The role of cue utilization in the detection of phishing emails

被引:10
|
作者
Sturman, Daniel [1 ]
Valenzuela, Chelsea [1 ]
Plate, Oliver [1 ]
Tanvir, Tazin [1 ]
Auton, Jaime C. [1 ]
Bayl-Smith, Piers [2 ]
Wiggins, Mark W. [2 ]
机构
[1] Univ Adelaide, Sch Psychol, Adelaide, SA, Australia
[2] Macquarie Univ, Dept Psychol, Sydney, NSW, Australia
关键词
Cue utilization; Cybersecurity; Information processing; Phishing; Visual search; EXPERT; UNCERTAINTY; AWARENESS; FAILURE; NOVICE; FLIGHT;
D O I
10.1016/j.apergo.2022.103887
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
This study was designed to examine the roles of cue utilization, phishing features and time pressure in the detection of phishing emails. During two experiments, participants completed an email sorting task containing both phishing and genuine emails. Participants were allocated to either a high or low time pressure condition. Performance was assessed via detection sensitivity and response bias. Participants were classified with either higher or lower cue utilization and completed a measure of phishing knowledge. When participants were blind to the nature of the study (N = 191), participants with higher cue utilization were better able to discriminate phishing from genuine emails. However, they also recorded a stronger bias towards classifying emails as phishing, compared to participants with lower cue utilization. When notified of phishing base rates prior to the email sorting task (N = 191), participants with higher cue utilization were better able to discriminate phishing from genuine emails without recording an increase in rate of false alarms, compared to participants with lower cue utilization. Sensitivity increased with a reduction in time pressure, while response bias was influenced by the number of phishing-related features in each email. The outcomes support the proposition that cue-based processing of critical features is associated with an increase in the capacity of individuals to discriminate phishing from genuine emails, above and beyond phishing-related knowledge. From an applied perspective, these outcomes suggest that cue-based training may be beneficial for improving detection of phishing emails.
引用
收藏
页数:13
相关论文
共 50 条
  • [1] The Effects of Cue Utilization and Cognitive Load in the Detection of Phishing Emails
    Nasser, George
    Morrison, Ben W.
    Bayl-Smith, Piers
    Taib, Ronnie
    Gayed, Michael
    Wiggins, Mark W.
    FINANCIAL CRYPTOGRAPHY AND DATA SECURITY, FC 2020, 2020, 12063 : 47 - 55
  • [2] The Role of Cue Utilization and Cognitive Load in the Recognition of Phishing Emails
    Nasser, George
    Morrison, Ben W.
    Bayl-Smith, Piers
    Taib, Ronnie
    Gayed, Michael
    Wiggins, Mark W.
    FRONTIERS IN BIG DATA, 2020, 3
  • [3] The roles of phishing knowledge, cue utilization, and decision styles in phishing email detection
    Sturman, Daniel
    Bell, Elliot A.
    Auton, Jaime C.
    Breakey, Georgia R.
    Wiggins, Mark W.
    APPLIED ERGONOMICS, 2024, 119
  • [4] Cue Utilization, Phishing Feature and Phishing Email Detection
    Bayl-Smith, Piers
    Sturman, Daniel
    Wiggins, Mark
    FINANCIAL CRYPTOGRAPHY AND DATA SECURITY, FC 2020, 2020, 12063 : 56 - 70
  • [5] The role of conscientiousness and cue utilisation in the detection of phishing emails in controlled and naturalistic settings
    Williams, Rohan
    Morrison, Ben W.
    Wiggins, Mark W.
    Bayl-Smith, Piers
    BEHAVIOUR & INFORMATION TECHNOLOGY, 2024, 43 (09) : 1842 - 1858
  • [6] Verbal Deception Cue Training for the Detection of Phishing Emails
    Lim, Jaewan
    Zhou, Lina
    Zhang, Dongsong
    2021 IEEE INTERNATIONAL CONFERENCE ON INTELLIGENCE AND SECURITY INFORMATICS (ISI), 2021, : 103 - 105
  • [7] Errors, Irregularities, and Misdirection: Cue Utilisation and Cognitive Reflection in the Diagnosis of Phishing Emails
    Ackerley, Mitchell
    Morrison, Ben W.
    Ingrey, Kate
    Wiggins, Mark W.
    Bayl-Smith, Piers
    Morrison, Natalie M., V
    AUSTRALASIAN JOURNAL OF INFORMATION SYSTEMS, 2022, 26
  • [8] A method to Measure the Efficiency of Phishing Emails Detection Features
    Al-Daeef, Melad Mohamed
    Basir, Nurlida
    Saudi, Madihah Mohd
    2014 INTERNATIONAL CONFERENCE ON INFORMATION SCIENCE AND APPLICATIONS (ICISA), 2014,
  • [9] Perceptual representation of spam and phishing emails
    Patel, Pooja
    Sarno, Dawn M.
    Lewis, Joanna E.
    Shoss, Mindy
    Neider, Mark B.
    Bohil, Corey J.
    APPLIED COGNITIVE PSYCHOLOGY, 2019, 33 (06) : 1296 - 1304
  • [10] Detection of Phishing Emails using Data Mining Algorithms
    Smadi, Sami
    Aslam, Nauman
    Zhang, Li
    Alasem, Rafe
    Hossain, M. A.
    2015 9TH INTERNATIONAL CONFERENCE ON SOFTWARE, KNOWLEDGE, INFORMATION MANAGEMENT AND APPLICATIONS (SKIMA), 2015,