scispace - formally typeset
Search or ask a question
Author

Nalin Asanka Gamagedara Arachchilage

Bio: Nalin Asanka Gamagedara Arachchilage is an academic researcher from La Trobe University. The author has contributed to research in topics: Phishing & Game design. The author has an hindex of 14, co-authored 93 publications receiving 1294 citations. Previous affiliations of Nalin Asanka Gamagedara Arachchilage include Brunel University London & Commonwealth Scientific and Industrial Research Organisation.


Papers
More filters
Journal ArticleDOI
TL;DR: It can be argued that well-designed end-user security education contributes to thwart phishing threats, as the interaction effect of conceptual and procedural knowledge positively impacts on computer users' self-efficacy, which enhances their phishing threat avoidance behaviour.

257 citations

Journal ArticleDOI
TL;DR: The history of phishing attacks and the attackers’ motivation in details are discussed and a taxonomy of various types ofphishing attacks is provided to protect users from phishing based on the attacks identified in this taxonomy.
Abstract: Internet technology is so pervasive today, for example, from online social networking to online banking, it has made people's lives more comfortable. Due the growth of Internet technology, security threats to systems and networks are relentlessly inventive. One such a serious threat is "phishing", in which, attackers attempt to steal the user's credentials using fake emails or websites or both. It is true that both industry and academia are working hard to develop solutions to combat against phishing threats. It is therefore very important that organisations to pay attention to end-user awareness in phishing threat prevention. Therefore, aim of our paper is twofold. First, we will discuss the history of phishing attacks and the attackers' motivation in details. Then, we will provide taxonomy of various types of phishing attacks. Second, we will provide taxonomy of various solutions proposed in literature to protect users from phishing based on the attacks identified in our taxonomy. Moreover, we have also discussed impact of phishing attacks in Internet of Things (IoTs). We conclude our paper discussing various issues and challenges that still exist in the literature, which are important to fight against with phishing threats.

177 citations

Journal ArticleDOI
TL;DR: It is argued that this game design framework can be used not only for preventing phishing attacks but also for preventing other malicious IT attacks such as viruses, malware, botnets and spyware.

164 citations

Journal ArticleDOI
TL;DR: A critical review of eight of the most influential theories that have been used to predict and explain human behaviour towards adoption of various technologies at the individual level and concludes that a well-established theory should consider the personal, social, cultural, technological, organizational and environmental factors.
Abstract: Previous research shows that selecting an appropriate theory or model has always remained a critical task for IS researchers. To the best of the authors' knowledge, there are few papers that review and compare the acceptance theories and models at the individual level. Hence, this article aims to overcome this problem by providing a critical review of eight of the most influential theories that have been used to predict and explain human behaviour towards adoption of various technologies at the individual level. This article also summarizes their evolution; highlight the key constructs, extensions, strengths, and criticisms from a selective list of published articles appeared in the literature related to IS. This review provides a holistic picture for future researchers in selecting appropriate single/multiple theoretical models/constructs based on their strengths and weaknesses and in terms of predictive power and path significance. It is concluded that a well-established theory should consider the personal, social, cultural, technological, organizational and environmental factors

149 citations

Journal ArticleDOI
TL;DR: The study results showed a significant improvement of participants' phishing avoidance behaviour in their post-test assessment, and suggest that participants' threat perception, safeguard effectiveness, self-efficacy, perceived severity and perceived susceptibility elements positively impact threat avoidance behaviour, whereas safeguard cost had a negative impact on it.

143 citations


Cited by
More filters
Journal ArticleDOI
01 Jun 1959

3,442 citations

Book ChapterDOI
01 Jan 2001
TL;DR: A wide variety of media can be used in learning, including distance learning, such as print, lectures, conference sections, tutors, pictures, video, sound, and computers.
Abstract: A wide variety of media can be used in learning, including distance learning, such as print, lectures, conference sections, tutors, pictures, video, sound, and computers. Any one instance of distance learning will make choices among these media, perhaps using several.

2,940 citations

01 Jan 2013
TL;DR: From the experience of several industrial trials on smart grid with communication infrastructures, it is expected that the traditional carbon fuel based power plants can cooperate with emerging distributed renewable energy such as wind, solar, etc, to reduce the carbon fuel consumption and consequent green house gas such as carbon dioxide emission.
Abstract: A communication infrastructure is an essential part to the success of the emerging smart grid. A scalable and pervasive communication infrastructure is crucial in both construction and operation of a smart grid. In this paper, we present the background and motivation of communication infrastructures in smart grid systems. We also summarize major requirements that smart grid communications must meet. From the experience of several industrial trials on smart grid with communication infrastructures, we expect that the traditional carbon fuel based power plants can cooperate with emerging distributed renewable energy such as wind, solar, etc, to reduce the carbon fuel consumption and consequent green house gas such as carbon dioxide emission. The consumers can minimize their expense on energy by adjusting their intelligent home appliance operations to avoid the peak hours and utilize the renewable energy instead. We further explore the challenges for a communication infrastructure as the part of a complex smart grid system. Since a smart grid system might have over millions of consumers and devices, the demand of its reliability and security is extremely critical. Through a communication infrastructure, a smart grid can improve power reliability and quality to eliminate electricity blackout. Security is a challenging issue since the on-going smart grid systems facing increasing vulnerabilities as more and more automation, remote monitoring/controlling and supervision entities are interconnected.

1,036 citations

Journal ArticleDOI
TL;DR: A conceptual model was developed based on the integration of Information Adoption Model and related components of Theory of Reasoned Action that confirmed that quality, credibility, usefulness and adoption of information, needs of information and attitude towards information are the key factors of eWOM in social media that influence consumers' purchase intentions.

640 citations