消费者识别网络钓鱼欺诈的过度自信:紧迫性线索视觉显著性视角
Overconfidence in Consumers’ Detection of Phishing Fraud: From the Perspective of the Visual Saliency of Urgency Cues
DOI: 10.12677/ecl.2025.14124454, PDF,    科研立项经费支持
作者: 尚璐瑶, 王志英*:江苏科技大学经济管理学院,江苏 镇江
关键词: 过度自信紧迫性线索视觉显著性网络钓鱼电子商务Overconfidence Urgency Cues Visual Saliency Phishing E-Commerce
摘要: 电子商务领域是发生网络钓鱼欺诈的重灾区。在邮件中设置紧迫性线索是网络钓鱼欺诈常用的欺骗手段,对消费者线上安全行为存在影响。作为影响消费者最终行为因素之一的过度自信是否受到网络钓鱼邮件中紧迫性线索特征的影响还不得而知。本研究结合S-O-R模型,探究紧迫性线索的视觉显著性对消费者过度自信的影响。研究设计电子邮件合法性判断任务并应用眼动追踪技术,将紧迫性线索视觉显著性分为高低两组,进行组间实验。研究结果表明,紧迫性线索的视觉显著性会显著降低消费者的过度自信水平,即对消费者的不安全行为起到了抑制作用;消费者对紧迫性线索的视觉注意在这种影响中起到了中介作用。本研究丰富了电子商务领域中信息安全的相关研究,对消费者及电商平台的网络钓鱼欺诈防御工作的进行具有重要意义。
Abstract: The e-commerce sector is a major hotspot for phishing. Creating a sense of urgency in emails is a common tactic used by phishing scammers, which significantly impacts consumers’ online security behaviors. As one of the factors influencing consumers’ final behavior, the effect of overconfidence, which is affected by characteristics of urgency cues in phishing emails remains unknown. This study combines the S-O-R model to investigate how the visual saliency of urgency cues affects consumers’ overconfidence. Researchers designed an email legitimacy judgment task and applied eye-tracking technology, dividing visual saliency of urgency cues into high and low visual saliency groups for an intergroup experiment. Research findings indicate that the visual saliency of urgency cues significantly reduces consumers’ overconfidence levels, thereby inhibiting unsafe consumer behaviors. Consumers’ visual attention to urgency cues mediates this effect. This study enriches the literature on information security in the e-commerce domain and holds significant implications for enhancing phishing defense efforts among consumers and e-commerce platforms.
文章引用:尚璐瑶, 王志英. 消费者识别网络钓鱼欺诈的过度自信:紧迫性线索视觉显著性视角 [J]. 电子商务评论, 2025, 14(12): 4998-5013. https://doi.org/10.12677/ecl.2025.14124454

参考文献

[1] 唐宇悦. 电子商务中消费者个人信息法律保护的困境及规制[J]. 电子商务评论, 2025, 14(10): 1645-1650.
[2] Wang, P. and Lutchkus, P. (2023) Psychological Tactics of Phishing Emails. Issues in Information Systems, 24, 71-83.
[3] APWG (2025) Phishing Activity Trends Report, 1st Quarter 2025.
https://apwg.org/
[4] Wang, J., Li, Y. and Rao, H.R. (2016) Overconfidence in Phishing Email Detection. Journal of the Association for Information Systems, 17, 759-783. [Google Scholar] [CrossRef
[5] McAlaney, J. and Hills, P.J. (2020) Understanding Phishing Email Processing and Perceived Trustworthiness through Eye Tracking. Frontiers in Psychology, 11, Article No. 1756. [Google Scholar] [CrossRef] [PubMed]
[6] Chowdhury, N.H., Adam, M.T.P. and Skinner, G. (2019) The Impact of Time Pressure on Cybersecurity Behaviour: A Systematic Literature Review. Behaviour & Information Technology, 38, 1290-1308. [Google Scholar] [CrossRef
[7] 周寒, 肖益. 文档型恶意软件攻击的原理分析与防御策略研究[J]. 网络安全技术与应用, 2025(10): 42-44.
[8] Sarno, D.M. and Neider, M.B. (2021) So Many Phish, So Little Time: Exploring Email Task Factors and Phishing Susceptibility. Human Factors: The Journal of the Human Factors and Ergonomics Society, 64, 1379-1403. [Google Scholar] [CrossRef] [PubMed]
[9] Patel, P., Sarno, D.M., Lewis, J.E., Shoss, M., Neider, M.B. and Bohil, C.J. (2019) Perceptual Representation of Spam and Phishing Emails. Applied Cognitive Psychology, 33, 1296-1304. [Google Scholar] [CrossRef
[10] Baryshevtsev, M. and McGlynn, J. (2020) Persuasive Appeals Predict Credibility Judgments of Phishing Messages. Cyberpsychology, Behavior, and Social Networking, 23, 297-302. [Google Scholar] [CrossRef] [PubMed]
[11] Hu, Q., West, R. and Smarandescu, L. (2015) The Role of Self-Control in Information Security Violations: Insights from a Cognitive Neuroscience Perspective. Journal of Management Information Systems, 31, 6-48. [Google Scholar] [CrossRef
[12] Vishwanath, A., Herath, T., Chen, R., Wang, J. and Rao, H.R. (2011) Why Do People Get Phished? Testing Individual Differences in Phishing Vulnerability within an Integrated, Information Processing Model. Decision Support Systems, 51, 576-586. [Google Scholar] [CrossRef
[13] Williams, E.J., Hinds, J. and Joinson, A.N. (2018) Exploring Susceptibility to Phishing in the Workplace. International Journal of Human-Computer Studies, 120, 1-13. [Google Scholar] [CrossRef
[14] 贾心怡, 刘伟. 国内个人投资者过度自信的前因分析——人格特质、社会阶层及认知能力[J]. 科技创业月刊, 2024, 37(12): 159-166.
[15] Ifcher, J. and Zarghamee, H. (2014) Affect and Overconfidence: A Laboratory Investigation. Journal of Neuroscience, Psychology, and Economics, 7, 125-150. [Google Scholar] [CrossRef
[16] Frank, M., Jaeger, L. and Manuel Ranft, L. (2023) Using Contextual Factors to Predict Information Security Overconfidence: A Machine Learning Approach. Computers & Security, 125, Article ID: 103046. [Google Scholar] [CrossRef
[17] Ebert, N., Ackermann, K.A. and Bearth, A. (2022) When Information Security Depends on Font Size: How the Saliency of Warnings Affects Protection Behavior. Journal of Risk Research, 26, 233-255. [Google Scholar] [CrossRef] [PubMed]
[18] Pan, S., Kwak, D., Kuem, J. and Kim, S.S. (2024) Roles of Feedback and Phishing Characteristics in Anti-Phishing Training Performance: Perspectives of Goal Setting and Skill Acquisition. Journal of the Association for Information Systems, 25, 1037-1078. [Google Scholar] [CrossRef
[19] 李勋, 孙林辉, 朱鹏烨. 弹窗广告的视觉显著性对消费者注意的影响研究[J]. 人类工效学, 2021, 27(6): 33-40.
[20] Jaeger, L. and Eckhardt, A. (2020) Eyes Wide Open: The Role of Situational Information Security Awareness for Security‐Related Behaviour. Information Systems Journal, 31, 429-472. [Google Scholar] [CrossRef
[21] Brüns, J.D. and Meißner, M. (2023) Show Me That You Are Advertising: Visual Salience of Products Attenuates Detrimental Effects of Persuasion Knowledge Activation in Influencer Advertising. Computers in Human Behavior, 148, Article ID: 107891. [Google Scholar] [CrossRef
[22] 杨强, 蒋玉石, 申黎华, 等. 隐喻修辞对网络横幅广告注意效果的影响研究[J]. 管理工程学报, 2023, 37(2): 48-59.
[23] Wang, Z., Li, G., Diao, Y. and Wang, N. (2024) Warning Deterrence or Knowledge Guidance? Research on Triggering Mechanism of Phishing Sensitivity. Computers & Security, 142, Article ID: 103875. [Google Scholar] [CrossRef
[24] Williams, E.J. and Polage, D. (2018) How Persuasive Is Phishing Email? The Role of Authentic Design, Influence and Current Events in Email Judgements. Behaviour & Information Technology, 38, 184-197. [Google Scholar] [CrossRef
[25] Cakici, N. and Zaremba, A. (2022) Salience Theory and the Cross-Section of Stock Returns: International and Further Evidence. Journal of Financial Economics, 146, 689-725. [Google Scholar] [CrossRef
[26] Yeari, M., Oudega, M. and van den Broek, P. (2016) The Effect of Highlighting on Processing and Memory of Central and Peripheral Text Information: Evidence from Eye Movements. Journal of Research in Reading, 40, 365-383. [Google Scholar] [CrossRef
[27] Milutinović, G., Ahonen-Jonnarth, U. and Seipel, S. (2021) Does Visual Saliency Affect Decision-Making? Journal of Visualization, 24, 1267-1285. [Google Scholar] [CrossRef
[28] Chun, M.M., Golomb, J.D. and Turk-Browne, N.B. (2011) A Taxonomy of External and Internal Attention. Annual Review of Psychology, 62, 73-101. [Google Scholar] [CrossRef] [PubMed]
[29] Connor, C.E., Egeth, H.E. and Yantis, S. (2004) Visual Attention: Bottom-Up versus Top-Down. Current Biology, 14, R850-R852. [Google Scholar] [CrossRef] [PubMed]
[30] Li, W., Guan, J. and Shi, W. (2021) Increasing the Load on Executive Working Memory Reduces the Search Performance in the Natural Scenes: Evidence from Eye Movements. Current Psychology, 42, 10234-10247. [Google Scholar] [CrossRef
[31] Hussein, N. (2023) Eye-Tracking in Association with Phishing Cyber Attacks: A Comprehensive Literature Review. 10th International Conference on Computer Networks & Communications (CCNET 2023), Vancouver, 25-26 February 2023, 71-85. [Google Scholar] [CrossRef
[32] Zhu, M., Yang, Y. and Hsee, C.K. (2018) The Mere Urgency Effect. Journal of Consumer Research, 45, 673-690. [Google Scholar] [CrossRef
[33] Wagner, B.C. and Petty, R.E. (2022) The Elaboration Likelihood Model of Persuasion: Thoughtful and Non-Thoughtful social Influence. In: Theories in Social Psychology, 2nd Edition, Wiley, 120-142.
[34] Shah, D.V., Kwak, N., Schmierbach, M. and Zubric, J. (2004) The Interplay of News Frames on Cognitive Complexity. Human Communication Research, 30, 102-120. [Google Scholar] [CrossRef
[35] Canfield, C.I., Fischhoff, B. and Davis, A. (2016) Quantifying Phishing Susceptibility for Detection and Behavior Decisions. Human Factors: The Journal of the Human Factors and Ergonomics Society, 58, 1158-1172. [Google Scholar] [CrossRef] [PubMed]
[36] Sheng, X., Felix, R., Saravade, S., Siguaw, J.A., Ketron, S.C., Krejtz, K., et al. (2020) Sight Unseen: The Role of Online Security Indicators in Visual Attention to Online Privacy Information. Journal of Business Research, 111, 218-240. [Google Scholar] [CrossRef
[37] Rajab, M. (2019) Visualisation Model Based on Phishing Features. Journal of Information & Knowledge Management, 18, Article ID: 1950010. [Google Scholar] [CrossRef
[38] Porta, M., Ravarelli, A. and Spaghi, F. (2013) Online Newspapers and Ad Banners: An Eye Tracking Study on the Effects of Congruity. Online Information Review, 37, 405-423. [Google Scholar] [CrossRef
[39] Frank, M.C., Vul, E. and Johnson, S.P. (2009) Development of Infants’ Attention to Faces during the First Year. Cognition, 110, 160-170. [Google Scholar] [CrossRef] [PubMed]
[40] Pietrantonio, F., Botta, A., Zinno, S., Ventre, G., Gallo, L., Mancuso, L., et al. (2024) A Gaze-Based Analysis of Human Detection of Email Phishing. 2024 Silicon Valley Cybersecurity Conference (SVCC), Seoul, 17-19 June 2024, 1-8. [Google Scholar] [CrossRef
[41] Walther, D. and Koch, C. (2006) Modeling Attention to Salient Proto-Objects. Neural Networks, 19, 1395-1407. [Google Scholar] [CrossRef] [PubMed]
[42] Wilson, R.T., Baack, D.W. and Till, B.D. (2015) Creativity, Attention and the Memory for Brands: An Outdoor Advertising Field Study. International Journal of Advertising, 34, 232-261. [Google Scholar] [CrossRef
[43] Menzel, T., Teubner, T., Adam, M.T.P. and Toreini, P. (2022) Home Is Where Your Gaze Is—Evaluating Effects of Embedding Regional Cues in User Interfaces. Computers in Human Behavior, 136, Article ID: 107369. [Google Scholar] [CrossRef
[44] Lawson, P., Pearson, C.J., Crowson, A. and Mayhorn, C.B. (2020) Email Phishing and Signal Detection: How Persuasion Principles and Personality Influence Response Patterns and Accuracy. Applied Ergonomics, 86, Article ID: 103084. [Google Scholar] [CrossRef] [PubMed]
[45] Elazary, L. and Itti, L. (2008) Interesting Objects Are Visually Salient. Journal of Vision, 8, 1-15. [Google Scholar] [CrossRef] [PubMed]
[46] Klompstra, L., Deka, P., Almenar, L., Pathak, D., Muñoz-Gómez, E., López-Vilella, R., et al. (2022) Physical Activity Enjoyment, Exercise Motivation, and Physical Activity in Patients with Heart Failure: A Mediation Analysis. Clinical Rehabilitation, 36, 1324-1331. [Google Scholar] [CrossRef] [PubMed]
[47] Proctor, R.W. and Chen, J. (2015) The Role of Human Factors/Ergonomics in the Science of Security: Decision Making and Action Selection in Cyberspace. Human Factors: The Journal of the Human Factors and Ergonomics Society, 57, 721-727. [Google Scholar] [CrossRef] [PubMed]