{"links":{},"metadata":{"_oai":{"id":"oai:ipsj.ixsq.nii.ac.jp:00222836","sets":["581:10784:10798"]},"path":["10798"],"owner":"44499","recid":"222836","title":["Experiences, Behavioral Tendencies, and Concerns of Non-Native English Speakers in Identifying Phishing Emails"],"pubdate":{"attribute_name":"公開日","attribute_value":"2022-12-15"},"_buckets":{"deposit":"9935bfc7-ff5e-452a-8cd1-acc6832c37fa"},"_deposit":{"id":"222836","pid":{"type":"depid","value":"222836","revision_id":0},"owners":[44499],"status":"published","created_by":44499},"item_title":"Experiences, Behavioral Tendencies, and Concerns of Non-Native English Speakers in Identifying Phishing Emails","author_link":["585139","585144","585141","585143","585140","585138","585142","585145"],"item_titles":{"attribute_name":"タイトル","attribute_value_mlt":[{"subitem_title":"Experiences, Behavioral Tendencies, and Concerns of Non-Native English Speakers in Identifying Phishing Emails"},{"subitem_title":"Experiences, Behavioral Tendencies, and Concerns of Non-Native English Speakers in Identifying Phishing Emails","subitem_title_language":"en"}]},"item_keyword":{"attribute_name":"キーワード","attribute_value_mlt":[{"subitem_subject":"[特集:持続可能な社会のIT基盤に向けた情報セキュリティとトラスト] usable security, phishing, non-native English speakers, security behavior","subitem_subject_scheme":"Other"}]},"item_type_id":"2","publish_date":"2022-12-15","item_2_text_3":{"attribute_name":"著者所属","attribute_value_mlt":[{"subitem_text_value":"NICT"},{"subitem_text_value":"NTT/Kyoto University"},{"subitem_text_value":"NTT"},{"subitem_text_value":"Waseda University/NICT/RIKEN AIP"}]},"item_2_text_4":{"attribute_name":"著者所属(英)","attribute_value_mlt":[{"subitem_text_value":"NICT","subitem_text_language":"en"},{"subitem_text_value":"NTT / Kyoto University","subitem_text_language":"en"},{"subitem_text_value":"NTT","subitem_text_language":"en"},{"subitem_text_value":"Waseda University / NICT / RIKEN AIP","subitem_text_language":"en"}]},"item_language":{"attribute_name":"言語","attribute_value_mlt":[{"subitem_language":"eng"}]},"publish_status":"0","weko_shared_id":-1,"item_file_price":{"attribute_name":"Billing file","attribute_type":"file","attribute_value_mlt":[{"url":{"url":"https://ipsj.ixsq.nii.ac.jp/record/222836/files/IPSJ-JNL6312012.pdf","label":"IPSJ-JNL6312012.pdf"},"date":[{"dateType":"Available","dateValue":"2024-12-15"}],"format":"application/pdf","billing":["billing_file"],"filename":"IPSJ-JNL6312012.pdf","filesize":[{"value":"1.0 MB"}],"mimetype":"application/pdf","priceinfo":[{"tax":["include_tax"],"price":"0","billingrole":"5"},{"tax":["include_tax"],"price":"0","billingrole":"6"},{"tax":["include_tax"],"price":"0","billingrole":"8"},{"tax":["include_tax"],"price":"0","billingrole":"44"}],"accessrole":"open_date","version_id":"0105533f-edc2-4da0-95f8-a52e58fe9786","displaytype":"detail","licensetype":"license_note","license_note":"Copyright (c) 2022 by the Information Processing Society of Japan"}]},"item_2_creator_5":{"attribute_name":"著者名","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"Ayako, A. Hasegawa"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Naomi, Yamashita"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Mitsuaki, Akiyama"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Tatsuya, Mori"}],"nameIdentifiers":[{}]}]},"item_2_creator_6":{"attribute_name":"著者名(英)","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"Ayako, A. Hasegawa","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Naomi, Yamashita","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Mitsuaki, Akiyama","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Tatsuya, Mori","creatorNameLang":"en"}],"nameIdentifiers":[{}]}]},"item_2_source_id_9":{"attribute_name":"書誌レコードID","attribute_value_mlt":[{"subitem_source_identifier":"AN00116647","subitem_source_identifier_type":"NCID"}]},"item_resource_type":{"attribute_name":"資源タイプ","attribute_value_mlt":[{"resourceuri":"http://purl.org/coar/resource_type/c_6501","resourcetype":"journal article"}]},"item_2_publisher_15":{"attribute_name":"公開者","attribute_value_mlt":[{"subitem_publisher":"情報処理学会","subitem_publisher_language":"ja"}]},"item_2_source_id_11":{"attribute_name":"ISSN","attribute_value_mlt":[{"subitem_source_identifier":"1882-7764","subitem_source_identifier_type":"ISSN"}]},"item_2_description_7":{"attribute_name":"論文抄録","attribute_value_mlt":[{"subitem_description":"Phishing, a form of online fraud, remains a huge cybersecurity threat. Recent research in cybersecurity and risk management revealed the possibility that non-native speakers of the language used in phishing emails are more susceptible to such attacks. Although many studies have focused on the behaviors that native English speakers use to avoid phishing attacks, little is known about the behaviors of non-native speakers. Therefore, we conducted an online survey with 862 non-native English speakers (284 Germans, 276 South Koreans, and 302 Japanese). We showed that non-native English speakers are regularly exposed to English phishing emails. Through our scenario-based roleplay task, we found that participants, especially those who lacked confidence in English, had a higher tendency to ignore English emails without careful inspection than emails in their native languages. Furthermore, both the German and South Korean participants generally followed the instructions in the email in their native languages without careful inspection. Finally, our qualitative analysis revealed five main concerns in identifying English phishing emails: difficulty understanding email content, difficulty identifying errors and unnatural language, unfamiliarity with phishing emails, decreased attention, and difficulty finding similar cases. These findings highlight the importance of providing non-native speakers with specific anti-phishing interventions that differ from those for native speakers.\n------------------------------\nThis is a preprint of an article intended for publication Journal of\nInformation Processing(JIP). This preprint should not be cited. This\narticle should be cited as: Journal of Information Processing Vol.30(2022) (online)\nDOI http://dx.doi.org/10.2197/ipsjjip.30.841\n------------------------------","subitem_description_type":"Other"}]},"item_2_description_8":{"attribute_name":"論文抄録(英)","attribute_value_mlt":[{"subitem_description":"Phishing, a form of online fraud, remains a huge cybersecurity threat. Recent research in cybersecurity and risk management revealed the possibility that non-native speakers of the language used in phishing emails are more susceptible to such attacks. Although many studies have focused on the behaviors that native English speakers use to avoid phishing attacks, little is known about the behaviors of non-native speakers. Therefore, we conducted an online survey with 862 non-native English speakers (284 Germans, 276 South Koreans, and 302 Japanese). We showed that non-native English speakers are regularly exposed to English phishing emails. Through our scenario-based roleplay task, we found that participants, especially those who lacked confidence in English, had a higher tendency to ignore English emails without careful inspection than emails in their native languages. Furthermore, both the German and South Korean participants generally followed the instructions in the email in their native languages without careful inspection. Finally, our qualitative analysis revealed five main concerns in identifying English phishing emails: difficulty understanding email content, difficulty identifying errors and unnatural language, unfamiliarity with phishing emails, decreased attention, and difficulty finding similar cases. These findings highlight the importance of providing non-native speakers with specific anti-phishing interventions that differ from those for native speakers.\n------------------------------\nThis is a preprint of an article intended for publication Journal of\nInformation Processing(JIP). This preprint should not be cited. This\narticle should be cited as: Journal of Information Processing Vol.30(2022) (online)\nDOI http://dx.doi.org/10.2197/ipsjjip.30.841\n------------------------------","subitem_description_type":"Other"}]},"item_2_biblio_info_10":{"attribute_name":"書誌情報","attribute_value_mlt":[{"bibliographic_titles":[{"bibliographic_title":"情報処理学会論文誌"}],"bibliographicIssueDates":{"bibliographicIssueDate":"2022-12-15","bibliographicIssueDateType":"Issued"},"bibliographicIssueNumber":"12","bibliographicVolumeNumber":"63"}]},"relation_version_is_last":true,"weko_creator_id":"44499"},"created":"2025-01-19T01:22:46.362589+00:00","updated":"2025-01-19T13:36:10.760088+00:00","id":222836}