Will the “Phisher-Men” Reel You In?: Assessing Individual Differences in a Phishing Detection Task
Phishing is an act of technology-based deception that targets individuals to obtain information. To minimize the number of phishing attacks, factors that influence the ability to identify phishing attempts must be examined. The present study aimed to determine how individual differences relate to pe...
Gespeichert in:
Veröffentlicht in: | International journal of cyber behavior, psychology, and learning psychology, and learning, 2015-10, Vol.5 (4), p.1-17 |
---|---|
Hauptverfasser: | , , , , , |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 17 |
---|---|
container_issue | 4 |
container_start_page | 1 |
container_title | International journal of cyber behavior, psychology, and learning |
container_volume | 5 |
creator | Welk, Allaire K Hong, Kyung Wha Zielinska, Olga A Tembe, Rucha Murphy-Hill, Emerson Mayhorn, Christopher B |
description | Phishing is an act of technology-based deception that targets individuals to obtain information. To minimize the number of phishing attacks, factors that influence the ability to identify phishing attempts must be examined. The present study aimed to determine how individual differences relate to performance on a phishing task. Undergraduate students completed a questionnaire designed to assess impulsivity, trust, personality characteristics, and Internet/security habits. Participants performed an email task where they had to discriminate between legitimate emails and phishing attempts. Researchers assessed performance in terms of correctly identifying all email types (overall accuracy) as well as accuracy in identifying phishing emails (phishing accuracy). Results indicated that overall and phishing accuracy each possessed unique trust, personality, and impulsivity predictors, but shared one significant behavioral predictor. These results present distinct predictors of phishing susceptibility that should be incorporated in the development of anti-phishing technology and training. |
doi_str_mv | 10.4018/IJCBPL.2015100101 |
format | Article |
fullrecord | <record><control><sourceid>gale_proqu</sourceid><recordid>TN_cdi_proquest_miscellaneous_1793242775</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><galeid>A443397212</galeid><sourcerecordid>A443397212</sourcerecordid><originalsourceid>FETCH-LOGICAL-c335t-d1fb1c3bec537d26e1c1ed773dffd36e308ea669286c7d2297e6a288ba6188ea3</originalsourceid><addsrcrecordid>eNp1kcFuEzEQhlcIJKq2D9CbJS5w2NRj79obLigkFIKCqFAR6sly7HHisvGG9W4lbn0QeLk-CV5SEQGtffDY8_-_xvqy7AToqKBQnc7fT1-fL0aMQgmUAoVH2QGDsswlFMXjPzUXT7PjGK9oWmVRQSUPMvfF1zXp1khub36cr31cY5t_wHB785N8QqzJZdOTeXj1kkxixBh9WKWr9dfe9romM-8cthgMRuID0eR3xCCaYYem800gFzp-PcqeOF1HPL47D7PPZ28upu_yxce38-lkkRvOyy634JZg-BJNyaVlAsEAWim5dc5ygZxWqIUYs0qY1GdjiUKzqlpqAVVq8cPs-S532zbfeoyd2vhosK51wKaPCuSYs4JJWSbps3-kV03fhjSd4rQQQkpgcq9a6RqVD67pWm2GUDUpCs7HkgFLqtE9qrQtbrxpAjqf3v8ywM5g2ibGFp3atn6j2-8KqBqYqh1TtWeaPLOdx6_8ftaETt1xU4mbGqCpywdThn-_uCfmP6HaWsd_AebYtm8</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>3046677127</pqid></control><display><type>article</type><title>Will the “Phisher-Men” Reel You In?: Assessing Individual Differences in a Phishing Detection Task</title><source>ProQuest Central UK/Ireland</source><source>Alma/SFX Local Collection</source><source>ProQuest Central</source><creator>Welk, Allaire K ; Hong, Kyung Wha ; Zielinska, Olga A ; Tembe, Rucha ; Murphy-Hill, Emerson ; Mayhorn, Christopher B</creator><creatorcontrib>Welk, Allaire K ; Hong, Kyung Wha ; Zielinska, Olga A ; Tembe, Rucha ; Murphy-Hill, Emerson ; Mayhorn, Christopher B</creatorcontrib><description>Phishing is an act of technology-based deception that targets individuals to obtain information. To minimize the number of phishing attacks, factors that influence the ability to identify phishing attempts must be examined. The present study aimed to determine how individual differences relate to performance on a phishing task. Undergraduate students completed a questionnaire designed to assess impulsivity, trust, personality characteristics, and Internet/security habits. Participants performed an email task where they had to discriminate between legitimate emails and phishing attempts. Researchers assessed performance in terms of correctly identifying all email types (overall accuracy) as well as accuracy in identifying phishing emails (phishing accuracy). Results indicated that overall and phishing accuracy each possessed unique trust, personality, and impulsivity predictors, but shared one significant behavioral predictor. These results present distinct predictors of phishing susceptibility that should be incorporated in the development of anti-phishing technology and training.</description><identifier>ISSN: 2155-7136</identifier><identifier>EISSN: 2155-7144</identifier><identifier>DOI: 10.4018/IJCBPL.2015100101</identifier><language>eng</language><publisher>Hershey: IGI Global</publisher><subject>Computer information security ; Data security ; Electronic mail ; Email ; Learning ; Methods ; Personal preferences (Social sciences) ; Personality ; Phishing ; Psychological aspects ; Psychological research ; Students ; Tasks</subject><ispartof>International journal of cyber behavior, psychology, and learning, 2015-10, Vol.5 (4), p.1-17</ispartof><rights>COPYRIGHT 2015 IGI Global</rights><rights>Copyright © 2015, IGI Global. Copying or distributing in print or electronic forms without written permission of IGI Global is prohibited.</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://www.proquest.com/docview/3046677127?pq-origsite=primo$$EHTML$$P50$$Gproquest$$H</linktohtml><link.rule.ids>314,780,784,21388,27924,27925,33744,33745,43805,64385,64387,64389,72341</link.rule.ids></links><search><creatorcontrib>Welk, Allaire K</creatorcontrib><creatorcontrib>Hong, Kyung Wha</creatorcontrib><creatorcontrib>Zielinska, Olga A</creatorcontrib><creatorcontrib>Tembe, Rucha</creatorcontrib><creatorcontrib>Murphy-Hill, Emerson</creatorcontrib><creatorcontrib>Mayhorn, Christopher B</creatorcontrib><title>Will the “Phisher-Men” Reel You In?: Assessing Individual Differences in a Phishing Detection Task</title><title>International journal of cyber behavior, psychology, and learning</title><description>Phishing is an act of technology-based deception that targets individuals to obtain information. To minimize the number of phishing attacks, factors that influence the ability to identify phishing attempts must be examined. The present study aimed to determine how individual differences relate to performance on a phishing task. Undergraduate students completed a questionnaire designed to assess impulsivity, trust, personality characteristics, and Internet/security habits. Participants performed an email task where they had to discriminate between legitimate emails and phishing attempts. Researchers assessed performance in terms of correctly identifying all email types (overall accuracy) as well as accuracy in identifying phishing emails (phishing accuracy). Results indicated that overall and phishing accuracy each possessed unique trust, personality, and impulsivity predictors, but shared one significant behavioral predictor. These results present distinct predictors of phishing susceptibility that should be incorporated in the development of anti-phishing technology and training.</description><subject>Computer information security</subject><subject>Data security</subject><subject>Electronic mail</subject><subject>Email</subject><subject>Learning</subject><subject>Methods</subject><subject>Personal preferences (Social sciences)</subject><subject>Personality</subject><subject>Phishing</subject><subject>Psychological aspects</subject><subject>Psychological research</subject><subject>Students</subject><subject>Tasks</subject><issn>2155-7136</issn><issn>2155-7144</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2015</creationdate><recordtype>article</recordtype><sourceid>AFKRA</sourceid><sourceid>AZQEC</sourceid><sourceid>BENPR</sourceid><sourceid>CCPQU</sourceid><sourceid>DWQXO</sourceid><sourceid>GNUQQ</sourceid><recordid>eNp1kcFuEzEQhlcIJKq2D9CbJS5w2NRj79obLigkFIKCqFAR6sly7HHisvGG9W4lbn0QeLk-CV5SEQGtffDY8_-_xvqy7AToqKBQnc7fT1-fL0aMQgmUAoVH2QGDsswlFMXjPzUXT7PjGK9oWmVRQSUPMvfF1zXp1khub36cr31cY5t_wHB785N8QqzJZdOTeXj1kkxixBh9WKWr9dfe9romM-8cthgMRuID0eR3xCCaYYem800gFzp-PcqeOF1HPL47D7PPZ28upu_yxce38-lkkRvOyy634JZg-BJNyaVlAsEAWim5dc5ygZxWqIUYs0qY1GdjiUKzqlpqAVVq8cPs-S532zbfeoyd2vhosK51wKaPCuSYs4JJWSbps3-kV03fhjSd4rQQQkpgcq9a6RqVD67pWm2GUDUpCs7HkgFLqtE9qrQtbrxpAjqf3v8ywM5g2ibGFp3atn6j2-8KqBqYqh1TtWeaPLOdx6_8ftaETt1xU4mbGqCpywdThn-_uCfmP6HaWsd_AebYtm8</recordid><startdate>20151001</startdate><enddate>20151001</enddate><creator>Welk, Allaire K</creator><creator>Hong, Kyung Wha</creator><creator>Zielinska, Olga A</creator><creator>Tembe, Rucha</creator><creator>Murphy-Hill, Emerson</creator><creator>Mayhorn, Christopher B</creator><general>IGI Global</general><scope>AAYXX</scope><scope>CITATION</scope><scope>7SC</scope><scope>8FD</scope><scope>8FE</scope><scope>8FG</scope><scope>AFKRA</scope><scope>ARAPS</scope><scope>AZQEC</scope><scope>BENPR</scope><scope>BGLVJ</scope><scope>CCPQU</scope><scope>DWQXO</scope><scope>GNUQQ</scope><scope>HCIFZ</scope><scope>JQ2</scope><scope>K7-</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope><scope>P5Z</scope><scope>P62</scope><scope>PQEST</scope><scope>PQQKQ</scope><scope>PQUKI</scope><scope>PRINS</scope><scope>PSYQQ</scope></search><sort><creationdate>20151001</creationdate><title>Will the “Phisher-Men” Reel You In?: Assessing Individual Differences in a Phishing Detection Task</title><author>Welk, Allaire K ; Hong, Kyung Wha ; Zielinska, Olga A ; Tembe, Rucha ; Murphy-Hill, Emerson ; Mayhorn, Christopher B</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c335t-d1fb1c3bec537d26e1c1ed773dffd36e308ea669286c7d2297e6a288ba6188ea3</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2015</creationdate><topic>Computer information security</topic><topic>Data security</topic><topic>Electronic mail</topic><topic>Email</topic><topic>Learning</topic><topic>Methods</topic><topic>Personal preferences (Social sciences)</topic><topic>Personality</topic><topic>Phishing</topic><topic>Psychological aspects</topic><topic>Psychological research</topic><topic>Students</topic><topic>Tasks</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Welk, Allaire K</creatorcontrib><creatorcontrib>Hong, Kyung Wha</creatorcontrib><creatorcontrib>Zielinska, Olga A</creatorcontrib><creatorcontrib>Tembe, Rucha</creatorcontrib><creatorcontrib>Murphy-Hill, Emerson</creatorcontrib><creatorcontrib>Mayhorn, Christopher B</creatorcontrib><collection>CrossRef</collection><collection>Computer and Information Systems Abstracts</collection><collection>Technology Research Database</collection><collection>ProQuest SciTech Collection</collection><collection>ProQuest Technology Collection</collection><collection>ProQuest Central UK/Ireland</collection><collection>Advanced Technologies & Aerospace Collection</collection><collection>ProQuest Central Essentials</collection><collection>ProQuest Central</collection><collection>Technology Collection</collection><collection>ProQuest One Community College</collection><collection>ProQuest Central Korea</collection><collection>ProQuest Central Student</collection><collection>SciTech Premium Collection</collection><collection>ProQuest Computer Science Collection</collection><collection>Computer Science Database</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><collection>Advanced Technologies & Aerospace Database</collection><collection>ProQuest Advanced Technologies & Aerospace Collection</collection><collection>ProQuest One Academic Eastern Edition (DO NOT USE)</collection><collection>ProQuest One Academic</collection><collection>ProQuest One Academic UKI Edition</collection><collection>ProQuest Central China</collection><collection>ProQuest One Psychology</collection><jtitle>International journal of cyber behavior, psychology, and learning</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Welk, Allaire K</au><au>Hong, Kyung Wha</au><au>Zielinska, Olga A</au><au>Tembe, Rucha</au><au>Murphy-Hill, Emerson</au><au>Mayhorn, Christopher B</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Will the “Phisher-Men” Reel You In?: Assessing Individual Differences in a Phishing Detection Task</atitle><jtitle>International journal of cyber behavior, psychology, and learning</jtitle><date>2015-10-01</date><risdate>2015</risdate><volume>5</volume><issue>4</issue><spage>1</spage><epage>17</epage><pages>1-17</pages><issn>2155-7136</issn><eissn>2155-7144</eissn><abstract>Phishing is an act of technology-based deception that targets individuals to obtain information. To minimize the number of phishing attacks, factors that influence the ability to identify phishing attempts must be examined. The present study aimed to determine how individual differences relate to performance on a phishing task. Undergraduate students completed a questionnaire designed to assess impulsivity, trust, personality characteristics, and Internet/security habits. Participants performed an email task where they had to discriminate between legitimate emails and phishing attempts. Researchers assessed performance in terms of correctly identifying all email types (overall accuracy) as well as accuracy in identifying phishing emails (phishing accuracy). Results indicated that overall and phishing accuracy each possessed unique trust, personality, and impulsivity predictors, but shared one significant behavioral predictor. These results present distinct predictors of phishing susceptibility that should be incorporated in the development of anti-phishing technology and training.</abstract><cop>Hershey</cop><pub>IGI Global</pub><doi>10.4018/IJCBPL.2015100101</doi><tpages>17</tpages></addata></record> |
fulltext | fulltext |
identifier | ISSN: 2155-7136 |
ispartof | International journal of cyber behavior, psychology, and learning, 2015-10, Vol.5 (4), p.1-17 |
issn | 2155-7136 2155-7144 |
language | eng |
recordid | cdi_proquest_miscellaneous_1793242775 |
source | ProQuest Central UK/Ireland; Alma/SFX Local Collection; ProQuest Central |
subjects | Computer information security Data security Electronic mail Learning Methods Personal preferences (Social sciences) Personality Phishing Psychological aspects Psychological research Students Tasks |
title | Will the “Phisher-Men” Reel You In?: Assessing Individual Differences in a Phishing Detection Task |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-08T04%3A42%3A53IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-gale_proqu&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Will%20the%20%E2%80%9CPhisher-Men%E2%80%9D%20Reel%20You%20In?:%20Assessing%20Individual%20Differences%20in%20a%20Phishing%20Detection%20Task&rft.jtitle=International%20journal%20of%20cyber%20behavior,%20psychology,%20and%20learning&rft.au=Welk,%20Allaire%20K&rft.date=2015-10-01&rft.volume=5&rft.issue=4&rft.spage=1&rft.epage=17&rft.pages=1-17&rft.issn=2155-7136&rft.eissn=2155-7144&rft_id=info:doi/10.4018/IJCBPL.2015100101&rft_dat=%3Cgale_proqu%3EA443397212%3C/gale_proqu%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=3046677127&rft_id=info:pmid/&rft_galeid=A443397212&rfr_iscdi=true |