Have a personal or library account? Click to login
How the big five psychological factors affect phishing: A literature review Cover
By: Alex Gordon and  Darlene Russ-Eft  
Open Access
|Feb 2025

References

  1. Alseadoon, I., Chan, T., Foo, E., & Nieto, J. G. (2012). Who is more susceptible to phishing emails?: A Saudi Arabian study. ACIS 2012 : Proceedings of the 23rd Australasian Conference on Information Systems.
  2. Alseadoon, I., Othman, M.F.I., & Chan, T. (2015). What is the influence of users’ characteristics on their ability to detect phishing emails? Advanced Computer and Communication Engineering Technology, 315, 949-962. https://doi.org/10.1007/978-3-319-07674-4_89
  3. Alsharnouby, M., Alaca, F., & Chiasson, S. (2015). Why phishing still works: User strategies for combating phishing attacks. International Journal of Human-Computer Studies, 82(1), 69-82. https://doi.org/10.1016/j.ijhcs.2015.05.005
  4. Ayob, Z., & Weir, G. R. S. (2021). Is human behavior the real challenge in combating phishing. Advances in Intelligent Systems and Computing, 1291(1), 27–38. https://doi.org/10.1007/978-981-33-4062-6_3
  5. Babcock, S. E., & Wilson, C. A. (2020). Big Five model of personality. In B. J. Carducci, C. S. Nave, C. S. Nave (Eds.). The Wiley encyclopedia of personality and individual differences: Models and theories. (pp. 55-60). Wiley-Blackwell.
  6. Baki, S., Verma, R. M., & Gnawali, O. (2020). Scam augmentation and customization: Identifying vulnerable users and arming defenders. Proceedings of the 15th ACM Asia Conference on Computer and Communications Security, 236–247. https://doi.org/10.1145/3320269.3384753
  7. Barrick, M. R., & Mount, M. K. (1991). The Big Five personality dimensions and job performance. A meta-analysis. Personnel Psychology,44(1), 1–26. https://doi.org/10.1111/j.1744-6570.1991.tb00688.x
  8. Canham, M., Posey, C., & Constantino, M. (2022). Phish derby: Shoring the human shield through gamified phishing attacks. Frontiers in Education (Lausanne), 6. https://doi.org/10.3389/feduc.2021.807277
  9. Chen, H., & Magramo, K. (2024, February 4). Finance worker pays out $25 million after video call with deepfake ‘chief financial officer’. CNN. https://www.cnn.com/2024/02/04/asia/deepfake-cfo-scamhong-kong-intl-hnk/index.html
  10. Cho, J. H., Cam, H., & Oltramari, A. (2016). Effect of personality traits on trust and risk to phishing vulnerability: Modeling and analysis. 2016 IEEE International Multi-Disciplinary Conference on Cognitive Methods in Situation Awareness and Decision Support, CogSIMA 2016, 7–13. https://doi.org/10.1109/COGSIMA.2016.7497779
  11. Cialdini, R. B. (2021). Influence, new and expanded: The psychology of persuasion. Harper Business.
  12. Diman, A. P., & Rahman, T. K. A. (2023). Examining individual tendency to respond to phishing e-mails from the perspective of protection motivation theory. Journal of Education and Social Sciences, Vol. 25(1). 40-51.
  13. Eftimie, S., Moinescu, R., & Racuciu, C. (2022). Spear-phishing susceptibility stemming from personality traits. IEEE Access, 10, 73548–73561. https://doi.org/10.1109/ACCESS.2022.3190009
  14. FBI. (2021, March 17). IC3 releases 2020 Internet Crime Report. Federal Bureau of Investigation. https://www.fbi.gov/news/pressrel/press-releases/fbi-releases-the-internet-crime-complaint-center-2020-internet-crime-report-including-covid-19-scam-statistics
  15. Fruhlinger, J. (2020, March 9). Top cybersecurity facts, figures, and statistics. CSO Online. https://www.csoonline.com/article/3153707/top-cybersecurity-facts-figures-and-statistics.html
  16. Fruhlinger, J. (2022, April 12). What is phishing? Examples, types, and techniques. CSO Online. https://www.csoonline.com/article/514515/what-is-phishing-examples-types-and-techniques.html
  17. Ge, Y., Lu, L., Cui, X., Chen, Z., & Qu, W. (2021). How personal characteristics impact phishing susceptibility: The mediating role of mail processing. Applied Ergonomics, 97(1), 1103526-103526. https://doi.org/10.1016/j.apergo.2021.103526
  18. Gideon, S. (2024, July 11). Over 40% of top phishing scams at work come from HR related email subjects. Human Resources Online. https://www.humanresourcesonline.net/over-40-of-top-phishingscams-at-work-come-from-hr-related-email-subjects
  19. Goldberg, L. R. (1990). An alternative “description of personality”: The Big-Five factor structure. Journal of Personality and Social Psychology, 59(6), 1216–1229. https://doi.org/10.1037/0022-3514.59.6.1216
  20. Halevi, T., Lewis, J., & Memon, N. (2013). Phishing, personality traits and Facebook. arXiv.Org. https://doi.org/10.48550/arxiv.1301.7643
  21. Halevi, T., Memon, N., & Nov, O. (2015). Spear-phishing in the wild: A real-world study of personality, phishing self-efficacy and vulnerability to spear-phishing attacks. SSRN Electronic Journal. http://dx.doi.org/10.2139/ssrn.2544742
  22. IBM. (2024). Cost of a data breach report 2023. International Business Machines Corporation. https://www.ibm.com/reports/data-breach
  23. Lawson, P. A., Crowson, A. D., & Mayhorn, C. B. (2018). Baiting the hook: Exploring the interaction of personality and persuasion tactics in email phishing attacks. Advances in Intelligent Systems and Computing, 822, 401–406. https://doi.org/10.1007/978-3-319-96077-7_42
  24. Lawson, P., Pearson, C. J., Crowson, A., & Mayhorn, C. B. (2020). Email phishing and signal detection: How persuasion principles and personality influence response patterns and accuracy. Applied Ergonomics, 86, 103084–103084. https://doi.org/10.1016/j.apergo.2020.103084
  25. Lopez-Aguilar, P., & Solanas, A. (2021). The role of phishing victims’ neuroticism: Reasons behind the lack of consensus. International Journal of Information Security and Cybercrime, 10(2), 75–80. https://doi.org/10.19107/IJISC.2021.02.07
  26. Lopez-Aguilar, P., Patsakis, C., & Solanas, A. (2022). The role of extraversion in phishing victimization: A systematic literature review. 2022 APWG Symposium on Electronic Crime Research (eCrime), 2022, 1–10. https://doi.org/10.1109/eCrime57793.2022.10142078
  27. Mammadov, S. (2022). Big Five personality traits and academic performance: A meta-analysis. Journal of Personality, 90(2), 222–255. https://doi.org/10.1111/jopy.12663
  28. Pattinson, M., Jerram, C., Parsons, K., McCormac, A., & Butavicius, M. (2011). Managing phishing emails: A scenario-based experiment. Proceedings of the 5th International Symposium on Human Aspects of Information Security and Assurance, HAISA 2011, 75–85.
  29. Petrosyan, A. (2024, April 15). Number of phishing attack victims in the United States from 2018 to 2023. Statista. https://www.statista.com/statistics/1390362/phishing-victim-number-us/
  30. Petrosyan, A. (2024, November 5). Worldwide digital population. Statista. https://www.statista.com/statistics/617136/digital-population-worldwide/
  31. Rahman, A. U., Al-Obeidat, F., Tubaishat, A., Shah, B., Anwar, S., & Halim, Z. (2022). Discovering the correlation between phishing susceptibility causing data biases and Big Five personality traits using C-GAN. IEEE Transactions on Computational Social Systems, 1–9. https://doi.org/10.1109/TCSS.2022.3201153
  32. Rashid, F. Y. (2020, November 24). 8 types of phishing attacks and how to identify them. CSO. https://www.csoonline.com/article/3234716/8-types-of-phishing-attacks-and-how-to-identifythem.html
  33. Rowland, M. P. (2017, July 24). Two-thirds of the world’s seafood is over-fished – Here’s how you can help. Forbes. https://www.forbes.com/sites/michaelpellmanrowland/2017/07/24/seafood-sustainability-facts/
  34. Russell, C. L. (2005). An overview of the integrative research review. Progress in transplantation (Aliso Viejo, Calif.), 15(1), 8–13. https://doi.org/10.1177/152692480501500102
  35. Sarno, D. M., Harris, M. W., & Black, J. (2023). Which phish is captured in the net? Understanding phishing susceptibility and individual differences. Applied Cognitive Psychology, 37(4), 789–803. https://doi.org/10.1002/acp.4075
  36. Schretlen, D. J., van der Hulst, E.-J., Pearlson, G. D., & Gordon, B. (2010). A neuropsychological study of personality: Trait openness in relation to intelligence, fluency, and executive functioning. Journal of Clinical and Experimental Neuropsychology, 32(10), 1068–1073. https://doi.org/10.1080/13803391003689770
  37. Soleimani, M., & Kashani, H. B. (2024). Frozen or fine-tuned? Analyzing deep learning models and training strategies for optimizing Big Five personality traits prediction from text. 2024 10th International Conference on Artificial Intelligence and Robotics (QICAR), 11–16. https://doi.org/10.1109/QICAR61538.2024.10496606
  38. Sommestad, T., & Karlzen, H. (2019). A meta-analysis of field experiments on phishing susceptibility. eCrime Researchers Summit. https://doi.org/10.1109/eCrime47957.2019.9037502
  39. Torraco, R. J. (2016). Writing integrative literature reviews: Using the past and present to explore the future. Human Resource Development Review, 15(4), 404–428. https://doi.org/10.1177/1534484316671606
  40. Vishwanath, A. (2015). Examining the distinct antecedents of e-mail habits and its influence on the outcomes of a phishing attack. Journal of Computer-Mediated Communication, 20(5), 570–584. https://doi.org/10.1111/jcc4.12126
  41. Wilmot, M. P., & Ones, D. S. (2019). A century of research on conscientiousness at work. Proceedings of the National Academy of Sciences - PNAS, 116(46), 23004–23010. https://doi.org/10.1073/pnas.190843011
  42. Zielinski, D. (2023, November 30). Beware cybercriminals masquerading as HR professionals. SHRM. https://www.shrm.org/topics-tools/news/hr-magazine/beware-cybercriminals-masquerading-as-hr-professionals
Language: English
Page range: 100 - 113
Published on: Feb 24, 2025
Published by: University Forum for Human Resource Development & World Federation of People Management Associations
In partnership with: Paradigm Publishing Services
Publication frequency: 2 issues per year

© 2025 Alex Gordon, Darlene Russ-Eft, published by University Forum for Human Resource Development & World Federation of People Management Associations
This work is licensed under the Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 License.