2020
DOI: 10.3389/fdata.2020.546860
|View full text |Cite
|
Sign up to set email alerts
|

The Role of Cue Utilization and Cognitive Load in the Recognition of Phishing Emails

Abstract: Phishing emails represent a major threat to online information security. While the prevailing research is focused on users' susceptibility, few studies have considered the decision-making strategies that account for skilled detection. One relevant facet of decision-making is cue utilization, where users retrieve feature-event associations stored in long-term memory. High degrees of cue utilization help reduce the demands placed on working memory (i.e., cognitive load), and invariably improve decision performan… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
0
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
6
1
1

Relationship

0
8

Authors

Journals

citations
Cited by 12 publications
(7 citation statements)
references
References 44 publications
0
0
0
Order By: Relevance
“…The current study aimed to examine the role of, and potential interplay between, cue utilisation and cognitive reflection in email users' ability to accurately (and efficiently) differentiate between phishing and genuine emails. In doing so, this work directly extends upon existing phishing victimology frameworks that have established the role of cue utilisation (Nasser et al, 2020a(Nasser et al, , 2020bBayl-Smith et al, 2020) and factors relating to dual process information processing (Butavicius et al, 2016;Frauenstein & Flowerday, 2020;Harrison et al, 2016;Jones et al, 2019;Luo et al, 2013;Valecha et al, 2015;Vishwanath et al, 2011;Vishwanath et al, 2016;Vishwanath et al, 2018;Yan & Gozu, 2012;Zhang et al, 2012) in determining users' phishing susceptibility. Critically, clarifying the interplay between users' perceptual-cognitive skills and their existing preferences concerning information processing have implications to the future design of cyber security interventions such as education and training programs, and more broadly, to our understanding of the acquisition of skilled intuition and expertise in similar domains of judgement and decision-making.…”
Section: Introductionmentioning
confidence: 78%
See 2 more Smart Citations
“…The current study aimed to examine the role of, and potential interplay between, cue utilisation and cognitive reflection in email users' ability to accurately (and efficiently) differentiate between phishing and genuine emails. In doing so, this work directly extends upon existing phishing victimology frameworks that have established the role of cue utilisation (Nasser et al, 2020a(Nasser et al, , 2020bBayl-Smith et al, 2020) and factors relating to dual process information processing (Butavicius et al, 2016;Frauenstein & Flowerday, 2020;Harrison et al, 2016;Jones et al, 2019;Luo et al, 2013;Valecha et al, 2015;Vishwanath et al, 2011;Vishwanath et al, 2016;Vishwanath et al, 2018;Yan & Gozu, 2012;Zhang et al, 2012) in determining users' phishing susceptibility. Critically, clarifying the interplay between users' perceptual-cognitive skills and their existing preferences concerning information processing have implications to the future design of cyber security interventions such as education and training programs, and more broadly, to our understanding of the acquisition of skilled intuition and expertise in similar domains of judgement and decision-making.…”
Section: Introductionmentioning
confidence: 78%
“…Finally, despite previous work differentiating levels of performance based on phishing cue utilisation (Nasser et al, 2020b), and others eliciting a set of 'correct' phishing cues , differences in the types of cues used across high and low cue users are yet to be captured. This has largely been attributed to limitations in previous designs (e.g., asking participants to recognise the features they use from a pre-defined list; Nasser et al, 2020b).…”
Section: Study Aimsmentioning
confidence: 99%
See 1 more Smart Citation
“…Healthcare staff can fall victim to phishing attacks due to the nature of their work. They are often occupied with a heavy workload due to the high patients-to-staff ratio and their work is sometimes characterized by emergency situations, thereby increasing their cognitive load [70]. Additionally, healthcare workers may have poor information security knowledge and training and poor perception, possibly causing them to undermine better cyber security hygiene in phishing attacks [71].…”
Section: Discussionmentioning
confidence: 99%
“…These systems give individuals another platform for interaction, networking, knowledge, and information sharing through messaging, voice, photos, videos, and more. The use of these platforms has increased considerably in organisations during and post-pandemic periods [2], [80],…”
Section: Making Use Of Other Communication Platformsmentioning
confidence: 99%