organization is large enough to support an internal
Red Team, it is imperative this method is utilized,
even on a contract or third-party vendor basis.
5.1 Recommendations and Future
Research
This research study was to compare phishing training
and campaign methods and their role in mitigating
malicious emails in organizations. While the goals of
our research study were met, there are many areas for
expansion and additional future research in the
phishing training and campaign method domains. The
implications above also lead to recommendations on
how to continuously improve this process. As stated,
the IT security industry needs to rethink current ways
of training end-users, and their overall effectiveness.
With many current advances in Machine Learning
(ML) and Artificial Intelligence (AI) there stands to
be a great opportunity to address this issue. By
combining ML/AI methods with modern advances in
behavioral technology, there must be a better way to
prevent, not just mitigate, phishing attacks. Future
research in this area should include more focus on
technological approaches to prevent phishing emails
by providing alerts and warnings similar to not
fastening a car seatbelt (Cooper et al., 2021) and
complete screen freezing techniques to enable the
end-users to shift from System 1 to System 2 thinking
(Antonucci et al., 2022). This research study was
conducted in a medium-sized, privately held,
healthcare network organization. The composition of
the organization is typical for a healthcare company
that has offices distributed nationally, however, there
is a very high employee turnover rate. In our results,
we found that 55.62% of the end-users has been
employed by the company for five years or less.
There may be future research done on a more mature,
more stable employee base to see if there may be
some correlation to the higher vulnerability rates. In
addition, being a privately held company, there has
historically been less investment in IT security
processes, tools, procedures, and training. There may
be some differences in outcomes based on company
size, stability, and IT security posture. Lastly, as this
was a healthcare company, there may be more end-
users learnings from other industries or verticals that
operate in non-healthcare mediums, which may have
impacted the results.
REFERENCES
Antonucci, A. E., Levy, Y., Dringus, L. P., & Snyder, M.
(2022). Experimental study to assess the impact of
timers on user susceptibility to phishing attacks.
Journal of Cybersecurity Education, Research and
Practice, 2021(No. 2), Article 6.
Carlton, M., & Levy, Y. (2015). Expert assessment of top
platform independent cybersecurity skills for non-IT
professionals. Proceedings of the Institute of Electrical
and Electronic Engineers Southeast Conference (pp. 1-
6). https://doi.org/10.1109/SECON.2015.7132932
Cooper, M., Levy, Y., Wang, L., & Dringus, L. (2021).
Heads-up! An alert and warning system for phishing
emails. Organizational Cybersecurity Journal:
Practice, Process and People, 1(1), 47-68.
https://doi.org/10.1108/OCJ-03-2021-0006
Costantino, G., La Marra, A., Martinelli, F., & Matteucci,
I. (2018). CANDY: A social engineering attack to leak
information from infotainment system. Proceedings of
the IEEE Vehicular Technology Conference, Porto,
Portugal (pp. 1–5).
Dupuis, M. J., Crossler, R. E., & Endicott-Popovsky, B.
(2016). Measuring the human factor in information
security and privacy. Proceedings of the IEEE Hawaii
International Conference on System Sciences (pp.
3676-3685).
Earthweb (2022). How many phishing emails are sent daily
in 2022? https://earthweb.com/how-many-phishing-
emails-are-sent-daily/
Federal Bureau of Investigations (FBI) Internet Crime
Complaint Center (IC3) (2019, September 10).
Business email compromise the $26 billion scam.
https://www.ic3.gov/media/2019/190910.aspx
Federal Bureau of Investigations (FBI) Internet Crime
Complaint Center (IC3) (2020, March 17). 2020
Internet crime report. https://www.ic3.gov/Media/
PDF/AnnualReport/2020_IC3Report.pdf
Federal Bureau of Investigations Internet (FBI) Crime
Complaint Center (IC3) (2021, March 23). 2021
Internet crime report. https://www.ic3.gov/Media/
PDF/AnnualReport/2021_IC3Report.pdf
Ho, A. (2018). Rules of three lines of defense for
information security and governance. ISACA Journal,
18(4), 1-5.
Kost, R. G., & da Rosa, J. C. (2018). Impact of survey
length and compensation on validity, reliability, and
sample characteristics for ultrashort-, short-, and long-
research participant perception surveys. Journal of
Clinical and Translational Science, 2(1), 31-37.
https://doi.org/10.1017/cts.2018.18
Kotson, M., & Shultz, A. (2015). Characterizing phishing
threats with natural language processing. Proceedings
of the IEEE Conference on Communications and
Network Security, 308-316. https://doi.org/10.1109/
CNS.2015.7346841
Lastdrager, E. E. (2014). Achieving a consensual definition
of phishing based on a systematic review of the
literature. Crime Science, 3(1), 1-10. https://doi.
org/10.1186/s40163-014-0009-y