| Literature DB >> 32501314 |
Edwin Donald Frauenstein1, Stephen Flowerday1.
Abstract
Today, the traditional approach used to conduct phishing attacks through email and spoofed websites has evolved to include social network sites (SNSs). This is because phishers are able to use similar methods to entice social network users to click on malicious links masquerading as fake news, controversial videos and other opportunities thought to be attractive or beneficial to the victim. SNSs are a phisher's "market" as they offer phishers a wide range of targets and take advantage of opportunities that exploit the behavioural vulnerabilities of their users. As such, it is important to further investigate aspects affecting behaviour when users are presented with phishing. Based on the literature studied, this research presents a theoretical model to address phishing susceptibility on SNSs. Using data collected from 215 respondents, the study examined the mediating role that information processing plays with regard to user susceptibility to social network phishing based on their personality traits, thereby identifying user characteristics that may be more susceptible than others to phishing on SNSs. The results from the structural equation modeling (SEM) analysis revealed that conscientious users were found to have a negative influence on heuristic processing, and are thus less susceptible to phishing on SNSs. The study also confirmed that heuristic processing increases susceptibility to phishing, thus supporting prior studies in this area. This research contributes to the information security discipline as it is one of the first to examine the effect of the relationship between the Big Five personality model and the heuristic-systematic model of information processing.Entities:
Keywords: Big Five; Heuristic processing; Heuristic-systematic processing model; Information processing; Personality traits; Phishing; Structural equation modeling; Systematic processing
Year: 2020 PMID: 32501314 PMCID: PMC7252086 DOI: 10.1016/j.cose.2020.101862
Source DB: PubMed Journal: Comput Secur ISSN: 0167-4048 Impact factor: 4.438
Fig. 1Reciprocity principle applied in Facebook Messenger
Fig. 2Authority principle applied in Facebook
Fig. 3Social proof principle applied in Facebook Messenger
Fig. 4Scarcity principle applied in Facebook Messenger.
Fig. 5Curiosity used to entice victims applied in Facebook Messenger
Fig. 6The proposed model
Discriminant validity of constructs.
| Constructs | 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 |
|---|---|---|---|---|---|---|---|---|
| 1. Extraversion | ||||||||
| 2. Agreeableness | 0.177 | |||||||
| 3. Conscientiousness | 0.120 | 0.050 | ||||||
| 4. Neuroticism | 0.006 | 0.016 | 0.043 | |||||
| 5. Openness | 0.218 | 0.130 | 0.165 | 0.027 | ||||
| 6. Heuristic Processing | 0.010 | 0.038 | 0.009 | 0.057 | 0.027 | |||
| 7. Systematic Processing | 0.035 | 0.071 | 0.021 | 0.028 | 0.080 | 0.191 | ||
| 8. Phishing Susceptibility | 0.000 | 0.013 | 0.001 | 0.002 | 0.001 | 0.081 | 0.015 |
Note: the square root of the AVEs are represented in bold, as appearing down the diagonal
Indicates item rounded off to 0.5
The constructs and their descriptive statistics.
| Construct | Description of stimuli | Instruction to user | Persuasion Principle(s) | Items | Mean | S.D. | Factor Loading | CR |
|---|---|---|---|---|---|---|---|---|
| InfoP1 | Opportunity to win a free store voucher worth R1500. The voucher contains an expiry date. | Click/Share | Authority and scarcity | 1 | 3.26 | 1.40 | .879 | 0.73 |
| 2 | 3.87 | 1.26 | .800 | |||||
| 3 | 3 | 1.57 | .626 | |||||
| 4 | 2.75 | 1.50 | .738 | |||||
| 5 | 3.34 | 1.43 | .591 | |||||
| 6 | 3.29 | 1.60 | .544 | |||||
| 7 | 3.30 | 1.50 | .649 | |||||
| InfoP2 | Owner is giving an opportunity for others to win a Mercedes-Benz vehicle. Two lucky giveaways. The draw claims to take place in the next two days. | Comment, Like and Share | Scarcity and social proof | 1 | 3.16 | 1.52 | .883 | 0.70 |
| 2 | 3.78 | 1.37 | .807 | |||||
| 3 | 3.29 | 1.56 | .519 | |||||
| 4 | 2.60 | 1.51 | .724 | |||||
| 5 | 3.35 | 1.44 | .446 | |||||
| 6 | 3.37 | 1.57 | .349 | |||||
| 7 | 3.20 | 1.50 | .518 | |||||
| InfoP3 | RIP: Breaking News of famous local athlete Caster Semenya died in a car accident. Video claiming to show footage of the accident. | Click link | Curiosity | 1 | 3.18 | 1.48 | .920 | 0.60 |
| 2 | 3.68 | 1.37 | .780 | |||||
| 3 | 2.66 | 1.53 | .680 | |||||
| 4 | 2.52 | 1.43 | .828 | |||||
| 5 | 3.22 | 1.30 | .523 | |||||
| 6 | 3.14 | 1.54 | .511 | |||||
| 7 | 3.04 | 1.54 | .643 | |||||
| InfoP4 | Opportunity to have financial freedom. Image shows a proof of payment received. | Comment with personal info (i.e. contact number) | Scarcity and social proof | 1 | 3.30 | 1.61 | .812 | 0.74 |
| 2 | 3.36 | 1.56 | .686 | |||||
| 3 | 2.73 | 1.62 | .412 | |||||
| 4 | 2.88 | 1.60 | .616 | |||||
| 5 | 3.13 | 1.59 | .513 | |||||
| 6 | 3.01 | 1.65 | .366 | |||||
| 7 | 2.91 | 1.62 | .500 | |||||
| InfoP5 | Video claiming a drunk woman appearing to be raped – 15 216 215 views | Click play | Curiosity | 1 | 3.20 | 1.59 | .838 | 0.70 |
| 2 | 3.22 | 1.60 | .675 | |||||
| 3 | 2.24 | 1.48 | .569 | |||||
| 4 | 2.84 | 1.66 | .835 | |||||
| 5 | 3.04 | 1.58 | .500 | |||||
| 6 | 2.65 | 1.67 | .345 | |||||
| 7 | 2.67 | 1.57 | .510 | |||||
| InfoP6 | Shocking video of a 16-year-old girl allegedly being raped at Makeni. | Click play | Curiosity | 1 | 3.24 | 1.59 | .890 | 0.73 |
| 2 | 3.27 | 1.57 | .678 | |||||
| 3 | 2.38 | 1.52 | .538 | |||||
| 4 | 2.67 | 1.56 | .807 | |||||
| 5 | 3.00 | 1.57 | .424 | |||||
| 6 | 2.83 | 1.57 | .391 | |||||
| 7 | 2.86 | 1.58 | .408 | |||||
| Personality Trait | Extraversion | 1 | 3.76 | 1.18 | .522 | 0.70 | ||
| 6 | 3.56 | 1.17 | .828 | |||||
| 11 | 4.15 | 0.94 | .566 | |||||
| 16 | 3.74 | 0.94 | .751 | |||||
| 21 | 2.66 | 1.39 | .660 | |||||
| 26 | 4.10 | 0.96 | .716 | |||||
| 31 | 2.43 | 1.31 | .743 | |||||
| 36 | 3.56 | 1.28 | .681 | |||||
| Personality Trait | Agreeableness | 2 | 3.53 | 1.24 | .882 | 0.57 | ||
| 7 | 4.48 | 1.02 | .793 | |||||
| 12 | 4.31 | 0.91 | .835 | |||||
| 17 | 4.35 | 0.99 | .697 | |||||
| 22 | 3.84 | 1.11 | .806 | |||||
| 27 | 3.04 | 1.34 | .796 | |||||
| 32 | 4.39 | 0.89 | .671 | |||||
| 37 | 3.95 | 1.38 | .749 | |||||
| 42 | 4.25 | 0.91 | .632 | |||||
| Personality Trait | Conscientiousness | 3 | 3.95 | 1.01 | .727 | 0.70 | ||
| 8 | 2.95 | 1.30 | .659 | |||||
| 13 | 4.31 | 0.91 | .597 | |||||
| 18 | 3.59 | 1.29 | .562 | |||||
| 23 | 3.33 | 1.39 | .629 | |||||
| 28 | 4.17 | 0.99 | .754 | |||||
| 33 | 4.15 | 0.79 | .677 | |||||
| 38 | 3.84 | 1.07 | .740 | |||||
| 43 | 2.83 | 1.43 | .796 | |||||
| Personality Trait | Neuroticism | 4 | 2.02 | 1.20 | .865 | 0.73 | ||
| 9 | 2.04 | 1.15 | .673 | |||||
| 14 | 3.41 | 1.26 | .656 | |||||
| 19 | 3.44 | 1.43 | .674 | |||||
| 24 | 2.27 | 1.34 | .674 | |||||
| 29 | 2.82 | 1.47 | .735 | |||||
| 34 | 2.12 | 1.14 | .707 | |||||
| 39 | 3.08 | 1.46 | .556 | |||||
| Personality Trait | Openness | 5 | 4.09 | 0.96 | .599 | 0.72 | ||
| 10 | 4.43 | 0.78 | .749 | |||||
| 15 | 3.79 | 0.99 | .650 | |||||
| 20 | 4.34 | 0.82 | .619 | |||||
| 25 | 3.51 | 1.02 | .662 | |||||
| 30 | 3.91 | 1.10 | .739 | |||||
| 35 | 2.04 | 1.08 | .875 | |||||
| 40 | 3.96 | 1.00 | .479 | |||||
| 41 | 2.59 | 1.25 | .779 | |||||
| 44 | 3.38 | 1.35 | .733 | |||||
Items < 0.5 factor loading were dropped;
item rounded off to 0.5.
Fig. 7Phishing email purportedly originating from Facebook
Path estimates and hypothesis outcomes.
| Tested | Path | ß | SE | Effect Size (f2) | Outcome (based on | Outcome (based on f2) | ||
| H1a | Extraversion→Heuristic | 0.013 | 0.079 | 0.160 | 0.873 | 0.000 | Not supported | No effect |
| H1b | Extraversion→Systematic | 0.003 | 0.078 | 0.040 | 0.968 | 0.000 | Not supported | No effect |
| H2a | Agreeableness→Heuristic | 0.152 | 0.074 | 2.057 | 0.041 | 0.020 | Supported | Small effect |
| H2b | Agreeableness→Systematic | 0.173 | 0.073 | 2.360 | 0.019 | 0.027 | Supported | Small effect |
| H3a | Conscientiousness→Heuristic | -0.155 | 0.077 | -2.022 | 0.044 | 0.020 | Supported | Small effect |
| H3b | Conscientiousness→Systematic | 0.063 | 0.076 | 0.824 | 0.411 | 0.003 | Not supported | No effect |
| H4a | Neuroticism→Heuristic | 0.163 | 0.070 | 2.330 | 0.021 | 0.026 | Supported | Small effect |
| H4b | Neuroticism→Systematic | 0.131 | 0.069 | 1.893 | 0.060 | 0.017 | Supported | No effect |
| H5a | Openness→Heuristic | 0.140 | 0.081 | 1.740 | 0.083 | 0.014 | Supported | No effect |
| H5b | Openness→Systematic | 0.172 | 0.080 | 2.158 | 0.032 | 0.022 | Supported | Small effect |
| H6 | Heuristic→Phishing Susceptibility | 0.287 | 0.073 | 3.914 | 0.000 | 0.072 | Supported | Small effect |
| H7 | Systematic→Phishing Susceptibility | -0.005 | 0.073 | -0.063 | 0.949 | 0.000 | Not supported | No effect |
Note:
p < 0.1;
p < .05
; p < 0.001.
Fig. 8The structural model
Goodness of Fit indices.
| Fit Indices | Model Value | Acceptable standard |
|---|---|---|
| CFI | 0.911 | ≥ 0.9 |
| SRMR | 0.052 | < 0.08 |
| RMSEA | 0.049 | ≤ 0.08 |
| Items measured (1= disagree strongly – 5 = agree strongly) | ||
|---|---|---|
| Construct | Item No: | Description |
| Extraversion | 1 | Is talkative |
| 6 | Is reserved (R) | |
| 11 | Is full of energy | |
| 16 | Generates a lot of enthusiasm | |
| 21 | Tends to be quiet (R) | |
| 26 | Has an assertive (i.e. confident) personality | |
| 31 | Is sometimes shy, inhibited (R) | |
| 36 | Is outgoing, sociable | |
| Agreeableness | 2 | Tends to find fault with others (R) |
| 7 | Is helpful and unselfish with others | |
| 12 | Starts quarrels (i.e. arguments) with others (R) | |
| 17 | Has a forgiving nature | |
| 22 | Is generally trusting | |
| 27 | Can be cold and aloof (i.e. distant) (R) | |
| 32 | Is considerate and kind to almost everyone | |
| 37 | Is sometimes rude to others (R) | |
| 42 | Likes to cooperate with others | |
| Conscientiousness | 3 | Does a thorough job |
| 8 | Can be somewhat careless (R) | |
| 13 | Is a reliable worker | |
| 18 | Tends to be disorganized (R) | |
| 23 | Tends to be lazy (R) | |
| 28 | Perseveres until the task is finished | |
| 33 | Does things efficiently | |
| 38 | Makes plans and follows through with them | |
| 43 | Is easily distracted (R) | |
| Neuroticism | 4 | Is depressed, blue |
| 9 | Is relaxed, handles stress well (R) | |
| 14 | Can be tense (i.e. nervous, anxious) | |
| 19 | Worries a lot | |
| 24 | Is emotionally stable, not easily upset (R) | |
| 29 | Can be moody | |
| 34 | Remains calm in tense situations (R) | |
| 39 | Gets nervous easily | |
| Openness | 5 | Is original, comes up with new ideas |
| 10 | Is curious about many different things | |
| 15 | Is ingenious (i.e. clever), a deep thinker | |
| 20 | Has an active imagination | |
| 25 | Is inventive | |
| 30 | Values artistic (i.e. beauty), aesthetic experiences | |
| 35 | Prefers work that is routine (i.e. procedure) (R) | |
| 40 | Likes to reflect, play with ideas | |
| 41 | Has few artistic interests (R) | |
| 44 | Is sophisticated in art, music, or literature | |
(R)=denotes reverse scaled items.
| Items measured (1= disagree strongly – 5 = agree strongly) | |
|---|---|
| Construct | Items |
| Heuristic | I skimmed (i.e. moved quickly) through the Facebook message |
| Heuristic | I briefly looked at the sender/source of the message |
| Heuristic | The message is attractive to me as I am interested in the benefits it has to offer |
| Heuristic | I ignored the message content |
| Systematic | I thought about the action I took based on what I saw in the Facebook message |
| Systematic | I spent some time thinking about the request before I made my decision |
| Systematic | I found myself making connections between the message request and what I have heard about on social networks requesting such information |
| What action would you most likely take? |
|---|
| Reply to the email |
| Immediately delete the email |
| Check the attachment because I am interested to know what my friend has to say |
| Ignore the email |
| I do not trust this email |
| Unsure |