What Is the Influence of Users' Characteristics on Their Ability to Detect Phishing Emails?

被引:24
|
作者
Alseadoon, Ibrahim [1 ]
Othman, F. I. [1 ]
Chan, Taizan [1 ]
机构
[1] Queensland Univ Technol, Brisbane, Qld 4000, Australia
关键词
MEDIA RICHNESS; DECEPTION; FAILURE;
D O I
10.1007/978-3-319-07674-4_89
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Phishing emails cause significant losses for organisations and victims. To fight back against phishing emails, victims' detection behaviours must be identified and improved. Then, the impact of victims' characteristics on their detection behaviours must be measured. Three methods, namely experiments, surveys and semi-structured interviews, were applied in our research to gain a richer understanding of victims' behaviours concerning phishing emails. Several user characteristics were measured using the deception detection model. The results suggest that users' characteristics either increase or decrease their suspicions. Characteristics such as user extraversion, trust and submissiveness represent variables that prevent victims from suspecting phishing emails. In contrast, email experience increases victims' suspicion of phishing emails. Furthermore, victims' personality characteristics and a variable called the susceptibility variable play important roles in increasing the tendency of victims to execute the actions requested in phishing emails.
引用
收藏
页数:14
相关论文
共 50 条
  • [1] Comparing Machine and Human Ability to Detect Phishing Emails
    Park, Gilchan
    Stuart, Lauren M.
    Taylor, Julia M.
    Raskin, Victor
    [J]. 2014 IEEE INTERNATIONAL CONFERENCE ON SYSTEMS, MAN AND CYBERNETICS (SMC), 2014, : 2322 - 2327
  • [2] Training Users to Identify Phishing Emails
    Weaver, Bradley W.
    Braly, Adam M.
    Lane, David M.
    [J]. JOURNAL OF EDUCATIONAL COMPUTING RESEARCH, 2021, 59 (06) : 1169 - 1183
  • [3] "Alexa, What's a Phishing Email?": Training users to spot phishing emails using a voice assistant
    Sharevski, Filipo
    Jachim, Peter
    [J]. EURASIP JOURNAL ON INFORMATION SECURITY, 2022, 2022 (01)
  • [4] How Experts Detect Phishing Scam Emails
    Wash, Rick
    [J]. Proceedings of the ACM on Human-Computer Interaction, 2020, 4 (CSCW2)
  • [5] “Alexa, What’s a Phishing Email?”: Training users to spot phishing emails using a voice assistant
    Filipo Sharevski
    Peter Jachim
    [J]. EURASIP Journal on Information Security, 2022
  • [6] How Users Investigate Phishing Emails that Lack Traditional Phishing Cues
    Koehler, Daniel
    Puenter, Wenzel
    Meinel, Christoph
    [J]. APPLIED CRYPTOGRAPHY AND NETWORK SECURITY, ACNS 2024, PT III, 2024, 14585 : 381 - 411
  • [7] Persuasion: How phishing emails can influence users and bypass security measures
    Ferreira, Ana
    Teles, Soraia
    [J]. INTERNATIONAL JOURNAL OF HUMAN-COMPUTER STUDIES, 2019, 125 : 19 - 31
  • [8] CULTURAL COMPARISON TOWARDS USERS' SUSCEPTIBLE TO PHISHING EMAILS
    Alseadoon, Ibrahim Mohammed
    Othman, Mohd Fairuz Iskandar
    [J]. INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2021, 21 (10): : 240 - 244
  • [9] Why do users not report spear phishing emails?
    Kwak, Youngsun
    Lee, Seyoung
    Damiano, Amanda
    Vishwanath, Arun
    [J]. TELEMATICS AND INFORMATICS, 2020, 48
  • [10] Text and Data Mining to Detect Phishing Websites and Spam Emails
    Pandey, Mayank
    Ravi, Vadlamani
    [J]. SWARM, EVOLUTIONARY, AND MEMETIC COMPUTING, PT II (SEMCCO 2013), 2013, 8298 : 559 - 573