2020
DOI: 10.3389/fpsyg.2020.01756
|View full text |Cite
|
Sign up to set email alerts
|

Understanding Phishing Email Processing and Perceived Trustworthiness Through Eye Tracking

Abstract: Social engineering attacks in the form of phishing emails represent one of the biggest risks to cybersecurity. There is a lack of research on how the common elements of phishing emails, such as the presence of misspellings and the use of urgency and threatening language, influences how the email is processed and judged by individuals. Eye tracking technology may provide insight into this. In this exploratory study a sample of 22 participants viewed a series of emails with or without indicators associated with … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
17
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 19 publications
(17 citation statements)
references
References 26 publications
0
17
0
Order By: Relevance
“…In RQ1, we identified the nature of cybersecurity attacks being experienced by healthcare organisations, and the articles selected in the review received higher rankings than the papers with a lower ranking. This is due to the fact that several articles reported studies on the impact of ransomware (e.g., WannaCry) [ 20 , 32 , 42 , 43 ] and phishing attacks [ 9 , 10 , 13 , 14 , 15 , 41 , 44 , 45 , 46 , 47 ], to name a few being launched against healthcare organisations.…”
Section: Resultsmentioning
confidence: 99%
“…In RQ1, we identified the nature of cybersecurity attacks being experienced by healthcare organisations, and the articles selected in the review received higher rankings than the papers with a lower ranking. This is due to the fact that several articles reported studies on the impact of ransomware (e.g., WannaCry) [ 20 , 32 , 42 , 43 ] and phishing attacks [ 9 , 10 , 13 , 14 , 15 , 41 , 44 , 45 , 46 , 47 ], to name a few being launched against healthcare organisations.…”
Section: Resultsmentioning
confidence: 99%
“…In particular, researches have investigated the users' gaze behaviors and attention when reading Uniform Resource Locators (URLs) [3], phishing webs [15], and phishing email [16]- [18]. These works illustrate the users' visual processing of phishing contents [3], [15], [17], [19] and the effects of visual aids [18]. The authors in [15] further establish correlations between eye movements and phishing identification to estimate the likelihood that users may fall victim to phishing attacks.…”
Section: B Counterdeception Technologiesmentioning
confidence: 99%
“…Therefore, we need to compress the sensory outcomes and remove the information that hardly contributes to attention evaluation and phishing recognition. Previous works [3], [15], [17] have identified the role of Areas of Interest (AoIs) in helping human users recognize phishing. Thus, we aggregate the potential gaze locations (i.e., pixels of the email area) into a finite number of I AoIs that include the email address, the subject line, the addressee, attachments, hyperlinks, and the phishing indicators such as misspellings and grammar mistakes.…”
Section: Attention Enhancement Mechanismmentioning
confidence: 99%
See 1 more Smart Citation
“…Tracking the point of gaze as a window to the internal state of the human mind is a key requirement in cognitive tasks, where it is important to control the attention of human subjects. This application has been the focus of classic studies ( Yarbus, 1967 ), and more recently, the approach has been used not only as a clinical tool to detect neurological and neuropsychiatric disorders by studying the patients’ gaze patterns ( Adhikari and Stark, 2017 ), but also has been shown to be useful in every-day applications, such as analyzing the trustworthiness of phishing emails ( McAlaney and Hills, 2020 ). While there are different existing technologies to eye tracking on the market, an affordable and practical technology is still missing, limiting the use of this technique to a broader audience.…”
Section: Introductionmentioning
confidence: 99%