{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,7]],"date-time":"2026-01-07T23:08:00Z","timestamp":1767827280581,"version":"3.49.0"},"reference-count":23,"publisher":"SAGE Publications","issue":"8","license":[{"start":{"date-parts":[[2018,7,31]],"date-time":"2018-07-31T00:00:00Z","timestamp":1532995200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/journals.sagepub.com\/page\/policies\/text-and-data-mining-license"}],"content-domain":{"domain":["journals.sagepub.com"],"crossmark-restriction":true},"short-container-title":["Hum Factors"],"published-print":{"date-parts":[[2018,12]]},"abstract":"<jats:sec><jats:title>Objective:<\/jats:title><jats:p> To examine the utility of equal-variance signal detection theory (EVSDT) for evaluating and understanding human detection of phishing and spear-phishing e-mail scams. <\/jats:p><\/jats:sec><jats:sec><jats:title>Background:<\/jats:title><jats:p> Although the majority of cybersecurity breaches are due to erroneous responses to deceptive phishing e-mails, it is unclear how best to quantify performance in this context. In particular, it is unclear whether equal variances can safely be assumed in the SDT model, or, relatedly, whether degree of targeting, or threat level, primarily affects mean separation or evidence variability. <\/jats:p><\/jats:sec><jats:sec><jats:title>Method:<\/jats:title><jats:p> Through an online inbox simulation, the present research found that differences in susceptibility to phishing and spear-phishing e-mails could be carefully quantified with respect to detection accuracy and response bias through the use of an EVSDT framework. <\/jats:p><\/jats:sec><jats:sec><jats:title>Results:<\/jats:title><jats:p> The results indicated that EVSDT-based point metrics are effective for modeling and measuring phishing susceptibility in the inbox task, without the need for parameter estimation or model comparison involving unequal-variance SDT (UVSDT). Threat level modulated mean separation, with no effects on signal variances. <\/jats:p><\/jats:sec><jats:sec><jats:title>Conclusion:<\/jats:title><jats:p> These findings support the viability of using EVSDT to initially assess and subsequently monitor training effectiveness for phishing susceptibility, thereby providing measures that are superior to more intuitive metrics, which typically confound an individual\u2019s bias and accuracy. Effects of threat level mapped clearly onto distribution means with no effect on variances, suggesting phishing susceptibility primarily reflects temporally stable discriminative characteristics of observers. Notably, results indicated that people are particularly poor at identifying spear-phishing e-mail threats (demonstrating only 40% accuracy). <\/jats:p><\/jats:sec>","DOI":"10.1177\/0018720818789818","type":"journal-article","created":{"date-parts":[[2018,7,31]],"date-time":"2018-07-31T20:39:25Z","timestamp":1533069565000},"page":"1179-1191","update-policy":"https:\/\/doi.org\/10.1177\/sage-journals-update-policy","source":"Crossref","is-referenced-by-count":28,"title":["Signal Detection Theory (SDT) Is Effective for Modeling User Behavior Toward Phishing and Spear-Phishing Attacks"],"prefix":"10.1177","volume":"60","author":[{"given":"Jaclyn","family":"Martin","sequence":"first","affiliation":[{"name":"University of South Florida, Tampa, USA"}]},{"given":"Chad","family":"Dub\u00e9","sequence":"additional","affiliation":[{"name":"University of South Florida, Tampa, USA"}]},{"given":"Michael D.","family":"Coovert","sequence":"additional","affiliation":[{"name":"University of South Florida, Tampa, USA"}]}],"member":"179","published-online":{"date-parts":[[2018,7,31]]},"reference":[{"key":"bibr1-0018720818789818","doi-asserted-by":"publisher","DOI":"10.4324\/9781410600004"},{"key":"bibr2-0018720818789818","unstructured":"Bailey J. L., Mitchell R. B., Jensen B. K. (2008). Analysis of student vulnerabilities to phishing. AMCIS Proceedings, 271. Retrieved from http:\/\/aisel.aisnet.org\/amcis2008\/271"},{"key":"bibr3-0018720818789818","doi-asserted-by":"publisher","DOI":"10.1177\/0018720816665025"},{"key":"bibr4-0018720818789818","doi-asserted-by":"publisher","DOI":"10.1109\/ICCSII.2012.6454454"},{"key":"bibr5-0018720818789818","doi-asserted-by":"publisher","DOI":"10.1016\/0022-2496(69)90019-4"},{"key":"bibr6-0018720818789818","doi-asserted-by":"publisher","DOI":"10.1145\/1143120.1143131"},{"key":"bibr7-0018720818789818","doi-asserted-by":"publisher","DOI":"10.1037\/a0024957"},{"key":"bibr8-0018720818789818","volume-title":"Signal detection theory and psychophysics","author":"Green D. M.","year":"1966"},{"key":"bibr9-0018720818789818","unstructured":"Haselton T. (2017, September 7). Credit reporting firm Equifax says data breach could potentially affect 143 million US consumers. Retreived from https:\/\/www.cnbc.com\/2017\/09\/07\/credit-reporting-firm-equifax-says-cybersecurity-incident-could-potentially-affect-143-million-us-consumers.html"},{"key":"bibr10-0018720818789818","doi-asserted-by":"publisher","DOI":"10.1145\/1290958.1290968"},{"key":"bibr11-0018720818789818","doi-asserted-by":"publisher","DOI":"10.1017\/iop.2015.13"},{"key":"bibr12-0018720818789818","doi-asserted-by":"publisher","DOI":"10.1037\/0021-9010.70.1.66"},{"key":"bibr13-0018720818789818","doi-asserted-by":"publisher","DOI":"10.4324\/9781410611147"},{"key":"bibr14-0018720818789818","doi-asserted-by":"publisher","DOI":"10.1177\/154193121005402311"},{"key":"bibr15-0018720818789818","volume-title":"A personality based model for determining susceptibility to phishing attacks","author":"Parrish J. L.","year":"2009"},{"key":"bibr16-0018720818789818","doi-asserted-by":"publisher","DOI":"10.1037\/a0033044"},{"key":"bibr17-0018720818789818","doi-asserted-by":"publisher","DOI":"10.1145\/1753326.1753383"},{"key":"bibr18-0018720818789818","unstructured":"Singletary M. (2015, December 11). What to do if you are affected by the OPM data breach. Retrieved May 09, 2017, from https:\/\/www.washingtonpost.com\/business\/get-there\/what-to-do-if-you-are-affected-by-the-opm-data-breach\/2015\/12\/09\/534455e0-9dd0-11e5-a3c5-c77f2cc5a43c_story.html?utm_term=.3a12e61f9f46"},{"key":"bibr19-0018720818789818","doi-asserted-by":"publisher","DOI":"10.3758\/BF03207691"},{"key":"bibr20-0018720818789818","author":"Staggs J.","year":"2014","journal-title":"Journal of the Colloquium for Information System Security Education"},{"key":"bibr21-0018720818789818","doi-asserted-by":"publisher","DOI":"10.3758\/BF03207704"},{"key":"bibr22-0018720818789818","doi-asserted-by":"publisher","DOI":"10.1111\/jcc4.12126"},{"key":"bibr23-0018720818789818","doi-asserted-by":"publisher","DOI":"10.1037\/0033-295X.114.1.152"}],"container-title":["Human Factors: The Journal of the Human Factors and Ergonomics Society"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/journals.sagepub.com\/doi\/pdf\/10.1177\/0018720818789818","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/journals.sagepub.com\/doi\/full-xml\/10.1177\/0018720818789818","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/journals.sagepub.com\/doi\/pdf\/10.1177\/0018720818789818","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,28]],"date-time":"2025-02-28T22:33:32Z","timestamp":1740782012000},"score":1,"resource":{"primary":{"URL":"https:\/\/journals.sagepub.com\/doi\/10.1177\/0018720818789818"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,7,31]]},"references-count":23,"journal-issue":{"issue":"8","published-print":{"date-parts":[[2018,12]]}},"alternative-id":["10.1177\/0018720818789818"],"URL":"https:\/\/doi.org\/10.1177\/0018720818789818","relation":{},"ISSN":["0018-7208","1547-8181"],"issn-type":[{"value":"0018-7208","type":"print"},{"value":"1547-8181","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,7,31]]}}}