Affiliation:
1. Clemson University Clemson South Carolina USA
Abstract
AbstractPhishing research presents conflicting findings regarding the psychological predictors of phishing susceptibility. The present work aimed to resolve these discrepancies by utilizing a diverse online sample and email set. Participants completed a survey that included an email classification task and measured several individual differences, including phishing awareness, age, impulsivity, curiosity, and personality (the Big‐5). Phishing susceptibility was measured by participants' ability to distinguish between phishing and legitimate emails. Three regression analyses were performed to predict email discrimination ability; (1) an age model, (2) a deficient self‐regulation model (i.e., impulsivity, response times, and curiosity), and (3) a personality (i.e., the Big‐5) model. Overall, phishing susceptibility was predicted by younger age, higher levels of impulsivity and extraversion, lower levels of openness to experience and agreeableness, and quick responses. The present work identifies several populations that are particularly vulnerable to phishing attacks and may require targeted training interventions.
Subject
Arts and Humanities (miscellaneous),Developmental and Educational Psychology,Experimental and Cognitive Psychology
Reference69 articles.
1. Alseadoon I. Chan T. Foo E. &Gonzalez Nieto J.(2012).Who is more susceptible to phishing emails?: A Saudi Arabian study. InProceedings of the 23rd Australasian conference on information systems(pp. 1–11).https://aisel.aisnet.org/acis2012/21
2. Analysis of phishing susceptibility in a workplace: A big‐five personality perspectives;Anawar S.;Journal of Engineering Science and Technology,2019
3. Security awareness of computer users: A phishing threat avoidance perspective
4. A systematic review and meta-analysis of age-related differences in trust.
5. Introduction to the special issue on prosociality in adult development and aging: Advancing theory within a multilevel framework.
Cited by
3 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献