Literature DB >> 27562565

Quantifying Phishing Susceptibility for Detection and Behavior Decisions.

Casey Inez Canfield1, Baruch Fischhoff2, Alex Davis2.   

Abstract

OBJECTIVE: We use signal detection theory to measure vulnerability to phishing attacks, including variation in performance across task conditions.
BACKGROUND: Phishing attacks are difficult to prevent with technology alone, as long as technology is operated by people. Those responsible for managing security risks must understand user decision making in order to create and evaluate potential solutions.
METHOD: Using a scenario-based online task, we performed two experiments comparing performance on two tasks: detection, deciding whether an e-mail is phishing, and behavior, deciding what to do with an e-mail. In Experiment 1, we manipulated the order of the tasks and notification of the phishing base rate. In Experiment 2, we varied which task participants performed.
RESULTS: In both experiments, despite exhibiting cautious behavior, participants' limited detection ability left them vulnerable to phishing attacks. Greater sensitivity was positively correlated with confidence. Greater willingness to treat e-mails as legitimate was negatively correlated with perceived consequences from their actions and positively correlated with confidence. These patterns were robust across experimental conditions.
CONCLUSION: Phishing-related decisions are sensitive to individuals' detection ability, response bias, confidence, and perception of consequences. Performance differs when people evaluate messages or respond to them but not when their task varies in other ways. APPLICATION: Based on these results, potential interventions include providing users with feedback on their abilities and information about the consequences of phishing, perhaps targeting those with the worst performance. Signal detection methods offer system operators quantitative assessments of the impacts of interventions and their residual vulnerability.
© 2016, Human Factors and Ergonomics Society.

Entities:  

Keywords:  cybersecurity; metacognition; perception-action; signal detection theory; vigilance

Mesh:

Year:  2016        PMID: 27562565     DOI: 10.1177/0018720816665025

Source DB:  PubMed          Journal:  Hum Factors        ISSN: 0018-7208            Impact factor:   2.888


  4 in total

1.  The psychological interaction of spam email features.

Authors:  Sarah E Williams; Dawn M Sarno; Joanna E Lewis; Mindy K Shoss; Mark B Neider; Corey J Bohil
Journal:  Ergonomics       Date:  2019-05-20       Impact factor: 2.778

2.  Effectiveness of and user preferences for security awareness training methodologies.

Authors:  Kai Florian Tschakert; Sudsanguan Ngamsuriyaroj
Journal:  Heliyon       Date:  2019-06-28

3.  Phishing in healthcare organisations: threats, mitigation and approaches.

Authors:  Ward Priestman; Tony Anstis; Isabel G Sebire; Shankar Sridharan; Neil J Sebire
Journal:  BMJ Health Care Inform       Date:  2019-09

4.  It's the deceiver and the receiver: Individual differences in phishing susceptibility and false positives with item profiling.

Authors:  Sabina Kleitman; Marvin K H Law; Judy Kay
Journal:  PLoS One       Date:  2018-10-26       Impact factor: 3.240

  4 in total

北京卡尤迪生物科技股份有限公司 © 2022-2023.