Recognition of genuine and phishing emails may not be associated with response to phishing attacks

被引:1
|
作者
Crgol, Alex [1 ]
Vrhovec, Simon [1 ]
机构
[1] Univ Maribor, Maribor, Slovenia
关键词
Information security; cybersecurity; cyber attack; cyber threat; organization vulnerability; targeted phishing; spear phishing; context-aware phishing;
D O I
10.3897/jucs.132113
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
This paper investigates the associations between recognition of phishing and genuine emails, and response to phishing attacks, namely susceptibility to phishing emails (i.e., click rate) and full phishing attack compliance (i.e., click on a malicious link followed by an attempt to download a file). A cross-sectional survey was conducted among students at a Slovenian university (N = 135) to assess how participants recognize examples of phishing emails. Additionally, a field trial study (i.e., a phishing campaign) was performed to test participants' response to a real phishing attack. Chi-square and Fisher's exact tests were used to test the hypothesized associations between the studied constructs. Results do not indicate any significant associations between recognition of neither phishing nor genuine emails and response to phishing attacks. These findings suggest that studies should thus avoid using recognition of genuine and/or phishing emails in their research designs despite its convenience since it has little practical merit. These results also seriously undermine the assumptions that current phishing training is built on. The focus of phishing training may thus switch from knowledge-raising to actual response to phishing attacks, for example, through practical phishing attempts at the workplace. Although this is not a new phishing training approach, it may have some unwanted side-effects which future studies could focus on tackling.
引用
收藏
页码:1265 / 1283
页数:19
相关论文
共 50 条
  • [1] Analysis of phishing emails
    Burita L.
    Matoulek P.
    Halouzka K.
    Kozak P.
    Burita, Ladislav (ladislav.burita@unob.cz), 1600, American Institute of Mathematical Sciences (05): : 93 - 116
  • [2] Ontological Detection of Phishing Emails
    Park, Gilchan
    Rayz, Julia
    2018 IEEE INTERNATIONAL CONFERENCE ON SYSTEMS, MAN, AND CYBERNETICS (SMC), 2018, : 2858 - 2863
  • [3] Phishing email strategies: Understanding cybercriminals' strategies of crafting phishing emails
    Stojnic, Tatyana
    Vatsalan, Dinusha
    Arachchilage, Nalin A. G.
    SECURITY AND PRIVACY, 2021, 4 (05)
  • [4] How Users Investigate Phishing Emails that Lack Traditional Phishing Cues
    Koehler, Daniel
    Puenter, Wenzel
    Meinel, Christoph
    APPLIED CRYPTOGRAPHY AND NETWORK SECURITY, ACNS 2024, PT III, 2024, 14585 : 381 - 411
  • [5] The Role of Cue Utilization and Cognitive Load in the Recognition of Phishing Emails
    Nasser, George
    Morrison, Ben W.
    Bayl-Smith, Piers
    Taib, Ronnie
    Gayed, Michael
    Wiggins, Mark W.
    FRONTIERS IN BIG DATA, 2020, 3
  • [6] Profiling phishing activity based on hyperlinks extracted from phishing emails
    Yearwood, John
    Mammadov, Musa
    Webb, Dean
    SOCIAL NETWORK ANALYSIS AND MINING, 2012, 2 (01) : 5 - 16
  • [7] A Survey on Phishing Emails Detection Techniques
    Muneer, Amgad
    Ali, Rao Faizan
    Al-Sharai, Abdo Ali
    Fati, Suliman Mohamed
    4TH INTERNATIONAL CONFERENCE ON INNOVATIVE COMPUTING (IC)2, 2021, : 144 - 149
  • [8] Perceptual representation of spam and phishing emails
    Patel, Pooja
    Sarno, Dawn M.
    Lewis, Joanna E.
    Shoss, Mindy
    Neider, Mark B.
    Bohil, Corey J.
    APPLIED COGNITIVE PSYCHOLOGY, 2019, 33 (06) : 1296 - 1304
  • [9] Training Users to Identify Phishing Emails
    Weaver, Bradley W.
    Braly, Adam M.
    Lane, David M.
    JOURNAL OF EDUCATIONAL COMPUTING RESEARCH, 2021, 59 (06) : 1169 - 1183
  • [10] Individual processing of phishing emails How attention and elaboration protect against phishing
    Harrison, Brynne
    Svetieva, Elena
    Vishwanath, Arun
    ONLINE INFORMATION REVIEW, 2016, 40 (02) : 265 - 281