skip to main content
10.1145/1978942.1979459acmconferencesArticle/Chapter ViewAbstractPublication PageschiConference Proceedingsconference-collections
research-article

F for fake: four studies on how we fall for phish

Published:07 May 2011Publication History

ABSTRACT

This paper reports findings from a multi-method set of four studies that investigate why we continue to fall for phish. Current security advice suggests poor spelling and grammar in emails can be signs of phish. But a content analysis of a phishing archive indicates that many such emails contain no obvious spelling or grammar mistakes and often use convincing logos and letterheads. An online survey of 224 people finds that although phish are detected approximately 80% of the time, those with logos are significantly harder to detect. A qualitative interview study was undertaken to better understand the strategies used to identify phish. Blind users were selected because it was thought they may be more vulnerable to phishing attacks, however they demonstrated robust strategies for identifying phish based on careful reading of emails. Finally an analysis was undertaken of phish as a literary form. This identifies the main literary device employed as pastiche and draws on critical theory to consider why security based pastiche may be currently very persuasive.

References

  1. Anti-Phishing Working Group (APWG). http://antiphishing.org/.Google ScholarGoogle Scholar
  2. Bank Safe Online: Protecting Yourself. http://www.banksafeonline.org.uk/protecting_yourself.html.Google ScholarGoogle Scholar
  3. Bardzell, J. (2009). Interaction criticism and aesthetics. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI '09). New York: ACM Press. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Bell, G., Blythe, M., Gaver, B., Sengers, P. & Wright, P. (2003). Designing culturally situated technologies for the home. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI '03) Extended Abstracts. New York: ACM Press. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. Blythe, M., Reid, J., Wright, P. & Geelhoed, E. (2006). Interdisciplinary Criticism: Analysing The Experience Of Riot! A Location Sensitive Digital Narrative. Behaviour and Information Technology, 25(2), 127--139.Google ScholarGoogle ScholarCross RefCross Ref
  6. Blythe, M., McCarthy, J., Light, A., Bardzell, S., Wright, P., Bardzell, J. & Blackwell, A. (2010). Critical dialogue: interaction, experience and cultural theory. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI 2010). New York: ACM Press. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. Braun, N. (2004). Storytelling and Conversation to Improve the Fun Factor in Software Applications. In M. Blythe, K. Overbeeke, A. F. Monk, & P. C. Wright (Eds.), Funology: From Usability to Enjoyment. Dordecht, NL: Kluwer. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. Cohen, J., Cohen, P., West, S. G. and Aiken, L. S. (2003). Applied multiple regression/correlation analysis for the behavioural sciences. Hillsdale, NJ: Lawrence Erlbaum.Google ScholarGoogle Scholar
  9. Dhamija, R., Tygar, D. & Hearst, M. (2006). Why phishing works. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI '06). New York: ACM Press. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. Dong, X., Clark, J. A. & Jacob, J. (2008). Modelling user-phishing interaction. Proceedings of Human-System Interaction, May 25--27, 2008, Kraków, Poland.Google ScholarGoogle Scholar
  11. Dourish, P., Grinter, E., Delgado de la Flor, J. & Joseph, M. (2004). Security in the wild: user strategies for managing security as an everyday, practical problem. Personal and Ubiquitous Computing, 8(6), 391--401. Google ScholarGoogle ScholarCross RefCross Ref
  12. Downs, J. S., Holbrook, M. B. & Cranor, L. F. (2006). Decision strategies and susceptibility to phishing. In Proceedings of the Second Symposium on Usable Privacy and Security (Pittsburgh, Pennsylvania, July 12 - 14, 2006) (SOUPS '06). New York: ACM Press. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. Eagleton T. (2003). After theory. London: Penguin Books.Google ScholarGoogle Scholar
  14. Easthope, A. & McGowan, K. (1992). A Critical and Cultural Theory Reader. Milton Keynes: Open University Press.Google ScholarGoogle Scholar
  15. Giani, A. & Thompson, P. (2007). Detecting deception in the context of Web 2.0. In Proceedings of Web 2.0 Security and Privacy 2007. http://w2spconf.com/2007/.Google ScholarGoogle Scholar
  16. HSBC Phishing Scams. http://www.hsbc.com/1/2/online-security/phishing.Google ScholarGoogle Scholar
  17. Jakobsson, M. (2007). The human factor in phishing. In Proceedings of Privacy & Security of Consumer Information '07. http://markus-jakobsson.com/papers/jakobsson-psci07.pdf.Google ScholarGoogle Scholar
  18. Jolliffe, I. T. (1986). Principal Component Analysis. Berlin: Springer Verlag.Google ScholarGoogle ScholarCross RefCross Ref
  19. Keppel, G. & Wickens, T. D. (2004). Design and analysis: a researcher's handbook. Upper Saddle River, NJ: Pearson Prentice-Hall.Google ScholarGoogle Scholar
  20. Kumaraguru, P., Rhee, Y., Acquisti, A., Cranor, L. F., Hong, J. & Nunge, E. (2007). Protecting people from phishing: the design and evaluation of an embedded training email system. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI '07). New York: ACM Press. Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. Mayring P. (2004). Qualitative Content Analysis in Flickr. In Kardorff, U. & Steinke, E. (Eds.), A Companion to Qualitative Research. London: Sage.Google ScholarGoogle Scholar
  22. MillerSmiles.co.uk 419 scams. http://419.millersmiles.co.uk/.Google ScholarGoogle Scholar
  23. Propp, V. (1968). Morphology of the Folk Tale. Texas: University of Texas Press.Google ScholarGoogle Scholar
  24. Satchell C. (2008) Cultural Theory and Real World Design: Dystopian and Utopian Outcomes. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI '08). New York: ACM Press. Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. Sheng, S., Holbrook, M., Kumaraguru, P., Cranor, L. F., and Downs, J. 2010. Who falls for phish?: a demographic analysis of phishing susceptibility and effectiveness of interventions. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems. New York: ACM Press. Google ScholarGoogle ScholarDigital LibraryDigital Library
  26. Singh, S., Cabraal, A., Demosthenous, C., Astbrink, G., and Furlong, M. 2007. Password sharing: implications for security design based on social practice. In Proceedings of the Conference on Human Factors in Computing Systems (CHI '07). New York: ACM Press. Google ScholarGoogle ScholarDigital LibraryDigital Library
  27. The One Show: Phishing in Your Bank Account? http://www.bbc.co.uk/blogs/theoneshow/consumer/2008/10/30/phishing.html.Google ScholarGoogle Scholar
  28. Wickens, T. D. (2002). Elementary signal detection. New York: Oxford University Press.Google ScholarGoogle Scholar
  29. Wu, M., Miller, R. C. and Garfinkel, S. L. (2006). Do security toolbars actually prevent phishing attacks? In Proceedings of the Conference on Human Factors in Computing Systems. New York: ACM Press. Google ScholarGoogle ScholarDigital LibraryDigital Library
  30. Zizek S. (1992). Looking Awry: an introduction to Jacques Lacan through popular culture. Cambridge, MA: October Books.Google ScholarGoogle Scholar

Index Terms

  1. F for fake: four studies on how we fall for phish

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Conferences
      CHI '11: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
      May 2011
      3530 pages
      ISBN:9781450302289
      DOI:10.1145/1978942

      Copyright © 2011 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 7 May 2011

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article

      Acceptance Rates

      CHI '11 Paper Acceptance Rate410of1,532submissions,27%Overall Acceptance Rate6,199of26,314submissions,24%

      Upcoming Conference

      CHI '24
      CHI Conference on Human Factors in Computing Systems
      May 11 - 16, 2024
      Honolulu , HI , USA

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader