620
Views
5
CrossRef citations to date
0
Altmetric
Article

The psychological interaction of spam email features

, , , , &
Pages 983-994 | Received 01 May 2018, Accepted 23 Apr 2019, Published online: 20 May 2019

References

  • Ashby, F. G., and W. T. Maddox. 2011. “Human Category Learning 2.0.” Annals of the New York Academy of Sciences 1224: 147–161. doi:10.1111/j.1749-6632.2010.05874.x.
  • Ashby, F. G., and J. T. Townsend. 1986. “Varieties of Perceptual Independence.” Psychological Review 93 (2): 154. doi:10.1037/0033-295X.93.2.154.
  • Bergholz, A., J. De Beer, S. Glahn, M. Moens, G. Paaß, and S. Strobel. 2010. “New Filtering Approaches for Phishing Email.” Journal of Computer Security 18 (1): 7–35. doi:10.3233/JCS-2010-0371.
  • Canfield, C. I., B. Fischhoff, and A. Davis. 2016. “Quantifying Phishing Susceptibility for Detection and Behavior Decisions.” Human Factors: The Journal of the Human Factors and Ergonomics Society 58 (8): 1158–1172. doi:10.1177/0018720816665025.
  • Chandrasekaran, M., K. Narayanan, and S. Upadhyaya. 2006. “Phishing Email Detection Based on Structural Properties.” Paper presented at the New York State Cyber Security Conference. Albany, NY, June 2006.
  • Downs, J. S., M. B. Holbrook, and L. F. Cranor. 2006. “Decision Strategies and Susceptibility to Phishing.” In Proceedings of the Second Symposium on Usable Privacy and Security, 79–90. Pittsburgh, PA: ACM.
  • Drake, C. E., J. J. Oliver, and E. J. Koontz. 2004. “Anatomy of a Phishing Email.” In Proceedings of the Second Conference on Email and Anti-Spam (CEAS). ACM, New York, NY, USA.
  • Farris, C., R. J. Viken, and T. A. Treat. 2010. “Perceived Association between Diagnostic and Non-Diagnostic Cues of Women’s Sexual Interest: General Recognition Theory Predictors of Risk for Sexual Coercion.” Journal of Mathematical Psychology 54 (1): 137–149. doi:10.1016/j.jmp.2008.10.001.
  • Farris, C., R. J. Viken, T. A. Treat, and R. M. McFall. 2006. “Heterosocial Perceptual Organization: Application of the Choice Model to Sexual Coercion.” Psychological Science 17 (10): 869–875. doi:10.1111/j.1467-9280.2006.01796.x.
  • Ferguson, A. J. 2005. “Fostering Email Security Awareness: The West Point Carronade.” Educause Quarterly 1: 55–57.
  • Fette, I., N. Sadeh, and A. Tomasic. 2007. “Learning to Detect Phishing Emails.” In Proceedings of the 16th International Conference on World Wide Web. Ney York, NY: ACM.
  • Grimes, G. A., M. G. Hough, and M. L. Signorella. 2007. “Email End Users and Spam: Relations of Gender and Age Group to Attitudes and Actions.” Computers in Human Behavior 23 (1): 318–332. doi:10.1016/j.chb.2004.10.015.
  • Hayden, E. C. 2015. “Cybercrime Fight Targets User Error.” Nature 518: 282–283.
  • Herley, C. 2012. “Why do Nigerian Scammers Say They are from Nigeria?” In Proceedings of the Workshop on the Economics of Information Security. Berlin, Germany: Springer-Verlag.
  • Jagatic, T. N., N. A. Johnson, M. Jakobsson, and F. Menczer. 2007. “Social Phishing.” Communications of the ACM 50 (10): 94–100. doi:10.1145/1290958.1290968.
  • Kleider-Offutt, H. M., A. D. Bond, S. E. Williams, and C. J. Bohil. 2018. “When a Face Type Is Perceived as Threatening: Using General Recognition Theory to Understand Biased Categorization of Afrocentric Faces.” Memory and Cognition 46 (5): 716–728.
  • Kumaraguru, P., S. Sheng, A. Acquisti, L. F. Cranor, and J. Hong. 2010. “Teaching Johnny Not to Fall for Phish.” ACM Transactions on Internet Technology (TOIT) 10 (2): 7. doi:10.1145/1754393.1754396.
  • Lowd, D., and C. Meek. 2005. “Good Word Attacks on Statistical Spam Filters.” In Proceedings of the Second Conference on Email and Anti-Spam (CEAS). ACM, New York, NY, USA.
  • Macmillan, N. A., and C. D. Creelman. 2004. Detection Theory: A User’s Guide. New York, NY: Psychology press.
  • Mayhorn, C. B., and P. G. Nyeste. 2012. “Training Users to Counteract Phishing.” Work 41 (1): 3549–3552. doi:10.3233/WOR-2012-1054-3549.
  • McCarley, J. S., and W. K. Krebs. 2006. “The Psychophysics of Sensor Fusion: A Multidimensional Signal Detection Analysis.” Proceedings of the Human Factors and Ergonomics Society Annual Meeting 50 (17): 2094–2098. doi:10.1177/154193120605001781.
  • Parsons, K., A. McCormac, M. Pattinson, M. Butavicius, and C. Jerram. 2013. Phishing for the Truth: A Scenario-Based Experiment of Users’ Behavioural Response to Emails. In IFIP International Information Security Conference, 366–378. Berlin, Heidelberg: Springer.
  • R Core Team. 2016. “R: A language and environment for statistical computing.” R Foundation for Statistical Computing. Vienna, Austria. Accessed on May 9, 2019. http://www.R-project.org/
  • Robila, S. A., and J. W. Ragucci. 2006. “Don’t Be a Phish: Steps in User Education.” Proceedings of the 11th annual SIGCSE conference on Innovation and technology in computer science education. ACM New York, NY, USA.
  • RStudio Team. 2016. RStudio: Integrated Development for R. Boston, MA: RStudio, Inc. Retrieved from http://www.rstudio.com/
  • Soto, F. A., L. Vucovich, R. Musgrave, and F. G. Ashby. 2015. “General Recognition Theory with Individual Differences: A New Method for Examining Perceptual and Decisional Interactions with an Application to Face Perception.” Psychonomic Bulletin & Review 22 (1): 88–111. doi:10.3758/s13423-014-0661-y.
  • Soto, F. A., E. Zheng, J. Fonseca, and F. G. Ashby. 2017. “Testing Separability and Independence of Perceptual Dimensions with General Recognition Theory: A Tutorial and New R Package (grtools).” Frontiers in Psychology.8: 696. doi:10.3389/fpsyg.2017.00696.
  • Vishwanath, A., B. Harrison, and Y. J. Ng. 2016. “Suspicion, Cognition, and Automaticity Model of Phishing Susceptibility.” Communication Research 45 (8): 1146–1166. doi:10.1177%2F0093650215627483.
  • Vishwanath, A., T. Herath, R. Chen, J. Wang, and H. R. Rao. 2011. “Why Do People Get Phished? Testing Individual Differences in Phishing Vulnerability within an Integrated, Information Processing Model.” Decision Support Systems 51 (3): 576–586. doi:10.1016/j.dss.2011.03.002.
  • Wu, C., K. Cheng, Q. Zhu, and Y. Wu. 2005. “Using Visual Features for Anti-Spam Filtering.” In Proceedings of the IEEE International Conference on Image Processing. Genoa, Italy: IEEE.
  • Youn, S., and D. McLeod. 2007. “A Comparative Study for Email Classification.” Computing Sciences and Software Engineering 387: 391.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.