Author
Listed:
- Allaire K. Welk
(Department of Psychology, North Carolina State University, Raleigh, NC, USA)
- Kyung Wha Hong
(Department of Computer Science, North Carolina State University, Raleigh, NC, USA)
- Olga A. Zielinska
(Department of Psychology, North Carolina State University, Raleigh, NC, USA)
- Rucha Tembe
(Department of Psychology, North Carolina State University, Raleigh, NC, USA)
- Emerson Murphy-Hill
(Department of Computer Science, North Carolina State University, Raleigh, NC, USA)
- Christopher B. Mayhorn
(Department of Psychology, North Carolina State University, Raleigh, NC, USA)
Abstract
Phishing is an act of technology-based deception that targets individuals to obtain information. To minimize the number of phishing attacks, factors that influence the ability to identify phishing attempts must be examined. The present study aimed to determine how individual differences relate to performance on a phishing task. Undergraduate students completed a questionnaire designed to assess impulsivity, trust, personality characteristics, and Internet/security habits. Participants performed an email task where they had to discriminate between legitimate emails and phishing attempts. Researchers assessed performance in terms of correctly identifying all email types (overall accuracy) as well as accuracy in identifying phishing emails (phishing accuracy). Results indicated that overall and phishing accuracy each possessed unique trust, personality, and impulsivity predictors, but shared one significant behavioral predictor. These results present distinct predictors of phishing susceptibility that should be incorporated in the development of anti-phishing technology and training.
Suggested Citation
Allaire K. Welk & Kyung Wha Hong & Olga A. Zielinska & Rucha Tembe & Emerson Murphy-Hill & Christopher B. Mayhorn, 2015.
"Will the “Phisher-Men” Reel You In?: Assessing Individual Differences in a Phishing Detection Task,"
International Journal of Cyber Behavior, Psychology and Learning (IJCBPL), IGI Global, vol. 5(4), pages 1-17, October.
Handle:
RePEc:igg:jcbpl0:v:5:y:2015:i:4:p:1-17
Download full text from publisher
Corrections
All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:igg:jcbpl0:v:5:y:2015:i:4:p:1-17. See general information about how to correct material in RePEc.
If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.
We have no bibliographic references for this item. You can help adding them by using this form .
If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.
For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Journal Editor (email available below). General contact details of provider: https://www.igi-global.com .
Please note that corrections may take a couple of weeks to filter through
the various RePEc services.