Phishing Attack Simulation and Training Design To Improve Cybersecurity Awareness
Phishing Attack Simulation and Training Design To Improve Cybersecurity Awareness
Phishing Attack Simulation and Training Design To Improve Cybersecurity Awareness
A Thesis Paper
May 2022
ABSTRACT
● To assess the response of the LGU employees based on the survey and phishing attack
simulation;
The figure shown above was adapted as the framework of the researchers to execute the
study properly. This guided the researchers on how to start dissecting the problem of the target
population, coming up with alternative solutions, implementing them with backup research and
investigation, as well as recommend a plan as solution to the problems found (Clune, 2007).
3.1.1 Theory of Change
The researchers used the theory of change in the phases of the action research to
properly assess that every change and idea implemented in the study would result in a
better outcome that would eventually help improve the overall quality of the conducted
study. The usual community-based change initiatives of even a larger target population
who will undergo change through proposing solutions are often considered to be
ambitious goals. According to Allen (2016), these steps toward change are difficult since
it involves a large number of the population and so, specific planning and effective
strategies are encouraged. The theory of change is vital to these types of studies because
it helps the researchers to develop a solution based on an iterative process where every
step was well planned and assessed. It is easier to sustain, bring them to scale, and
evaluate all of them since every step requires ideas or resources for the outcomes it hopes
to achieve (Allen, 2016). The figure below from BetterEvaluation (2019) supports the
statement in this section.
3.2.1 Population
The chosen population for this study were the employees of Sangguniang
Panlungsod of the local government unit of Iligan City. Using the quantitative research
method, the amount of data collected was determined on the availability of the
employees. According to Creswell (2003), the researcher’s target population should have
common characteristics defined as a group or of an organization so that it will be easy for
the research to be completed as well as to help the researchers identify and study the
population.
The employees needed to satisfy a set of specifications. In this study, the
population was from all age groups, educational status, socioeconomic status and should
be on duty at the time of the data collection process.
Before data collection, the researchers designed a survey form (see Appendix A)
with relevant statements stating the connection between the target population’s
knowledge or perceptions about cybersecurity and phishing. The survey form that the
researchers produced were primarily aimed at the employees under the Sangguniang
Panlungsod.
The survey form has 6 sections: Part I, II, III, IV, V, and VI. The researchers
adopted most of the statements from Muniandy et al. (2017), Chandarman & Niekerk
(2017), and KnowBe4 (2019), then customized it to make sure that it aligns with the
target population and to come up with a valid and reliable instrument for data collection.
● Part I is on the personal information obtained from the respondents,
● Part VI samples real phishing links, attachments, and websites that respondents
need to verify its legitimacy.
Through a collaboration with a government official and its office, the distribution
of the survey form was done by another employee to disguise as another data gathering
activity from the office. The total number of respondents and personal information were
introduced by the head of the office. Participants were not informed of anything in
relation to the study to obtain unbiased results. The allotted time to administer the data
collection through handling, answering, and collecting the survey form were expected to
be between 15-20 minutes only. The researchers collected the survey form after
completion.
Using the phishing simulation tool mentioned, GoPhish was used in the testing
phase to identify the vulnerability of the employees (Martinez, 2019). By introducing the
click URL method, the employees should identify:
Prior to conducting the activity, GoPhish was installed on two host computers by
the researchers. Respondents randomly received phishing emails generated from the
simulator within a span of 4 weeks.
3.3.2 Detecting
The detecting phase helped the researchers identify and monitor the responses of
the employees through the GoPhish dashboard and degree of response from the
employees. The phishing simulation tool chosen generates statistics of sent and received
emails, opened emails, and URL/attachments click-times (Wallen, 2020).
3.3.3 Protecting
Reduction of phishing-related incidents can be achieved in two ways: to warn and
block. Warning the participants through alerting them of the potential risks of phishing
attacks as well as blocking identified senders or owners of the digital contents containing
phishing attacks (Martinez, 2019).
● Identify and label external emails and potential impersonation
● Move emails to spam folders to quarantine them
● Demonstrate the different types of website domains and their privacy
● Introduce common phishing emails, including some spear-phishing
emails, to raise awareness
The researchers provided a training course which incorporated all the necessary
protecting methods stated in this part.
3.3.4 Training
In order to instill knowledge on the employees from the simulation experience, it
is still considered that some phishing still goes through their cyber defences or of the
organizations they belong to. According to Martinez (2019), user awareness is the first
line of defence against phishing. In order to achieve it, training the employees to
understand phishing risks and what it looks like consistently would be the best possible
way.
● Introduce learning courses that are relevant to the risks found in the
previous phases
● Come up with scenarios of actual phishing attacks.
● Use relatable examples to properly train and educate each employee
The following methods included were presented to introduce guidelines that
consist of the dos and don’ts, according to Martinez (2019).
Dos:
● Think before you click
● Check email provenance
● Check email context
● Be careful of disappearing emails
● Report suspicious emails
Don’ts:
● Ignore security warnings
● Open expected attachments
● Click unexpected URL
● Enter passwords from URLs in emails
● Use work email for personal purpose
3.3.5 GoPhish
3.3.5.1 Functionality
The simulator provides an overall view of the phishing attack. Figure 5
provides the dashboard of the simulator where it displays the result of a certain
phishing campaign. Aside from displaying the percentage and statistics of the
numbers of employees who received, opened, clicked links, and submitted data
from the phishing emails, the researchers may also track the timeline of activity
for each participant or recipient involved, such as timestamps for each activity
(Wallen, 2020).
3.3.5.2 Flexibility
The simulator offers a customizable tool to compose emails. These
features greatly help the researchers in composing different types of phishing
emails. The simulator also offered releasing the campaign by batches of
recipients, a safe landing site attached in emails, URL customization, and etc.
(Wallen, 2020).
DAY 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 1 2 3 4 5
iLandbank
Gramarly
C
A Shoopee
T
M
A
P Waowaowin
L
A iHotel L
I
Y
G Gaysano
N
Laazada
Robinsuns
2 0.80-0.89 Good
3 0.70-0.79 Acceptable
4 0.6-0.69 Questionable
5 0.5-0.59 Poor
49% and below Employees’ actions or responses are unsatisfactory. Therefore, these items
with unsatisfactory results should be highlighted in order to provide answers
to what needs to be done to reduce risks.
Figure 10: Survey Score Range and Indications for Correct Response
CHAPTER 4
● The first set of statements were about the respondent’s perception about their
awareness of cybersecurity and phishing scams. This introduced them to the
overall context of phishing attacks.
● The second set of statements concerns how respondents would behave from a
phishing attack encounter. The statements were mostly possible situations of
them falling into phishing attacks in which it measures their behavior.
● The third set of statements test their knowledge about the possible consequences
if they fall into phishing attacks. This part gives them an overview of the
aftermath of phishing attacks and measures their behavior and response as well.
● The fourth set of statements were about their immediate responses after
encountering related activities to phishing attacks. The statement in this part
provides possible actions or responses to avoid falling into. This measures how
they keep themselves safe when encountering such misconducts.
● The last set of statements test their familiarity with real examples of phishing
attacks, links, and attachments. Most of the figures included in this part were
relatable and obvious, it measured their ability to identify phishing attacks.
The complete copy of the survey form can be accessed in Appendix A.
4.1.1 Respondents' Self-Perception of Their Cybersecurity Awareness and Phishing
Scams
The first set of statements reflects the awareness of the respondents about
cybersecurity and phishing scams. This introduced the whole context of the survey forms.
Awareness on cybersecurity and phishing scams
S4 I immediately delete or hide emails that are suspicious. 47% 38% 15%
Procedural Knowledge
1 0.79 Acceptable
2 0.70 Acceptable
3 0.78 Acceptable
4 0.87 Good
5 0.76 Acceptable
Laazada 130
Shoopee 130
Gramarly 130
Email type and contents Number of Emails Sent
Laazada 130
Shoopee 130
iLandbank 130
Waowowin 130
iHotel 130
Gaysano 130
Robinsuns 130
Phishing Simulation
Week 1 Week 2 Week 3 Week 4
Period
Total
Date of Email Sent Nov. 7 Nov. 10 Nov. 14 Nov. 17 Nov. 21 Nov. 24 Nov. 28 Dec. 1
Email Template iLandbank Gramarly Shoopee Woawowin iHotel Gaysano Laazada Robinsuns
Total Email Sent 130 130 130 130 130 130 130 130 1040
Regarding the ability of respondents to identify whether the email is safe, the survey
results show that 48% claimed that they can identify a phishing email. However, when they were
asked to identify whether the email presented to them in the survey is safe, only 29% answered
correctly while 42% were undecided. On the other hand, simulation results show that 6 out of 8
email templates were unopened by more than 55% of the respondents. While the remaining 2
email templates that had been opened by more than 60% were then ignored by 90% to 96%.
Although the simulation presented better results compared to the survey, respondents are still at
risk. It could be that respondents would rather ignore the simulated emails since they were
unsure if it was safe. Thus, respondents lack awareness and ability to spot a phishing email.
As for the respondents’ ability to identify the authenticity of attached links, based on the
survey, 47% and 68% stated that they were unlikely to click or open attachments from known
and unknown senders, respectively. In addition, 1 out of 2 presented links in the survey were
correctly identified by more than 70%. While based on the simulation, only 1 out of 8 links were
opened or clicked by more than 15%. Results from survey and simulation practically correspond,
however it also shows the respondents' lack of ability to identify authentic links from fake ones.
Clicking suspicious links could put them to a lot of risk. Moreover, only 50% claimed that they
were unlikely to sign any registration form linked to an email. The simulation produced better
results with only 2 recorded submitted data from 2 out of 8 simulated emails. However, even if
there were few recorded click linked and submitted data this could still lead to a high probability
of security and information breach within the organization.
For respondents' ability to counter phishing email, despite the fact that 48% of
respondents said that they report phishing emails requesting personal or sensitive information,
GoPhish records show that no emails have been reported. Reporting suspicious emails is
important for organizations' cybersecurity teams to take immediate preventive measures. Overall,
results prove that respondents do not practice and lack awareness of preventive protocols for
phishing to keep themselves, as well as the organization, secure.
Figure 26 shows that iHotel had the highest percentage of opened emails
(88%), and was 83% higher than Lazada, which had the lowest number of
unopened emails (15%). The simulated email template from iHotel includes a free
night stay at any nearby or local hotel. It's possible that the high number of
opened emails is related to the email's designated location, which is the city where
the participant works. Moreover, the total number of emails that were opened
ranged from 19 to 114 across all 8 kinds of emails.
Figure 19. Percentage of Clicked Links to Total Email Sent; derived from
GoPhish
Figure 27 shows that Shoopee had the highest percentage of clicked
links(18%) and was infinitely higher than Robinsuns, which had the lowest
percentage of clicked links(1%). The Shooppee template is based on Shopee, a
well-known online store. Since Shopee provides a lot of promo to its members, it
could be one of the reasons why so many people click on the attached link.
Moreover, across all 8 Email Types, the sum of clicked links ranged from 0 to 24.
Figure 20. Percentage of Submitted Data to Total Email Sent; derived from
GoPhish
Figure 28 shows that iLandbank and Gaysano tied for the highest
percentage of submitted data (2%), followed by Waowowin (1%).Gaysano
imitates the popular mall (Gaisano Mall) , while iLandbank imitates the
well-known bank (Landbank) in Iligan City. The templates, like iHotel, are based
on well-known companies in the city, making them relevant to the targeted
individuals. This could be one of the motivators for participants to provide
information. The Woawowin email template, on the other hand, is based on the
popular television show Wowowin. It is well-known for its games that reward
winning players with cash. As a result, this could be one of the reasons why
participants are susceptible to these kinds of emails.
4.5.1 Laazada
The same with the Laazada email, this was based on the replicated popular
online shopping app named Shopee. The contents were solely based on common
unauthorized access notification for any apps that require an account to sign in.
Most of the elements of the email have been altered out to give it an authentic
feel, helping it to become more realistic.
4.5.3 Gramarly
Grammarly has been one of the most common service providers whose
reputation when it comes to reliability is very strong, as well as their ways to
market their service. In this case, the researchers came up with a fake clone of the
popular grammar and spelling service app. There were a lot of similar emails of
an advertisement from them on a consistent basis and the researchers decided to
come up with a copy one by altering the subject of the email only.
Figure 23. Gramarly Email
The same with other emails, 20% was the basis of success in the phishing
simulation. The email was somehow successful with an email open rate of
28.46%. The link click rate was rather very low as it only gathered 1 response, a
percentage of 2.70%, lower than the success rate.
4.5.4 iLandbank
Even though common phishing attacks were from banks and other
financial organizations, the researchers also decided to come up with a phishing
email that contains personalized information such as financial transactions, dates,
and other sensitive information. For this, the researchers decided to copy a well
known bank in the country and provide a fake copy of its name, address, and
other information.
Figure 24. iLandbank Email
4.5.5 Waowowin
The TV Show’s presence has been observed recently in the internet as the
recent launch of the program online. One of the most common pieces of
information from the show was that they look for players to join a segment. The
researchers came up with a fake clone of the popular tv game show and with an
invitation email for them to play the show with a money prize. The email has
garnered a total of 59 opened emails, 11 click rate and 1 submitted data. However,
the respondents fail to report the email garnering a 0% report rate.
This simulation was considered the second unsuccessful email since the
responses were very low. A percentage of 8.46% on the emails opened rate and
9.09% on the clicked link rates were both lower than half of the passing rate. It's
possible that the failure was due to the fact that respondents were not enticed with
the content of the email, making it unsuccessful.
4.5.6 iHotel
Hotel stay-in promos were an uncommon type of phishing scam, and
apparently, this garnered the highest when it comes to email opening rate and
links clicked rate. The email contains convincing statements such as exclusive and
selected winners-only invitations. It was a plain text-simple email, but it garnered
a total of 114 emails opened and 4 times the links have been clicked. However,
the respondents fail to report the email garnering a 0% report rate.
Figure 26. iHotel Email
An 88% rate for emails opened was more than enough when referring to
the success rate. The impact was very high as it generated a 3.51% link clicked
rate. The most common feedback from the respondents was that the booking was
suspicious; however, they still opened the emails. It clearly shows that they were
not just tricked by the subject of the email, but as well as its contents.
4.5.7 Gaysano and Robinsuns
The first email sent to the respondents yielded a total email open rate of
44.62%, higher than the success rate. It also has 17.24% link click rates, higher
enough to surpass the success rate. And 1.54% data submitted rate. Even though it
garners low rates on the data submitted category, it was still one of the most
successful emails in the three categories, the same with iLandbank. In the same
situation and explanation with iLandbank, people become too serious when it
comes to financial-related topics, ignoring whether it was legitimate or not.
I. Identifying information
A. Event Title: “Think Before You Click/Don’t Take the Bait” A Phishing
Awareness Symposium to Improve Cybersecurity Knowledge
B. Venue:
G. Duration: 1 Hour
II. Rationale:
Given the rising amount of phishing attempts over the years, there are also altering tactics
for collecting an individual's information; as a result, sensitive information about individuals
may be endangered, especially in government entities. Employees of Iligan City's Sangguniang
Panlungsod, in particular, have an unmeasured level of cybersecurity awareness and must be
examined to identify what to focus on in cybersecurity training and efficiently improve digital
habits.
Moving forward, the results from the survey and phishing simulation showed that many
respondents can’t identify a phishing email without opening them. As there were a total number
of 406 out 468 emails opened that have been ignored after opening. Despite the fact that the
simulated emails were disregarded, the participants took no time to report them. The zero
number of emails reported also implies that the participants are unaware of or have not practiced
the appropriate response to phishing emails.
Implementing new protocols for work and introducing the learning courses prepared by
the researchers, will help strengthen and build their skills to counter phishing. In order to achieve
so, a monthly phishing simulation should be held to constantly expose employees to timely and
various forms of phishing.
III. Objectives:
The training design provided by the researchers in partnership with the office of the
Sangguniang Panlungsod of Iligan City spearheaded by Hon. Jake N. Balanay, entitled “Think
Before You Click/Don’t Take the Bait” aims to:
IV. Methodology: The modes of delivery included in this training program are
provided below:
• Common format of a
phishing email: clickable
links, attachments,
headers, etc. and how to
identify them
• Relatedness to social
engineering
• Low chances of
identifying secured links
from fake ones
Two simulated email templates drew the attention of the majority of the employees, with
80 to 114 participants opening these emails. Based on the findings, the researchers conclude that
the content of the two email templates proves relevant to the targeted individual. With this, the
researcher agreed with Furnell (2017), Yeoh (2021) and Vishwanath et al. (2019) that the email
templates to be used for phishing simulation should be authentic and customized enough to catch
the attention of target individuals or groups, especially those who are highly educated.
Furthermore, the iLandbank simulated email template which was one of the email templates that
garnered the highest number of opened emails proves Greene's (2018) statement. As the
researcher tries to imitate the famous government-owned bank in the Philippines, it aligns with
the target individuals' experience of knowledge as government employees resulting in a
successful phishing susceptibility test.
As employees were constantly exposed to simulated phishing email templates, the results
of opened emails, clicked links and submitted data show a downward trend. Indicating that
employees were getting better at identifying simulated phishing emails. Agreeing with the study
of Gordon et al. (2019) that frequent phishing simulation attempts help employees be more
aware of the indicators of malicious emails. Even though the researcher used and sent different
email templates each week.
The results of this study call for desperate measures within the employees under the
Sangguniang Panlungsod. The capacity of the respondents to overlook the survey statements
suggests that they were unprepared for cybersecurity training. Thus, the results of the survey
create a huge impact on the phishing simulation. With that, since there were high numbers of
negative responses from phishing simulation results, necessary training and education should be
provided as soon as possible to lessen possible issues. According to Yoeh et al. (2021), the
simulated emails did not generate enough reports, leading researchers to conclude that there may
be additional ways to enhance the low report rate. By that, the researchers also followed the same
procedure which was to include and encourage reporting of suspicious emails. To proceed, the
researchers provided learning courses and training through phishing simulations that were stated
in the last chapter.
CHAPTER 5
CONCLUSION AND
RECOMMENDATION
5.1 Conclusion
● How aware are the employees of cybersecurity and phishing schemes?
According to the survey findings, employees are generally aware of cybersecurity
and specific cyber threats. However, just 52% feel confident in their ability to detect
suspicious activity and avoid being a victim of online fraud. Employees are conscious of
the risks, but they are not confident in their abilities to protect themselves against
cybersecurity attacks, particularly phishing.
● How do the employees behave when encountering a possible phishing attack?
All survey statements from table 4 are about employees' confidence in detecting
phishing emails and behaviors that demonstrate if they are careful about emails they
receive. Furthermore, because no item had a score higher than 69 percent, it is plausible
to believe that employees are not being cautious in what they do or how they reply to
emails from known and unknown senders. Finally, it is crucial to remember that the
responders are government officials routinely called in to answer general questions. As a
result, it is vital for employees to review each email they receive thoroughly and to be
able to determine if email attachments are secure.
● How aware are the employees of the harmful effects of phishing on its victims?
Survey results demonstrate that 69% of respondents know the hazards and
negative implications on its victims. While 21% say, phishing attempts will not
jeopardize their privacy. The findings indicate that employees are aware that phishing
attempts will lead to other concerns. They are, however, unaware of the precise threats
that phishing presents. As a result, it is plausible to assume that these individuals are not
well-versed in the effects of phishing.
● How do the employees react when encountering a phishing attack?
Less than half of the respondents claimed to immediately record, disclose, and
delete fraudulent emails and attachments. Moreover, roughly 44% indicated that they do
not download attachments offered by known or unknown senders after reading the email.
The survey results suggest that even when respondents implement some recommended
phishing preventative measures, they still participate in unsafe actions, such as opening
and downloading suspicious files, putting them at risk.
● How aware are the employees of Iligan City's Sangguniang Panlungsod of phishing
indicators, and how do they respond to simulated phishing emails?
There are various forms of phishing attacks that have been targeting the
employees of the local government unit in Iligan City. Although the upper management
have warned employees to be cautious with who they are conversing with online, there
are still individuals who fall into phishing. This proves that there is a need to educate
government employees with best practices in cybersecurity for users to lessen the risk
associated with cyber security threats. Thus, there should be effective training and proper
assessment for employees to continuously improve their ability to protect themselves
against phishing.
The results from the survey and phishing simulation showed that many
respondents can’t identify a phishing email without opening them. As there were a total
number of 406 out 468 emails opened that have been ignored after opening. Despite the
fact that the simulated emails were disregarded, the participants took no time to report
them. The zero number of emails reported also implies that the participants are unaware
of or have not practiced the appropriate response to phishing emails.
Employees' ability to detect phishing emails has improved as a result of their
regular exposure to simulated emails. Making simulated phishing emails unsuccessful
unless the email template is designed with great attention regarding its relevance and
authenticity to the target set of individuals. Even though there are employees who still
have fallen victim to the simulated emails, the number of victims gradually decreases
over the course of the campaign. Thus, the study proved phishing simulation as an
effective approach for the Sangguniang Panlungsod of Iligan City to assess and train their
employees.
5.2 Recommendation
Through the introduction of a training design tailored from the simulation results, this
will help strengthen and build awareness to counter phishing. In order to achieve so, a monthly
phishing simulation would be recommended to constantly expose employees to timely and
various forms of phishing.
This study has some limitations that provide opportunity for further research. First, this
study focuses only on Iligan City's Sangguniang Panlungsod; hence, future research can look at
other sectors and compare the outcomes. Second, the participants in this study were mainly
accommodating to the general public. Thus , future research could look into study in different
sets of individuals and compare the results.
APPENDIX A
Introduction
Good day! We are third-year students from Mindanao State University – Iligan Institute
Technology taking up Bachelor of Science in Information Systems. For our research, we are here
to conduct a survey. Your attention, time, effort, and opinions regarding the assessment of local
government units in relation to cybersecurity awareness/risks are appreciated. Responses will be
treated carefully and kept confidential for academic purposes, together with the results, once
determined.
2. Email address*
____________________________________________
3. Age
(Check only one)
17 or less
18-25
26-35
34-45
45-55
56-65
66-75
76 and above
Instruction: Please check the box of your desired response to each statement. Kindly
double-check your responses after answering the survey form.
Procedural Knowledge
Strongly Agree Neutral Disagree Strongly
agree Disagree
Statements
1 2 3 4 5
http://www.msn-verify.com/
https://www.microsoft.com/licenserenewal/
S4. I can verify that the attachment below
is safe:
Muniandy et al. (2017), Chandarman & Niekerk (2017), Hakim et al. (2020),
Allen, W. (2016, April 12). Using a theory of change (ToC) to better understand your program.
Using a theory of change (ToC) to better understand your program. Retrieved June 28,
Arof, K. Z. M., Ismail, S., & Saleh, A. L. (2018, July). Contractor’s Performance Appraisal
10.14419/ijet.v7i3.9.15272
Basset, R. (2019, March 10). Hello, world! Hello, world! Retrieved June 17, 2021, from
https://www.vadesecure.com/en/blog/5-common-phishing-techniques
BetterEvaluation. (2019, 18 January). Describe the Theory of Change. Describe the Theory of
https://www.betterevaluation.org/en/managers_guide/step_2/describe_theory_of_change
Bisson, D. (2020, October 20). 6 Common Phishing Attacks and How to Protect Against Them.
https://www.tripwire.com/state-of-security/security-awareness/6-common-phishing-attac
ks-and-how-to-protect-against-them/
Britannica. (2021, July 15). Technology. Technology. Retrieved August 17, 2021, from
https://www.britannica.com/technology/technology
Bruijn, H. D., & Janssen, M. (https://doi.org/10.1016/j.giq.2017.02.007). Building Cybersecurity
Bruner, B. (2021, August 2). End User: Definition & Role. End User: Definition & Role.
https://study.com/academy/lesson/end-user-definition-role.html
Chandarman, R., & Niekerk, B. v. (2017, December 23). Students' cybersecurity awareness at a
Chatchalermpun, S., & Daengsi, T. (2021). Improving cybersecurity awareness using phishing
Chatchalermpun, S., Daengsi, T., & Wuttidittachotti, P. (2020). Cybersecurity Drill Test Using
Phishing Attack: A Pilot Study of a Large Financial Services Firm in Thailand. 2020
Clarke, I. (2018, November 28). What is an Internal Audit? Answers to Common Questions.
https://linfordco.com/blog/what-is-internal-audit/
Cloudflare. (2019, April 25). What is a phishing attack? Phishing Attacks. Retrieved June 7,
https://www.researchgate.net/publication/259751556_Sustainability_Literacy_for_Industr
ial_Designers_through_Action_Research
https://www.csis.org/analysis/cybersecurity-workforce-gap
Computer Hope. (2021, January 2). Scam. What is a scam? Retrieved August 17, 2021, from
https://www.computerhope.com/jargon/s/scam.htm
Cyberguard. (2021, September 4). The Importance of Cyber Security Awareness. Cyberguard
https://www.ogl.co.uk/the-importance-of-cyber-security-awareness
https://datareportal.com/?utm_source=Statista&utm_medium=Data_Citation_Hyperlink
&utm_campaign=Data_Partners&utm_content=Statista_Data_Citation
Devanesan, J. (2020, August). Phishing scams dominate the Philippines cybercrime landscape.
https://techwireasia.com/2020/08/phishing-scams-dominate-the-philippines-cybercrime-l
andscape/
Definitions.net. (2021, March 5). What does information mean? What does information mean?
Diaz, A., Sherman, A. T., & Joshi, A. (2018, November 14). Phishing in an Academic
https://doi.org/10.1080/01611194.2019.1623343
DICT. (n.d.). National Cybersecurity Plan 2022. National Cybersecurity Plan 2022. Retrieved
Downs, J. S., Holbrook, M. B., & Cranor, L. F. (2006). Decision strategies and susceptibility to
Eclipse, L. (2020). Filipino Remote Remote Workers: How Fast Should Your Internet Be in the
https://www.remotestaff.ph/blog/filipino-remote-remote-workers-how-fast-should-your-i
nternet-be-in-the-philippines/
Elysium Security. (2019, July 1). PHISHING PROTECTION FRAMEWORK. Security News.
Formplus. (2020, November 3). Survey Research: Types, Examples & Methods. Survey
Fruhlinger, J. (2020, September 4). What is phishing? How this cyber attack works and how to
https://www.csoonline.com/article/2117843/what-is-phishing-how-this-cyber-attack-work
s-and-how-to-prevent-it.html
Furnell, S. (2017). Phishing: can we spot the signs? Computer Security and Reliabiility, 2017(3),
10-15. http://dx.doi.org/10.1016/S1361-3723(07)70035-0
https://www.rappler.com/newsbreak/in-depth/state-cybersecurity-philippines
Groot, D. J. (2020, August). What is Cyber Security? Definition, Best Practices & More.
https://digitalguardian.com/blog/what-cyber-security
Gordon, W. J., Wright, A., Aiyagari, R., Corbo, L., Glynn, R. J., Kadakia, J., Kufahi, J.,
Mazzone, C., Noga, J., Parkulo, M., Sanford, B., Scheib, P., & Landman, A. B. (2019,
Greene, K., Steves, M., Theofanos, M. F., & Kostick, J. (2018). User Context: An Explanatory
http://dx.doi.org/10.14722/usec.2018.23016
Hakim, Z. M., Ebner, N. C., Oliveira, D. S., Getz, S. J., Levin, B. E., Lin, T., Lloyd, K., Grilli,
M. D., & Wilson, R. C. (2020, September 30). The Phishing Email Suspicion Test
(PEST) a lab-based task for evaluating the cognitive mechanisms of phishing detection.
Institute for Digital Research & Education Statistical Consulting. (n.d.). What does Cronbach's alpha
mean? | SPSS FAQ. WHAT DOES CRONBACH’S ALPHA MEAN? | SPSS FAQ. Retrieved
http://dx.doi.org/10.1145/1290958.1290968
Kaft, D. (2018, December 31). The Job Description of IT Personnel. The Job Description of IT
https://careertrend.com/about-6640443-job-description-personnel.html
Kaspersky. (2021, August). Internet Safety for Kids: How to Protect Your Child from the Top 7
https://usa.kaspersky.com/resource-center/threats/top-seven-dangers-children-face-online
https://www.kaspersky.com/resource-center/definitions/what-is-cyber-security
KeepNetLabs. (2021, May 5). What is a Phishing Simulation? What is a Phishing Simulation?
https://www.keepnetlabs.com/what-is-a-phishing-simulation/
Kim, B., Lee, D.-Y., & Kim, B. (2019, August 19). Deterrent effects of punishment and training
https://doi.org/10.1080/0144929X.2019.1653992
KnowBe4. (2019, January 14). Phishing Examples. Phishing Examples. Retrieved June 17, 2021,
from https://www.phishing.org/phishing-examples
M-Library. (2021, July 22). What is "Fake News"? What is "Fake News"? Retrieved August 17,
Muniandy, L., Muniandy, B., & Samsudin, Z. (2017). Cyber Security Behaviour among Higher
2017(14), 145-165.
https://doi.org/10.5171/2017.800299
Lestari, I., Maksum, A., & Kustandi, C. (2019, September). Mobile Learning Design Models for
Luse, A., & Burkman, J. (2021, January). Gophish: Implementing a Real-W Gophish:
https://digitalcommons.kennesaw.edu/cgi/viewcontent.cgi?article=1072&context=jcerp
Malaya, B. (2020, January 29). Cybersecurity Awareness Month: Why Filipinos should start
securing its online presence. Cybersecurity Awareness Why Filipinos Should Bother.
https://www.whatalife.ph/cybersecurity-awareness-why-filipinos-should-bother/
Martin, J. (2014, October 1). Cybersecurity Awareness Is About Both ‘Knowing’ and ‘Doing’.
https://securityintelligence.com/cybersecurity-awareness-is-about-both-knowing-and-doi
ng/
Martinez, S. (2019, July 1). PHISHING PROTECTION. Slideshare. Retrieved June 7, 2021, from
https://www.slideshare.net/SylvainMartinez5/phishing-protection-152853164
Meir, M. (2021, January 17). What is a Cybersecurity Assessment? (Definition & Types).
https://securityscorecard.com/blog/what-is-a-cybersecurity-assessment-definition-types#:
~:text=A%20cybersecurity%20assessment%20analyzes%20your,would%20for%20a%20
cybersecurity%20audit.
Microsoft Asia. (2017, March). Cybersecurity in 2017: How organizations in Asia Pacific can
https://news.microsoft.com/apac/2017/03/16/cybersecurity-in-2017-how-organizations-in
-asia-pacific-can-safeguard-against-cyberattacks/
Mohebzada, J. G., El Zarka, A., Bhojani, A. H., & Darwish, A. (2018). Phishing in a university
Oest, E., Zhang P., Wardman B., Nunes E., Burgis J., Zand A., Thomas K., Doupe A., & Ahn G.
(2020, August). Sunrise to Sunset: Analyzing the End-to-end Life. Proceedings of the
https://www.usenix.org/system/files/sec20-oest-sunrise.pdf
ÖMER. (2020, June 2). What is Gophish? Gophish Installation and Scenario. What is Gophish?
https://www.systemconf.com/2020/06/02/what-is-gophish-gophish-installation-and-scena
rio/
Onumo, A., Awan, I. U., & Cullen, A. (2021, February 3). Assessing the Moderating Effect of
Philstar. (2022, January 26). NBI to probe phishing scam targeting teachers. NBI to probe
https://www.philstar.com/nation/2022/01/26/2156397/nbi-probe-phishing-scam-targeting-
teachers
Rahman, N. N. B., & Widyarto, S. (2013, February). Information Security: Human Resources
https://www.researchgate.net/publication/245025557_Information_Security_Human_Res
ources_Management_and_Information_Security_Incident_Management
Rappler. (2020, July 12). Phishing is top PH cybercrime during pandemic – authorities. Phishing
is top PH cybercrime during pandemic – authorities. Retrieved August 22, 2021, from
https://www.rappler.com/nation/phishing-top-philippines-cybercrime-during-pandemic
Robbins, N. B. & Heiberger, R. M. (2011). Plotting Likert and Other Rating Scales. Section on
Survey Research Methods – JSM, 1058-1066. Retrieved June 17, 2021, from
https://www.google.com/url?sa=t&rct=j&q=&esrc=s&source=web&cd=&cad=rja&uact=
8&ved=2ahUKEwi03MHr857xAhUKdCsKHZdBCpkQFjAXegQIAhAD&url=https%3A
%2F%2Fwww.montana.edu%2Fmsse%2FData_analysis%2FLikert%2520Survey%2520
Graphs.pdf&usg=AOvVaw0Nd12Ve2VAuwfNSzGMyOvJ
Schwartz, J. (2020). 10 Steps to A Successful Simulated Phishing Program. 10 Steps to A
https://www.mediapro.com/blog/10-steps-simulated-phishing-program-success/
Shang, H., Jang, R., Li, A., & Wang, W. (2017, June 29). A Framework to Construct Knowledge
Base for Cyber Security. IEEE International Conference on Data Science in Cyberspace
Sheng, S., Lanyon, M. B., Kumaraguru, P., & Cranor, L. (2019). Who falls for phish? A
http://dx.doi.org/10.1145/1753326.1753383
https://www.statista.com/statistics/221179/internet-users-philippines/
Statista. (2021, June 21). Total number of phishing incidents in the Philippines in 2019, by
https://www.statista.com/statistics/1136171/philippines-number-phishing-incidents-by-re
gion/
https://thedefenceworks.com/blog/the-benefits-of-using-phishing-simulations/
Torres, T. P. (2016, April). Lack of IT security professionals makes Philippines prone to cyber
crime.
https://www.philstar.com/business/banking/2016/04/11/1571843/lack-it-security-professi
onals-makes-philippines-prone-cyber-crime
Techopedia. (2020, September 30). Cyberspace. Cyberspace. Retrieved August 17, 2021, from
https://www.techopedia.com/definition/2493/cyberspace
Tunggal, A. T. (2021, May 25). What is a Cyber Threat? Cyber Threat. Retrieved June 7, 2021,
from https://www.upguard.com/blog/cyber-threat
VanBaren, J. (2019, January 22). What Are the Types of Action Research Design? What Are the
https://bizfluent.com/list-7608678-types-action-research-design.html
Umali, T. (2018, November). Cybersecurity in the Philippine academe to bridge skills gap.
https://opengovasia.com/cybersecurity-in-the-philippine-academe-to-bridge-skills-gap/
Vogel, R. (2016). CLOSING THE CYBERSECURITY SKILLS GAP. Salus Journal, 4, 32–46.
https://www.academia.edu/25380112/CLOSING_THE_CYBERSECURITY_SKILLS_G
AP
Vishwanath, A., Herath, T., Chen, R., & Wang, J. (2019). Why do people get phished? Testing
http://dx.doi.org/10.1016/j.dss.2011.03.002
Wallen, J. (2020, September 15). How to run a phishing attack simulation with GoPhish. How to
run a phishing attack simulation with GoPhish. Retrieved June 17, 2021, from
https://www.techrepublic.com/article/how-to-run-a-phishing-attack-simulation-with-goph
ish/
Fruhlinger, J. (2020, September 4). What is phishing? How this cyber attack works and how to
https://www.csoonline.com/article/2117843/what-is-phishing-how-this-cyber-attack-work
s-and-how-to-prevent-it.html
Yeoh, W., Huang, H., Lee, W. S., Jafari, F. A., & Mansson, R. (2021). Simulated Phishing Attack
https://doi.org/10.1080/08874417.2021.1919941
https://medium.com/@orhan_yildirim/gophish-open-source-phishing-framework-fe4662e
60721#:~:text=Gophish%20is%20an%20opensource%20program,check%20statistics%2
0all%20of%20them.
Zan, T. D. (2019, February). Mind the Gap: The Cyber Security Skills Shortage and Public
Policy Interventions.
https://www.researchgate.net/publication/331160765_Mind_the_Gap_the_Cyber_Securit
y_Skills_Shortage_and_Public_Policy_Interventions