Literature DB >> 32501314

Susceptibility to phishing on social network sites: A personality information processing model.

Edwin Donald Frauenstein1, Stephen Flowerday1.   

Abstract

Today, the traditional approach used to conduct phishing attacks through email and spoofed websites has evolved to include social network sites (SNSs). This is because phishers are able to use similar methods to entice social network users to click on malicious links masquerading as fake news, controversial videos and other opportunities thought to be attractive or beneficial to the victim. SNSs are a phisher's "market" as they offer phishers a wide range of targets and take advantage of opportunities that exploit the behavioural vulnerabilities of their users. As such, it is important to further investigate aspects affecting behaviour when users are presented with phishing. Based on the literature studied, this research presents a theoretical model to address phishing susceptibility on SNSs. Using data collected from 215 respondents, the study examined the mediating role that information processing plays with regard to user susceptibility to social network phishing based on their personality traits, thereby identifying user characteristics that may be more susceptible than others to phishing on SNSs. The results from the structural equation modeling (SEM) analysis revealed that conscientious users were found to have a negative influence on heuristic processing, and are thus less susceptible to phishing on SNSs. The study also confirmed that heuristic processing increases susceptibility to phishing, thus supporting prior studies in this area. This research contributes to the information security discipline as it is one of the first to examine the effect of the relationship between the Big Five personality model and the heuristic-systematic model of information processing.
© 2020 Elsevier Ltd. All rights reserved.

Entities:  

Keywords:  Big Five; Heuristic processing; Heuristic-systematic processing model; Information processing; Personality traits; Phishing; Structural equation modeling; Systematic processing

Year:  2020        PMID: 32501314      PMCID: PMC7252086          DOI: 10.1016/j.cose.2020.101862

Source DB:  PubMed          Journal:  Comput Secur        ISSN: 0167-4048            Impact factor:   4.438


Introduction

For several years, the Anti-Phishing Working Group (APWG) has defined phishing as “a criminal mechanism employing both social engineering and technical subterfuge to steal consumers’ personal identity data and financial account credentials” (APWG 2019). Lastdrager (2014) defines phishing as an “act of deception whereby impersonation is used to obtain information from a target”. It is apparent that in the definitions, users are deceived in some way to give out information to the attacker. However, these definitions do not elaborate on the channel or environment in which phishing may be executed, or the attack vector, nor is any mention made of the use of persuasion to make phishing effective. Phishing is regarded as a type of Internet fraud typically carried out by sending victims an email ostensibly from a legitimate organisation or individual. Phishing emails often include hyperlinks that lead victims to spoofed websites; however, they can also include attachments, which users may unknowingly download and install spyware that data-mines the victim's computer for usernames, passwords and credit card information (Harrison et al., 2015). The term “phishing” was coined as early as 1996 when attempts were made to steal passwords from the accounts of America Online (AOL) users (Ollmann, 2002). Several decades later, annual reports released by various information security organisations continue to emphasise the impact phishing has on numerous industries and their customers today (APWG, 2019). Almost daily, large successful organisations make headlines by falling victim to some form of phishing, resulting in substantial monetary losses. In November 2017, Facebook announced that of its 2.1 billion monthly active users, approximately 270 million user accounts could be duplicate or fraudulent (Titcomb, 2017). Earlier the same year, Facebook and Google were defrauded of more than $100 000 through a phishing scheme that impersonated a large Asian-based manufacturer (United States Department of Justice, 2017). Phishing is reported to be the fifth most common primary cause of security incidents, is ranked as the main cause of data breaches, and has the highest success rate of any threat vector (Verizon, 2019). In the third quarter of 2019, phishing attacks rose to heights not previously seen since late 2016 (APWG, 2019). Sophisticated phishing attacks have continued to target mobile banking users and to deceive them into submitting bank-related information after having received a phishing email or a SMS containing a link on their mobile phones (Choudhary and Jain, 2018). This has allowed phishers to fraudulently perform a “SIM-swap”, thereby giving them access to text messages directed to the victim's cell phone number (Samunderu, 2014). The phishers are then able to add beneficiaries to the victim's online Internet banking profile because the phisher will have access to confirm the two-factor authentication (2FA) code typically sent to the victim's mobile device. Furthermore, phishers are creating secure websites, thus foiling efforts to educate users into relying on HTTPS as a means of adjudicating whether a website is safe or not (APWG, 2019). Phishers took advantage of the public's fear and uncertainty over the coronavirus (COVID-19) global pandemic. Since the start of January 2020, COVID-19 related email phishing attacks saw a steady increase followed by a sudden surge of 667% by the end of February, according to security firm Barracuda Networks (Muncaster, 2020). COVID-19-themed phishing attacks were in the form of scams (54%), brand impersonation (34%), blackmail (11%) and business email (1%). In April 2020, Google blocked more than 18 million COVID-19-related emails consisting of malware and phishing and 240 million COVID-related daily spam messages (Musil, 2020). Approaches to mitigating phishing have focused mainly on two control measures: technological controls and user education. Mass phishing attacks have to a large extent gone the route of becoming spam, thus relying on the server-side filter technologies to prevent them from reaching users (Ollmann, 2002). However, for decades, the information security literature has emphasised that relying on technology alone is insufficient to counter phishing threats today, because such attacks focus to a large extent on exploiting human vulnerabilities rather than technical vulnerabilities. For this reason, many information security scholars mention the phrase “humans are the weakest link” (Yan et al., 2018). This has resulted in efforts to make users aware of phishing by improving security awareness, training and education programs (Volkamer et al., 2018). However, while it has been shown that security education training campaigns have indeed had an impact on user awareness of security threats, this has not produced the desired results as users who consider themselves to be aware of security threats have not demonstrated actual awareness (Caldwell, 2016). Furthermore, when faced with phishing, users may be preoccupied with other activities and thus not motivated to consider the security aspects associated with the threat (Moreno-Fernández et al., 2017). As such, to save time and effort, users may resort to various “cognitive shortcuts” when attempting to make decisions about the authenticity of a message (Vishwanath et al., 2011). This brings to the fore information processing as a variable which is considered in the current study. Today, the range of communication technologies available has expanded, especially in the mobile device market, to include instant messenger (IM) and social applications. Phishing is versatile as it is not only carried out in emails and on fake websites, but also in other environments such as in text messages and on social networking sites (SNSs) (Aleroud and Zhou, 2017; Vishwanath, 2015a). While users appear to be aware of phishing emails impersonating financial institutions (Frauenstein, 2018), many may be unaware of modern social network threats and associated methods (Fire et al., 2014, Sophos, 2011). Krombholz et al. (2015) point out that users’ awareness of SE on SNSs is still comparatively low compared to emails. There is currently no universally accepted term for phishing conducted on SNSs. As such, phishing on SNSs is sometimes referred to as social phishing (Jagatic et al., 2007), social media phishing (Vishwanath, 2015a) or social network phishing (Frauenstein and Flowerday, 2016). Phishing conducted on SNSs reaches a far wider audience than the traditional email phishing, consequently affecting both businesses and consumers (Wilcox and Bhattacharya, 2015). The core SE principles employed in traditional phishing emails have also expanded to social network environments (Frauenstein and Flowerday, 2016; Tsikerdekis and Zeadally, 2014). According to Vishwanath (2015a, 2015b), social network phishing attacks are multi-staged whereas email phishing is single-staged, although both share common techniques. Like phishing emails on SNSs phishers exploit the technical features offered, creating fake accounts and distributing malicious content (Fire et al., 2014). Phishers may take advantage of controversial or significant events that garner public interest or trigger emotions by creating clickbait posts on SNSs that “attract attention and encourage visitors to click on a link to a particular web page” (Chen et al., 2015). Attackers have been using SNSs to launch attacks on organisations by using various methods, including phishing, clickjacking, financial abuse, identity theft, impersonation, and physical crime. In addition to this, social network users are exposed to other risks such as cyberbullying, sexting, embarrassing photos, public sharing of locations, and the spread of dangerous pranks and games (Algarni et al., 2017; Branley and Covey, 2018; Reznik, 2013). Facebook users in particular are at more risk to focused attacks such as spear phishing and click jacking (Adewole et al., 2017; Algarni et al., 2017). In South Africa, the rapidly growing Facebook group #ImStaying was established to create unity in a country that had experienced political and economic instability. Members post uplifting messages to inspire hope in others. However, anecdotal evidence suggests that groups such as these could be lucrative targets for cyber criminals who may conduct malicious SE attacks and steal personal or confidential information (McKane, 2019). This might be because social network users who join particular social network groups typically share common interests and exhibit similar behaviours. In the case of #ImStaying, as these members are generally like-minded and positively disposed, they may be open to giving out their personal information such as their mobile number on these groups to help others in need, which in turn can be used by social engineers to conduct further attacks. Millions of different email addresses can be collected by phishers simply by using the usernames of members of SNSs (Polakis et al., 2010). Despite these risks, SNSs lack effective techniques for predicting, detecting or controlling SE attacks (Algarni et al., 2014). In addition, there generally appears to be inadequate or outdated laws to deal with the Internet identity theft and online impersonation prevalent on SNSs (Reznik, 2013). Social network users, on their part, exhibit unsafe behaviours that range from failing to implement privacy controls, clicking on links originating from seemingly trustworthy sources, and not giving enough attention or thought to the content of messages. Research has shown that the activities performed on SNSs reveal specific personality characteristics (Waheed et al., 2017) and in these contexts, attacks that exploit certain personality types in victims have been found to be successful (Parish et al., 2009). Specific types of users may be more vulnerable than others to particular forms of persuasion techniques employed by phishers (Lawson et al., 2018; Pattinson et al., 2011). On SNSs, user interaction with content is mainly click-based and information is presented spontaneously with little cognitive effort required on the part of the user. This adds another dimension to research in information security, as users may overlook suspicious messages by resorting to a heuristic approach instead of a systematic approach to processing information. This may be attributed to the design of the underlying software of the SNS itself, in that it relaxes users and thus could make them less aware of the potential risks of being deceived (Tsikerdekis and Zeadally, 2014). This section highlighted the inadequacy of current methods for addressing phishing, especially in the case of SNSs. Phishing programmes and the literature focus on training users to identify phishing emails and spoofed websites, but little attention has been given to social network phishing and other influential factors and their effects on user information processing (Vishwanath, 2015b). Furthermore, there is a lack of research on the individual differences that lead to susceptibility to online scams (Williams et al., 2017). This study shows that the techniques used in phishing emails can also be employed on SNSs, thus calling attention to the need for future phishing attack definitions and for taxonomies to be redefined. Importantly, this study proposes a theoretical model that can help identify the types of user who are more likely to be susceptible to phishing on SNSs and is an essential step towards improving online security.

Theoretical background

Phishing victimisation is a behavioural problem and, as such, researchers have focused mainly on understanding the factors that influence user behaviour (Wright and Marett, 2010). Various studies report that users’ intentions to behave securely may differ from their actual security behaviour (Guo et al., 2011). Furthermore, it is difficult to predict user behaviour even when users have knowledge and awareness of security threats (Halevi et al., 2013), as some users willingly give up sensitive information despite their awareness of these threats (Workman, 2008a). Users who perceive themselves to be competent in using computers are just as likely to be phished as those who are not (Vishwanath et al., 2011). It has also been shown that users’ attitudes to risk do not correlate with them being more or less vulnerable to phishing (Halevi et al., 2013). In this regard, Yan et al. (2018) maintain that identifying ordinary users as the weakest link is too general, and that specific users should be determined through quantitative assessment. Moreover, Williams et al. (2017) recommend that further research be conducted on the influential factors that affect user behaviour. As such, this study follows this recommendation by identifying particular users susceptible to social network phishing by their personality traits, as this is one of the factors that have recently been found to influence user behaviour (Shropshire et al., 2015). Moreover, based on personality traits, this identified the processing “mode” users would choose when confronted with phishing on SNSs.

Persuasion on social network sites

The strength of phishing lies in its use of SE techniques to manipulate the victim to carry out actions that are unsafe or to divulge confidential information (Mitnick and Simon, 2002). This can be effectively achieved by impersonating trustworthy or reputable sources such as a financial institution, government agency or the victim's own employer organisation. Phishers also make use of visual cues by replicating corporate logos and slogans of organisations to increase the users' trust in the message (Moreno-Fernández et al., 2017). The content and arguments in the body of the message can also effectively trigger human emotions (e.g. fear or excitement) and influence cognitive abilities, a ploy that is reinforced by the use of persuasion principles. Behavioural vulnerabilities can be exploited through persuasion such as gullibility and optimistic bias (Bullée et al., 2015). Phishers also take advantage of current and popular events, beliefs, prize offers, religion and politics to obtain a response from the victim. These techniques can influence information processing by the victim, who may not give sufficient attention to validating the authenticity of the message (Vishwanath et al., 2011). Cialdini (2007) identified six key principles of persuasion, namely, reciprocity, commitment or consistency, social proof or conformity, authority, liking, and scarcity. While these techniques have been used in phishing emails, they can also be employed on SNSs (Algarni et al., 2014). This section demonstrates how effective these principles can be in persuading users to perform certain actions on SNSs. The images used in each of the persuasion principles are real-world cases personally obtained by the researcher.

Reciprocity

A message is made to appear helpful and thus the user feels obligated to do something in return; for example to share a message warning others that there is a possibility that their Facebook account could be hacked. Fig. 1 gives an example of how this technique is used in Facebook messenger.
Fig. 1

Reciprocity principle applied in Facebook Messenger

Reciprocity principle applied in Facebook Messenger Fig. 1 is not considered an example of social network phishing but rather of the hoax messages found on Facebook. However, such hoax messages could effectively lead to phishing if the user is requested to click on a link with a message stating, “Click on the link to see if your profile has been hacked too”. Users might comply with the instruction especially if the message originates from a trusted friend. Facebook responses such as complimenting, commenting on, or liking another user's posts can contribute towards developing a relationship between users, thus encouraging them to accept each other's requests (Algarni et al., 2014).

Commitment or consistency

The commitment principle refers to the likelihood of dedicating oneself to a cause or idea after having made a promise or agreement to do something (Cialdini, 2007). Typically, once people have made a choice to commit to something, they will encounter personal and interpersonal pressures to behave consistently with that commitment. According to Cialdini (2007), such pressures will cause people to respond in ways that justify their original decision to commit. Further, people will be more confident in their decision to commit especially if they make it known publicly (Ferreira et al., 2015). In this regard, SNSs could be perceived by users as a suitable platform for making their commitment to something known.

Authority

The authority principle is the most used persuasion technique in phishing (Akbar, 2014). Messages designed to appear as if they originate from an authoritative or trustworthy entity (e.g. a bank, or from the recipient's employer or a friend) may persuade users to feel obligated to obey or respond to requests. This is because social learning encourages people not to question authority and therefore they are conditioned or may feel obligated to respond (Ferreira et al., 2015). On SNSs, this technique may be effective if the attacker has created an attractive profile or page with fabricated information intended to make it appear legitimate. The fake profile may also have many followers, mutual friends, recent updates and interesting photos, thus increasing the user's trust. Alternatively, the attacker could impersonate a public figure, clone a profile or pretend to be someone that the victim may trust (Stajano and Wilson, 2011). An earlier study by Jagatic et al. (2007) found that subjects were more likely to respond when the phishing email appeared to have been sent by a friend. In Fig. 2, a well-recognised multinational retail company, is impersonated on Facebook with a claim to offer free shopping vouchers. Persuasion is further enhanced by creating urgency as the fake shopping voucher is only valid for a limited period.
Fig. 2

Authority principle applied in Facebook

Authority principle applied in Facebook

Social proof or conformity

The tendency to imitate the behaviour of members of a group is known as social proof. People will comply with a request if they see others have also complied (Cialdini, 2007). For example, a message is shared on Facebook by the user's friends and the user in turn shares the post with others in his or her social network. In Fig. 3, the message preys on users’ Christian beliefs, as the message includes an image of Jesus and requests the user to “share me”. In view of the sentiments expressed in the message, it may go against subjective norms if users choose to ignore such requests. The use of the reciprocity technique is also evident in this example.
Fig. 3

Social proof principle applied in Facebook Messenger

Social proof principle applied in Facebook Messenger

Scarcity

A message that incorporates “scarcity” may create a sense of urgency by putting the user under pressure to act. The user may respond in order to avoid missing out on an opportunity, a product, a service, or information, especially if it has limited availability (Bullée et al., 2015). Urgency can be enhanced by adding a consequence or a timeframe to the message (e.g. a special discount or a prize valid for a certain period), as seen in Fig. 2. In Fig. 4, persuasion is further enhanced by impersonating the internationally known American comedian Ellen DeGeneres, thus taking advantage of the principle of authority. Evidently, users responded quickly to the request after which they received further instructions to register their name and to download a movie. In order to become a winner, users were required to click on the shortened URL link concealing the site that the user was directed to. It is apparent that the incorrect spelling of Ellen's name did not affect the trust of the respondents.
Fig. 4

Scarcity principle applied in Facebook Messenger.

Scarcity principle applied in Facebook Messenger.

Liking

People may be persuaded to obey others if they display certain favourable or familiar characteristics (Ferreira et al., 2015). SNSs provide an environment that encourages “liking”, as there are built-in features that allow the user to indicate their support for posts by means of a reaction such as “liking” or emotion indicators. People typically like or prefer to be associated with people who are similar to them in terms of personal interests, attitudes, beliefs, opinions, backgrounds, personality types and so on (Bullée et al., 2015). For example, a Facebook user may receive an invitation to accept a friend request but before accepting the request, he or she may seek information on the sender in relation to the number of friends they have in common, photo albums, occupation and where they live. If there are characteristics that the user likes, they may decide to accept the invitation or comply with a request. If the user agrees strongly with the sender on something important to them, the likelihood of responding increases. Phishers take advantage of current affairs, controversial news and events reported in social media, thus preying on users’ interests and curiosity. (Krombholz et al., 2015) note that “curiosity” is a technique overlooked by Cialdini (2007). However, curiosity has been equated with an openness to experience personality trait (McElroy et al., 2007). Fig. 5 shows how the curiosity technique can be employed on Facebook messenger.
Fig. 5

Curiosity used to entice victims applied in Facebook Messenger

Curiosity used to entice victims applied in Facebook Messenger Heartfield and Loukas (2015) classified this type of an attack as an instant message phishing. In Fig. 5, the effectiveness of this technique is enhanced by visual cues, as the message includes the statement “really” with a shocked emotion icon, as well as an exact image of the victim's profile picture. It also prompts the user's attention and creates urgency as it indicates that hundreds of thousands of users have already viewed the video. Although not considered to be part of Cialdini's persuasion taxonomy, this technique could use “fear” in order to create urgency (Workman, 2008b). Interestingly, user training interventions have made use of “fear appeals” as a means to counteract phishing attacks (Jansen and Van Schaik, 2018, Schuetz et al., 2016). In these scenarios, if the persuasion principles are used in combination it may influence the way in which the user responds. For example, Lawson et al. (2017) found that a combination of authority and scarcity persuasion principles was most likely to arouse suspicion in relation to phishing emails. Furthermore, the context in which persuasive techniques are executed can also play a substantial role in the success of a SE attack (Bullée et al., 2015). As a result, identifying which persuasion techniques users in general are more likely to fall victim is difficult. Accordingly, as the phishing literature suggests, it is important to consider users’ personality traits as another vulnerability factor (Parish et al., 2009).

The Big Five personality traits

Personality traits describe individual differences in terms of characteristic thoughts, feelings and behaviours (Funder, 2001). Personalities are unique to each individual as they are predominantly determined by genetics, social and environmental influences, and experiences (McCrae and John, 1992). Personality characteristics are integral to the way humans think and behave, and therefore have an influence on whether or not an individual is likely, be it intentionally or unintentionally, to become involved in malicious activities or risky behaviour (Nurse et al., 2014). Personality is considered a leading factor in understanding why people behave as they do on the Internet (Amichai-Hamburger, 2002). Personality traits are also influenced by gender differences which subsequently affect Internet usage behaviour (Amichai-Hamburger and Ben-Artzi, 2000). Prior literature has also investigated personality traits and its influence on social network use (Amichai-Hamburger and Vinitzky, 2010, Correa et al., 2010, Moore and McElroy, 2012, Ryan and Xenos, 2011). Personality traits can also predict the security behaviour intentions of users towards protecting their computer devices (Gratian et al., 2018) and can also have a significant effect on perceived trust and risk, thus affecting decision making (Cho et al., 2016). Research involving personality traits has been a topic of interest for a number of decades, with several rating instruments applied in many studies across various disciplines and contexts (Costa and McCrae, 1992; John and Srivastava, 1999). Scholars, particularly in the psychology domain, continue to explore a variety of focus areas within personality trait research. For example, anxiety and anger, which are among the neuroticism personality traits, are positively associated with risky driving behaviour (Yang et al., 2013). In the information security domain, studies that involve personality traits have gained the interest of scholars, as certain traits are considered important predictors of human behaviour (Albladi and Weir, 2017; Gratian et al., 2018). Of the many types of personality scales scholars can adopt, the Big Five has been noted as the most widely accepted as it shows consistency across time, culture and age groups and is considered more structured as the five traits do not overlap with each other (Erder and Pureur, 2016). The five-factor model (FFM), consisting of the “Big Five” personality traits, is the most widely used and extensively researched model of personality (John and Srivastava, 1999; McCrae and Costa Jr, 1999). It comprises the five empirically derived factors or dimensions of openness, conscientiousness, extraversion, agreeableness and neuroticism, which are usually represented by the acronym OCEAN or CANOE. Now known as the “Big Five”, has resulted from numerous improvements, refinements and iterations which have led to a wide array of personality scales. On the other hand, prior literature has also examined the “Dark Triad” personality traits, consisting of psychopathy, machiavellianism and narcissism, and its influence on the behaviour of Facebook users (Lopes and Yu, 2017). Combining the descriptions of the Big Five personality traits given by (Zhang, 2006; John and Srivastava, 1999; Rolland, 2002), each of the five personality traits are described as follows: Openness to experience is the personality trait related to people who are open-minded and seek new experiences, have an active imagination, and focus on intellectual pursuits. They tend to be independent of judgement and have an appreciation for art, nature and different ideas and beliefs. Conscientiousness refers to individuals who are honest, trustworthy, neat and hardworking. They have self-discipline, are goal-oriented, are prudent and tend to follow the rules, standards and procedures. Extraversion is the personality trait attributed to individuals who tend to experience positive emotions such as excitement. They prefer to work with others and tend to be sociable, energetic, talkative, assertive, impulsive and dominant. Agreeableness is attributed to individuals who are tolerant, compassionate, modest, polite, cooperative and trusting of others, as they believe that the people they interact with are generally well intentioned and honest. They also value and respect other people's beliefs and conventions. Neuroticism is the opposite of emotional stability and is attributed to individuals who tend to experience negative emotions such as pessimism, embarrassment and guilt. Such people are generally sad or nervous, and sometimes hot-tempered, and tend to have low self-esteem. Pertaining to Cialdini's principles of persuasion mentioned earlier, prior research investigated whether certain users, based on their personality type, may be more susceptible to specific persuasion techniques (Gkika et al., 2016). Others investigated personality traits and the influence persuasion strategies has on users detection of phishing emails (Butavicius et al., 2015; Lawson et al., 2018; Lawson et al., 2017; Oyibo et al., 2017; Uebelacker and Quiel, 2014). Researchers have also focused on exploring the influence of gender and personality traits on phishing susceptibility (Halevi et al., 2013; Mayhorn et al., 2015; Parish et al., 2009; Pattinson et al., 2011; Sumner et al., 2011). Halevi et al. (2013) examined the relationship between the Big Five personality traits and email phishing responses, as well as how these traits affect users' privacy behaviour on Facebook. Their study revealed that 17% of the respondents had been “phished” and found a correlation between gender and personality traits. For women, a very high correlation to neuroticism was found, while for men no correlation was found to any personality trait, although neuroticism and openness had an inverse correlation to extraversion. Halevi et al. (2013) found that the tendency to share information on Facebook correlated mainly with openness, while Halevi et al. (2015) found conscientiousness to be most at risk to spear phishing. Pattinson et al. (2011) investigated the behavioural responses of users when presented with phishing emails and found that those with the personality traits of extraversion and openness were better at detecting phishing emails. However, studies by Albladi and Weir (2017) and Lawson et al. (2017) presented opposing findings as they found that high extraversion increased susceptibility to phishing attacks. Furthermore, Alseadoon et al. (2015) found that openness, extraversion and agreeableness increase user tendency to comply with phishing email requests. These contradictions were noted by Albladi and Weir (2017), who found that conscientiousness, agreeableness and neuroticism significantly decrease the user's susceptibility to phishing on SNSs. They propose that other factors mediate the involvement of personality traits such as the individual's competence level, motivation to use the services of social networks, trust in social network members and providers, and users’ experience of cybercrime (Albladi and Weir, 2017). Although “scepticism” is not regarded as a Big Five trait, in the cyberworld it would be preferable if users could adopt this trait, as a “trust no one” approach may encourage users to exercise more caution when receiving requests. In the current study, we explored whether information processing could be one of the mediating factors influenced by personality traits.

Information processing – heuristic vs systematic

As phishers constantly improve the authenticity of spoofed websites, the visual discrepancies between spoofed websites and their original counterparts are often difficult for users to detect. Prior studies have referred to existing theories and have designed models to understand the phenomenon of phishing (Algarni and Xu, 2013). Vishwanath et al. (2018) state that social-psychological research on phishing has identified a lack of cognitive processing as the main reason for individual victimisation. Persuasion is one of the key factors that influence information processing in online environments (Guadagno and Cialdini, 2005). The effectiveness of persuasive communication increases if the message is relevant to the target audience (Petty and Cacioppo, 1986). As this study also posits that social network users are vulnerable to phishing because they do not process persuasive messages with enough circumspection, theories and models related to information processing were considered. In this context, popular persuasion theories and models include the Elaboration Likelihood Model (ELM), the Heuristic-Systematic Model of information processing (HSM) and Social Judgement Theory (Cameron, 2009). Recently, the HSM has received favourable attention from information security researchers as a suitable theoretical framework for understanding victimisation by phishing (Harrison et al., 2016; Luo et al., 2013; Valecha et al., 2015; Vishwanath, 2015b; Vishwanath et al., 2018; Zhang et al., 2012). An earlier study by Furnell (2007) presented participants with 20 messages and asked them to judge the authenticity of each message. Participants subsequently gave insights on the aspects that influenced their choices. According to Furnell (2007), most of the responses could be classified as follows: visual factors (i.e. logos, symbols such as copyright and trademarks, font styles), technical indications (i.e. URL in messages, using “https”), and language and content characteristics of the messages (language errors, presence/absence of recipient details, style of the message). Furnell (2007) notes that despite these useful insights, participants often arrived at “incorrect conclusions”. Although Furnell's study did not investigate information processing, it highlights that in evaluating the message, users took a heuristic route, focusing more on visual characteristics than on the quality of the argument in the message. Ironically, phishers use visual characteristics to their advantage with the aim of enhancing users’ trust. As pointed out earlier, persuasion is one of the means by which phishers successfully trick their victims. The HSM is a model that originated from persuasion research in social psychology (Eagly and Chaiken, 1993) and attempts to explain individual information processing and attitude formation in persuasive contexts. Dual-process models, such as the ELM and the HSM, are the most influential persuasion paradigms (Crano and Prislin, 2006). Both propose two significant approaches to persuasion: the central route (i.e. systematic) and the peripheral route (i.e. heuristic). Scholars have used the ELM, designed by Petty and Cacioppo (1986), to describe how cognitive processing influences deception (Vishwanath et al., 2011). The key difference between the two models is that the HSM recognises that the two distinct modes of thinking about information can co-occur, while the ELM suggests information processing occurs on a continuum. According to Harris and Yates (2015), users evaluate phishing based on two main criteria: the visual quality of the message and the quality of the message argument, of which the latter requires more effort to make a decision. Visual quality is concerned with aspects related to source address, company logos, grammar, context and the instruction given in the message (Wang, Chen, & Rao, 2012). Compared to systematic processing, Eagly and Chaiken (1993) explain heuristic processing as “a limited mode of information processing that requires less cognitive effort and fewer cognitive resources” (p. 327). Heuristic processing is focused on simple decision prompts, often termed “rules of thumb”, and follows when people lack motivation or cognitive resources. This mode of processing occurs at a shallow or surface level, allowing the receiver to form judgements based on certain factors or indicators such as trustworthiness, appeal and the length of the message (Cameron, 2009) – all of which are vital SE techniques used by phishers. Luo et al. (2013) add that heuristic processing takes advantage of the factors mentioned above for the user to conduct a swift validity assessment. In contrast, Luo et al. (2013) state that systematic processing takes place when users thoughtfully analyse the content of the message and perform further investigations to validate its authenticity. Workman (2008a) states that phishing messages are typically designed to decrease systematic processing. Ideally, systematic processing would be the preferred method when users are engaged on SNSs. However, this type of processing requires more effort, time and cognitive resources. Systematic processing not only depends on one's capacity to think critically but also on other factors such as one's existing knowledge, self-efficacy in obtaining relevant information and the perceived usefulness and credibility of available information (Griffin et al., 2002). Moreover, users may be involved with other information-seeking activities, using different software applications, which distracts them. In this regard, Ivaturi et al. (2014) suggest that users may not be in the correct frame of mind when presented with security attacks, thus leaving them vulnerable. Moreover, as SNSs include both asynchronous (i.e. personal messages sent within the SNS) and synchronous (i.e. embedded chat functions within the SNS) modes of communication (Kuss and Griffiths, 2011), this too can distract users. Taking this into consideration, users may limit systematic processing unless they are motivated to do so (Chen et al., 1999). If users consider determining the validity of a phishing message on an SNS as being too time-consuming, difficult or unimportant, this may influence them to resort to heuristic processing. Human emotions may also interfere with the users’ judgement of message content (Workman, 2007). Moreover, personality traits can also influence these decisions. Cho et al. (2016) found that the personality traits of agreeableness and neuroticism can affect decision making, as these traits have a significant influence on whether these users perceive information as either trusted or distrusted. Ideally, if users were to systematically process the information they receive, checking it for validity and paying attention to visual cues, there would be fewer phishing victims.

Theoretical model and hypotheses

In the previous section, the literature discussed the relationships between personality traits and their effect on phishing susceptibility, and in doing so revealed contradictory findings. Moreover, a paucity of research was found that investigated the relationship between personality traits and information processing. Vishwanath (2015b) states that decades of empirical research have failed to show any relationships between the Big Five personality traits and information processing. However, prior research has not investigated these aspects in a social network and phishing context. As a result, the formulation of hypotheses for the present study was affected by the following limitations: 1) contradictory findings in the literature on the effects personality traits have on phishing susceptibility and 2) prior literature has examined personality traits and information processing separately from each other. It is the second of these limitations to which the present study makes a contribution. As a result, hypothesis formulation relied mainly on prior literature that described the characteristics of personality traits, and on literature, albeit contradictory, that examined their influence on users when presented with phishing (outlined in Section 2.2). Based on this explanation this study hypothesises the following: H1a: Extraversion has a positive influence on heuristic processing. H1b: Extraversion has a negative influence on systematic processing. H2a: Agreeableness has a positive influence on heuristic processing. H2b: Agreeableness has a positive influence on systematic processing. H3a: Conscientiousness has a negative influence on heuristic processing. H3b: Conscientiousness has a positive influence on systematic processing. H4a: Neuroticism has a negative influence on heuristic processing. H4b: Neuroticism has a positive influence on systematic processing. H5a: Openness has a positive influence on heuristic processing. H5b: Openness has a negative influence on systematic processing. H6: Heuristic processing will increase the likelihood of susceptibility to social network phishing. H7: Systematic processing will decrease the likelihood of susceptibility to social network phishing. In summary, the proposed theoretical model in Fig. 6 consists of three major components, personality traits, information processing, and phishing susceptibility, with hypothesised associations. The personality traits comprise five latent variables (Big Five) proposed to each have an influence on information processing. Information processing is comprised of heuristic and systematic processing and proposed to have an effect on the likelihood of an individual falling victim to phishing on SNSs.
Fig. 6

The proposed model

The proposed model

Methodology

Sample and data collection

Our sampling frame was a convenience sample drawn from final-year undergraduate students enrolled in various courses at a South African university located across three different sites in the Eastern Cape province. The total population consisted of 587 final year engineering students. As this study aimed to achieve a 95% confidence level, a minimum of 234 users were required (Kothari, 2004). The choice of students was based on the following reasons. Firstly, students are actively engaged on SNSs (Dixit and Prakash, 2018). Secondly, the choice of final year students, instead of any particular level of student, was based on the notion that they may bring security risks to the organisations that they anticipate working for in the following year. Finally, university students are more susceptible to email phishing attacks (Bailey et al., 2008). SurveyMonkey®, an online survey tool, was used to collect primary data. Approval was granted by the university where the target sample was located. We managed to collect data from 285 respondents, of which seventy cases had incomplete responses and were removed from the analysis. The final sample consisted of a total of 215 respondents of which 114 were male (53%) and 101 were female (47%). Respondents had a mean age of 22.6 years (S.D. = 4.41). Sheng et al. (2010) found participants in this age group were more likely to fall victim to phishing than people of other ages.

Common method variance

As a self-reported questionnaire was the sole method used to collect data from the participants in a single-sitting, there is the prospect that the tested relationships among the constructs might be inaccurate caused by the effect of common method variance (CMV) (Podsakoff and Organ, 1986). CMV is “attributable to the measurement method rather than to the constructs the measures represent” (Podsakoff et al., 2003). As such, CMV can potentially lead to incorrect conclusions concerning the reliability and validity of the item scales measures. Two main approaches can help overcome CMV- procedural and statistical. The procedural or preventative approach (an ex-ante technique) is the most preferred and is applied early in the research design stage. The statistical approach (an ex-post technique) is conducted in the empirical stage to detect or possibly eliminate CMV (Chang et al., 2010, Podsakoff et al., 2003). Following the guidelines of Podsakoff et al. (2003), we employed the following procedural strategies in this study to minimise CMV. An initial version of the survey was pilot-tested to establish whether the research instrument could be considered reliable. Respondents were instructed to provide feedback relating to any misinterpretations about what the questions expected of them. To ensure that the survey was clear and unambiguous, we included synonyms in parenthesis where necessary, for some of the personality scale items. For example, “can be tense (i.e. nervous, anxious)”. To encourage honest responses, the respondents were informed of the purpose of the study, participation was voluntary, that there are no right or wrong answers, and that they could withdraw from the survey at any time. Data was collected anonymously and no identifiable personal information was requested from the respondents. For the statistical approach to detect if CMV exists, we performed two tests. First, we conducted the Harman's single-factor test by including all the variables in a principal component factor analysis (Podsakoff et al., 2003). If the total variance for a single factor is less than 50%, it suggests CMV to be of no concern. Our results show that the largest variance explained by a single factor was 10.76% indicating that none of the emergent factors could explain the majority of the covariance. Second, Bagozzi et al. (1991) suggested that CMV can have an effect on the discriminant validity of the constructs. As such we examined the correlation matrix (in Table 2) to determine whether any of the correlations between any pair of constructs exceeded 0.9 – this procedure was also performed by Pavlou et al. (2007). As the correlations were below 0.9, this suggests that CMV is unlikely to be a significant issue (Bagozzi et al., 1991).
Table 2

Discriminant validity of constructs.

Constructs12345678
1. Extraversion0.526
2. Agreeableness0.1770.437
3. Conscientiousness0.1200.0500.536
4. Neuroticism0.0060.0160.0430.479*
5. Openness0.2180.1300.1650.0270.534
6. Heuristic Processing0.0100.0380.0090.0570.0270.652
7. Systematic Processing0.0350.0710.0210.0280.0800.1910.708
8. Phishing Susceptibility0.0000.0130.0010.0020.0010.0810.0151.0

Note: the square root of the AVEs are represented in bold, as appearing down the diagonal

Indicates item rounded off to 0.5

Variable descriptions and measures

The measures and individual items for personality traits and information processing were adopted from prior studies as they had been proven to be statistically reliable. The variables are discussed in further detail.

3.3.1. Personality traits

The public domain instrument known as the Big Five Inventory (BFI) scale test by John and Srivastava (1999) was used to determine the personality traits. This instrument (see Appendix A) consists of 44 items scored on a five-point Likert scale (1 = Disagree strongly to 5 = Agree strongly). The test determines into which of the five personality traits a person's personality predominantly fits. The personality test has been shown to have solid psychometric properties when compared to other even more comprehensive personality tests (John and Srivastava, 1999).

3.3.2. Information processing

In the survey instrument, this section consisted of six stimuli/images of a social network phishing-related message (i.e., persuasive message) found on Facebook and personally obtained by the researcher. As mentioned earlier, persuasion is increased if the message is relevant to the audience (Petty and Cacioppo, 1986). As the respondents were students and accustomed to engaging on SNSs using their mobile devices, the stimuli used were screenshots derived from the Facebook smartphone apps. None of the screenshots contained spelling errors which the literature recommends as one of the cues that may assist in identifying phishing. As the primary focus of the study was not to determine which persuasion principle is most effective, not all persuasion principles were tested. As reported in Table 1 , the screenshots illustrated that a particular action was required from the user (e.g. to click on play). The purpose of including a variety of different phishing cases was to address the respondents’ potential bias as they might give more attention to some messages than others based on their interests or prior encounters. Heuristic processing was measured by adopting a four-item scale (see Appendix B) used in prior research (Griffin et al., 2002; Vishwanath, 2015b). Systematic processing was measured using a three-item scale (see Appendix B) adapted from prior research (Griffin et al., 2002; Vishwanath et al., 2011). Both the heuristic and systematic items were scored on a five-point Likert scale (1 = Disagree strongly to 5 = Agree strongly). The above-mentioned items in each stimulus were combined, thus consisting of a total of seven items per stimulus. Separating items according to whether they were heuristic or systematic could potentially influence respondents to respond in a way that they may consider morally acceptable rather than reflecting their true behaviour.
Table 1

The constructs and their descriptive statistics.

ConstructDescription of stimuliInstruction to userPersuasion Principle(s)ItemsMeanS.D.Factor LoadingCR
InfoP1Opportunity to win a free store voucher worth R1500. The voucher contains an expiry date.Click/ShareAuthority and scarcity13.261.40.8790.73
23.871.26.800
331.57.626
42.751.50.738
53.341.43.591
63.291.60.544
73.301.50.649
InfoP2Owner is giving an opportunity for others to win a Mercedes-Benz vehicle. Two lucky giveaways. The draw claims to take place in the next two days.Comment, Like and ShareScarcity and social proof13.161.52.8830.70
23.781.37.807
33.291.56.519
42.601.51.724
53.351.44.446*
63.371.57.349*
73.201.50.518
InfoP3RIP: Breaking News of famous local athlete Caster Semenya died in a car accident. Video claiming to show footage of the accident.Click linkCuriosity13.181.48.9200.60
23.681.37.780
32.661.53.680
42.521.43.828
53.221.30.523
63.141.54.511
73.041.54.643
InfoP4Opportunity to have financial freedom. Image shows a proof of payment received.Comment with personal info (i.e. contact number)Scarcity and social proof13.301.61.8120.74
23.361.56.686
32.731.62.412*
42.881.60.616
53.131.59.513
63.011.65.366*
72.911.62.500
InfoP5Video claiming a drunk woman appearing to be raped – 15 216 215 viewsClick playCuriosity13.201.59.8380.70
23.221.60.675
32.241.48.569
42.841.66.835
53.041.58.500
62.651.67.345*
72.671.57.510
InfoP6Shocking video of a 16-year-old girl allegedly being raped at Makeni.Click playCuriosity13.241.59.8900.73
23.271.57.678
32.381.52.538
42.671.56.807
53.001.57.424*
62.831.57.391*
72.861.58.408*
Personality TraitExtraversion13.761.18.5220.70
63.561.17.828
114.150.94.566
163.740.94.751
212.661.39.660
264.100.96.716
312.431.31.743
363.561.28.681
Personality TraitAgreeableness23.531.24.8820.57
74.481.02.793
124.310.91.835
174.350.99.697
223.841.11.806
273.041.34.796
324.390.89.671
373.951.38.749
424.250.91.632
Personality TraitConscientiousness33.951.01.7270.70
82.951.30.659
134.310.91.597
183.591.29.562
233.331.39.629
284.170.99.754
334.150.79.677
383.841.07.740
432.831.43.796
Personality TraitNeuroticism42.021.20.8650.73
92.041.15.673
143.411.26.656
193.441.43.674
242.271.34.674
292.821.47.735
342.121.14.707
393.081.46.556
Personality TraitOpenness54.090.96.5990.72
104.430.78.749
153.790.99.650
204.340.82.619
253.511.02.662
303.911.10.739
352.041.08.875
403.961.00.479⁎⁎
412.591.25.779
443.381.35.733

Items < 0.5 factor loading were dropped;

item rounded off to 0.5.

The constructs and their descriptive statistics. Items < 0.5 factor loading were dropped; item rounded off to 0.5.

3.3.3. Phishing susceptibility

Fig. 7 depicts a screenshot of a phishing email personally received by the researcher, which was subsequently used in the survey to test phishing susceptibility.
Fig. 7

Phishing email purportedly originating from Facebook

Phishing email purportedly originating from Facebook Evidently, the email depicted in Fig. 7 is designed to appear as if it originated from Facebook with the address being update@facebookmail.com. It also employs the blue theme typically associated with Facebook branding. The purpose of this variable was to test susceptibility to phishing directly and for this purpose a multiple-choice item scale was used (see Appendix C). In the analysis, we employed Generalised Structural Equation Model (GSEM), taking into account the binary dependent variable which we created on testing phishing susceptibility (coded as 0 = Not susceptible; 1 = Susceptible). The items: "Reply to the email" and "check the attachment because I am interested to know what my friend has to say" were considered to be items related to phishing susceptibility. Not susceptible was represented by the items: "Immediately delete the email", "Ignore the email" and "I do not trust this email". The item "Unsure" was considered to be a missing observation as it does not inform the exact position of the respondent's choice.

Data analysis

Structural Equation Modeling (SEM), also referred to as path analysis, is known for representing causal relations in multivariate data in the behavioural and social sciences disciplines (McDonald and Ho, 2002). SEM provides a way to test the relationships among observed and latent variables holistically and allows for theory testing even when experiments are not possible (Savalei and Bentler, 2006). The statistical software package, STATA® 14, was used in this study to conduct data analysis. Likert scales were predominantly used and are typically regarded as observed variables represented graphically by squares or rectangles (Schreiber et al., 2006), while unobserved variables are termed latent factors or constructs and are depicted graphically by circles or ovals (Schreiber et al., 2006). SEM consists of two main parts, the measurement model and structural model (Civelek, 2018); Hair Jr, Hult, Ringle, & Sarstedt, 2017). McDonald and Ho (2002 state that the latter is a composite of the measurement and path models.

Measurement model assessment

The measurement model is a conventional confirmatory factor model that represents a set of observable variables as multiple indicators of a smaller set of latent variables (McDonald and Ho, 2002). In simpler terms, the measurement model pertains to how observed variables relate to unobserved variables. In SEM, the measurement model corresponds to confirmatory factor analysis (Civelek, 2018). Owing to the alpha limitations, it is technically more appropriate for researchers to apply composite reliability (CR) values because this takes into consideration the different outer loadings of the indicator variables (Jr et al., 2017)). Much like Cronbach's alpha, CR values exceeding 0.7 as shown in Table 1, are deemed acceptable for reliability (Chin, 1998). Convergent and discriminant validity are both considered subcategories of construct validity. Firstly, the convergent validity of the items was examined by the factor loadings and composite reliability (CR). Factor loading exceeding 0.5 demonstrated acceptable convergent validity (Civelek, 2018). Items loading less than 0.5 were dropped from the model. Secondly, for discriminant validity we used the Fornell-Larcker criterion by examining the square roots of the average variance extracted (AVE) against the correlation coefficients of the latent variables (Fornell and Larcker, 1981). For adequate discriminant validity, the norm is that the square root of each construct's AVE should be greater than its highest correlation with any other construct (Jr et al., 2017)). Table 2 shows the correlation matrices and their discriminant validities. Discriminant validity of constructs. Note: the square root of the AVEs are represented in bold, as appearing down the diagonal Indicates item rounded off to 0.5

Structural model assessment

As noted earlier, the structural model is based on the measurement model (Civelek, 2018). The goal of path analysis, and more generally of SEM, is to determine how well the proposed model, which is a set of specified causal and non-causal relationships among variables, accounts for the observed relationships among these variables. To evaluate the proposed model constructs, the structural model incorporated path analysis, which not only indicated the magnitude of the relationships between the constructs but also whether these relationships are statistically significant. Chin et al. (2003) state that researchers should not only indicate whether the relationship between variables is significant or not, but also report the effect size between these variables. This view is shared by Bowman (2017), who adds that all data analyses should report relevant effect size statistics because although p-values may explain statistical significance from the null, they are unable to offer insight into the magnitude of the actual size of an effect. The effect size (f2) informs whether constructs have a substantive impact on one another. In simple terms, effect size assesses the strength of the relationship between the latent variables and therefore helps researchers to assess the overall contribution of a research study (Sullivan and Feinn, 2012). The guidelines for assessing f2 are values of 0.02–0.14, 0.15–0.34, and 0.35 and above, which respectively represent small, medium and large effects of an exogenous latent variable on an endogenous latent variable (Sullivan and Feinn, 2012). Effect size values of less than 0.02 indicate that there is no effect. Table 3 reports on the path estimates, t-statistics, effect sizes and overall statistical significance.
Table 3

Path estimates and hypothesis outcomes.

TestedPathßSEt-Valuep-ValueEffect Size (f2)Outcome (based on p-Value)Outcome (based on f2)

H1aExtraversion→Heuristic0.0130.0790.1600.8730.000Not supportedNo effect
H1bExtraversion→Systematic0.0030.0780.0400.9680.000Not supportedNo effect
H2aAgreeableness→Heuristic0.152⁎⁎0.0742.0570.0410.020SupportedSmall effect
H2bAgreeableness→Systematic0.173⁎⁎0.0732.3600.0190.027SupportedSmall effect
H3aConscientiousness→Heuristic-0.155⁎⁎0.077-2.0220.0440.020SupportedSmall effect
H3bConscientiousness→Systematic0.0630.0760.8240.4110.003Not supportedNo effect
H4aNeuroticism→Heuristic0.163⁎⁎0.0702.3300.0210.026SupportedSmall effect
H4bNeuroticism→Systematic0.131*0.0691.8930.0600.017SupportedNo effect
H5aOpenness→Heuristic0.140*0.0811.7400.0830.014SupportedNo effect
H5bOpenness→Systematic0.172⁎⁎0.0802.1580.0320.022SupportedSmall effect
H6Heuristic→Phishing Susceptibility0.287⁎⁎⁎0.0733.9140.0000.072SupportedSmall effect
H7Systematic→Phishing Susceptibility-0.0050.073-0.0630.9490.000Not supportedNo effect

Note:

p < 0.1;

p < .05

; p < 0.001.

Path estimates and hypothesis outcomes. Note: p < 0.1; p < .05 ; p < 0.001. The path diagram illustrated in Fig. 8 shows the hypothesised associations and the corresponding beta (ß) values and p-values. Model fit determines the extent to which the proposed model fits the sample data (Schermelleh-Engel et al., 2003). Barrett (Barrett, 2007) controversially advocates for an outright ban on approximate fit indexes and posits that the chi-square (χ2) exact fit test is the only applicable test of model fit for SEM. The χ2 test statistic is the only goodness-of-fit measure that has an associated significance test, while all other measures are descriptive (Schermelleh-Engel et al., 2003). A non-significant χ2 result at >.05 threshold is desired to achieve a good fit between the variance and covariance matrix (Barrett, 2007). The χ2 test achieved an acceptable fit: χ2= 24.39, df = 16 and p = 0.08. In addition to the χ2 test, (Kline, 2016) recommends reporting the following approximate fit indices: the Root Mean Square Error of Approximation (RMSEA), the Standardized Root Mean Square Residual (SRMR) and the Comparative Fit Index (CFI). For each of the aforementioned approximate fit indicators, Hu and Bentler (1999), Schermelleh-Engel et al. (2003) and Hooper et al. (2008) provided a set of acceptable “rules of thumb” thresholds. These thresholds were considered in interpreting the various fit indices for the model.
Fig. 8

The structural model

The structural model The RMSEA determines to what extent the model, with unknown but optimally chosen parameter estimates, would fit the populations’ covariance matrix (Hooper et al., 2008). A RMSEA value of zero indicates the best result (Kline, 2016). However, a cut-off value close to .06 or a strict upper limit of .07 appears to be the acceptable norm (Hooper et al., 2008). The SRMR is an absolute fit index and is computed as the square-root of the difference between the residuals of the sample covariance matrix and the hypothesized model. Similar to the RMSEA, an SRMR value of zero indicates perfect fit (Hooper et al., 2008) and a value as high as .08 are deemed acceptable fit (Hu and Bentler, 1999). The CFI, an incremental fit index, assumes that all latent variables are independent of the model and compares the sample covariance matrix with the null model (Hooper et al., 2008). A CFI value exceeding 0.9 is required in order to ensure that “misspecified” models are not accepted (Hu and Bentler, 1999). Table 4 presents a summary of the approximate fit indexes with its associated threshold values.
Table 4

Goodness of Fit indices.

Fit IndicesModel ValueAcceptable standard
CFI0.911≥ 0.9
SRMR0.052< 0.08
RMSEA0.049≤ 0.08
Goodness of Fit indices.

Results

This section presents the results of the various statistical tests that were discussed in the previous section. Most results in Table 1 show an acceptable level of composite reliability as all the constructs exceeded 0.7, except for the constructs InfoP3 and agreeableness. In Table 2, we examined the correlations between all the pairs of constructs in order to establish the discriminant validity of the constructs. The correlations between all of these pairs were below the recommended threshold value of 0.9 (Safa et al., 2016) suggesting that all constructs are distinct from each other. Table 3 presents the results of the hypothesis tests and associated relationships between the five personality traits, heuristic and systematic processing and phishing susceptibility. Each path is a hypothesised correlation between variables representing the causal and consequent constructs of a theoretical proposition (Lowry and Gaskin, 2014). The results of the hypothesis tests presented in Table 3 show that some of the personality traits have significant relationships in regard to heuristic and systematic information processing. Following the hypothesis tests and outcomes presented in Table 3, the structural model was created. Fig. 8, depicted as a path diagram, presents the theoretical model demonstrating the predictors of phishing susceptibility on SNSs in terms of personality traits and information processing. The model shows the correlation coefficients and significance of the relationships between the variables. For further insights, direct phishing susceptibility was examined by excluding the influences of personality traits and information processing in the analysis. The data revealed that respondents would fall victim to a phishing email originating from Facebook, as 40.09% of the respondents chose the option “check the attachment because I am interested to know what my friend has to say” while 9.68% would delete the email. Only 20.78% did not trust the phishing email. The values of the approximate fit indices demonstrated in Table 4 support the conclusion that the estimated model provides an acceptable fit with the data. Implying inferences can be made from the study findings which is discussed next.

Discussion

The present study revealed that apart from extraversion and conscientiousness (partly), personality traits do indeed have significant relationships with both heuristic and systematic processing, which may lead to phishing susceptibility on SNSs. It was unexpected that extraversion would be the sole construct to have no statistically significant influence on both heuristic (ß = 0.013, p = 0.873) and systematic processing (ß = 0.003, p = 0.968). As such, our results did not support hypotheses 1a and 1b. Owing to the characteristics that describe the extraversion trait, it was anticipated that respondents who possess this trait would be excited and would act impulsively towards the stimuli, thereby resorting to heuristic processing. This is confirmed by Lawson et al. (2017), who found extraversion to be highly predictive of susceptibility to phishing emails. Moreover, it was anticipated that these users would be less likely to apply the cognitive resources aligned with systematic processing. Our results could be because the extraversion trait is found to be sensitive to the cultural background of individuals (Rolland, 2002). As expected, agreeableness was found to be statistically significant and having a positive influence for both heuristic (ß = 0.152, p = 0.041, small effect) and systematic processing (ß = 0.173, p = 0.019, small effect), thereby supporting H2a and H2b. As the agreeableness trait describes individuals as tolerant, cooperative, tending to experience emotional concern for others’ well-being and trusting of others, it was predicted that users might process the stimuli in either mode. While this may be deemed contradictory, it does support the large base of literature that shares these contradictory findings. For example, the study by Enos et al. (2006) revealed that people with high agreeableness were better at detecting deception, while conversely Modic and Lea (2012)found that highly agreeable people are more susceptible to phishing because they are more likely to trust in uncertain situations. Alkiş and Taşkaya Temizel (2015) found that agreeableness is the most susceptible personality trait to persuasion strategies and Cusack and Adedokun (2018) concluded that users high in agreeableness are likely to be more susceptible to SE attacks than others. Alseadoon et al. (2015) found agreeableness increased user tendency to comply with phishing email requests while Albladi and Weir (2017) found that agreeableness significantly decreased susceptibility to phishing. Ryan and Xenos (2011) found that Facebook users are less conscientious than nonusers of the platform. In our study conscientiousness was found to be statistically significant for heuristic processing and had a negative influence (ß = -0.155, p = 0.044, small effect), thus supporting hypothesis 3a. As expected, this indicates that an individual with the conscientiousness trait would not process heuristically and thus be less likely to fall victim to social network phishing. This finding supports Albladi and Weir (2017) and Parish et al. (2009) findings. A study by Moutafi, Furnham, and Paltiel (Moutafi et al., 2004) found consistent evidence that intelligence is strongly negatively correlated with conscientiousness. Moutafi et al. (2004) argued that this is caused by fluid intelligence, which is the capacity to think logically and solve problems in novel situations independently of acquired knowledge. This explanation by Moutafi et al. (2004) may also explain why users would resort to heuristic processing. By contrast, conscientiousness was not found to be statistically significant for systematic processing (ß = 0.063, p = 0.411), although it had a positive influence. As such, hypothesis 3b is rejected. Neuroticism was found to be statistically significant for both heuristic and systematic processing. However, it was predicted that neuroticism would be negatively correlated with heuristic processing (ß = 0.163, p = 0.021, small effect), although this was not the case in our findings. Thus hypothesis 4a was rejected. As mentioned by Parish et al. (2009), neuroticism has been associated with computer anxiety and as such this may indirectly help protect individuals with the personality trait of neuroticism against cybercrime. Our findings revealed that neuroticism is significantly positively related to systematic processing (ß = 0.131, p = 0.060, no effect), thus supporting hypothesis 4b. This finding supports the studies by Sumner et al. (2011) and Li et al. (2019), who found that users high in neuroticism were more concerned for their privacy. It also supports Albladi and Weir (2017) finding that neuroticism significantly decreased susceptibility to phishing. Openness was found to be statistically significant for both heuristic and systematic processing. Individuals with the personality trait of openness are intellectually curious and as such it was anticipated that, given the nature of the images depicted in the stimuli, it would have promoted them to process the stimuli heuristically. As expected, openness has a positive relationship with heuristic processing (ß = 0.140, p = 0.083, no effect) thus supporting hypothesis 5a. This supports studies by Halevi et al. (2013) and Alseadoon et al. (2015), who found that openness is closely related to high phishing susceptibility. Hypothesis 5b is thus rejected, as the relationship to systematic processing was expected to be negative (ß = 0.172, p = 0.032, small effect). This might substantiate the findings by Pattinson et al. (2011), who found individuals with the trait of openness were better at detecting phishing emails. In addition, the study by Kreitz et al. (2015) showed that in comparison to the other Big Five traits, individuals with the openness trait are more perceptive as they were able to detect unexpected stimuli in their environment. As expected, heuristic processing had a significant positive effect on increasing susceptibility to phishing (ß = 0.287, p = 0.000, small effect), therefore supporting hypothesis 6 and the results by Vishwanath (2015b). However, the relationship of systematic processing to phishing susceptibility was found not to be statistically significant (ß = -0.005, p = 0.949, no effect) and as such hypothesis 7 was rejected. Although not statistically significant, the data revealed that systematic processing was negatively related to phishing susceptibility, thus decreasing the risk posed by phishing. The overall findings revealed that there are indeed significant relationships between several personality traits and information processing and also that the mode of processing influences the outcome of susceptibility to phishing on SNSs. However, following the results of the hypothesis tests, the current study has revealed that predicting the mode of information processing a user would take, based on personality traits, had some unforeseen expectations. The results showed certain traits, such as agreeableness, neuroticism and openness, processed information in both modes thus supporting the dual nature of the HSM – both modes can occur simultaneously. Ironically, this aspect could explain the contradictory findings found in phishing literature related to the Big Five personality traits. Furthermore, our findings suggests that apart from personality traits, information processing could also be influenced by the context or persuasion technique (Vishwanath et al., 2011). This is further explained by McAndrew (2018), who states that behaviours associated with a particular personality trait can be influenced by specific situations and environments. This is also highlighted by Johnson (1997), who points out that personality traits do not mean that someone's reactions are absolutely consistent; people may react consistently to similar situations but they may also respond differently in the same situations. Similarly, Cusack and Adedokun (2018) are of the view that traits are also influenced by moderating variables such as emotional state, the environment and motivations. As mentioned earlier the Big Five personality scale, classified by five distinct classes, has been shown to be reliable and consistent across many studies. In contrast, Cusack and Adedokun (2018) state that the Big Five taxonomy defines personalities along a continuum rather than in categories or types, thus allowing for different types of behaviour under different circumstances. As such, the current study showed a “snapshot” view of the students’ perceptions and behaviour at that particular time. Thus, if this survey were to be conducted again in a different environment, it is possible that the results could be slightly different. As a result, this promotes opportunities for other researchers to conduct similar studies or to improve on this study by considering different variables and environments.

Limitations and future research

While our study offers some insights for behavioural researchers, there were several limitations that open possibilities for future research. The convenience sampling method used and the small sample size minimises the generalisability of the findings as the sample, consisting solely of students, was not representative of the general public. Furthermore, the stimuli used in the instrument to test information processing originated on the researcher's Facebook profile. This creates bias as the stimuli originated from acquaintances connected to the researcher and not to the respondents. To make the experiment more accurate to reflect its intended environment, researchers could create a Facebook profile (i.e. a dummy account), and survey participants could add this profile by responding to a friend request. Respondents could then comment on how they would respond to stimuli appearing on their timeline which originates from the researcher's dummy profile. However, this would have to be carefully designed in adherence to ethical guidelines and practices. The study assumed that respondents would address the section on information processing in the survey using the same amount of time and attention to detail as they would in an online social network environment. As the instrument was a survey, the measures used were indirect and consequently could not measure response time, which could be particularly important with regard to information processing. Although the survey instrument consisted of several persuasive stimuli, respondents only had to deal with one post at a time. In the SNS environment, users would be exposed to a larger set of posts at one time appearing on their timeline. Furthermore, the instrument has an option “I ignored the message content”, however this did not take into account users “cognitively” ignoring stimuli. As a result, it is possible that users could dismiss posts, thus making no decision, without applying any mode of processing that may pass through their timeline. This study did not aim to identify which specific persuasion strategy is more susceptible to phishing, as has been done previously in other studies. As a result, the current instrument design did not test responses for each of the six persuasion principles. However, as noted by Lawson et al. (2017), phishers tend to use a combination of persuasion types and thus, in such cases, the instrument in its current form cannot determine which specific persuasion principle a user is more likely to fall victim to. Furthermore, measuring certain principles such as “liking” makes it difficult to draw conclusions as individuals each have their own set of preferences. Also, it was not possible to assess the effect of personality traits on information processing in respect of the persuasion principles of “commitment” and “reciprocity”, as this would require prior knowledge of the respondents’ past choices and commitments. These specific principles were also identified by Butavicius et al. (2015) as being less suited to their laboratory study. The study has implications for organisations as they could develop a similar instrument to identify their employees at risk to phishing. Organisations could use the personality test together with an assessment tool that examines employees’ preferences; for example, to determine their interest in free prizes, movie genres, employment opportunities, financial stability and the like. These preferences could identify potential behavioural vulnerabilities that phishers could use to persuade victims on both email and SNSs. Following the identification of vulnerable employees, organisations could classify these users accordingly and design security awareness programmes orientated to addressing employees’ personal sets of vulnerabilities with consideration to their personality traits. The current study also has implications for researchers. Research in personality traits and information processing and their influence on phishing susceptibility has the potential to grow further. The model could be extended to include other variables such as perceived risk, self-efficacy, knowledge, social norms, culture and the like, which could potentially offer further insights into phishing susceptibility. Moreover, there is a lack of studies investigating the influence of personality traits on habit. This was pointed out by Wood (2017), who stated that “habit” is largely missing from modern social and personality psychology. A study by Vishwanath (2015b) concluded that habits and information processing jointly influence phishing susceptibility. Similarly, Frauenstein and Flowerday (2016) posited that the habitual behaviours exhibited by social network users could influence them to not process phishing messages on SNSs with sufficient consideration, thus becoming vulnerable to social network phishing.

Conclusion

The threat of phishing continues to pose a problem for both organisations and consumers. Protection against phishing threats has limitations when relying solely on technical controls. Phishers will take advantage of new events, catastrophes and global headlines when designing persuasive messages, thus making it difficult to predict what user education should address. People may serve as a protective measure but only if they “recognise” the threat. However, owing to the individual behavioural vulnerabilities that characterise each user, any security awareness efforts may be ineffective when users are faced with phishing. Thus, any steps taken to protect users should also include understanding the individual characteristics that may consequently influence user behaviour and make them vulnerable. In addition, the popularity of SNSs create new opportunities for phishers to exploit the behavioural vulnerabilities of its users. Prior literature has indicated that the personality traits of an individual influence susceptibility to phishing and that the mode of information processing can influence susceptibility to phishing. The current study makes a contribution by bringing together these two distinct areas of research to better understand their relationship to phishing susceptibility on SNSs. This study proposed a theoretical model that can help identify the types of user who are more likely to be susceptible to phishing on SNSs and is an essential step towards improving online security. Prior literature has highlighted that there are inconsistent findings with regard to personality type and its direct relationship on phishing susceptibility. Similarly, our study revealed that the Big Five traits of agreeableness, neuroticism and openness had a positive influence to both heuristic and systematic processing. Conscientiousness was found to have a negative influence on heuristic processing. It is therefore expected that if conscientious people are faced with phishing on SNSs, they are more likely to closely inspect it before resorting to heuristic processing. Extraversion was the only trait found to have no statistical significance on both modes of processing in the study. The study also confirmed that heuristic processing significantly increases susceptibility to phishing on SNSs, thus supporting prior studies in this area.

CRediT authorship contribution statement

Edwin Donald Frauenstein: Conceptualization, Methodology, Investigation, Formal analysis, Writing - original draft. Stephen Flowerday: Conceptualization, Writing - review & editing, Supervision.

Declaration of Competing Interest

This article has not been published or accepted for publication and it is not under consideration at any other outlet. To our knowledge, we have no known conflicts of interest with this work.
Items measured (1= disagree strongly – 5 = agree strongly)
ConstructItem No:Description
Extraversion1Is talkative
6Is reserved (R)
11Is full of energy
16Generates a lot of enthusiasm
21Tends to be quiet (R)
26Has an assertive (i.e. confident) personality
31Is sometimes shy, inhibited (R)
36Is outgoing, sociable
Agreeableness2Tends to find fault with others (R)
7Is helpful and unselfish with others
12Starts quarrels (i.e. arguments) with others (R)
17Has a forgiving nature
22Is generally trusting
27Can be cold and aloof (i.e. distant) (R)
32Is considerate and kind to almost everyone
37Is sometimes rude to others (R)
42Likes to cooperate with others
Conscientiousness3Does a thorough job
8Can be somewhat careless (R)
13Is a reliable worker
18Tends to be disorganized (R)
23Tends to be lazy (R)
28Perseveres until the task is finished
33Does things efficiently
38Makes plans and follows through with them
43Is easily distracted (R)
Neuroticism4Is depressed, blue
9Is relaxed, handles stress well (R)
14Can be tense (i.e. nervous, anxious)
19Worries a lot
24Is emotionally stable, not easily upset (R)
29Can be moody
34Remains calm in tense situations (R)
39Gets nervous easily
Openness5Is original, comes up with new ideas
10Is curious about many different things
15Is ingenious (i.e. clever), a deep thinker
20Has an active imagination
25Is inventive
30Values artistic (i.e. beauty), aesthetic experiences
35Prefers work that is routine (i.e. procedure) (R)
40Likes to reflect, play with ideas
41Has few artistic interests (R)
44Is sophisticated in art, music, or literature

(R)=denotes reverse scaled items.

Items measured (1= disagree strongly – 5 = agree strongly)
ConstructItems
HeuristicI skimmed (i.e. moved quickly) through the Facebook message
HeuristicI briefly looked at the sender/source of the message
HeuristicThe message is attractive to me as I am interested in the benefits it has to offer
HeuristicI ignored the message content
SystematicI thought about the action I took based on what I saw in the Facebook message
SystematicI spent some time thinking about the request before I made my decision
SystematicI found myself making connections between the message request and what I have heard about on social networks requesting such information
What action would you most likely take?
Reply to the email
Immediately delete the email
Check the attachment because I am interested to know what my friend has to say
Ignore the email
I do not trust this email
Unsure
  13 in total

1.  Personality.

Authors:  D C Funder
Journal:  Annu Rev Psychol       Date:  2001       Impact factor: 24.137

2.  Principles and practice in reporting structural equation analyses.

Authors:  Roderick P McDonald; Moon-Ho Ringo Ho
Journal:  Psychol Methods       Date:  2002-03

Review 3.  Attitudes and persuasion.

Authors:  William D Crano; Radmila Prislin
Journal:  Annu Rev Psychol       Date:  2006       Impact factor: 24.137

Review 4.  An introduction to the five-factor model and its applications.

Authors:  R R McCrae; O P John
Journal:  J Pers       Date:  1992-06

5.  Using Effect Size-or Why the P Value Is Not Enough.

Authors:  Gail M Sullivan; Richard Feinn
Journal:  J Grad Med Educ       Date:  2012-09

6.  Habit in Personality and Social Psychology.

Authors:  Wendy Wood
Journal:  Pers Soc Psychol Rev       Date:  2017-07-24

7.  Effects of personality on risky driving behavior and accident involvement for Chinese drivers.

Authors:  Jiaoyan Yang; Feng Du; Weina Qu; Zhun Gong; Xianghong Sun
Journal:  Traffic Inj Prev       Date:  2013       Impact factor: 1.491

Review 8.  A practitioner's guide to persuasion: an overview of 15 selected persuasion theories, models and frameworks.

Authors:  Kenzie A Cameron
Journal:  Patient Educ Couns       Date:  2009-01-10

Review 9.  Online social networking and addiction--a review of the psychological literature.

Authors:  Daria J Kuss; Mark D Griffiths
Journal:  Int J Environ Res Public Health       Date:  2011-08-29       Impact factor: 3.390

10.  Some See It, Some Don't: Exploring the Relation between Inattentional Blindness and Personality Factors.

Authors:  Carina Kreitz; Robert Schnuerch; Henning Gibbons; Daniel Memmert
Journal:  PLoS One       Date:  2015-05-26       Impact factor: 3.240

View more
  1 in total

1.  How Good Are We at Detecting a Phishing Attack? Investigating the Evolving Phishing Attack Email and Why It Continues to Successfully Deceive Society.

Authors:  Fiona Carroll; John Ayooluwa Adejobi; Reza Montasari
Journal:  SN Comput Sci       Date:  2022-02-23
  1 in total

北京卡尤迪生物科技股份有限公司 © 2022-2023.