Please use this identifier to cite or link to this item:

Understanding Security Behavior of Real Users: Analysis of a Phishing Study

File Size Format  
0700.pdf 1.09 MB Adobe PDF View/Open

Item Summary

Title:Understanding Security Behavior of Real Users: Analysis of a Phishing Study
Authors:Kang, Mingqing
Shonman, Matthew
Subramanya, Anshul
Zhang, Haoruo
Li, Xiangyang
show 1 moreDahbura, Anton
show less
Keywords:Security and Privacy Aspects of Human-Computer-Interactions
demographic analysis
empirical study
show 1 moreuser behavior
show less
Date Issued:05 Jan 2021
Abstract:This paper presents a set of statistical analyses on an empirical study of phishing email sorting by real online users. Participants were assigned to multitasking and/or incentive conditions in unattended web-based tasks that are the most realistic in any comparable study to date. Our three stages of analyses included logistic regression models to identify individual phishing “cues” contributing to successful classifications, statistical significance tests assessing the links between participants’ training experience and self-assessments of success to their actual performance, significance tests searching for significant demographic factors influencing task completion performance, and lastly k-means clustering based on a range of performance measures and utilizing participants’ demographic attributes. In particular, the results indicate that multitasking and incentives create complex dynamics while demographic traits and cybersecurity training can be informative predictors of user security behavior. These findings strongly support the benefits of security training and education and advocate for customized and differentiated interventions to increase users’ success of correctly identifying phishing emails.
Pages/Duration:10 pages
Rights:Attribution-NonCommercial-NoDerivatives 4.0 International
Appears in Collections: Security and Privacy Aspects of Human-Computer-Interactions

Please email if you need this content in ADA-compliant format.

This item is licensed under a Creative Commons License Creative Commons