TY - GEN
T1 - Analysis of Management of Phishing Attack Risks Based on an Adaptive Network Model
AU - Lepădatu, Flavia
AU - Mihăilescu, Teodora
AU - Spaan, Senne
AU - Ţiţei, Paula
AU - van der Vossen, Marjolein
AU - van den Hout, Niek Jan
AU - Hoffmans, Charlotte
AU - Treur, Jan
AU - Roelofsma, Peter H.M.P.
N1 - Publisher Copyright:
© The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. 2025.
PY - 2025
Y1 - 2025
N2 - This paper examines the processes of a phishing attack in a hospital setting by using a simulation-based approach to analyze the employees’ responses to phishing emails. The aim is to improve organizational resilience against phishing attacks and enhance overall cybersecurity measures. The approach emphasizes particularly the risks of clicking on a malicious link and the benefits of reporting suspicious activities. The COM-B framework was used to provide a structured analysis of the capability, opportunity and motivation of employees and the factors that influence their behavior. Furthermore, adaptive network-oriented modeling was used to offer a nuanced understanding of the interactions between the cognitive, emotional, and the social processes and their adaptation over longer time periods. The paper also includes the simulation results and future work recommendations.
AB - This paper examines the processes of a phishing attack in a hospital setting by using a simulation-based approach to analyze the employees’ responses to phishing emails. The aim is to improve organizational resilience against phishing attacks and enhance overall cybersecurity measures. The approach emphasizes particularly the risks of clicking on a malicious link and the benefits of reporting suspicious activities. The COM-B framework was used to provide a structured analysis of the capability, opportunity and motivation of employees and the factors that influence their behavior. Furthermore, adaptive network-oriented modeling was used to offer a nuanced understanding of the interactions between the cognitive, emotional, and the social processes and their adaptation over longer time periods. The paper also includes the simulation results and future work recommendations.
KW - Adaptive network model
KW - Cybersecurity Risks
KW - Phishing Attack
UR - https://www.scopus.com/pages/publications/86000450100
UR - https://www.scopus.com/inward/citedby.url?scp=86000450100&partnerID=8YFLogxK
U2 - 10.1007/978-981-96-1907-8_26
DO - 10.1007/978-981-96-1907-8_26
M3 - Conference contribution
AN - SCOPUS:86000450100
SN - 9789819619061
VL - 1
T3 - Communications in Computer and Information Science
SP - 270
EP - 282
BT - Applied Intelligence
A2 - Huang, De-Shuang
A2 - Chen, Wei
A2 - Zhang, Chuanlei
A2 - Pan, Yijie
A2 - Zhang, Qinhu
A2 - Kong, Xiangzeng
PB - Springer Nature
T2 - 2nd International Conference on Applied Intelligence, ICAI 2024
Y2 - 22 November 2024 through 25 November 2024
ER -