Abstract
Repeat clickers refer to individuals who repeatedly fall prey to phishing attempts, posing a disproportionately higher risk to the organizations they inhabit. This study sought to explore the potential influence of three factors on repeat clicking behavior. First, building from previous research, we examined the impact of individual characteristics such as personality traits (Big 5 and Locus of Control), expertise (security and phishing knowledge), and technology usage. Second, social engineering tactics were considered as a potential factor, based on the specifications of the NIST Phish Scale, a metric for rating an email’s human phishing detection difficulty. Third, the impact of contextual factors, such as world events, were investigated. Data was collected from study participants via a survey on their individual differences, followed by campaigns in which they were emailed a total of eight messages (four phishing and four controls) over a four-week period of time. Repeat clickers were found to spend less time working online, check email more often, have a more internally oriented locus of control, and a lower need for cognition than the comparison groups. The Phish Scale resulted in difficulty scores closely corresponding to observed click-rates in phishing emails, suggesting that it is an effective metric of evaluating human phishing detection difficulty in a university environment.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
Notes
- 1.
1C and ZC were chosen to reduce confusion between the number 0 and the capital O.
- 2.
A pre-print version of this manuscript is available which contains the full versions of all scales in the appendix.
- 3.
* Indicates p < .05, ** p < .01, and *** p < .001.
References
Hadnagy, C.: Social Engineering: The Science of Human Hacking, 1st ed. Wiley (2018). https://doi.org/10.1002/9781119433729
Canham, M., Fiore, S.M., Constantino, M., Caulkins, B., Reinerman-Jones, L.: The Enduring Mystery of the Repeat Clickers (2019)
Verizon. 2023 Data Breach Investigations Report (DBIR). Verizon Enterprise Solutions. https://www.verizon.com/business/resources/reports/2023-data-breach-investigations-report-dbir.pdf. Accessed 19 Jun 2023
Caputo, D.D., Pfleeger, S.L., Freeman, J.D., Johnson, M.E.: Going spear phishing: exploring embedded training and awareness. IEEE Secur. Priv. 12(1), 28–38 (2013). https://doi.org/10.1109/MSP.2013.106
Canham, M., Posey, C., Strickland, D., Constantino, M.: Phishing for long tails: examining organizational repeat clickers and protective stewards. SAGE Open 11(1), 215824402199065 (2021). https://doi.org/10.1177/2158244021990656
Canham, M.: Repeat Clicking: A Lack of Awareness Is Not the Problem. PsyArXiv, preprint (2023). https://doi.org/10.31234/osf.io/36eqn
Li, W., Lee, J., Purl, J., Greitzer, F., Yousefi, B., Laskey, K.: Experimental Investigation of Demographic Factors Related to Phishing Susceptibility (2020). https://doi.org/10.24251/HICSS.2020.274
Lain, D., Kostiainen, K., Čapkun, S.: Phishing in Organizations: Findings from a Large-Scale and Long-Term Study. In: 2022 IEEE Symposium on Security and Privacy (SP), pp. 842–859 (2022). https://doi.org/10.1109/SP46214.2022.9833766
Greene, K., Steves, M., Theofanos, M., Kostick, J.: User context: an explanatory variable in phishing susceptibility. In: Proceedings 2018 Workshop on Usable Security, San Diego, CA: Internet Society (2018). https://doi.org/10.14722/usec.2018.23016
Elevate Security. High Risk Users and Where to Find Them (2023)
PhishMe. Enterprise Phishing Susceptibility Report (2015). https://cofense.com/wp-content/uploads/2017/10/PhishMe_EnterprisePhishingSusceptibilityReport_2015_Final.pdf
Vernon, H.M.: An investigation of the factors concerned in the causation of industrial accidents. J. Manag. Hist. 1(2), 65–78 (1918)
Hogan, R.: The accident-prone personality. People Strategy 39(1), 20–24 (2016)
Hansen, C.P.: Personality characteristics of the accident involved employee. J. Bus. Psychol. 2(4), 346–365 (1988)
Rotter, J.B.: Rotter’s Internal-External Control Scale. Psychological Monographs: General and Applied (1966)
Bridge, R.G.: “Internal-external control and seat-belt use”, presented at the Western Psychological Association. American Psychological Association, San Francisco (1971)
Hoyt, M.F.: Internal-external control and beliefs about automobile travel. J. Res. Pers. 7, 288–293 (1973)
Denning, D.L.: Correlates of employee safety performance. In: Presented at the Southeastern I/O Psychology Association Meeting, Atlanta, Georgia (1983)
Wichman, H., Ball, J.: Locus of control, self-serving biases, and attitudes towards safety in general aviation pilots. Aviat. Space Environ. Med. 54(6), 507–510 (1983)
Jones, J.W.: The Safety Locus of Control Scale. St. Paul, MN: The St. Paul Companies (1984)
Jones, J.W., Wuebker, L.: Development and validation of the Safety Locus of Control (SLC) scale. Percept. Mot. Skills 61, 151–161 (1985)
Mayer, R.E., Treat, J.R.: Psychological, social, and cognitive characteristics of high-risk drivers: a pilot study. Accid. Anal. Prev. 9, 1–8 (1977)
Ayaburi, E., Andoh-Baidoo, F.K.: Understanding phishing susceptibility: an integrated model of cue-utilization and habits. In: ICIS 2019 Proceedings (2019). https://aisel.aisnet.org/icis2019/cyber_security_privacy_ethics_IS/cyber_security_privacy/43
Parsons, K., McCormac, A., Pattinson, M., Butavicius, M., Jerram, C.: The design of phishing studies: Challenges for researchers. Comput. Secur. 52, 194–206 (2015). https://doi.org/10.1016/j.cose.2015.02.008
Hadlington, L., Popovac, M., Janicke, H., Yevseyeva, I., Jones, K.: Exploring the role of work identity and work locus of control in information security awareness. Comput. Secur. 81, 41–48 (2018)
Johnson, K.: Better Safe than Sorry: The Relationship between Locus of Control, Perception of Risk, and Cyber Misbehaviors – ProQuest. In: Doctoral dissertation, University of South Florida (2018). https://www.proquest.com/openview/42ccd20fc5e2b6403ece12dff9686055/1?pq-origsite=gscholar&cbl=18750. Accessed 30 Dec 2023
Whitty, M.T.: Is there a scam for everyone? Psychologically profiling cyberscam victims. Eur. J. Crim. Policy Res. 26(3), 399–409 (2020). https://doi.org/10.1007/s10610-020-09458-z
McCrae, R.R., Costa, P.T.: Validation of the five-factor model of personality across instruments and observers. J. Pers. Soc. Psychol. 52(1), 81–90 (1987). https://doi.org/10.1037/0022-3514.52.1.81
Lawson, P., Zielinska, O., Pearson, C., Mayhorn, C.B.: Interaction of personality and persuasion tactics in email phishing attacks. Proc. Hum. Factors Ergon. Soc. Ann. Meet. 61(1), 1331–1333 (2017). https://doi.org/10.1177/1541931213601815
Pattinson, M., Jerram, C., Parsons, K., McCormac, A., Butavicius, M.: Why do some people manage phishing e-mails better than others? Inf. Manag. Comput. Secur. 20(1), 18–28 (2012). https://doi.org/10.1108/09685221211219173
Sudzina, F., Pavlicek, A.: Propensity to click on suspicious links: impact of gender, of age, and of personality traits. In: Digital Transformation – From Connecting Things to Transforming Our Lives, University of Maribor Press, pp. 593–601 (2017). https://doi.org/10.18690/978-961-286-043-1.41
Workman, M.: Wisecrackers: A theory-grounded investigation of phishing and pretext social engineering threats to information security. J. Am. Soc. Inform. Sci. Technol. 59(4), 662–674 (2008). https://doi.org/10.1002/asi.20779
Steves, M.P. Greene, K.K., Theofanos, M.F.: A phish scale: rating human phishing message detection difficulty. In: Proceedings 2019 Workshop on Usable Security, San Diego, CA: Internet Society (2019). https://doi.org/10.14722/usec.2019.23028
Canham, M., Hegarty, M.: Effects of knowledge and display design on comprehension of complex graphics. Learn. Instr. 20(2), 155–166 (2010). https://doi.org/10.1016/j.learninstruc.2009.02.014
Steves, M., Greene, K., Theofanos, M.: Categorizing human phishing difficulty: a Phish Scale. J. Cybersecurity 6(1), 1–16 (2020). https://doi.org/10.1093/cybsec/tyaa009
Dawkins, S., Jacobs, J.: NIST Phish Scale User Guide. National Institute of Standards and Technology, Gaithersburg, MD, NIST TN 2276 (2023). https://doi.org/10.6028/NIST.TN.2276
Shah, K.R., Sinha, B.K.: 4 Row-Column Designs. Theory of Optimal Designs. In: Lecture Notes in Statistics, no. 54. Springer-Verlag (1989). https://doi.org/10.1007/978-1-4612-3662-7
Carella, A., Kotsoev, M., Truta, T.M.: Impact of security awareness training on phishing click-through rates. In: 2017 IEEE International Conference on Big Data (Big Data), pp. 4458–4466 (2017). https://doi.org/10.1109/BigData.2017.8258485
Halevi, T., Memon, N., Nov, O.: Spear-phishing in the wild: a real-world study of personality, phishing self-efficacy and vulnerability to spear-phishing attacks. In: Social Science Research Network, Rochester, NY, SSRN Scholarly Paper ID 2544742 (2015). https://doi.org/10.2139/ssrn.2544742
Moody, G.D., Galletta, D.F., Dunn, B.K.: Which phish get caught? An exploratory study of individuals′ susceptibility to phishing. Eur. J. Inf. Syst. 26(6), 564–584 (2017). https://doi.org/10.1057/s41303-017-0058-x
Joiner, R., Brosnan, M., Duffield, J., Gavin, J., Maras, P.: The relationship between Internet identification, Internet anxiety and Internet use. Comput. Hum. Behav. 23(3), 1408–1420 (2007). https://doi.org/10.1016/j.chb.2005.03.002
Maples-Keller, J.L., Williamson, R.L., Sleep, C.E., Carter, N.T., Campbell, W.K., Miller, J.D.: Using item response theory to develop a 60-item representation of the NEO PI–R using the international personality item pool: development of the IPIP–NEO–60. J. Pers. Assess. 101(1), 4–15 (2019). https://doi.org/10.1080/00223891.2017.1381968
Cacioppo, J.T., Petty, R.E.: The need for cognition. J. Pers. Soc. Psychol. 42(1), 116–131 (1982). https://doi.org/10.1037/0022-3514.42.1.116
Collins, R.P., Litman, J.A., Spielberger, C.D.: The measurement of perceptual curiosity. Personality Individ. Differ. 36(5), 1127–1141 (2004). https://doi.org/10.1016/S0191-8869(03)00205-8
Herman, J.L., Stevens, M.J., Bird, A., Mendenhall, M., Oddou, G.: The tolerance for ambiguity scale: towards a more refined measure for international management research. Int. J. Intercult. Relat. 34(1), 58–65 (2010). https://doi.org/10.1016/j.ijintrel.2009.09.004
Nicholson, N., Soane, E., Fenton‐O’Creevy, M., Willman, P.: Personality and domain‐specific risk taking. J. Risk Res. 8(2), 157–176 (2005). https://doi.org/10.1080/1366987032000123856
Tellegen, A.: Multidimensional Personality Questionnaire-276 (MPQ-276) Test Booklet, 1st ed., vol. 1. University of Minnesota Press, Minneapolis (1995)
Levenson, H.: Differentiating among internality, powerful others, and chance. In: Research with the Locus of Control Construct, Lefcourt, H.M., Ed., Academic Press, pp. 1–15 (1981)
Oregon Research Institute. Locus of Control, Single Construct Scoring Keys, International Personality Item Pool (2022). https://ipip.ori.org/newSingleConstructsKey.htm
(Robert) Luo, X., Zhang, W., Burd, S., Seazzu, A.: Investigating phishing victimization with the Heuristic–Systematic Model: A theoretical framework and an exploration. Comput. Secur. 38, 28–38 (2013). https://doi.org/10.1016/j.cose.2012.12.003
Cialdini, R.B.: Pre-Suasion: A Revolutionary Way to Influence and Persuade, Reprint edition. Simon & Schuster, New York (2016)
Mayer, R.E., Alexander, P.A.: Handbook of Research on Learning and Instruction. Taylor & Francis, Florence (2016)
Vygotsky, L.S., Cole, M.: Mind in Society: Development of Higher Psychological Processes. Harvard University Press, Cambridge (1978)
Acknowledgements
The authors wish to thank Dr. Ben D. Sawyer, Dr. Erica Castilho Grao, Dr. Clay Posey, Michael Constantino, and Delainey Strickland for their assistance in collecting and analyzing the data for this study.
This research was conducted with the support of the National Institute of Standards and Technology (NIST) under Financial Assistance Award Number: 60NANB19D123. The views and conclusions contained in this document are those of the author and should not be interpreted as representing the official policies, either expressed or implied, of NIST or the U.S. Government.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2024 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this paper
Cite this paper
Canham, M., Dawkins, S., Jacobs, J. (2024). Not All Victims Are Created Equal: Investigating Differential Phishing Susceptibility. In: Schmorrow, D.D., Fidopiastis, C.M. (eds) Augmented Cognition. HCII 2024. Lecture Notes in Computer Science(), vol 14694. Springer, Cham. https://doi.org/10.1007/978-3-031-61569-6_1
Download citation
DOI: https://doi.org/10.1007/978-3-031-61569-6_1
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-031-61568-9
Online ISBN: 978-3-031-61569-6
eBook Packages: Computer ScienceComputer Science (R0)