2019
DOI: 10.1002/acp.3594
|View full text |Cite
|
Sign up to set email alerts
|

Perceptual representation of spam and phishing emails

Abstract: SummaryUnderstanding how computer users allocate attention to features of potentially dangerous emails could help mitigate costly errors. Which features are salient? How stable is attention allocation across variation in email features? We attempted to measure the mental salience of several email features common in spam and/or phishing emails. We created two email sets: one in which messages contained company logos and urgent actionable links and one without these features. Participants rated pairwise similari… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
6
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
8
2

Relationship

1
9

Authors

Journals

citations
Cited by 12 publications
(6 citation statements)
references
References 20 publications
0
6
0
Order By: Relevance
“…The experiment was programmed and run in SR Research Ltd’s Experiment Builder. Stimuli were real emails, obtained from either the researcher’s inboxes/junk folders or web searches, and have been validated in previous studies (Sarno et al, 2020, Sarno et al, 2017; Patel et al, 2019; Williams et al, 2019). Participants had unlimited time to view the 100 emails.…”
Section: Methodsmentioning
confidence: 99%
“…The experiment was programmed and run in SR Research Ltd’s Experiment Builder. Stimuli were real emails, obtained from either the researcher’s inboxes/junk folders or web searches, and have been validated in previous studies (Sarno et al, 2020, Sarno et al, 2017; Patel et al, 2019; Williams et al, 2019). Participants had unlimited time to view the 100 emails.…”
Section: Methodsmentioning
confidence: 99%
“…In the second part, we analyze publications studying the training materials themselves (e.g., how the documents should be structured or whether more graphics should be used than text). [50,96], trust symbols [111,120,129], spelling [130], links [130], content consistency [130], personalization [130], visual appearance [95,119,130], urgency [130], social presence [87] Spelling errors [84], link destination [127] Topic Shipping [50], order [50], received fax [50], complaint [50], banks [136], government institutions [136] Other gain [55], other loss [55], individual gain [55], individual loss [55] Link URL Categories 5, 6 [128], same protocol [79], contains secure or similar terms [128] Categories 1, 2, 7 [128] Design Clone of original [79,124] -Survey a. Form of the training: Based on their results, Kumaraguru et al [82] suggest that users learn more effectively when the training materials are presented after the users have fallen victim to a simulated attack.…”
Section: Introductionmentioning
confidence: 99%
“…Phishing is related to spam and refers to deceptive computer-based ways to trick individuals into reacting to the e-mail and disclosing sensitive information. Spam messages are delivered through compromised e-mail systems using an alternate e-mail address [84].…”
Section: Spam and Phishingmentioning
confidence: 99%