Visible to the public Replication: Challenges in Using Data Logs to Validate Phishing Detection Ability MetricsConflict Detection Enabled

TitleReplication: Challenges in Using Data Logs to Validate Phishing Detection Ability Metrics
Publication TypeConference Proceedings
Year of Publication2017
AuthorsCasey Canfield, Alex Davis, Baruch Fischhoff, Alain Forget, Sarah Pearman, Jeremy Thomas
Conference Name13th Symposium on Usable Privacy and Security (SOUPS)
Date Published07/2017
Conference LocationSanta Clara, CA
KeywordsAugust'17, CMU, Human Behavior, USE: User Security Behavior
Abstract

The Security Behavior Observatory (SBO) is a longitudinal field-study of computer security habits that provides a novel dataset for validating computer security metrics. This paper demonstrates a new strategy for validating phishing detection ability metrics by comparing performance on a phishing signal detection task with data logs found in the SBO. We report: (1) a test of the robustness of performance on the signal detection task by replicating Canfield, Fischhoff and Davis (2016), (2) an assessment of the task's construct validity, and (3) evaluation of its predictive validity using data logs. We find that members of the SBO sample had similar signal detection ability compared to members of the previous mTurk sample and that performance on the task correlated with the Security Behavior Intentions Scale (SeBIS). However, there was no evidence of predictive validity, as the signal detection task performance was unrelated to computer security outcomes in the SBO, including the presence of malicious URLs, malware, and malicious files. We discuss the implications of these findings and the challenges of comparing behavior on structured experimental tasks to behavior in complex real-world settings.

Citation Keynode-36398