User Behavior Under Phishing Attacks: Eye tracking, Scenarios and Analysis

  • Shaikha Jamal M.S. Al-Naimi*
  • , Alireza Sadighian
  • , Gabriele Oligeri
  • *Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

In our increasingly digital world, phishing attacks pose a persistent threat that requires enhanced cybersecurity measures. Social engineering attacks in the form of Phishing emails pose various risks and challenges to an enormous number of users around the world. In such attacks, attackers use various strategies, such as visual manipulations and cognitive vulnerabilities, to significantly increase the number of victims. This paper introduces an approach that addresses the urgent need for better cybersecurity measures against persistent phishing threats, highlighting a gap in our understanding of how users cognitively and behaviorally respond to phishing emails. For this purpose, by analyzing users' visual and cognitive reactions to possible phishing content through two separate scenarios, this study aims to clarify changes in behavior caused by malicious emails and the criteria to determine their legitimacy. Our results highlight the differences in decision criteria among users when encountering phishing emails.

Original languageEnglish
Title of host publication2025 10th International Conference On Information And Network Technologies, Icint
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages9-16
Number of pages8
ISBN (Electronic)9798331536756
ISBN (Print)979-8-3315-3676-3
DOIs
Publication statusPublished - 14 Mar 2025
Event10th International Conference on Information and Network Technologies, ICINT 2025 - Melbourne, Australia
Duration: 12 Mar 202514 Mar 2025

Publication series

Name2025 10th International Conference on Information and Network Technologies, ICINT 2025

Conference

Conference10th International Conference on Information and Network Technologies, ICINT 2025
Country/TerritoryAustralia
CityMelbourne
Period12/03/2514/03/25

Keywords

  • Behavioral analysis
  • Cognitive vulnerabilities
  • Eye-tracking
  • Phishing threats

Fingerprint

Dive into the research topics of 'User Behavior Under Phishing Attacks: Eye tracking, Scenarios and Analysis'. Together they form a unique fingerprint.

Cite this