Cue utilization, phishing feature and phishing email detection

Piers Bayl-Smith*, Daniel Sturman, Mark Wiggins

*Corresponding author for this work

    Research output: Chapter in Book/Report/Conference proceedingConference proceeding contributionpeer-review

    11 Citations (Scopus)

    Abstract

    Cognitive processes are broadly considered to be of vital importance to understanding phishing email feature detection or misidentification. This research extends the current literature by introducing the concept of cue utilization as a unique predictor of phishing feature detection. First year psychology students (n = 127) undertook three tasks measuring cue utilization, phishing feature detection and phishing email detection. A multiple linear regression model provided evidence that those in a higher cue utilization typology (n = 55) performed better at identifying phishing features than those in a lower cue utilization typology (n = 72). Furthermore, as predicted by the Elaboration Likelihood Model (ELM) and Heuristic-Systematic Model (HSM), those who deliberated longer per email demonstrated an increased ability to correctly identify phishing features. However, these results did not translate into improved performance in the phishing email detection task. Possible explanations for these results are discussed, including possible limitations and areas of future research.

    Original languageEnglish
    Title of host publicationFinancial Cryptography and Data Security
    Subtitle of host publicationFC 2020 International Workshops, AsiaUSEC, CoDeFi, VOTING, and WTSC, Revised Selected Papers
    EditorsMatthew Bernhard, Andrea Bracciali, L. Jean Camp, Shin’ichiro Matsuo, Alana Maurushat, Peter B. Rønne, Massimiliano Sala
    Place of PublicationSwitzerland
    PublisherSpringer
    Pages56-70
    Number of pages15
    ISBN (Electronic)9783030544553
    ISBN (Print)9783030544546
    DOIs
    Publication statusPublished - 2020
    Event1st Asian Workshop on Usable Security, AsiaUSEC 2020, the 1st Workshop on Coordination of Decentralized Finance, CoDeFi 2020, the 5th Workshop on Advances in Secure Electronic Voting, VOTING 2020, and the 4th Workshop on Trusted Smart Contracts, WTSC 2020, held at the 24th International Conference on Financial Cryptography and Data Security, FC 2020 - Kota Kinabalu, Malaysia
    Duration: 14 Feb 202014 Feb 2020

    Publication series

    NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
    Volume12063
    ISSN (Print)0302-9743
    ISSN (Electronic)1611-3349

    Conference

    Conference1st Asian Workshop on Usable Security, AsiaUSEC 2020, the 1st Workshop on Coordination of Decentralized Finance, CoDeFi 2020, the 5th Workshop on Advances in Secure Electronic Voting, VOTING 2020, and the 4th Workshop on Trusted Smart Contracts, WTSC 2020, held at the 24th International Conference on Financial Cryptography and Data Security, FC 2020
    Country/TerritoryMalaysia
    CityKota Kinabalu
    Period14/02/2014/02/20

    Keywords

    • phishing
    • cue utilization
    • feature identification
    • elaboration likelihood model
    • heuristic-systematic model

    Fingerprint

    Dive into the research topics of 'Cue utilization, phishing feature and phishing email detection'. Together they form a unique fingerprint.

    Cite this