AUTHOR=McAlaney John , Hills Peter J. TITLE=Understanding Phishing Email Processing and Perceived Trustworthiness Through Eye Tracking JOURNAL=Frontiers in Psychology VOLUME=Volume 11 - 2020 YEAR=2020 URL=https://www.frontiersin.org/journals/psychology/articles/10.3389/fpsyg.2020.01756 DOI=10.3389/fpsyg.2020.01756 ISSN=1664-1078 ABSTRACT=Social engineering attacks in the form of phishing emails represent one of the biggest risks to cybersecurity. There is a lack of research on how the common elements of phishing emails such as the presence of misspellings and the use of urgency and threatening language influences how the email is processed and judged by participants. Eye tracking technology may provide insight into this. In this exploratory study a sample of 22 participants viewed a series of emails with or without elements associated with phishing emails, whilst their eye movements were recorded using a SMI RED 500 eye-tracker. Participants were also asked to give a numerical rating of how trustworthy they deemed each email to be. Overall it was found that participants looked more frequently at the elements associated with phishing than would be expected by chance but spent less overall time viewing these elements than would be expected by chance. The emails that included elements associated with phishing were rated as less trustworthy on average, with the presence of misspellings or threatening language being associated with the lowest trustworthiness ratings. In addition, it was noted that phishing elements relating to threatening language or urgency were viewed before misspellings. However, there was no significant interaction between the trustworthiness ratings of the emails and the amount of scanning time for phishing elements within the emails. These results suggest that there is a complex relationship between the presence of elements associated with phishing within an email and how trustworthy that email is judged to be. This study also demonstrates that eye tracking technology is a feasible method with which to identify and record how phishing emails are processed visually by individuals, which may contribute towards the design of future mitigation approaches.