The role of cue utilization in the detection of phishing emails

被引:10
|
作者
Sturman, Daniel [1 ]
Valenzuela, Chelsea [1 ]
Plate, Oliver [1 ]
Tanvir, Tazin [1 ]
Auton, Jaime C. [1 ]
Bayl-Smith, Piers [2 ]
Wiggins, Mark W. [2 ]
机构
[1] Univ Adelaide, Sch Psychol, Adelaide, SA, Australia
[2] Macquarie Univ, Dept Psychol, Sydney, NSW, Australia
关键词
Cue utilization; Cybersecurity; Information processing; Phishing; Visual search; EXPERT; UNCERTAINTY; AWARENESS; FAILURE; NOVICE; FLIGHT;
D O I
10.1016/j.apergo.2022.103887
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
This study was designed to examine the roles of cue utilization, phishing features and time pressure in the detection of phishing emails. During two experiments, participants completed an email sorting task containing both phishing and genuine emails. Participants were allocated to either a high or low time pressure condition. Performance was assessed via detection sensitivity and response bias. Participants were classified with either higher or lower cue utilization and completed a measure of phishing knowledge. When participants were blind to the nature of the study (N = 191), participants with higher cue utilization were better able to discriminate phishing from genuine emails. However, they also recorded a stronger bias towards classifying emails as phishing, compared to participants with lower cue utilization. When notified of phishing base rates prior to the email sorting task (N = 191), participants with higher cue utilization were better able to discriminate phishing from genuine emails without recording an increase in rate of false alarms, compared to participants with lower cue utilization. Sensitivity increased with a reduction in time pressure, while response bias was influenced by the number of phishing-related features in each email. The outcomes support the proposition that cue-based processing of critical features is associated with an increase in the capacity of individuals to discriminate phishing from genuine emails, above and beyond phishing-related knowledge. From an applied perspective, these outcomes suggest that cue-based training may be beneficial for improving detection of phishing emails.
引用
收藏
页数:13
相关论文
共 50 条
  • [21] Understanding the Role of Demographic and Psychological Factors in Users' Susceptibility to Phishing Emails: A Review
    Kavvadias, Alexandros
    Kotsilieris, Theodore
    APPLIED SCIENCES-BASEL, 2025, 15 (04):
  • [22] ADVANCED PERSISTENT THREAT AND SPEAR PHISHING EMAILS
    Ghafir, Ibrahim
    Prenosil, Vaclav
    DISTANCE LEARNING, SIMULATION AND COMMUNICATION 'DLSC 2015', 2015, : 34 - 41
  • [23] How Experts Detect Phishing Scam Emails
    Wash R.
    Proceedings of the ACM on Human-Computer Interaction, 2020, 4 (CSCW2)
  • [24] Individual processing of phishing emails How attention and elaboration protect against phishing
    Harrison, Brynne
    Svetieva, Elena
    Vishwanath, Arun
    ONLINE INFORMATION REVIEW, 2016, 40 (02) : 265 - 281
  • [25] Eyes on phishing emails: an eye-tracking study
    Ribeiro, Liliana
    Guedes, Ines Sousa
    Cardoso, Carla Sofia
    JOURNAL OF EXPERIMENTAL CRIMINOLOGY, 2024,
  • [26] CULTURAL COMPARISON TOWARDS USERS' SUSCEPTIBLE TO PHISHING EMAILS
    Alseadoon, Ibrahim Mohammed
    Othman, Mohd Fairuz Iskandar
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2021, 21 (10): : 240 - 244
  • [27] More Than Meets the Eye - An Anti-Phishing Learning Game with a Focus on Phishing Emails
    Roepke, Rene
    Drury, Vincent
    Peess, Philipp
    Johnen, Tobias
    Meyer, Ulrike
    Schroeder, Ulrik
    GAMES AND LEARNING ALLIANCE, GALA 2022, 2022, 13647 : 118 - 126
  • [28] Spear-Phishing Emails Verification Method based on Verifiable Secret Sharing Scheme
    Sonowal, Gunikhan
    Sharma, Aditi
    Kharb, Latika
    JOURNAL OF INFORMATION ASSURANCE AND SECURITY, 2021, 16 (03): : 117 - +
  • [29] Text and Data Mining to Detect Phishing Websites and Spam Emails
    Pandey, Mayank
    Ravi, Vadlamani
    SWARM, EVOLUTIONARY, AND MEMETIC COMPUTING, PT II (SEMCCO 2013), 2013, 8298 : 559 - 573
  • [30] Field Studies on the Impact of Cryptographic Signatures and Encryption on Phishing Emails
    Pham, Stefanie
    Schopp, Matthias
    Stiemert, Lars
    Seeber, Sebastian
    Poehn, Daniela
    Hommel, Wolfgang
    ICISSP: PROCEEDINGS OF THE 7TH INTERNATIONAL CONFERENCE ON INFORMATION SYSTEMS SECURITY AND PRIVACY, 2021, : 384 - 390