| Literature DB >> 30365492 |
Sabina Kleitman1, Marvin K H Law1, Judy Kay2.
Abstract
Phishing email is one of the biggest risks to online information security due to its ability to exploit human trust and naivety. Prior research has examined whether some people are more susceptible to phishing than others and what characteristics may predict this susceptibility. Given that there are no standardised measures or methodologies to detect phishing susceptibility, results have conflicted. To address this issue, the current study created a 40-item phishing detection task to measure both cognitive and behavioural indicators of phishing susceptibility and false positives (misjudged genuine email). The task is based on current real-life email stimuli (i.e., phishing and genuine) relevant to the student and general population. Extending previous literature we also designed a methodology for assessing phishing susceptibility by allowing participants to indicate perception of maliciousness of each email type and the actions they would take (keep it, trash it or seek further information). This enabled us to: (1) examine the relationships that psychological variables share with phishing susceptibility and false positives-both captured as consistent tendencies; (2) determine the relationships between perceptions of maliciousness with behavioural outcomes and psychological variables; and (3) determine the relationships between these tendencies and email characteristics. In our study, 150 undergraduate psychology students participated in exchange for partial course credit (98 Females; Mean age = 19.70, SD = 2.27). Participants also completed a comprehensive battery of psychometric tests assessing intelligence, pre- and on-task confidence, Big 6 personality, and familiarity/competence in computing and phishing. Results revealed that people showed distinct and robust tendencies for phishing susceptibility and false positives. A series of regression analyses looking at the accuracy of both phishing and false positives detection revealed that human-centred variables accounted for a good degree of variance in phishing susceptibility (about 54%), with perceptions of maliciousness, intelligence, knowledge of phishing, and on-task confidence contributing significantly, directly and/or indirectly via perception of maliciousness. A regression model looking at discriminating false positives has also shown that human-centred variables accounted for a reasonable degree of variance (41%), with perceptions of maliciousness, intelligence and on-task confidence contributing significantly, directly and/or indirectly via perception of maliciousness. Furthermore, the characteristics of the most effective phishing and misjudged genuine email items were profiled. Based on our findings, we suggest that future research should investigate these significant variables in more detail. We also recommend that future research should capture consistent response tendencies to determine vulnerability to phishing and false positives (rather than a one off response to a single email), and use the collection of the most current phishing email obtained from relevant sources to the population. It is important to capture perceptions of maliciousness of email because it is a key predictor of the action taken on the email. It directly predicts accuracy detection of phishing and genuine email, as well as mediating the relationships between some other predictors whose role would have been overlooked if the perceptions were not captured. The study provides the framework of human-centred variables which predict phishing and false positive susceptibility as well as the characteristics of email which most deceive people.Entities:
Mesh:
Year: 2018 PMID: 30365492 PMCID: PMC6203253 DOI: 10.1371/journal.pone.0205089
Source DB: PubMed Journal: PLoS One ISSN: 1932-6203 Impact factor: 3.240
Characteristics of email used in the phishing detection task.
| Email Characteristics | Description | Distribution within Stimuli |
|---|---|---|
| Email Word Length | How many words are in the email? | Mean = 138.75, SD = 171.19, |
| Target | Who is the email is intended for? (Generic is for the general population, i.e. [No mentions of any group], Loosely-Targeted is for a type of population e.g. “The Library of Alexandria is contacting you and other great researchers in the world”, Spear-phishing is intended for a specific group e.g. “Sydney University Students Needed” | Generic- 16, Loosely-targeted– 14,Spear phishing– 10 |
| Contact Method | How is the email asking the sender to respond? Email Reply–“If interested, revert back to my personal email: | Email Reply– 12, File Attachment– 3, Hyperlink– 23, Hyperlink + Email Reply– 1, None– 1 |
| Number of URL | The number of URL links contained within the email | Mean = 1.55, SD = 1.81, Range = 0–7 |
| Asks for Confidential Information | Asks for confidential information from their victim e.g., “Verify your email address to have full access to the document!!” | Yes- 9, No- 31 |
| Misspellings/Grammatical Errors | Contains mistakes in spelling and grammar within the email, e.g. “John McKinnon recently send you confidential Dropbox file” | Yes- 19, No- 21 |
| Pressure | Incites pressure for victims to respond without thinking clearly, e.g., “Your mail box is cramped with unsolicited mails and will be suspended if you don’t prove it is not used for fraudulent acts.” | Yes-19, No- 21 |
| Vague Recipient | Addresses victim vaguely (e.g. Sir) rather than by name, e.g. “Hi friend” | Yes– 30, No– 10 |
| Suspicious Email Domain | Contains email domains which are easily obtained and/or do not suit the sender’s character, e.g. | Yes-1, No- 39 |
| Suspicious URL | Contains URLs which contain non-letter characters, are long and/or have a different URL domain than the official one. E.g. | Yes-8, No-32 |
| Official Email Domain | Contains email domains which are analogous to the sender’s character and are difficult to obtain (e.g. | Yes- 9, No- 31 |
| Official URL | Contains URLs which link to official email and are difficult to obtain, e.g. “ | Yes- 4, No -36 |
| Use of URLs with HTTPS | Contains URLs with HTTPS indicates that the information processed by it are encrypted, although the site may still be a phishing scam, e.g. “ | Yes- 6, No -34 |
Fig 1A sample genuine item from the phishing detection task.
Fig 2A sample phishing email item from the phishing detection task.
Metrics used in the phishing detection task.
| Phishing email | Genuine Email |
|---|---|
Descriptive statistics and reliability estimates of other variables.
| Mean (%) | SD | Min | Max | Cronbach’s α | |
|---|---|---|---|---|---|
| Behavioural Response Confidence | 74.6 | 15.3 | 17.0 | 100.0 | .93 |
| Perceived Email Maliciousness | 66.4 | 14.4 | 24.9 | 100.0 | .86 |
| Email Detection Accuracy | 78.1 | 18.7 | 15.0 | 100.0 | .81 |
| Behavioural Response Confidence | 74.0 | 15.9 | 23.0 | 100.0 | .94 |
| Perceived Email Maliciousness | 27.8 | 15.7 | 0.0 | 70.4 | .89 |
| Agreeableness | 3.4 | .7 | 1.5 | 5.0 | .60 |
| Conscientiousness | 2.9 | .7 | 1.5 | 4.3 | .57 |
| Extraversion | 3.6 | .6 | 2.0 | 5.0 | .51 |
| Originality/ Intellect | 3.2 | .6 | 1.5 | 4.8 | .44 |
| Honesty/ Propriety | 3.2 | .6 | 1.4 | 4.6 | .45 |
| Resilience | 2.9 | .7 | 1.3 | 4.5 | .61 |
| EAT accuracy | 69.4 | 15.5 | 20.8 | 95.8 | .72 |
| EAT confidence | 75.8 | 11.8 | 43.1 | 97.8 | .88 |
| Destroying Old Documents | 56.7 | 49.7 | 0.0 | 100.0 | - |
| Valuable Possession Protection | 68.0 | 46.8 | 0.0 | 100.0 | - |
| Computer Update Installation | 51.3 | 50.1 | 0.0 | 100.0 | - |
| Seek Online Retailer Legitimacy | 50.0 | 50.2 | 0.0 | 100.0 | - |
| Website Privacy Policy | 36.7 | 48.4 | 0.0 | 100.0 | - |
| Online Checkout Seal of Approval | 38.0 | 48.7 | 0.0 | 100.0 | - |
Note: “-”indicates that internal consistency reliability was not calculated due to use of only one item
Fig 3Network plot of correlations between all 40 email items.
Q1-20 are phishing email while Q21-40 are genuine email. Correlations stronger than |.3| are shown. Red diamonds represent phishing email whilst black triangles represent genuine email.
Correlations between phishing susceptibility and individual difference measures.
| Email Detection Accuracy | Perceived Maliciousness | |||
|---|---|---|---|---|
| Phishing | Genuine | Phishing | Genuine | |
| Perceived Maliciousness | -.12 | - | ||
| Confidence ( | .09 | |||
| Perceived Maliciousness | .07 | - | ||
| Confidence | -.01 | .03 | ||
| Esoteric Analogies Test Accuracy | ||||
| Esoteric Analogies Test Confidence | .10 | .08 | .12 | -.12 |
| Accuracy of Phishing Definition | .14 | |||
| Self-Reported Competence in Detecting Phishing | .08 | -.13 | ||
| Honesty/ Propriety | .10 | .02 | .03 | .05 |
| Extraversion | -.04 | .01 | -.06 | -.03 |
| Resilience | .03 | -.02 | .09 | .09 |
| Agreeableness | .02 | .04 | .06 | -.01 |
| Conscientiousness | .06 | -.04 | .01 | .09 |
| Originality/ Intellect | .07 | .10 | -.00 | -.12 |
| Age | -.01 | -.02 | -.02 | .04 |
* p< .05
** p<. 0.01
Fig 4List of information sought after by participants when seeking more information on the PDT.
Correlations between variables used in regression models.
| 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11 | 12 | 13 | 14 | |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 1. PDT Phishing Email Detection Accuracy | -.27** | .68** | .07 | .02 | -.10 | .16 | .27** | .01 | .32** | .16* | .18* | .24** | -.01 |
| 2. PDT Genuine Email Detection Accuracy | 1 | -.12 | -.61** | -.00 | -.06 | .17* | .24** | .08 | .14 | .08 | -.03 | .09 | .23** |
| 3. PDT Phishing Maliciousness Perception | 1 | .28** | .01 | .13 | .15 | .18* | .12 | .29** | .28** | .14 | .32** | .03 | |
| 4. PDT Genuine Maliciousness Perception | 1 | .03 | .06 | -.21* | -.17* | -.13 | -.19* | -.11 | -.05 | -.26** | -.51** | ||
| 5. Age | 1 | .13 | -.10 | .00 | -.01 | -.01 | .06 | .02 | .09 | .02 | |||
| 6. Gender | 1 | -.02 | -.04 | .06 | .04 | .17* | .15 | .23** | .20* | ||||
| 7. English as a First Language | 1 | .10 | -.11 | .14 | .06 | .20* | .15 | .08 | |||||
| 8. EAT Accuracy | 1 | .46** | .35** | .23** | -.01 | .20* | .21* | ||||||
| 9. EAT Confidence | 1 | .25** | .17* | .06 | .30** | .37** | |||||||
| 10. Phishing Definition Score | 1 | .34** | .23** | .14 | .18* | ||||||||
| 11. Perceived Capacity in Handling Phishing | 1 | .15 | .35** | .31** | |||||||||
| 12. Awareness of Padlock Icon | 1 | .13 | .10 | ||||||||||
| 13. PDT Phishing Confidence | 1 | .80** | |||||||||||
| 14. PDT Genuine Confidence | 1 |
p < .05*, p < .01**, p < .001***
Results of sequential regression models predicting phishing and genuine maliciousness perception and detection accuracy.
| Phishing Detection Accuracy | Maliciousness Perception | ||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| Predictor | Phishing Email | Genuine Email | Phishing Email | Genuine Email | |||||||||
| ΔR2 | β | Unique Variance | ΔR2 | β | Unique Variance | ΔR2 | β | Unique Variance | ΔR2 | β | Unique Variance | ||
| Step 1 | .04 | .03 | .04 | .05 | |||||||||
| Age | .05 | .23% | .02 | .03% | .01 | .01% | .00 | .00% | |||||
| Gender | -.11 | 1.10% | -.07 | .42% | .13 | 1.56% | .06 | .41% | |||||
| English as a First Language | .16 | 2.53% | .15 | 2.32% | |||||||||
| Step 2 | |||||||||||||
| .06** | .05* | .03 | .03 | ||||||||||
| Age | .05 | .22% | .02 | .03% | .01 | .01% | .00 | .00% | |||||
| Gender | -.09 | .81% | -.05 | .27% | .13 | 1.63% | .07 | .43% | |||||
| English as a First Language | .13 | 1.59% | .14 | 1.85% | .14 | 1.93% | |||||||
| EAT Accuracy | .14 | 1.56% | -.09 | .65% | |||||||||
| EAT Confidence | .00 | .00% | -.01 | .00% | .06 | .29% | -.11 | .90% | |||||
| Step 3 | |||||||||||||
| .11** | .05 | .12*** | .25*** | ||||||||||
| Age | .02 | .05% | .02 | .03% | -.02 | .05% | .00 | .00% | |||||
| Gender | -.08 | .59% | .04 | .16% | |||||||||
| English as a First Language | .04 | .17% | .12 | 1.33% | .07 | .41% | -.14 | 1.70% | |||||
| EAT Accuracy | .05 | .17% | -.05 | .20% | |||||||||
| EAT Confidence | -.10 | .64% | -.09 | .49% | -.04 | .10% | .09 | .60% | |||||
| Phishing Definition Score | .06 | .30% | -.11 | 1.00% | |||||||||
| Perceived Capacity in Handling Phishing | -.01 | .01% | -.03 | .08% | .11 | .86% | .07 | .40% | |||||
| Awareness of Padlock Icon | .12 | 1.29% | -.07 | .43% | .03 | .07% | .02 | .00% | |||||
| PDT Phishing Confidence | - | - | - | - | |||||||||
| PDT Genuine Confidence | - | - | - | - | |||||||||
| Step 4 | |||||||||||||
| .33*** | .28*** | ||||||||||||
| Age | .04 | .12% | .02 | .04% | - | - | - | - | |||||
| Gender | .02 | .04% | - | - | - | - | |||||||
| English as a First Language | .00 | .00% | .03 | .09% | - | - | - | - | |||||
| EAT Accuracy | - | - | - | - | |||||||||
| EAT Confidence | -.07 | .35% | -.03 | .05% | - | - | - | - | |||||
| Phishing Definition Score | .10 | .70% | -.01 | .01% | - | - | - | - | |||||
| Perceived Capacity in Handling Phishing | -.08 | .44% | .01 | .02% | - | - | - | - | |||||
| Awareness of Padlock Icon | .10 | .93% | -.06 | .29% | - | - | - | - | |||||
| PDT Phishing Confidence | .06 | .22% | - | - | - | - | - | - | |||||
| PDT Genuine Confidence | - | - | -0.13 | 1.03% | - | - | - | - | |||||
| PDT Phishing Maliciousness Perception | - | - | - | - | - | - | |||||||
| PDT Genuine Maliciousness Perception | - | - | - | - | - | - | |||||||
| Overall % of Variance Accounted for by Model | 53.90% | 41.00% | 19.30% | 33.20% | |||||||||
p < .05*, p < .01**, p < .001*** significant predictors are in bold.
Characteristics of most successful phishing email and least successful genuine email.
| Phishing | Genuine | |||||||
|---|---|---|---|---|---|---|---|---|
| Item Number | 17 | 1 | 3 | 10 | 34 | 25 | 28 | 32 |
| Email Word Length | 1075 | 181 | 67 | 51 | 223 | 84 | 15 | 254 |
| Target Group | LT | SP | LT | LT | SP | SP | G | LT |
| Contact Method | H/ER | H | H | H | H | ER | H | ER |
| Number of URLs | 6 | 7 | 1 | 1 | 4 | 1 | 1 | 7 |
| Misspellings and Grammatical Errors | Yes | No | Yes | Yes | Yes | No | No | Yes |
| Vague Recipient | Yes | Yes | Yes | No | Yes | Yes | No | Yes |
| Pressure | Yes | Yes | No | Yes | Yes | No | No | No |
| Suspicious Email Domain | Yes | No | No | No | No | No | No | No |
| Suspicious URL | Yes | Yes | Yes | No | Yes | No | Yes | Yes |
| Asks for Confidential Information | No | No | No | No | No | No | No | No |
| Official Email Domain | No | No | No | No | No | Yes | No | Yes |
| Official URL | No | No | No | No | No | No | No | Yes |
| Use of URLs with HTTPS | Yes | No | No | No | Yes | No | No | No |
| Number of Suspicion-Inducing Characteristics | 5 | 3 | 3 | 2 | 4 | 1 | 1 | 3 |
| Number of Trust-Inducing Characteristics | 1 | 0 | 0 | 0 | 1 | 1 | 0 | 2 |
| Behavioural Percentages on Email | ||||||||
| Kept | .54 | .47 | .46 | .44 | .63 | .60 | .54 | .54 |
| Trashed | .38 | .48 | .44 | .45 | .30 | .32 | .38 | .41 |
| Sought Further Information | .07 | .05 | .09 | .11 | .07 | .09 | .07 | .05 |
SP = Spear Phishing, LT = Loosely-Targeted, G = Generic; H = Hyperlink, ER = Email Reply