The role of cue utilization in the detection of phishing emails

被引:10
|
作者
Sturman, Daniel [1 ]
Valenzuela, Chelsea [1 ]
Plate, Oliver [1 ]
Tanvir, Tazin [1 ]
Auton, Jaime C. [1 ]
Bayl-Smith, Piers [2 ]
Wiggins, Mark W. [2 ]
机构
[1] Univ Adelaide, Sch Psychol, Adelaide, SA, Australia
[2] Macquarie Univ, Dept Psychol, Sydney, NSW, Australia
关键词
Cue utilization; Cybersecurity; Information processing; Phishing; Visual search; EXPERT; UNCERTAINTY; AWARENESS; FAILURE; NOVICE; FLIGHT;
D O I
10.1016/j.apergo.2022.103887
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
This study was designed to examine the roles of cue utilization, phishing features and time pressure in the detection of phishing emails. During two experiments, participants completed an email sorting task containing both phishing and genuine emails. Participants were allocated to either a high or low time pressure condition. Performance was assessed via detection sensitivity and response bias. Participants were classified with either higher or lower cue utilization and completed a measure of phishing knowledge. When participants were blind to the nature of the study (N = 191), participants with higher cue utilization were better able to discriminate phishing from genuine emails. However, they also recorded a stronger bias towards classifying emails as phishing, compared to participants with lower cue utilization. When notified of phishing base rates prior to the email sorting task (N = 191), participants with higher cue utilization were better able to discriminate phishing from genuine emails without recording an increase in rate of false alarms, compared to participants with lower cue utilization. Sensitivity increased with a reduction in time pressure, while response bias was influenced by the number of phishing-related features in each email. The outcomes support the proposition that cue-based processing of critical features is associated with an increase in the capacity of individuals to discriminate phishing from genuine emails, above and beyond phishing-related knowledge. From an applied perspective, these outcomes suggest that cue-based training may be beneficial for improving detection of phishing emails.
引用
收藏
页数:13
相关论文
共 50 条
  • [31] What Is the Influence of Users' Characteristics on Their Ability to Detect Phishing Emails?
    Alseadoon, Ibrahim
    Othman, F. I.
    Chan, Taizan
    ADVANCED COMPUTER AND COMMUNICATION ENGINEERING TECHNOLOGY, 2015, 315
  • [32] Detecting Phishing Sites Using URLs Collected from Emails
    Wang, Chuan-Sheng
    Hsu, Fu-Hau
    Chen, Shih-Jen
    Hwang, Yan-Ling
    Wu, Min-Hao
    APPLIED SCIENCE AND PRECISION ENGINEERING INNOVATION, PTS 1 AND 2, 2014, 479-480 : 916 - +
  • [33] Devising and Detecting Phishing Emails Using Large Language Models
    Heiding, Fredrik
    Schneier, Bruce
    Vishwanath, Arun
    Bernstein, Jeremy
    Park, Peter S.
    IEEE ACCESS, 2024, 12 : 42131 - 42146
  • [34] To click or not to click the link: the factors influencing internet banking users' intention in responding to phishing emails
    Manoharan, Suganthi
    Katuk, Norliza
    Hassan, Syahida
    Ahmad, Rahayu
    INFORMATION AND COMPUTER SECURITY, 2022, 30 (01) : 37 - 62
  • [35] Prevention and mitigation measures against phishing emails: a sequential schema model
    Yumi E. Suzuki
    Sergio A. Salinas Monroy
    Security Journal, 2022, 35 : 1162 - 1182
  • [36] Utilizing Large Language Models with Human Feedback Integration for Generating Dedicated Warning for Phishing Emails
    Nguyen, Quan Hong
    Wu, Tingmin
    Nguyen, Van
    Yuan, Xingliang
    Xue, Jason
    Rudolph, Carsten
    PROCEEDINGS OF THE 2ND ACM WORKSHOP ON SECURE AND TRUSTWORTHY DEEP LEARNING SYSTEMS, SECTL 2024, 2024, : 35 - 46
  • [37] Phishing or Not Phishing? A Survey on the Detection of Phishing Websites
    Zieni, Rasha
    Massari, Luisa
    Calzarossa, Maria Carla
    IEEE ACCESS, 2023, 11 : 18499 - 18519
  • [38] The Persuasive Phish: Examining the Social Psychological Principles Hidden in Phishing Emails
    Zielinska, Olga
    Welk, Allaire
    Mayhorn, Christopher B.
    Murphy-Hill, Emerson
    SYMPOSIUM AND BOOTCAMP ON THE SCIENCE OF SECURITY, 2016, : 126 - 126
  • [39] Prevention and mitigation measures against phishing emails: a sequential schema model
    Suzuki, Yumi E.
    Monroy, Sergio A. Salinas
    SECURITY JOURNAL, 2022, 35 (04) : 1162 - 1182
  • [40] Static versus dynamic medical images: The role of cue utilization in diagnostic performance
    Carrigan, Ann J.
    Stoodley, Paul
    Ng, Kenny
    Moerel, Denise
    Wiggins, Mark W.
    APPLIED COGNITIVE PSYCHOLOGY, 2021, 35 (05) : 1284 - 1296