Phishing is the spoofing of Internet websites or emails aimed at tricking users into entering sensitive information, with such goals as financial or identity theft. The current study sought to determine whether age is associated with increased susceptibility to phishing and whether tests of executive functioning can predict phishing susceptibility. A total of 193 cognitively intact participants, 91 younger adults and 102 older adults, were primarily recruited through a Psychology department undergraduate subject pool and a gerontology research registry, respectively. The Executive Functions Module from the Neuropsychological Assessment Battery and the Iowa Gambling Task were the primary cognitive predictors of reported phishing suspiciousness. Other predictors included age group (older vs. younger), sex, education, race, ethnicity, prior knowledge of phishing, prior susceptibility to phishing, and whether or not browsing behaviors were reportedly different in the laboratory setting versus at home. A logistic regression, which accounted for a 22.7% reduction in error variance compared to the null model and predicted phishing suspiciousness with 73.1% (95% CI [66.0, 80.3]) accuracy, revealed three statistically significant predictors: the main effect of education (b = 0.58, SE = 0.27) and the interactions of age group with prior awareness of phishing (b = 2.31, SE = 1.12) and performance on the Neuropsychological Assessment Battery Mazes test (b = 0.16, SE = 0.07). Whether or not older adults reported being suspicious of the phishing attacks used in this study was partially explained by educational history and prior phishing knowledge. This suggests that simple educational interventions may be effective in reducing phishing vulnerability. Although one test of executive functioning was found useful for identifying those at risk of phishing susceptibility, four tests were not found to be useful; these results speak to the need for more ecologically valid tools in clinical neuropsychology.
Citation: Gavett BE, Zhao R, John SE, Bussell CA, Roberts JR, Yue C (2017) Phishing suspiciousness in older and younger adults: The role of executive functioning. PLoS ONE 12(2): e0171620. https://doi.org/10.1371/journal.pone.0171620
Editor: Etsuro Ito, Waseda University, JAPAN
Received: November 23, 2016; Accepted: January 23, 2017; Published: February 3, 2017
Copyright: © 2017 Gavett et al. This is an open access article distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited.
Data Availability: The data file for this project is publicly available through the Open Science Framework (DOI: 10.17605/OSF.IO/Z4382; ARK: c7605/osf.io/z4382).
Funding: This material is based upon work supported by the National Science Foundation under Grant Nos. CNS-1624149 (https://www.nsf.gov/awardsearch/showAward?AWD_ID=1624149) and CNS-1359542 (https://www.nsf.gov/awardsearch/showAward?AWD_ID=1359542). The funders had no role in study design, data collection and analysis, decision to publish, or preparation of the manuscript.
Competing interests: The authors have declared that no competing interests exist.
Phishing is the spoofing of Internet websites or emails aimed at tricking users into entering sensitive information, such as usernames and passwords . It is one of the most severe and challenging threats to Internet security. As Internet accessibility continues to increase, and as the sophistication of phishing attacks continues to improve , individuals of all ages and backgrounds are increasingly susceptible to this threat. Falling victim to a phishing attempt may lead to identity theft and loss of financial resources . In older adults, these outcomes may have important consequences for living independently and for maintaining social, emotional, and medical health.
An abundance of research in the computer sciences and human factors fields has addressed phishing susceptibility and its association with demographic variables. For instance, Metzger et al.  reported that students were more likely to trust all information channels and less likely to verify online information compared to nonstudents. Sheng et al.  found that women and people between 18 and 25 years old were less suspicious of phishing than people of other ages. The effect of age on phishing susceptibility was largely explained by prior experience with phishing, experience using the Internet, perception of financial risk, and years of education. The average age of their sample, recruited through Amazon’s Mechanical Turk, was 30; but because no other information about the participants’ age was reported, the composition of older adults in that study is unclear . Using a role-play paradigm similar to Sheng and colleagues , Welk et al.  found that “personality characteristics that support reserved behavior, low impulsivity, and distrust decreased phishing susceptibility within an email-based decision making task” (p. 13). The increased impulsivity that is often characteristic of younger adults has been proposed as another mechanism governing the increased phishing susceptibility reported in this cohort. However, it should be noted that some studies have failed to demonstrate increased susceptibility in the 18–25 age group compared to older groups; for example, Zielinska et al.  found no difference between young people (age 18–25) and other people (age ≥ 26) in phishing susceptibility. Nevertheless, no studies of phishing susceptibility to date have focused specifically on older adults (i.e., age 50+).
Similarly, few studies have focused on examining the value of cognitive abilities in predicting phishing susceptibility. Vishwanath and colleagues have reported a series of studies showing that the degree to which participants pay attention to and recall the details of a phishing email are related to whether or not victimization occurs [8–10]. Hong and colleagues  measured working memory, crystallized intelligence, spatial skills, and sustained attention in their sample of younger adults, but did not report data related to the association between these cognitive abilities and performance on a phishing detection task. Finally, Purkait et al.  found positive associations between phishing detection and experimental measures of attentional vigilance and short-term memory. There are no other studies known to have evaluated the predictive validity of cognitive measures for phishing outcomes.
In the field of clinical neuropsychology, there is a large corpus of research that has focused on the use of cognitive tests to predict real-world functional outcomes, including instrumental activities of daily living (IADLs) such as financial management, driving, and medication adherence . These ecological validity studies are commonly pursued in an older adult population due to the increased risk of aging-related cognitive disorders and their associated functional disabilities . Given the now prevalent use of the Internet and smartphone applications for the organization and management of daily tasks such as shopping, banking, and social networking, predictions about real-world functional outcomes ought to include measures of technology use and its associated risks. The use of technology such as online shopping and banking may represent an enhanced activity of daily living (EADL; ) that serves to improve quality of life, whereas one’s ability to resist phishing and other scams may be best conceptualized as an IADL. Despite the threats posed by phishing, one’s ability to recognize and avoid phishing attacks has not been a common focus of research from the perspective of clinical neuropsychology and ecological validity. The current study was designed to bridge this gap in the literature, with the goals of adding a clinical and ecological perspective to the existing security-focused literature on phishing as well as taking the first steps toward promoting the assessment and prediction of phishing susceptibility across age groups.
Current older adult cohorts may be particularly vulnerable to phishing attempts. In fact, older adults appear to be disproportionately targeted for many types of fraud, including financial exploitation  as a result of their greater potential for wealth; decreased familiarity, comfort, and self-efficacy using computers; less experience with web browsing [17–20]; and increased risk for age-related cognitive decline . Even in the absence of mild cognitive impairment (MCI) or dementia, older adults may exhibit impairments in decision-making . For example, age-related decline in executive functioning is associated with a decline in functional capacities, such as financial management [23–25]. Research has consistently demonstrated that tests of executive functioning can be useful for the prediction of IADLs, especially in older adults with cognitive impairment due to neurodegenerative diseases [26–29]. For example, the Iowa Gambling Task (IGT) measures decision-making in ambiguous situations, which is believed to be important for performing IADLs . Other research has demonstrated associations between IADL functioning and scores on tests of judgment and decision-making [31,32], maze navigation , abstract reasoning and concept formation , and verbal fluency .
Avoiding online fraud is becoming an important component of one’s capacity to function independently. This is especially true for emerging cohorts of older adults who rely heavily on electronic storage of personal information, as through online banking applications, electronic medical records, and cloud-based storage systems. Clinicians working with older adults with known or suspected cognitive impairment may wish to assess this capacity to predict susceptibility and intervene when appropriate . Recent advances in the conceptualization and assessment of capacity have cautioned against treating this construct as a single entity; instead, it is recommended that capacity be conceptualized as applying to a particular function (e.g., capacity to make financial decisions) . Under this approach, the prediction of phishing susceptibility represents a specific type of capacity that may wish to be addressed to protect vulnerable individuals from financial abuse and identity theft. As current cohorts of digital natives age into older adulthood, assessing the capacity to detect phishing attempts will undoubtedly become an essential focus of clinical assessment.
The current study sought to identify and compare the relationship between cognitive functioning—in particular, executive functioning ability—and phishing susceptibility in younger and older adult samples. Because older adults are generally less familiar with computers [18–20] and are more likely to experience declines in abilities such as judgment and decision-making , we hypothesized that the older adult cohort would be more vulnerable to phishing attempts than the younger adult cohort. In addition, we hypothesized that commonly used tests of executive functioning, especially those measuring judgment and decision-making, would be predictive of phishing susceptibility.
Materials and methods
A total of 207 participants were recruited as volunteers for this study. Because we could not use the data from 10 participants due to technological errors and 4 participants for other reasons (confusion, n = 2; forgot login information, n = 2), the total sample size used in the current analysis was 193. The younger adult sample (n = 91) was primarily recruited through the Psychology department’s undergraduate subject pool at the University of Colorado Colorado Springs (UCCS), receiving course credit or extra credit for participation. The older adult sample (n = 102) was recruited from the community using a variety of methods, including a University Gerontology Center research registry, targeted newspaper advertisements, flyers, community lectures, and word of mouth. Older adults were compensated $15 for their participation. Inclusion criteria required use of the Internet at least once per month and possession of common Internet website accounts (e.g., Amazon, Google). Exclusion criteria were as follows: traumatic brain injury within the last three months, diagnosis of a major mental illness (e.g., Schizophrenia), use of medications that interfere with cognition, and diagnosis of dementia or other neurological condition. For older adults, the telephone version of the Memory Impairment Screen (MIS-T)  was administered to ensure that participants were cognitively intact; participants who scored 5 or lower (cut-off for suspected impairment) on the MIS-T were excluded.
The study received human subjects approval from the University of Colorado Colorado Springs Institutional Review Board. A trained graduate or undergraduate research assistant conducted all data collection in Psychology lab space on campus. At the outset of the study, participants provided written informed consent, answered a demographics questionnaire, and were administered a battery of executive functioning tests (described below). Participants were then asked to perform a series of web-browsing activities, including evaluation of websites’ login notifications, and to then rate their stylistic preferences by site. Participants were not aware that these activities would involve phishing attempts to obtain their login credentials.
Immediately before the web-browsing tasks, the examiner emphasized the voluntary nature of the study to participants and provided reassurance that the tasks could be discontinued at any time without penalty. After the examiner left the room, participants visited four different websites, two of which were legitimate sites and two of which were phishing sites that we created. Of the two total phishing sites, one login utilized traditional methods (i.e., entering one’s username and password for that site) and one utilized single sign-on (SSO) methods (i.e., logging into a website such as Sears.com using an identity provider account, such as Facebook or Google). The order of the legitimate and phishing websites, and the traditional vs. SSO websites, was counterbalanced. Participants’ interactions with these sites were monitored remotely to determine whether and where login attempts were made. No sensitive login information was recorded, transmitted, or stored when participants interacted with the phishing websites.
Phishing websites were hosted on university servers and designed to accurately mimic the target websites, so that activities such as clicking on links, searching, and logging in would behave identically to target websites. URLs of the phishing websites were created with the explicit purpose of alerting participants to the forgery site (e.g., http://www.amazon.jigdee.com instead of http://www.amazon.com). Figs 1 and 2 present examples of phishing websites used in this study. Fig 1 shows a screenshot of the phishing testbed’s replica of the Amazon.com homepage and Fig 2 shows a dynamically generated deep-level replica of the Amazon.com website. A more complete description of the phishing testbed has been published previously . The phishing testbed can also be accessed through our project website, hosted at http://inside.mines.edu/~chuanyue/NSF/NSF1624149.html.
A dynamically generated homepage on the Amazon phishing website (it presents the same content that is actually displayed on the legitimate Amazon website).
A dynamically generated deep-level webpage on the Amazon phishing website (any level of webpages can be generated and presented to users in real-time).
After participants completed the web-browsing task, the examiner returned to the room and administered several questionnaires about the web-browsing activity without disclosing the phishing attempts. The questionnaires asked whether the participants noticed anything suspicious about the websites, whether their approach to the web-browsing task would have differed if they were at home rather than in a lab, whether they had prior knowledge of phishing, and whether they had previously been victimized by phishing. A copy of the questionnaire is included as S1 Appendix. After the completion of these questionnaires, participants were debriefed about the true purpose of the study and compensated for their time.
Neuropsychological Assessment Battery (NAB) executive functions module.
The NAB Executive Functions Module  contains four tests that measure an array of abilities related to executive functioning. The scores on these four tests can be combined to produce a demographically corrected (age, sex, and education) Executive Functions Index Score (M = 100, SD = 15) that characterizes global executive functioning abilities. On all NAB tests, higher scores reflect better performance.
NAB Mazes. The NAB Mazes test (range = 0–26) requires participants to complete up to seven pen-and-paper mazes that increase in difficulty. Points are earned for completing the mazes within the allotted time, with more points awarded for more rapid completion times.
NAB Judgment. The NAB Judgment test (range = 0–20) asks participants to answer 10 questions about health and safety situations and has demonstrated ecological validity for various decision-making tasks [31,32].
NAB Categories. The NAB Categories test presents participants with pictures of six fictional people, along with details about each person. The participant is asked to classify the six-pictured individuals into two characteristically based groups of two to four people according to information presented. Groupings can be based on a variety of concrete and abstract features. The test consists of two trials, with identical rules but different pictured individuals. Accurate groupings are awarded points from 0–2.
NAB Word Generation. The NAB Word Generation test asks participants to generate as many three-letter words as possible from a pictured series of seven letters. Correct words are awarded 1 point.
Iowa Gambling Task (IGT).
The IGT  asks participants to imagine they are loaned money to play a card game, where each card picked from one of four decks causes them to win or lose money. Participants are instructed to win as much money as possible, but are not warned that the decks possess distinct patterns and systematic differences in credits and debits. Higher Net Total raw scores reflect the prioritization of better decks (and better decision-making) when picking cards. Past research has supported the relationship between low IGT scores, poor decision-making, and ventromedial prefrontal cortex dysfunction [41,42].
All analyses were performed in R version 3.3.2 . An a priori alpha level was set at .05. The study’s primary hypothesis was tested with logistic regression via the lrm function in the rms package version 5.0–1 . Missing data were handled using multiple imputation with five imputed data sets. Initially, phishing susceptibility was intended to be the primary dependent variable, but a lack of variance in this outcome was found (only 12 participants declined to login to the phishing websites). Therefore, the dependent variable chosen instead was whether or not participants reported feeling suspicious of one or more websites during the browsing activities.
Suspiciousness (yes/no) was modeled as a function of the following predictor variables: Prior knowledge of phishing (yes/no); prior susceptibility to phishing (yes/no); lab vs. home differences in approach (yes/no); education (years); sex (male/female); ethnicity (Hispanic/not Hispanic); race (Caucasian/not Caucasian); NAB Mazes, Judgment, Categories, and Word Generation (raw scores); and IGT Net Total (raw score). In addition to these main effects, the interactions between these variables and Age Group (younger/older) were also modeled to investigate if age group moderates the ability of predictor variables to explain phishing suspiciousness.
Participant demographic data, cognitive test results, and answers to phishing questionnaires are presented in Table 1. On the IGT, three participants admitted and two demonstrated (through perfect or nearly perfect scores) prior knowledge of the task; therefore, we omitted IGT scores for these five participants. As described above, only 12 were not vulnerable to the experimental phishing attacks. All 12 participants who chose not to enter their login information to the phishing sites were older adults. Of these 12 older adult participants, 10 reported prior knowledge of phishing and 4 reported being victims of phishing in the past; their mean age was 69.17 (SD = 9.4) and their mean years of education was 16.5 (SD = 2.11). Compared to the number of participants who were victimized by the experimental phishing attacks in the current study, there was more variability about reported suspiciousness, with 68 participants reporting something suspicious about one or more of the websites.
Overall, the younger adult group contained a greater proportion of individuals of non-Caucasian race, χ2 (df = 1) = 11.89, p = 0.001, and Hispanic/Latino/Spanish ethnicity, χ2 (df = 1) = 17.53, p < 0.001. Older adults had more years of education, t (df = 168.32) = -9.10, p < 0.001. The younger adult group performed better on NAB Mazes, t (df = 183.67) = 7.35, p < 0.001, and NAB Categories, t (df = 190.82) = 2.58, p = 0.011, while the older adult group demonstrated better overall executive functioning on the demographically-corrected NAB Executive Functions Index score, t (df = 179.58) = -6.73, p < 0.001, and produced higher scores on the NAB Word Generation test, t (df = 188.19) = -2.99, p = 0.003. More older adults than younger adults reported knowledge of phishing, χ2 (df = 1) = 7.56, p = 0.006. They were also more likely to have been victimized by phishing in the past, χ2 (df = 1) = 13.46, p < 0.001, and more likely to report that their web-browsing behaviors were different in the laboratory setting versus at home, χ2 (df = 1) = 16.33, p < 0.001. No other group differences were observed on any of the variables reported in Table 1.
The results of the logistic regression demonstrated that the predictor variables contributed to a 22.7% advantage for the hypothesized model over an intercept-only model (Nagelkerke R2), χ2 (df = 25) = 34.85, p = 0.092. Detailed results of the logistic regression model are presented in Table 2. As can be seen from Table 2, there were two significant main effects (years of education and NAB Mazes raw score); in addition, prior knowledge of phishing and scores on NAB Mazes were significantly moderated by Age Group. These effects are depicted graphically in Fig 3. The model correctly classified participants’ phishing suspiciousness with 73.1% (95% CI [66.0, 80.3]) accuracy.
Main effect of years of education on reported phishing suspiciousness (A). Age group interaction effects with prior phishing knowledge (B) and NAB Mazes score (C). Error bars and shaded bands represent 95% confidence intervals.
This study sought to determine whether older adults are more susceptible to computer-based phishing attacks and whether cognitive test scores can predict phishing susceptibility. Because very few participants declined to log in to the experimental phishing websites, we used reported suspiciousness as our dependent variable. Overall, the logistic regression model was able to achieve a classification accuracy of 73.1% (95% CI [66.0, 80.3]) in predicting whether or not participants would be suspicious of the experimental phishing attacks. The results presented here failed to support our hypothesis that older adults would be more susceptible to phishing than younger adults. Although the results indicate that being an older adult was associated with 3.69 times greater odds of being suspicious relative to younger adults, this parameter was estimated too imprecisely to interpret with confidence (Table 2). There was partial support for our hypothesis that executive functioning tests would be predictive of phishing susceptibility. One test, NAB Mazes, was predictive of phishing susceptibility. Other executive functioning test scores were not important predictors of phishing susceptibility. More specific findings are discussed below.
Compared to younger adults, older adults were more likely to have knowledge of phishing and more likely to have been victimized by phishing in the past. In addition, older adults appeared to have been less trusting of the research setting, as they were more likely to report using different browsing behaviors in the lab versus at home, and all 12 participants who resisted the phishing attacks were older adults. Older adults’ suspiciousness varied markedly depending on whether or not they possessed prior knowledge of phishing. When broken down by prior knowledge (Fig 3B), the most suspicious of the subgroups was the older adults with prior knowledge of phishing, whereas the least suspicious subgroup was the older adults without prior knowledge of phishing. In contrast, younger adults without prior knowledge of phishing reported more suspiciousness than those with prior knowledge. Because all of the younger adults—whether suspicious or not—entered their login information into phishing sites, this suggests that younger adults may have been too trusting of the laboratory environment. Consistent with the findings of Metzger and colleagues , our younger adult participants, all of whom were students at the university where this study was performed, trusted the experimental setting and the website content. For older adults, personal experience (having been victimized by phishing) and associated prior knowledge may have offered useful protection against fraud. For younger adults, experience and information may have had the opposite effect by creating implicit trust in the research setting, which likely includes trust about IT security. Also as expected, people with more years of education tended to be more suspicious of the phishing attempts (Table 2), which is consistent with previous research suggesting that years of education moderates the influence of age group on susceptibility to phishing . It is likely that educational background is related to factors associated with learning and cognition, but it may also serve as a proxy for experience and familiarity with computers, as has been previously reported . Unlike other studies (e.g., [5,11,45]), we found no differences in phishing suspiciousness between men and women.
Only one cognitive test, NAB Mazes, was strongly associated with phishing suspiciousness. The interaction between this variable and age group produced an unexpected pattern, however. In older adults, better test scores were associated with more suspiciousness, as expected. But in younger adults, better test scores were associated with less suspiciousness (Fig 3). The best explanation for this pattern may be that the abilities measured by NAB Mazes (processing speed, planning) serve different roles for younger and older adults: for younger adults, these executive functions contribute to efficient, automatic processing, especially in situations that are perceived as trustworthy (e.g., using campus computers); for older adults, these executive functions may contribute to more deliberative, self-protecting behaviors, especially when they are knowledgeable about risks (e.g., phishing and web browsing) . Similarly, it may be the case that the NAB Mazes test measures slightly different abilities in older versus younger adults. For example, in older adults, the NAB Mazes test may draw more heavily on skills such as visual scanning and spatial navigation; older adults who are better at these skills may be more adept at noticing webpage anomalies that increase suspiciousness. In younger adults, in contrast, the NAB Mazes test may draw more heavily on information processing speed and mental efficiency; younger adults who are better at these skills may have used cognitive shortcuts, such as the familiarity heuristic, which could have suppressed detection of webpage anomalies and reduced suspiciousness . The possibility that the NAB Mazes test draws on different cognitive abilities in younger and older adults suggests measurement invariance, which should be a focus of future research on this test and the rest of the NAB Executive Functions module.
In contrast to the effects discussed above, statistical significance was not reached for several predictor variables, including past phishing susceptibility, lab versus home browsing approach, sex, race, ethnicity, three tests from the NAB Executive Functions module, and the IGT. These results suggest that most demographic variables, including age cohort, are insufficient predictors of phishing victimization. Although race and ethnicity were associated with some of the larger effect sizes (Table 2), these parameters were estimated extremely imprecisely due to the limited representation of ethnic and racial minorities in the current sample, especially among older adults (Table 1). Examining phishing susceptibility differences across ethnic and racial groups is important, as evidence suggests that these groups report different Internet usage patterns . These results also suggest that some tests of executive functioning are limited in their utility to identify potential victims of phishing and possibly other forms of exploitation. It should be pointed out, however, that both the main and interaction effects of the IGT were very close to reaching statistical significance (Table 2). Nevertheless, these parameters were estimated with good precision, suggesting that the ability of IGT scores to predict phishing suspiciousness is of limited clinical significance regardless of statistical significance. Taken together, the predictor variables used here were able to predict—with an accuracy of 73.1% (95% CI [66.0, 80.3])—whether or not an individual participant would report suspiciousness. However, because the logistic regression model only produced a 22.7% reduction in error variance compared to the null model, it is likely that there are additional unmeasured variables that could greatly contribute to the prediction of phishing suspiciousness and susceptibility. The current results are best interpreted as the first step in identifying ecologically valid neuropsychological approaches for identifying phishing susceptibility and are not suited for classification purposes at the individual level. Because the current results have not been cross-validated or validated in out-of-set data, additional studies are needed before using neuropsychological tests to classify individuals based on predicted phishing susceptibility.
Neuropsychological assessment instruments have been described as having limited ecological validity [48,49]. The results of the current study also suggest considerable room for improvement in the use of neuropsychological tests for the prediction of real-world functional outcomes. Neuropsychologists are often asked to evaluate individuals to render judgments about functional capacities such as financial management and ability to avoid exploitation . Because phishing represents an emerging threat to individuals lacking in those capacities, it is necessary for neuropsychologists to have access to clinical tools that are valid for making such judgments. These results highlight the importance of continued development of assessment techniques that can jointly measure cognitive and functional abilities and that are predictive of real-world outcomes. Cognitive abilities have been shown to play an important role in older adults’ ability to learn and adapt to advances in computing technology , which suggests that the development of novel neuropsychological tests that can better predict computer-related EADLs and IADLs is of considerable importance.
The current study is limited by the salient influence of the laboratory environment. Out of the 29 individuals who reported prior knowledge of phishing, prior victimization by phishing, and suspiciousness of the websites visited, 26 (89.7%) entered their login information into the spoofed web pages. We attempted to minimize the influence of the laboratory setting by emphasizing that participants could discontinue any task without penalty, by having examiners leave the room while participants browsed the Internet, and by asking participants to enter their private login data into real (or seemingly real) websites, some of which may have been used to store sensitive data (e.g., credit cards). This aspect of the study represents a strength relative to other research, which often asks participants to indicate how they might respond to a role-play scenario (e.g., [5,45]) or to simply identify whether a website is legitimate (e.g., ). However, it appears as though the powerful influences of trust, obedience, and authoritarianism affected our participants . Past research has implicated trust as an important factor influencing phishing susceptibility , and current methods used by websites to demonstrate their own trustworthiness are of marginal effectiveness . However, because so few participants were able to avoid becoming susceptible to phishing, our resulting shift in focus from susceptibility to suspiciousness may be capturing other non-specific personality traits, such as skepticism, paranoia, or anxiety, that were not directly related to the phishing attempts [17,54]. Further, our study may have been improved through the inclusion of additional cognitive predictors of phishing suspiciousness, such as more basic aspects of attention, which have been proposed as a mechanism for phishing susceptibility in the past (e.g., ). However, given the fundamental role of attention skills in completing more complex tasks of executive functioning, it is likely that individual variability in attention skills was captured indirectly through the battery of executive functioning tests used here .
This study is also limited by the fact that our older adult sample was self-selected to participate in this study and is therefore unlikely to have good external validity for the entire population of Internet-using older adults, or older adults who use the internet less frequently than the minimum of once per month needed to meet our study’s inclusion criteria. Our older adult sample was highly educated, in possession of higher than average executive functioning abilities, and lacking in racial and ethnic diversity. Approximately 88% of the older adult sample reported knowledge of phishing (even more than the 71% reported in younger adults), which may be higher than in the general population of Internet-using older adults. Because almost 53% of the older adults in our sample reported past victimization by phishing attacks, it is possible that this high rate of phishing knowledge in older adults is caused by high rates of past victimization. It should also be mentioned that our study’s operationalization of younger and older age cohorts may affect the results. For example, some studies have used age 65 as the cutoff for defining "older" adults. Similarly, two individuals older than 40 were included in our younger adult group. Additional limitations include the fact that some parameters were not estimated with desirable precision (Table 2), and the fact that we did not ask participants about their familiarity with the target websites. Although we ensured that every phishing webpage was based on a website at which participants owned a real user account, participants may have differed in the frequency with which they used these sites. Finally, we excluded participants with cognitive impairment, so our results cannot speak to the risk of phishing susceptibility in older adults with MCI or dementia. Future research should evaluate susceptibility to phishing in individuals with MCI, as this group will continue to grow in size with the emerging baby-boomer cohort, many of whom are avid or frequent technology users.
Many phishing attempts are predicated upon trust and not necessarily technological sophistication. As such, the current results suggest that both older and younger adults can be protected from phishing attempts through methods that provoke discomfort and suspiciousness at the expense of automatic processing. Educational initiatives that increase phishing awareness while also directly linking phishing threats to concrete negative consequences may provide the necessary skills to avoid being phished. Past research supports the use of education as a strategy for intervention and means for decreasing vulnerability; similar initiatives have shown promise in increasing knowledge and suspiciousness about phishing in both older and younger adults. A training intervention employed by Sheng and colleagues showed that phishing education could help reduce users’ tendency to become victims . Carpenter et al. reported that warnings are effective at reducing online personal information disclosure . Kumaraguru et al. developed an email-based anti-phishing education system, PhishGuru, and an online game, Anti-Phishing Phil, that uses learning science instructional principles to teach users how to use cues in URLs to avoid falling into phishing attacks. Their results suggested that an education approach facilitated the identification of phishing emails and websites . In addition to the above, future research should attempt to investigate phishing susceptibility outside of a laboratory environment where the presence of implicit trust, especially on the part of students, may be influencing behaviors and decreasing the external validity of the results.
In conclusion, the results of this study reveal that older and younger adults both become suspicious about phishing at approximately equal rates, a previously understudied effect within older adults, but that the factors driving phishing susceptibility have similarities and differences between these two age cohorts. For both groups, more years of education appears to be protective against phishing susceptibility. In older adults, lack of knowledge about phishing and lower scores on NAB Mazes contributed to reduced suspiciousness and, presumably, greater susceptibility to phishing. These results also suggest an increased need for development of ecologically valid assessment instruments to identify individuals who are most vulnerable to phishing and similar exploits [49,50]. As access to technology continues to increase worldwide, the potential for victimization by this technology will also increase. Neuropsychologists and other clinicians who wish to identify individuals lacking the capacity to avoid this victimization are in need of more ecologically valid tools than those currently available.
The authors would like to thank Caleigh Findley and Josh Beaston for assistance with data collection and entry.
- Conceptualization: BEG RZ SEJ CY.
- Data curation: BEG RZ SEJ CAB JRR.
- Formal analysis: BEG.
- Funding acquisition: CY BEG.
- Investigation: SEJ CAB JRR.
- Methodology: BEG RZ SEJ CY.
- Project administration: RZ SEJ CAB JRR.
- Resources: BEG CY.
- Software: RZ CY.
- Supervision: BEG CY.
- Validation: BEG RZ SEJ CAB JRR CY.
- Visualization: BEG.
- Writing – original draft: BEG.
- Writing – review & editing: BEG RZ SEJ CAB JRR CY.
- 1. Zhao R, John SE, Karas S, Bussell CA, Roberts J, Six D, et al. The highly insidious extreme phishing attacks. Proc IEEE Int Conf Comput Commun Networks (ICCCN); 2016.
- 2. Yue C. The devil is phishing: Rethinking web single sign-on systems security. Proc 6th USENIX Work Large-Scale Exploit Emergent Threat; 2013.
- 3. Kelley CM, Hong KW, Mayhorn CB, Murphy-Hill E. Something smells phishy: Exploring definitions, consequences, and reactions to phishing. Proc Hum Fact Ergon Soc Annu Meet 2012;56: 2108–2112.
- 4. Metzger MJ, Flanagin AJ, Zwarun L. College student Web use, perceptions of information credibility, and verification behavior. Comput Educ 2003;41: 271–290.
- 5. Sheng S, Holbrook M, Kumaraguru P, Cranor LF, Downs J. Who falls for phish?: A demographic analysis of phishing susceptibility and effectiveness of interventions. Proceedings of the 28th International Conference on Human Factors in Computing Systems—CHI’10; 2010.
- 6. Welk AK, Hong KW, Zielinska OA, Tembe R, Murphy-Hill E, Mayhorn CB. Will the “phisher-men” reel you in? International Journal of Cyber Behavior, Psychology and Learning 2015;5: 1–17.
- 7. Zielinska OA, Tembe R, Hong KW, Ge X, Murphy-Hill E, Mayhorn CB. One phish, two phish, how to avoid the Internet phish. Proc Hum Fact Ergon Soc Annu Meet 2014;58: 1466–1470.
- 8. Harrison B, Svetieva E, Vishwanath A. Individual processing of phishing emails. Online Information Review 2016;40: 265–281.
- 9. Vishwanath A, Herath T, Chen R, Wang J, Rao HR. Why do people get phished? Testing individual differences in phishing vulnerability within an integrated, information processing model. Decis Support Syst 2011;51: 576–586.
- 10. Wang J, Herath T, Chen R, Vishwanath A, Rao HR. Phishing susceptibility: An investigation into the processing of a targeted spear phishing email. IEEE Trans Prof Commun 2012;55: 345–362.
- 11. Hong KW, Kelley CM, Tembe R, Murphy-Hill E, Mayhorn CB. Keeping up with the Joneses: Assessing phishing susceptibility in an email task. Proc Hum Fact Ergon Soc Annu Meet 2013;57: 1012–1016.
- 12. Purkait S, Kumar De S, Suar D. An empirical investigation of the factors that influence Internet user’s ability to correctly identify a phishing website. Information Management & Computer Security 2014;22: 194–234.
- 13. Lawton MP, Brody EM. Assessment of older people: Self-maintaining and instrumental activities of daily living. Gerontologist 1969;9: 179–186. pmid:5349366
- 14. Vaughan L, Giovanello K. Executive function in daily life: Age-related influences of executive processes on instrumental activities of daily living. Psychol Aging 2010;25: 343–355. pmid:20545419
- 15. Rogers WA, Meyer B, Walker N, Fisk AD. Functional limitations to daily living tasks in the aged: A focus group analysis. Hum Factors 1998;40: 111–25. pmid:9579107
- 16. Rabiner DJ, O’Keeffe J, Brown D. Financial exploitation of older persons: Challenges and opportunities to identify, prevent, and address it in the United States. J Aging Soc Policy 2006;18: 47–68. pmid:16837401
- 17. Czaja SJ, Charness N, Fisk AD, Hertzog C, Nair SN, Rogers WA, et al. Factors predicting the use of technology: Findings from the Center for Research and Education on Aging and Technology Enhancement (CREATE). Psychol Aging 2006;21: 333–52. pmid:16768579
- 18. Lorence DP, Park H. New technology and old habits: The role of age as a technology chasm. Technol Health Care 2006;14: 91–96. pmid:16720952
- 19. Poynton TA. Computer literacy across the lifespan: A review with implications for educators. Comput Human Behav 2005;21: 861–872.
- 20. Marquié J, Jourdan-Boddaert L, Huet N. Do older adults underestimate their actual computer knowledge? Behav Inf Technol 2002;21: 273–280.
- 21. Verhaeghen P, Salthouse TA. Meta-analyses of age-cognition relations in adulthood: Estimates of linear and nonlinear age effects and structural models. Psychol Bull 1997;122: 231–249. pmid:9354147
- 22. Boyle PA, Yu L, Wilson RS, Gamble K, Buchman AS, Bennett DA. Poor decision making is a consequence of cognitive decline among older persons without Alzheimer’s disease or mild cognitive impairment. PLOS ONE 2012;7.
- 23. Wood S, Rakela B, Liu PJ, Navarro AE, Bernatz S, Wilber KH, et al. Neuropsychological profiles of victims of financial elder exploitation at the Los Angeles County Elder Abuse Forensic Center. J Elder Abuse Negl 2014;26: 414–423. pmid:24848863
- 24. Pinsker DM, McFarland K. Exploitation in older adults: Personal competence correlates of social vulnerability. Neuropsychol Dev Cogn B Aging Neuropsychol Cogn 2010;17: 673–708. pmid:20799105
- 25. Mackin RS, Areán PA. Impaired financial capacity in late life depression is associated with cognitive performance on measures of executive functioning and attention. J Int Neuropsychol Soc 2009;15: 793–798. pmid:19635176
- 26. Farias ST, Harrell E, Neumann C, Houtz A. The relationship between neuropsychological performance and daily functioning in individuals with Alzheimer’s disease: Ecological validity of neuropsychological tests. Arch Clin Neuropsychol 2003;18: 655–672. pmid:14591439
- 27. Hart RP, Bean MK. Executive function, intellectual decline and daily living skills. Aging Neuropsychol Cogn 2011;18: 64–85.
- 28. Mitchell M, Miller LS. Prediction of functional status in older adults: The ecological validity of four Delis–Kaplan Executive Function System tests. J Clin Exp Neuropsychol 2008;30: 683–690. pmid:18608647
- 29. Razani J, Casas R, Wong JT, Lu P, Alessi C, Josephson K. Relationship between executive functioning and activities of daily living in patients with relatively mild dementia. Appl Neuropsychol 2007;14: 208–14. pmid:17848131
- 30. Brand M, Markowitsch HJ. Aging and decision-making: A neurocognitive perspective. Gerontology 2010;56: 319–324. pmid:19864870
- 31. MacDougall EE, Mansbach WE. The Judgment Test of the Neuropsychological Assessment Battery (NAB): Psychometric considerations in an assisted-living sample. Clin Neuropsychol 2013;27: 827–839. pmid:23570279
- 32. Zgaljardic DJ, Yancy S, Temple RO, Watford MF, Miller R. Ecological validity of the Screening Module and the Daily Living Tests of the Neuropsychological Assessment Battery Using the Mayo-Portland Adaptability Inventory-4 in postacute brain injury rehabilitation. Rehabil Psychol 2011;56: 359–365. pmid:21928919
- 33. Carr DB, Barco PP, Wallendorf MJ, Snellgrove CA, Ott BR. Predicting road test performance in drivers with dementia. J Am Geriatr Soc 2011;59: 2112–2117. pmid:22092029
- 34. Bell-McGinty S, Podell K, Franzen M, Baird AD, Williams MJ. Standard measures of executive function in predicting instrumental activities of daily living in older adults. Int J Geriatr Psychiatry 2002;17: 828–834. pmid:12221656
- 35. Martyr A, Clare L. Executive function and activities of daily living in Alzheimer’s disease: A correlational meta-analysis Dement Geriatr Cogn Disord 2012;33: 189–203. pmid:22572810
- 36. Lichtenberg PA. Financial exploitation, financial capacity, and Alzheimer’s disease. Am Psychol 2016;71: 312–320. pmid:27159438
- 37. Moye J, Marson DC, Edelstein B. Assessment of capacity in an aging society. Am Psychol 2013;68: 158–171. pmid:23586491
- 38. Lipton RB, Katz MJ, Kuslansky G, Sliwinski MJ, Stewart WF, Verghese J, et al. Screening for dementia by telephone using the Memory Impairment Screen. J Am Geriatr Soc 2003;51: 1382–1390. pmid:14511157
- 39. Stern RA, White T. Neuropsychological Assessment Battery. Lutz, FL: Psychological Assessment Resources; 2003.
- 40. Bechara A. Iowa Gambling Task Professional Manual. Lutz, FL: Psychological Assessment Resources, Inc.; 2007.
- 41. Bechara A, Damasio H, Tranel D, Anderson SW. Dissociation of working memory from decision making within the human prefrontal cortex. J Neurosci 1998;18: 428–437. pmid:9412519
- 42. Lamar M, Resnick SM. Aging and prefrontal functions: dissociating orbitofrontal and dorsolateral abilities. Neurobiol Aging 2004;25: 553–558. pmid:15013577
- 43. R Core Team. R: A Language and Environment for Statistical Computing [Internet]. Vienna, Austria: R Foundation for Statistical Computing; 2016. Available: http://www.r-project.org/.
- 44. Harrell Jr. FE. rms: Regression modeling strategies. 2016. https://cran.r-project.org/package=rms.
- 45. Iuga C, Nurse JRC, Erola A. Baiting the hook: factors impacting susceptibility to phishing attacks. Human-centric Computing and Information Sciences 2016;6: 8.
- 46. Huang YH, Wood S, Berger DE, Hanoch Y. Age differences in experiential and deliberative processes in unambiguous and ambiguous decision making. Psychol Aging 2015;30: 675–687. pmid:26280384
- 47. Goel V, Makale M, Grafman J. The hippocampal system mediates logical reasoning about familiar spatial environments. J Cogn Neurosci 2004;16: 654–664. pmid:15165354
- 48. Chaytor N, Schmitter-Edgecombe M. The ecological validity of neuropsychological tests: A review of the literature on everyday cognitive skills. Neuropsychol Rev 2003;13: 181–197. pmid:15000225
- 49. Spooner DM, Pachana NA. Ecological validity in neuropsychological assessment: A case for greater consideration in research with neurologically intact populations. Arch Clin Neuropsychol 2006;21: 327–337. pmid:16769198
- 50. Marson DC. Clinical and ethical aspects of financial capacity in dementia: A commentary. Am J Geriatr Psychiatry 2013;21: 382–390. pmid:23498385
- 51. Milgram S. Behavioral study of obedience. J Abnorm Psychol 1963;67: 371–378. pmid:14049516
- 52. Alseadoon I, Othman MFI, Chan T. What is the influence of users’ characteristics on their ability to detect phishing emails? In Sulaiman HM, Othman MA, Othman MFI, et al., eds. Advanced computer and communication engineering technology. Berlin: Springer International Publishing, Berlin, 2015, pp 949–962.
- 53. Dhamija R, Tygar JD, Hearst M. Why phishing works. In Grinter R, Rodden T, Aoki P, et al., eds. Proc SIGCHI Conf Hum Factors Comput Syst 2006;CHI-06: 581–590.
- 54. Harrison B, Vishwanath A, Rao R. A user-centered approach to phishing susceptibility: The role of a suspicious personality in protecting against phishing. Proc Annu Hawaii Int Conf Syst Sci 2016: 5628–5634.
- 55. McCabe DP, Roediger HL, McDaniel MA, Balota DA, Hambrick DZ, Hambrick DZ. The relationship between working memory capacity and executive functioning: Evidence for a common executive attention construct. Neuropsychology 2010;24: 222–43. pmid:20230116
- 56. Carpenter S, Zhu F, Kolimi S. Reducing online identity disclosure using warnings. Appl Ergon 2014;45: 1337–1342. pmid:24161300
- 57. Kumaraguru P, Sheng S, Acquisti A, Cranor LF, Hong J. Teaching Johnny not to fall for phish. ACM Transactions on Internet Technology 2010;10: 1–31.