention 1 group. Some millennials recorded no change. In Intervention 1 group 21% of
the students fall under this category versus only 8% of students in Intervention 2 group.
Overall, Intervention 2 group showed a moderate improvement regarding password length
when compared to the Intervention 1 group, as shown in Figure 15.
b. Password Complexity
Both types of intervention improved millennials complexity scores.
A student’s
performance is defined as having improved with respect to password complexity if the average
of the complexity scores of post-intervention passwords 3 and 4 is greater than the average of
the complexity scores for pre-intervention passwords 1 and 2. Post-reinforcement
improvement for password complexity computed for the intervention 2 group was 59% while
that of Intervention 1 group was 54%. The password complexity behavior of 39% of the
students in Intervention 1 group worsened compared with 34% of students Intervention 2
group. No behavioral change was registered for 7% of the students in either group. These
findings are summarized in Figure 16.
34
P Figure 15. Post-Intervention Password Length Improvement By Group
P Figure 16. Post-Intervention Password Complexity Improvement By Group
Both interventions were equally successful in improving password complexity scores. In
this case, the addition of the password strategy and avatar plus score reporting did not
significantly outperform simple feedback of complexity scores. Students from both groups
received a numerical, and the equivalent categorical, score (as computed by a password
meter) and we hypothesize that given the highly competitive nature of Kenan-Flagler students,
the password complexity score was a larger motivating factor in creating a more complex
password. This millennial competitive behavior was registered in the data collected, when
some students, after been shown their scores for the pre-reinforcement passwords they
created, went back to these previous screens and entered new passwords. Unbeknownst to
them, the software program saved all passwords entered. When we examined the data and
noticed this anomaly we decided to use for analysis purposes only their first attempt for each
35
password and to eliminate the secondary input attempts. Results suggest that providing a
numerical score may be enough to influence students to modify their password creation
behavior with respect to complexity.
In a deeper analysis of the data, we eliminate those millennials whose average baseline
password scores were greater than 60 which is the breakpoint between “good” and “strong”
password ability based on the algorithm. In this way, we focus only on the less -aware
students—those whose poor baseline behavior indicates they have something to learn from
the intervention. A score of 60 was also the mean for the complete sample. The distribution of
the password complexity behavior improvement in Figure 17 shows the frequency counts of
pre- and post-intervention password scores for the complete sample and the reduced sample
with scores less than 60. The arrows in the figure highlight the positive (rightward) shift i n the
complexity score frequencies post-intervention, meaning that the intervention positively
affected, i.e. positively modified, students’ password complexity behavior. The effects are
considerably greater for the reduced sample reflecting the relatively larger improvement in
performance of that group.
Figure 17. Distribution of Individual Password Complexity Score Improvement
We also computed the improvement gain in individual password complexity scores after
the intervention by subtracting, for each individual student, the average of the pre -intervention
passwords 1 and 2 from the average of post-intervention passwords 3 and 4. The results,
depicted in Figure 18, show the improvement gains achieved by the reduced sample—
students who had a pre-intervention password average of less the 60—versus the
improvement obtained by the complete sample. The gain can be seen in the rightward shift
of the most frequently observed improvement gains.
36
P Figure 18. Distribution of Password Complexity Score Improvement
20
Frequency Count
Reduced Sample
Whole Sample
15
10
5
0
Password Complexity Improvement
A comparison of the distribution of pre-intervention versus post-intervention password
complexity scores by intervention group is shown in Figure 19. Overall, improvement results
for each intervention group were positive but show different effects. There was a pronounced
positive shift in password complexity score behavior for Intervention 1 which peaked at 65, a
little above the sample mean of 60. The peak for Intervention 2 occurs at 77 suggesting that
Intervention 2 (with the strategy and avatars) had a more positive effect in the modification of
password complexity behavior.
P Figure 19. Comparison of Pre-Intervention and Post-Intervention Password
Complexity Scores By Group
37
c. Password Repeated Use Results
Approximately one-third of the sample or 36 students used the same password for the
two websites 1 and 2. After the intervention, only 19%, or 21 students repeated their
passwords for websites 3 and 4. Thus, there was a 42% improvement with respect to this
behavior. Regarding gender, 50% of females improved their behavior by using different
passwords for websites 3 and 4, compared with only 38% of males. Comparing this behavior
for the two intervention groups we found that they had a very similar outcome as summarized
in Table 11. The groups exhibit the same level of improvement after intervention, more
specifically 13% of intervention group 1 and 15% of intervention 2 group created different
passwords for websites 3 and 4.
Table11. Distribution of Repeated Password Behavior By Group
Website
Intervention 1
Group (% )
Intervention 2
Group (% )
Total (% )
Password 1 and
Password 2
30
33
63
Password 3 and
Password 4
18
19
37
TOTAL
48
52
100
Recommendations
Insights gained from millennial self-reported risky cybersecurity behavior and observed
experiments conducted by the Millennial Cybersecurity Project research team serve as the
basis for the following recommendations herein offered as guideline for better methods to
communicate cybersecurity best practices to millennials in order to increase awareness of and
modification of risky behavior in cyber space.
1) Explore, employ and exploit digital messaging that is short in length, iconic, and
actionable. Millennials grew up with browsers and hyperlinks, email and online
gaming in detriment of other practices common to previous generations. Some
compelling evidence of these trends is the sharp decline in the volume of mail
delivered by the U.S. Postal Service and a report from May 2012 by Funcom—the
online game company—that 1 million users had registered ahead of time to test the
beta version of its new online game “The Secret World”. Millennials are continually
38
exploring beyond Twitter and Facebook, as Pinterest’s—the virtual message board—
more than 11.7 million unique users demonstrate 11. One striking similarity between
sites that, like Pinterest, have millions of followers is the reduced amount of text in
benefit of visual graphics, photography, and the ability to share the contents with
whomever you select.
2) Personalize communications based on the audience’s profile. Insights gained from
this study suggest that UNC millennials fit four different awareness-based categories
of technology users: 1) expert; 2) trained; 3) confused; and 4) uninitiated. Trying to
communicate cybersecurity best practices to these different users with the same level
of information content may end up having limited reach, as it may be too simplistic and
fail to interest the expert or trained millennial, not specific enough to dissipate the
misconceptions of the confused millennial, and not simple and targeted enough for
helping the uninitiated. Overlaying self-digital representation, i.e. avatars, with
feedback and behavioral reinforcement messaging in our experiments led to
improvements in risky behavior on both phishing email and password use.
3) Develop cybersecurity tools that are technology-mediated, more interactive and
capable of providing a user experience of high value. In our experience opportunities
for raising cybersecurity awareness can be brought into the organization environment
with great success. During Security Day, promoted by Kenan-Flagler IT Department
every year, millennials wait in line to play fair games and win small prizes while
“chatting” with IT experts who answer questions and provide information about best
practices. Our phishing email observed experiment was conducted during Security
Day and attracted a large crowd. Mobile apps can be another vehicle for delivering
cybersecurity information to all individuals of an organization.
Conclusions and Future Directions
The Millennial Cybersecurity Project conducted a set of experiments to determine the
effectiveness of interventions such as the use of avatars and other digital (self) representations
for message personalization, real-time digital feedback about observed risky behaviors, and
messaging of policies and best practices in formats and language that are more aligned with
how millennials communicate with others and experience the world. The project’s underlying
premise is that cybersecurity awareness initiatives for millennials might be improved when
messaging is accomplished digitally and in formats consistent with digital devices such as
11
We are presuming that the vast majority of Pinterest users are millennials, although access to data to support
this claim is not available to us at this time.
39
personal computers, cell phones, and mobile devices.
experiments are:
Specific conclusions from these
Understanding Millennial Attitudes about and Behaviors in Cybersecurity. Favorable
results indicate that UNC millennials are aware of best practices about how to protect one’s
system and adhere to UNC information security policies for use of firewall, and antivirus and
operating system automatic updates. However, results also suggest that millennials are not as
knowledgeable regarding the dangers of inadequate password usage or risky practices in
cyberspace that can create vulnerabilities, for example phishing emails. Reported behaviors
suggest that male millennials are somewhat more knowledgeable than female millennials.
Nonetheless, males also appear to experience more problems due, perhaps, to higher
engagement in riskier online behaviors than their female counterparts.
Modifying Risky Behavior in Millennials. Overall, improvement results in password
creation and use for the two intervention groups were positive for all three categories: length,
complexity, and repeated use; but show different effects. Regarding password complexity, the
intervention presenting participants with only password scores led to an improvement that
shifted participants with lower scores to slightly higher scores positioned above the sample
mean and the threshold for a strong password. The improvement obtained with the
intervention containing the strategy and ava tars had a more positive effect in the modification
of password complexity behavior translated in higher scores for similar number of participants .
Contact Information
Project Contact Name: Noel P. Greis and Monica L. Nogueira
Mailing Address: Center for Logistics and Digital Strategy
Kenan Institute of Private Enterprise, CB# 3440 Kenan Center
University of North Carolina, Chapel Hill, NC 27599-3440.
Phone: 919-962-8201
Email: noel_greis@unc.edu; monica_nogueira@unc.edu
References
[1] Accenture. (8 November 2008) “Millennials at the Gates: Results from Accenture’s High
Performance IT Research,” Accenture.com. Available at: https://microsite.accenture.com/
foodforthought/downloads/Pages/default.aspx, last accessed 11 April 2011.
40
[2] Accenture. (10 February 2010). “Jumping the boundaries of corporate IT: Accenture global
research on Millennials’ use of technology,” Accenture.com. Report. Available at:
http://www.accenture.com/SiteCollectionDocuments/PDF/global_millennial_generation_re
se arch.pdf, last accessed 11 April 2011.
[3] Bailenson, J.N. and J. Blascovich. (2004) Avatars. Encyclopedia of Human-Computer
Interaction, Berkshire Publishing Group, pp. 64–68.
[4] Barreau, D. (15 January 2008). “The persistence of behavior and form in the organization
of personal information,” J American Society for Information Science Tech , 59 (2), pp.
307–317.
[5] Baylor, A.L. (12 December 2009). “Promoting motivation with virtual agents and avatars:
role of visual presence and appearance,” Phil. Trans. R. Soc. B, 364 (1535), pp. 3559–
3565.
[6] Bulgurcu, B., Cavusoglu, H. and I. Benbasat. (September 2010). “Information Security
Policy Compliance: An Empirical Study of Rationality-Based Beliefs and Information
Security Awareness,” MIS Quarterly, 34 (3), pp. 523–548.
[7] Colliver, V. (8 August 2008) “Fat people get online chance to lose weight,” SFGate.com.
Available at: http://articles.sfgate.com/2008-08-08/business/17120627_1_san-francisco-slinden-lab-second-life-virtual-world, last accessed 11 April 2011.
[8] Cone, B.D., Irvine, C.E., Thompson, M.F. and T.D. Nguyen. (February 2007). “A video
game for cyber security training and awareness,” Computers & Security, 26 (1), pp. 63–
72.
[9] Cone, B.D., Irvine, C.E., Thompson, M.F. and T.D. Nguyen. (February 2007). “A video
game for cyber security training and awareness,” Computers & Security, 26 (1), pp. 63–
72.[11] Dickerson, D. “The Millennial Brain and Risk” (12 November 2008). Campus
Activities Programming, pp. 10. Available at: http://ssrn.com/abstract=1300625, accessed
April 2011.
[10] Dickerson, D. “The Millennial Brain and Risk” (12 November 2008). Campus Activities
Programming, pp. 10. Available at: http://ssrn.com/abstract=1300625, accessed April
2011.
[11] Dickerson, D. (Jan/Feb. 2007). “Risk Management and the Millennial Generation,”
Campus Activities Programming. Available: http://ssrn.com/abstract=1093684, accessed
April 2011.
[12] Domínguez, C.M.F., Ramaswamy, M., Martinez, E.M. and M.G. Cleal. (2010). “Framework
for Information Security Awareness Programs,” Issues Inf Sys, XI (1), pp. 402–409.
[13] Hagen, J.M. and E. Albrechtsen. (2009) "Effects on employees' information security
abilities by e-learning,” Information Management & Computer Security, 17 (5), pp. 388–
407.
41
[14] IGI Global. (11 June 2010). “Battling Obesity with Virtual Self-Care: Teaching Students
Design and Exploration,” IGI-Global.com. Available at: http://www.igi-global.com/blogs/
main/10-06-11/Battling_Obesity_with_Virtual_Self-Care_Teaching, last accessed April
2011.
[15] Kirby, R. (April 2009) Development of a Real-time Performance Measurement and
Feedback System for Alpine Skiers. Richard Kirby, Sports Technology. Volume 2, Issue 12, pages 43–52.
[16] Liang, H. and Y. Xue. (July 2010). “Understanding Security Behaviors in personal
Computer Usage: A Threat Avoidance Perspective,” J Assoc Information Sys, 11 (7), pp.
394–413.
[17] Ludwig, T. and, D. Goomas (June 2009) Real-time performance monitoring, goal setting
and feedback for forklift operators in a distribution centre. , Journal of Occupational and
Organizational Psychology, Volume 82, Issue 2, pages 391–403.
[18] Messinger, P.R., Ge, X., Stroulia, E., Lyons, K., Smirnov, K. and M. Boone. (November
2008). “On the Relationship between My Avatar and Myself,” J Virtual Worlds Res, 1 (2).
[19] Morie, J.F. and E. Chance. (March 2011). “Extending the Reach of Health Care for
Obesity and Diabetes Using Virtual Worlds,” J Diabetes Science Technology, 5 (2), pp.
272–276.
[20] Myers, K.K. and K. Sadaghiani. (June 2010). “Millennials in the Workplace: A
Communication Perspective on Millennials’ Organizational Relationships and
Performance,” In: ‘Special Issue on Millennials and the World of Work: What You Didn't
Know You Didn't Know,’ Guest Eds: D.G. Altman and J.J. Deal, J Bus Psychol, 25(2), pp.
225–238, Springer.
[21] Ng, B.Y., Kankanhalli, A. and Y. Xu. ()2009). “Studying users’ computer security behavior;
A health belief perspective,” Decision Support Systems, 46, pp. 815–825.
[22] Pew Research Center. (February 2010). “The Millennials: Confident. Connected. Open to
Change.” Available at: http://pewresearch.org/millennials/, last accessed 11 April 2011.
[23] Rezgui, Y. and A. Marks. (December 2008). “Information security awareness in higher
education: An exploratory study,”
[24] Rafiq A, Tamariz F, Boanca C, Lavrentyev V, Merrell RC (July-August 2008). Objective
assessment of training surgical skills using simulated tissue interface with real-time
feedback Jour. Surgical Educ., 65(4):270-4.
[25] Thomson, M.E. and R. von Solms. (1998). “Information security awareness: educating
your users effectively,” Information Management & Computer Security, 6 (4), pp. 167–173.
[26] University of Southern California. (3 July 2008). “Network Culture Project awards over $1
million lindens for ‘Second Life and the Public Good Community Challenge’,” USC
42
Annenberg News. Available at: http://annenberg.usc.edu/News%20and%20Events/News/
080703SecondLife.aspx, last accessed 11 April 2011.
[27] U.S. Department of Homeland Security. (23 March 2011). “Enabling Distributed Security in
Cyberspace.” Available at: http://blog.dhs.gov/2011/03/enabling -distributed-securityin.html, last accessed 11 April 2011.
[28] Yee, N. and J.N. Bailenson. (2006). “Walk A Mile in Digital Shoes: The Impact of
Embodied Perspective-Taking on The Reduction of Negative Stereotyping in Immersive
Virtual Environments,” In: Proc PRESENCE 2006. August 24–26, Cleveland, Ohio, USA.
[29] Yee, N. and J.N. Bailenson. (2007) “The Proteus Effect: The Effect of Transformed SelfRepresentation on Behavior,” Human Communication Research, 33, pp. 271–290, 2007
International Communication Association.
[30] Zwieg, J. (March 26, 2011). “Meet ‘Future You.’ Like What You See?”
Journal, pp. B7 and B10.
43
Wall Street
Appendix A
Screenshots of Phishing Experiment Emails
Example of “Low Trust” Phishing Email Sent to Students
44
Example of “Low Trust” Phishing Email Sent to Students
45
Example of “Medium Trust” Phishing Email Sent to Students
46
Example of “Medium Trust” Phishing Email Sent to Students
Example of “High Trust” Phishing Email Sent to Students
47
48
Example of “High Trust” Phishing Email Sent to Students
49
Appendix B
Screenshots of Password Experiment Websites
Example of Logon Screen for Password Experiment
50
Example of Website for Creating First Password
51
Example of Website for Creating Second Password
52
Example of Website for Creating Third Password
53
Example of Website for Creating Fourth Password
54
Download