PSYCH OpenIR  > 中国科学院行为科学重点实验室
How personal characteristics impact phishing susceptibility: The mediating role of mail processing
Ge, Yan1,2; Lu, Li1; Cui, Xinyue1,2; Chen, Zhe3; Qu, Weina1,2
First AuthorGe, Yan
ContributorQu, Weina
Correspondent Emailquwn@psych.ac.cn (w. qu)
Contribution Rank1
Abstract

In the phishing email literature, recent researchers have given much attention to individual differences in phishing susceptibility from the perspective of the Big Five personality traits. Although the effectiveness and advantages of the phishing susceptibility measures in the signal detection theory (SDT) framework have been verified, the cognitive mechanisms that lead to individual differences in these measures remain unknown. The current study proposed and examined a theoretical path model to explore how the Big Five personality traits, related knowledge and experience and the cognitive processing of emails (i.e., mail elaboration) influence users' susceptibility to phishing emails. A sample of 414 Chinese participants completed the 44-item Big Five Personality Inventory (BFI-44), Mail Elaboration Scale (MES), Web Experience Questionnaire, Experience with Electronic Mail Scale, Knowledge and Technical Background Test and a demographic questionnaire. The phishing susceptibility measures were calculated after the participants finished an email legitimacy task in a role-playing scenario. The results showed that the general profile of the "victim personality" included low conscientiousness, low openness and high neuroticism, and Internet experience and computer and web knowledge played an important role. All of these factors have significant indirect effects on phishing susceptibility by influencing mail elaboration. Moreover, the probabilities of checking for further information or deleting the email reflect the sensitivity of email judgment. These findings reveal the mediating role of cognitive processing between individual factors and phishing susceptibility. The theoretical implications of this study for the phishing susceptibility literature and its applications to phishing risk interventions or training programs are discussed.

KeywordCognitive processing of emails Personality traits Phishing susceptibility Signal detection theory
2021-07
Language英语
DOI10.1016/j.apergo.2021.103526
Source PublicationApplied ergonomics
ISSN1872-9126
Volume97Pages:103526
Subtype实证研究
Indexed ByEI
Citation statistics
Document Type期刊论文
Identifierhttp://ir.psych.ac.cn/handle/311026/39588
Collection中国科学院行为科学重点实验室
Affiliation1.CAS Key Laboratory of Behavioral Science, Institute of Psychology, Chinese Academy of Sciences, Beijing, China
2.Department of Psychology, University of Chinese Academy of Sciences, Beijing, China
3.School of Computer and Information Technology, Beijing Jiaotong University, Beijing, China
First Author AffilicationKey Laboratory of Behavioral Science, CAS
Recommended Citation
GB/T 7714
Ge, Yan,Lu, Li,Cui, Xinyue,et al. How personal characteristics impact phishing susceptibility: The mediating role of mail processing[J]. Applied ergonomics,2021,97:103526.
APA Ge, Yan,Lu, Li,Cui, Xinyue,Chen, Zhe,&Qu, Weina.(2021).How personal characteristics impact phishing susceptibility: The mediating role of mail processing.Applied ergonomics,97,103526.
MLA Ge, Yan,et al."How personal characteristics impact phishing susceptibility: The mediating role of mail processing".Applied ergonomics 97(2021):103526.
Files in This Item:
File Name/Size DocType Version Access License
How personal charact(2149KB)期刊论文出版稿限制开放CC BY-NC-SAApplication Full Text
Related Services
Recommend this item
Bookmark
Usage statistics
Export to Endnote
Google Scholar
Similar articles in Google Scholar
[Ge, Yan]'s Articles
[Lu, Li]'s Articles
[Cui, Xinyue]'s Articles
Baidu academic
Similar articles in Baidu academic
[Ge, Yan]'s Articles
[Lu, Li]'s Articles
[Cui, Xinyue]'s Articles
Bing Scholar
Similar articles in Bing Scholar
[Ge, Yan]'s Articles
[Lu, Li]'s Articles
[Cui, Xinyue]'s Articles
Terms of Use
No data!
Social Bookmark/Share
All comments (0)
No comment.
 

Items in the repository are protected by copyright, with all rights reserved, unless otherwise indicated.