Like shooting phish in a barrel: cue utilization and cognitive reflection aid performance in controlled, but not naturalistic phishing tasks

Ben W. Morrison, Emmilly Graf, Piers Bayl-Smith, Mark W. Wiggins

Research output: Contribution to journalArticlepeer-review

2 Downloads (Pure)

Abstract

The study tested the role of cue utilization and cognitive reflection tendencies in email users’ phishing decision capabilities in both controlled and naturalistic settings. 94 university students completed measures of their phishing cue utilization and cognitive reflection, a phishing decision task, and a naturalistic simulated phishing campaign, in which they were sent simulated phishing emails to their personal inboxes. For the phishing decision task, results revealed that participants with lower cognitive reflection tendencies were more likely to misclassify genuine emails as phishing, compared to participants with higher cognitive reflection. Further, participants with higher cognitive reflection and lower cue utilization took the most time to diagnose emails, but participants low in both cue utilization and cognitive reflection demonstrated the shortest response latencies. These findings suggest that greater cognitive reflection can offset lower levels of cue utilization. For the naturalistic simulation, neither cue utilization nor cognitive reflection predicted an increased propensity to interact with a suspicious email. This result highlights a potential gap between phishing investigations conducted in controlled and naturalistic settings. The implications extend to future research, emphasizing the need for studies that employ naturalistic methodologies to better understand and address phishing threats in real-world environments.
Original languageEnglish
Pages (from-to)32-53
Number of pages22
JournalJournal of Cognitive Engineering and Decision Making
Volume19
Issue number1
Early online date27 Oct 2024
DOIs
Publication statusPublished - Mar 2025

Bibliographical note

Copyright Human Factors and Ergonomics Society 2024. Version archived for private and non-commercial use with the permission of the author/s and according to publisher conditions. For further rights please contact the publisher.

Keywords

  • cue utilization
  • cognitive reflection
  • phishing
  • cyber security
  • EXPERTise 2.0

Cite this