Skip to main content

“Alexa, What’s a Phishing Email?”: Training users to spot phishing emails using a voice assistant

Abstract

This paper reports the findings from an empirical study investigating the effectiveness of using intelligent voice assistants, Amazon Alexa in our case, to deliver a phishing training to users. Because intelligent voice assistants can hardly utilize visual cues but provide for convenient interaction with users, we developed an interaction-based phishing training focused on the principles of persuasion with examples on how to look for them in phishing emails. To test the effectiveness of this training, we conducted a between-subject study where 120 participants were randomly assigned in three groups: no training, interaction-based training with Alexa, and a facts-and-advice training and assessed a vignette of 28 emails. The results show that the participants in the interaction-based group statistically outperformed the others when detecting phishing emails that employed the following persuasion principles (and/or combinations of): authority, authority/scarcity, commitment, commitment/liking, and scarcity/liking. The paper discusses the implication of this result for future phishing training and anti-phishing efforts.

1 Introduction

The advances in filtering phishing emails/messages [1] and usable security warnings [2] still leave a considerable room for phishers to successfully exploit victims. The last line of phishing defense, thus, is a phishing awareness training. If we can train users to spot a phishy URL or an overtly influencing and persuasive email narrative, the chances are that the phishers will be left empty handed [3]. The common anti-phishing advice is to “hover over links to check their URLs and where the URLs lead to” or “not to open a suspicious attachment” [4]. The phishing awareness training comes in various formats. Users have the option to read facts-and-advice materials [5], participate in a phishing game [6], role-play in a simulated phishing scenario [7], or use an app to practice fraudulent URL detection [8]. The phishing awareness training sometimes is taken further and users are shown the real-world consequences of following a phishing URL or attempting to induce high-fear situations [9]. In most cases, the exposure to phishing training resulted in improved levels of spotting phishing emails and decreased susceptibility, proving that is an effective strategy in combating persistent phishers.

A characteristic and critical component for the success of all of the aforementioned phishing awareness trainings is that the phishing emails are demonstrated using visual cues, that is, users are given examples of known phishing emails, URLs, and attachment and carefully explained the differences between them and their legitimate counterparts. This modality is preferred because it is assumed that users mostly rely on visual inspection of the email through a screen, either a personal computer, laptop, tablet, or a smartphone. While the visually based phishing awareness training has received a tremendous research attention, very little is known about the effectiveness of a phishing awareness training delivered through an interaction with an intelligent voice assistant like Amazon Alexa or Google Home.

Amazon and Google allow for customization and use of third-party apps, called “skills” or “actions,” respectively. The skills and actions, like browser extensions, offer a variety of services Alexa or Home themselves do not provide [10]. A recent study explored how an attacker can implement a malicious logic in a skill to manipulate news briefings in order to induce misperception [11]. The results suggest that by manipulating the email text, a skill could influence users to misperceive phishing emails as legitimate ones. These results prompted us to explore how skills can be used to combat such phishing misperceptions. For this study, therefore, we developed an Amazon skill that delivers a phishing awareness training through a voice-based interaction with a user.

To test the effectiveness of the phishing awareness training skill, we conducted a between-subject study where 120 participants were randomly assigned in three groups: (1) no training, (2) interaction-based training with Alexa, and (3) facts-and-advice training. Each of the participants, after receiving a training (or simply proceeding), was given a vignette of 28 emails and assessed whether each one of them was phishing or not. Participants were also asked to elaborate on the cues they used to make their decision. We also measured participants’ “phishing awareness” using the SeBIS scale [2] and used the scores together with their responses to determine the immediate effect of the phishing training delivered though interaction with Alexa.

With this work, we built an alternative method of delivering a phishing awareness training—interaction with Alexa—to the traditional training methods. Our goal is to understand how the concept of phishing materializes within an intelligent voice assistant environments based on the users’ trust in these devices. This paper proceeds as follows: Section 2 reviews the current landscape of phishing awareness training methods, Section 3 contextualizes the phishing awareness training in an intelligent voice assistant environment and describes the concepts of interaction-based phishing training, Section 4 details the study design, and Section 5 reports the study results. The implications of the results for raising phishing awareness are discussed in Section 6 together with a proposal for phishing warnings and training bundle of skills for intelligent voice assistants users. Finally, Section 7 concludes the paper.

2 Phishing awareness training

Users are independent agents that make their own decisions, but the majority are not experts in computers nor are aware of the phishing threat. The reasonable strategy, then, is to persuade the users to change their security behavior when deciding on emails and phishing websites [5]. The most common method of changing user’s security behaviors is phishing awareness training. Users in these phishing awareness trainings are either given facts-and-advice materials [4], exposed to phishing stories, [5, 12], participate in a game [6], role-play in a simulated phishing scenario [3, 7], or use an app to practice fraudulent URL detection [8]. In this section, we review each of these phishing training methods with their advantages and disadvantages to inform the best approach for creating an interactive-based phishing training.

2.1 Facts-and-advice

Facts-and-advice materials explain phishing and how not to fall for it from an authoritative perspective of a security expert. These materials fit a common pattern, providing definition of phishing and generic examples of harm (decontextualized factual information) followed by a generic advice in the form of 2nd person imperative statements (“you should do X” or “don’t do X”). For example, a common advice is to “hover over links to check their URLs and where the URLs lead to” or “Be wary of messages demanding immediate response and requesting passwords, bank accounts, or threatening to suspend or terminate your account” [4, 5].

The facts-and-advice are shown to have positive effect in increasing phishing awareness, but the shortcomings of this approach is that they are often incomplete from a user’s point of view [13]. For example, many people take this advice but might not be prolific in understanding URLs, especially ones that are obfuscated in tiny forms. Facts-and-advice training does not contain information about who might be the phishers, what approaches they use to influence victims, or the detailed social and personal consequences of actual phishing attacks. Nonetheless, facts-and-advice training is suitable for delivery through an intelligent voice assistant because the advice comes from a “trusted voice” and could be delivered on-demand in people’s home environments.

2.2 Stories

Stories about experiencing phishing predicaments frame the phishing awareness training as a sequence of actions rather than as factual statements in order to help users learn from experience.. The phishing stories convey lessons about how to behave in various circumstances when deciding about a suspicious email [14]. A study comparing traditional facts-and-advice training against training that uses a phishing story found that the facts-and-advice training works better when presented by a security expert, and the stories work much better when told by a peer [5]. The use of stories for phishing awareness training highlights the need to consider both the perceived authority of the “trainer” (origin of training materials) as well as the relevance of the story to the user [12]. Alexa, in this case, could serve as a trusted authority, given that Alexa already serves as an “assistant” for delivering information relevant to users [15]. A recent study suggests that users are more likely to consent to share a conversation or listen to a story when they do not find it sensitive with their voice assistants [16].

2.3 Phishing games and simulations

Cybersecurity training and education through gamification is an effective method for chaining security behavior and skills development [17, 18] because users can participate without fear of consequences. Cybersecurity games incentivize and motivate users to engage in an activity that would otherwise not engage, for example, focus on examining a suspicious URL in an email. Additionally, game-based education attracts and retains the user until the end of the game by providing immediate feedback [19]. Leveraging the benefits of game design, authors in [6] developed and evaluated a phishing game to teach users how to identify phishing URLs, where to look for cues in web browsers, and how to use search engines to find legitimate websites. The results of the study show that game-trained users performed better in correctly identifying phishing websites but were no better in incorrectly judging phishing websites to be a legitimate compared to users who were given facts-and-advice or no training at all.

A similar game for mobile platforms was developed in [19]. The evaluation of the mobile phishing game showed that it positively raised users’ motivation to examine suspicious URLs before deciding to proceed with a suspicious email. Authors in [3] introduced a game that simulates actual phishing attacks in a role-playing game to encourage the player to practice defending themselves. The idea was to present phishing awareness information in context in order to better transfer the solving faculties out of the game and in the real life. Although the games show positive effect on raising awareness, at this point, it might be difficult to transfer them straightforwardly into the intelligent voice assistant environment.

2.4 Principles of influence in phishing training

All of the aforementioned training methods are focused on training users to differentiate phishing URL from a legitimate one, look for cues in web browsers, or check for a illegitimate email sender. Modest or no effort is invested in introducing the principles of influence to users and how to look for them, outside of implicit facts-and-advice about suspicious emails demanding “immediate action” [5]. A study investigating the effectiveness of the principles of influence in phishing context found that users are highly susceptible to emails employing the authority principle (e.g., an email sent from an authoritative figure) and to a lesser degree to the liking and social proof principles [20]. Factoring the demographics of the users, another study found that the younger ones were more susceptible authority and scarcity but the older ones to the liking and reciprocation [21]. Additionally, scarcity and reciprocation are found to successfully influence users to open a phishing website [22].

We choose to implement an interaction-based phishing awareness training that incorporates the principles of influence for several of reasons. First, the principles are general and do not depend on the particular email formatting and known phishing cues used in conventional facts-and-advice or game/simulation trainings. These cues are useful, but could be limited to URL formatting that is abandoned (e.g., replaced with tiny URLs instead) or past or irrelevant graphical/language formatting (e.g., old PayPal or Amazon emails) [5, 23]. Second, the principles of influence can be summarized and conveyed as a simple snippet or a story to the user by a “trusted” trainer, that is, Alexa. Users enjoy interacting with voice assistants because they are “seamless enough to be irresistible” and worry mainly about how their personal data is handled, not what information is delivered to them by these assistants [24]. Since the phishing awareness training is entirely delivered to the users (i.e., users do not share any personal data as part of the training), there is no reason for users to question the trustworthiness of Alexa.

Third, the principle of influence enable users contextualize the training to their personal email communication, instead of visually inspecting emails or reading phishing stories with no relevance to them [25]. Fourth, the principles of influence could be of benefit in raising phishing awareness in situations the training is simply completed for the sake of “compliance” [7]. Many people go thought phishing trainings because they are required to do so and less because they are genuinely interested to do so [26]. Based on these premises, we crafted a blend of a facts-and-advice and story training that presents the principles of influence to users as an alternative phishing awareness training.

3 Alexa the phishing teacher

3.1 Intelligent voice assistant environment

The basic elements of the intelligent voice assistant environment are shown in Fig. 1. Amazon introduced voice assistant skills to allow Alexa to help users with a multitude of tasks (similar to skills are Google’s actions). Skills are essentially third-party apps, like browser extensions, offering a variety of services Alexa itself does not provide [10]. To invoke a skill, the user utters a wake-word, a trigger phrase, and the skill’s invocation name. For example, for the spoken sentence “Alexa, what’s phishing?,” “Alexa” is the wake-word, “what’s” is the trigger phrase, and “phishing” is the skill invocation name. In response, Amazon’s cloud relays this request to the third-party server that returns text content as a result, e.g., “Phishing is an attempt by an attacker to solicit personal information from unsuspecting users.” This response is converted to speech by Alexa and spoken back to the user through the Alexa-enabled device (a similar invocation logic is followed in the case of Google’s actions).

Fig. 1
figure 1

Amazon Alexa intelligent voice assistant environment

3.2 Interaction-based phishing training

We used the Alexa skill blueprint for Q&A to develop a skill for an interaction-based phishing training. The development process was simple and straightforward and required only customization of the Q&A blueprint to include the training content. The training includes a definition of phishing and interaction flow with Alexa where the trainee first prompts Alexa about definition of phishing emails. Alexa responds with a brief definition of phishing, adapted from [20, 27]. Next, the trainee prompts Alexa to give more information about the principles of influence. Alexa, configured with summarized snippets from [28, 29], responds with brief explanation for each one of them. To help the trainee contextualize the training, the trainee also prompts Alexa for example emails incorporating the principles of influence as shown in Table 1.

Table 1 Interaction-based phishing awareness training

4 Study design

Our study investigates the benefits of an interactive-based phishing awareness training, delivered using the Alexa intelligent voice assistant. Because this is a first study of this kind, participants were exposed to (1) no training, (2) facts-and-advice training, and (3) interaction-based training in order to investigate any differences in outcome between these three training methods. The facts-and-advice training first described what a phishing email and next gave the trainees an advice on how persuasion could be used to influence a victim to click on a fraudulent URL.

The interaction-based training was conducted by interacting with Alexa, where Alexa provided answers to the questions in Table 2, that is, Alexa answered what a phishing email is, defined the principles of influence, and described phishing emails incorporating these principles. Participants, following the training (or simply proceeding), were offered a choice to indicate “phishing/no phishing” after each email and answer the open-ended question “‘What cues did you use to decide if this email is phishing or not?”. Participants also completed a SeBIS questionnaire assessing their susceptibility to phishing [2]. Using this data, we tested the following hypotheses:

  • Hypothesis 1: There is no difference in detecting phishing emails between the groups exposed to (1) no training, (2) facts-and-advice training, and (3) interaction-based training when compared for individual emails implementing one or a combination of two persuasion principles.

  • Hypothesis 2: There is no difference in susceptibility to phishing, measured with the SeBIS scale, between the groups exposed to (1) no training, (2) facts-and-advice training, (3) interaction-based training when compared for individual emails implementing one or a combination of two persuasion principles.

4.1 Participants

For the study, we recruited participants at least 18 years or older that have interacted with an intelligent voice assistant at least a few times in their lives (e.g., Alexa, Google Home, Siri, etc.). The participants were recruited from a large university participant pool. A sample of 120 participants agreed to be in the study (54 females, 66 males). We randomly assigned the sample to three groups (18 female/22 male participants/group; total 40): (1) a group that did not receive any training, (2) a group that received a regular facts-and-advice training, and (3) a group that received an interaction-based phishing training. To the first group, the study was announced as an “email assessment” that aims to investigate how an individual assess emails from their inbox in the normal course of a day. The second group and third group received additional information that they will be given visual training or interactive information on various types of persuasion in email communication from Alexa. The study was IRB approved; the participants received and electronically signed an informed consent and were given small compensation for their participation.

4.2 Procedure

The participants in each group then assessed a vignette of 28 emails, presented in random order to each participant, to determine if each email is phishing or not and indicate what cues they used to decide upon. Following the selection criteria for phishing susceptibility experimentation provided in [29], the emails were adapted from a corpus of confirmed phishing attacks compiled from four prominent universities [9]. The adaptation was in the context of the world events during the execution of the study and the current trends in phishing campaigns. These emails were selected from a larger group because they met two primary criteria: (1) they attempted to persuade the recipient to perform some action and (2) they clearly contained at least one of the persuasion principles of interest. The emails were coded accordingly using the coding approach in [28, 29]. Fourteen groups of persuasion principles (or combinations of principles) were derived, as shown in Table 2. For each combination, we included one phishing and one legitimate email.

Table 2 Phishing email vignette topics

After each email, the participants were asked to provide feedback on (1) whether the email is phishing or not and (2) what cues they used to aid their decision. We decided for an email phishing assessment after each question in our initial study because we wanted to preliminary gauge how users will respond to the idea of interaction-based training, and based on that, use the results to improve the Alexa-based training skill by revising how a particular persuasion principle (or a combination of) is incorporated and explained by Alexa. Following the completion of the phishing assessment, the participants completed the SeBIS questionnaire to measure participants’ phishing awareness [2].

SeBIS is an instrument scored on a 5-point Likert scale that measures a computer user’s self-reported intent to comply with “good” security practices such as paying attention to contextual phishing cues, e.g., the web browser URL bar or various security iconography. The experiment was conducted entirely online, hosted on Qualtrics survey software. The participants in the interaction-based learning group interacted with the web-based version of Amazon Alexa (due to the COVID-19 pandemic, we were unable to conduct in-person experiments with the real Alexa device. The web-based version, in any case, provides the same functionality as the device).

5 Study results

5.1 Hypothesis 1

The first hypothesis stated that there is no difference in detecting phishing emails between the groups exposed to (1) no training, (2) facts-and-advice training, and (3) interaction-based training delivered through Alexa. We found a statistically significant difference between the groups for phishing emails employing the following phishing persuasion principles (or combinations of): authority, authority/scarcity, commitment, commitment/liking, and scarcity/liking, as shown in Table 3. Initially, the interaction-based trained participants outperformed the participants in the other groups by correctly identifying that the email employing the authority principle (Fig. 2) is phishing, \(\chi (2) = 7.590\), \(p = .022^{*}, (\alpha = 0.05)\).

Fig. 2
figure 2

Phishing email incorporating the authority principle

Table 3 Pearson chi-square tests—hypothesis 1

The breakdown in Table 3 does not account to 40 participants per group for all groups because we allowed the participants to skip questions if they feel uncomfortable answering it, per the IRB approval requirements. The email came from the office of Financial Aid Office to indicate an update on the recipient’s financial profile resulting from the CARES Act. The interaction-based trained participants that indicated that “the CARES Act bails local governments, not universities,” and “the greeting is too generic from an authoritative office.” The correct participants in the facts-and-advice group referred to the formatting of the URL which “contained .org instead of .edu domain” as a tip-off cue that the email was phishing.

Next, the interaction-based trained participants also outperformed the other participants by identifying correctly that the email employing a combination of the authority and the scarcity principles (Fig. 3) is phishing, \(\chi (2) = 6.332\), \(p = .042^{*}, (\alpha = 0.05)\) . As in the previous instance, it can be noticed that the facts-and-advice participants performed better than the participants that received no training at all (even with one of the participants in the facts-and-advice group skipping this particular email). In this case, the email came from the IT department, notifying users about a re-purposing of space from unused email accounts and offering an opt-out option from this action. The participants in the interaction-based training group indicated that “it is highly unlikely that any email traffic caused congestion.” The correct participants in the facts-and-advice group mainly referred to the formatting of the email which was missing the usual “logos associated with the administration emails” as a tip-off cue that the email was phishing.

Fig. 3
figure 3

Phishing email incorporating the authority and scarcity principles

The interaction-based trained participants also outperformed the other participants (sans one response in each group) by identifying correctly that the email employing a commitment principles (Fig. 4) is phishing, \(\chi (2) = 18.842\), \(p = .000^{*}, (\alpha = 0.05)\). In this case, the email came from a political party campaign, requesting small donation. The participants in the interaction-based training group indicated that “the language in this email doesn’t appear authentic, and one can donate on the candidate website if they want to.” The correct participants in the facts-and-advice group indicated that “the URL is a long and prominent red flag - it’s not the official Bernie site”.

Fig. 4
figure 4

Phishing email incorporating the commitment principle

The same pattern was observed for the interaction-based trained participants that correctly deemed the email employing a combination of the commitment and the liking principles (Fig. 5) as phishing, \(\chi (2) = 7.440\), \(p = .024^{*}, (\alpha = 0.05)\). In this case, the email again came from the same political party campaign, offering the recipients a refund of their donations due to conclusion of the campaign. The participants in the interaction-based training group indicated that “donations made to a campaign are final, and it is up to the campaign on how they decide to spend the money - it cannot be given back to users to decide where the money goes.” The correct participants in the facts-and-advice group pointed the URL as a tip-off cue that the email is phishing.

Fig. 5
figure 5

Phishing email incorporating the commitment and liking principles

Lastly, the interaction-based trained participants outperformed the other participants and correctly deemed that the email employing a combination of the scarcity and the liking principles (Fig. 6) is phishing, \(\chi (2) = 8.712\), \(p = .013^{*}, (\alpha = 0.05)\). In this case, the email again came from the Centers for Disease Control (CDC) on the behalf of a large foundation offering the recipients a report on the COVID-19 progress. The participants in the interaction-based training group that correctly deemed the email phishing justified their decision indicating that “CDC is transparent and has all the COVID-19 numbers on their website for free.” The correct participants in the facts-and-advice group again pointed the URL as a tip-off cue that the email is phishing.

Fig. 6
figure 6

Phishing email incorporating the scarcity and liking principles

In summary, the first hypothesis is rejected for five out of 14 phishing emails and the alternative hypothesis accepted. The interaction-based training proved on par with the facts-and-advice training when the emails incorporated the authority, authority/scarcity, commitment, commitment/liking, and scarcity/liking principles of influence. A difference was not observed for the emails formatted with the authority/commitment, authority/liking, liking, scarcity, reciprocation, reciprocation/liking, social proof, social proof/liking, and social proof/commitment. Previous evidence suggests that victims are significantly more likely to click on links in emails using authority and scarcity than those using the other principles of influence [20, 22]. Respectively, the interaction-based training, as the results from our study suggest, has the potential to counter this effect and help users recognize emerging phishing campaigns.

Expectedly, we did not get any significant results for the 14 legitimate emails. Upon inspection of the reported cues in determining whether an email is phishing or not, participants in each group were overly suspicious and falsely determined the email as phishing. For example, one participant from the interaction-based group deemed the legitimate email incorporating the authority/liking principle as “phishing” believing that “the email comes from the office of the mayor, which is used as the ‘authority’ hence it is phishing.”

In several other examples, participants expected that the emails incorporating the reciprocation or liking principles should be “directly referenced to them by name instead of being general to show that the sender really has honest intentions and deserves ‘reciprocation’ and/or ‘liking’.” These comments, though without a statistical support, nonetheless warrant attention when proceeding with interaction-based trainings. Users certainly can be overly cautious and security minded [30] but the interaction-based training must stress during the training that legitimate emails also come from authoritative senders and implicitly incorporate the principles of influence. These findings, hence, are useful for our future work and we plan to evolve and test the interaction-based training with respective examples of contrasting legitimate emails.

5.2 Hypothesis 2

The second hypothesis states that there is no difference in susceptibility to phishing, measured with the SeBIS scale, between the groups exposed to (1) no training, (2) facts-and-advice training, and (3) interaction-based training. We did not find a statistical difference between the three groups on the SeBIS scale (\(\chi (2) = 3.069\), \(p = .216, (\alpha = 0.05)\)) so we retain the hypothesis 2. However, the interaction-based training participants (\(SeBiS = 3.999\), \(\sigma = .62092\)) and the facts-and-advice participants (\(SeBiS = 4.02\), \(\sigma = .70718\)) had a higher on average SeBIS score compared to the participants that received no training at all (\(SeBiS = 3.7638\), \(\sigma = .73641\)). We believe that with a larger sample a significance will be achieved, confirming that the interaction-based training as proposed in this paper is on par with the regular facts-and-advice training and certainly better than a no training at all. A further investigation could contextualize the SeBIS scale regarding the principles of influence and compare the susceptibility to phishing prior and post administering the interaction-based and the facts-and-advice training.

6 Discussion

Inspired by the rapid proliferation of intelligent voice assistants like Amazon Alexa or Google Home, we investigated how they can be utilized in training users to spot phishing emails. Our analysis shows that the participants who received interaction-based training on the principles of influence through Alexa performed significantly better when detecting five out of the 14 phishing emails in the vignette we selected for testing. In all five instances, the Alexa-trained participants correctly detected that the email is phishing with efficiency ranging between 87.2 and 92.1%. We believe that this result is promising and clearly underlines the potential of any intelligent voice assistants as alternative methods for delivering phishing training.

We also asked all the participants in the study to provide a description on cues they used to spot a potentially phishing email in the vignette. In the case of the phishing email with the authority principle of persuasion, the Alexa-trained participants immediately called the inconsistency between the authority (a university’s financial aid office) and the need for using a login to receive any CARES Act related benefits. Similarly, in the case of the authority/scarcity email, the Alexa-trained participants noticed that a university usually will not sent any email with a “sign in here” link, as well as that it is unlikely there was a scarcity of traffic and therefore a migration was needed.

In the case of the email employing the commitment principle of persuasion, the main rationale for being phished was around the fact that a political campaign communication tried to guilt-trip the receiver in sending money without providing more details on the political platform. In a similar vain, the explanation on why the commitment/liking phishing email stands out, the Alexa-trained participants pointed out that the email plays around the commitment and unequivocal support the particular candidate receives from his supporters. Finally, in the the case of the scarcity/liking phishing email, the rationale provided was that the CDC is hardly to partner with the Bill and Melinda Gates foundation for any report related to COVID-19.

The interaction-based training did not show a statistical significance in the remaining emails from the vignette shown in Table 2. A close inspection of the results indicates that the Alexa-trained participants and the facts-and-advice participants showed better efficiency of over 85.5% in detecting the phishing emails employing the authority/commitment, authority/liking, authority/liking/scarcity, and scarcity. The participants in all three groups were equally good in calling off the phishing emails in the case of social proof, social proof/liking, liking, and scarcity. The facts-and-advice-trained participants were better in calling the phishing email employing the reciprocation, reciprocation/liking, and social proof/commitment.

6.1 Implications for anti-phishing

The results of our study show that the users trust intelligent voice assistants like Alexa in learning more about the threat of phishing emails and the nefarious use of persuasion in communication. Since users personify and highly trust Alexa over a traditional computer or a smartphone, we believe that Alexa can be utilized as a “phishing trainer” on a lager scale. The phishing training can be organized in several forms. For example, the first time a user configures Alexa to manage their emails, Alexa can deliver a quick tutorial with examples on each of the principles of phishing email influences, mentioned in Section 2.5, in a medium “excited” tone [31]. Similarly, an interactive game for phishing training can be developed as an Alexa skill, and we also plan to purse that line of research. Various training emails could be spoken back to users, and based on their answers, Alexa can give explanations in a high “exciting” tone for correct and a medium “disappointed” tone for incorrect decisions. It is worth comparing the impressions of users when given the opportunity to play an interactive game like Jeopardy for the purpose of learning phishing.

From a usable security perspective, a way forward for dealing with suspicious emails is not just to deliver a training for users but also to use Alexa in screening and notifying users about a potentially harmful email in the user’s inbox. For those emails that are suspicious yet anyhow end up in our inbox, email providers like Google Mail provide visual warnings when displaying the email to notify the user that “this message seems dangerous” and offer a button to delete the message right away. A simple adaptation for the Alexa email application is a configuration where Alexa by default reads this warning with a different tone/volume than the usual and directly suggest to the user “It’s probably best that I delete this message right away, okay?” Amazon allows Alexa to express emotions with a different tone, for now only “excited” and “disappointed,” and with high, medium, or low volumes [31]. An update to the Alexa API should allow for “suspicious” tone, but in the meantime a combination of “disappointed” and “high” tones could be used to deliver this interaction-based phishing warning.

6.2 Limitations and future work

We utilized a relatively small sample in our study with mostly younger-leaning participants. This limits the generalization of the findings about a more representative population that might have a different approach towards handling phishing training and interacting with Alexa. We did not measure for the frequency of interaction with intelligent voice assistants but studies suggest that the personification and interaction with Alexa is dependent on it [6, 15]. It will be interesting in the future to explore the relationship between one’s susceptibility to phishing and their interaction habits with Alexa that might affect the interactive-phishing training. We used Amazon Alexa in our study, and that might also affect the generalization of the results. Other voice assistants like Google Home, Siri, or Cortana might yield different findings in regard to people’s ability to spot a phishing email. Our study utilized a vignette with 28 emails that were customized based on previous tropes and examples of phishing emails. Different emails from different senders, perhaps including actual fraudulent links, might yield different results. Also, different type of interaction-based training, focused say only on fraudulent URLs and not the principles of persuasion, might yield different results.

7 Conclusion

In this work, we set out to understand the effectiveness of an interaction-based phishing training delivered through an intelligent voice assistant—Alexa. This new type of phishing training, we believe, has the potential to help users better understand the threat of phishing in addition to any facts-and-advice training, phishing story, or a phishing game. We tested this interaction-based phishing training and compared with a phishing assessment between three groups of participants (120 total), one that received no training, one that was given a facts-and-advice training, and one that interacted with Alexa to learn about the persuasive nature of the phishing emails. We found that the Alexa-trained participants significantly outperformed the other groups when spotting phishing emails employing the persuasion principles (and or combinations) of authority, authority/scarcity, commitment, commitment/liking, and scarcity/liking. These findings are along the lines of the other studies that tested the effectiveness of traditional forms of phishing training like facts-and-advice, stories, and phishing games. In response, we proposed a couple of solutions for phishing warnings and extended training delivered through Alexa that we plan to pursue in our future research. We hope our results inform the security community about the potential of using Alexa as a phishing teacher.

Availability of data and materials

The study data is confidential and could be made available upon direct request to the authors.

Abbreviations

API:

Applicaiton Programming Interface

CARES Act:

Coronavirus Aid, Relief, and Economic Security Act

CDC:

Centers for Disease Control

COVID-19:

Coronavirus disease of 2019

IRB:

Institutional Review Board

SeBIS:

Security Behaviour Intentions Scale

Q[MYAMP:

A] Questions and Answers

URL:

Uniform Resource Locator

References

  1. H. Hu, G. Wang, in 27th USENIX Security Symposium (USENIX Security 18). End-to-End Measurements of Email Spoofing Attacks (USENIX Association, Baltimore, 2018), pp. 1095–1112. https://www.usenix.org/conference/usenixsecurity18/presentation/hu

  2. S. Egelman, L.F. Cranor, J. Hong, in Proceedings of the SIGCHI Conference on Human Factors in Computing Systems. You’ve Been Warned: An Empirical Study of the Effectiveness of Web Browser Phishing Warnings (Association for Computing Machinery, New York, 2008), CHI ’08, p. 1065–1074. https://doi.org/10.1145/1357054.1357219

  3. Z.A. Wen, Z. Lin, R. Chen, E. Andersen, in Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems. What.Hack: Engaging Anti-Phishing Training Through a Role-playing Phishing Simulation Game (ACM, New York, 2019), CHI ’19, pp. 108:1–108:12. https://doi.org/10.1145/3290605.3300338

  4. C. Bravo-Lillo, S. Komanduri, L.F. Cranor, R.W. Reeder, M. Sleeper, J. Downs, S. Schechter, in Proceedings of the Ninth Symposium on Usable Privacy and Security. Your Attention Please: Designing Security-Decision UIs to Make Genuine Risks Harder to Ignore (Association for Computing Machinery, New York, 2013), SOUPS ’13. https://doi.org/10.1145/2501604.2501610

  5. R. Wash, M.M. Cooper, in Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems. Who Provides Phishing Training? Facts, Stories, and People Like Me (Association for Computing Machinery, New York, 2018), CHI ’18. https://doi.org/10.1145/3173574.3174066

  6. S. Sheng, B. Magnien, P. Kumaraguru, A. Acquisti, L.F. Cranor, J. Hong, E. Nunge, in Proceedings of the 3rd Symposium on Usable Privacy and Security. Anti-Phishing Phil: The Design and Evaluation of a Game That Teaches People Not to Fall for Phish (Association for Computing Machinery, New York, 2007), SOUPS ’07, p. 88–99. https://doi.org/10.1145/1280680.1280692

  7. W. Yang, A. Xiong, J. Chen, R.W. Proctor, N. Li, in Proceedings of the Hot Topics in Science of Security: Symposium and Bootcamp. Use of Phishing Training to Improve Security Warning Compliance: Evidence from a Field Experiment (Association for Computing Machinery, New York, 2017), HoTSoS, p. 52–61. https://doi.org/10.1145/3055305.3055310

  8. G. Canova, M. Volkamer, C. Bergmann, R. Borza, in Security and Trust Management, ed. by S. Mauw, C.D. Jensen. NoPhish: An Anti-Phishing Education App (Springer International Publishing, Cham, 2014), pp.188–192

  9. O.A. Zielinska, R. Tembe, K.W. Hong, X. Ge, E. Murphy-Hill, C.B. Mayhorn, One phish, two phish, how to avoid the internet phish: Analysis of training strategies to detect phishing emails. Proc. Hum. Factors Ergon. Soc. Annu. Meet. 58(1), 1466–1470 (2014)

  10. N. Zhang, X. Mi, X. Feng, X. Wang, Y. Tian, F. Qian, in 2019 IEEE Symposium on Security and Privacy (SP). Dangerous Skills: Understanding and Mitigating Security Risks of Voice-Controlled Third-Party Functions on Virtual Personal Assistant Systems (2019). pp. 1381–1396. https://doi.org/10.1109/SP.2019.00016

  11. F. Sharevski, P. Treebridge, P. Jachim, A. Li, A. Babin, J. Westbrook, Meet malexa, alexa’s malicious twin: Malware-induced misperception through intelligent voice assistants. Int J Hum-Comput Stud 149, 102604–5 (2020). https://doi.org/10.1016/j.ijhcs.2021.102604

    Article  Google Scholar 

  12. J. Marsden, Z. Albrecht, P. Berggren, J. Halbert, K. Lemons, A. Moncivais, M. Thompson, in Extended Abstracts of the 2020 CHI Conference on Human Factors in Computing Systems. Facts and Stories in Phishing Training: A Replication and Extension (Association for Computing Machinery, New York, 2020), CHI EA ’20, p. 1–6. https://doi.org/10.1145/3334480.3381435

  13. E. Rader, R. Wash, Identifying patterns in informal sources of security information. J. Cybersecurity 1(1), 121–144 (2015). https://doi.org/10.1093/cybsec/tyv008

    Article  Google Scholar 

  14. E.M. Redmiles, A.R. Malone, M.L. Mazurek, in 2016 IEEE Symposium on Security and Privacy (SP). I Think They’re Trying to Tell Me Something: Advice Sources and Selection for Digital Security (2016), pp. 272–288

  15. A. Purington, J.G. Taft, S. Sannon, N.N. Bazarova, S.H. Taylor, in Proceedings of the 2017 CHI Conference Extended Abstracts on Human Factors in Computing Systems. “Alexa is My New BFF”: Social Roles, User Satisfaction, and Personification of the Amazon Echo (Association for Computing Machinery, New York, 2017), CHI EA ’17, p. 2853–2859. https://doi.org/10.1145/3027063.3053246

  16. M. Tabassum, T. Kosiński, A. Frik, N. Malkin, P. Wijesekera, S. Egelman, H.R. Lipford, Investigating users’ preferences and expectations for always-listening voice assistants. 3(4) (2019). https://doi.org/10.1145/3369807

  17. M. Gondree, Z.N.J. Peterson, T. Denning, Security through play. IEEE Secur. Priv. 11(3), 64–67 (2013)

    Article  Google Scholar 

  18. M. Carlisle, M. Chiaramonte, D. Caswell, in 2015 USENIX Summit on Gaming, Games, and Gamification in Security Education (3GSE 15). Using CTFs for an Undergraduate Cyber Education (USENIX Association, Washington, 2015). https://www.usenix.org/conference/3gse15/summit-program/presentation/carlisle

  19. N.A.G. Arachchilage, S. Love, K. Beznosov, Phishing threat avoidance behaviour: An empirical investigation. Comput. Hum. Behav. 60, 185–197 (2016). https://doi.org/10.1016/j.chb.2016.02.065

    Article  Google Scholar 

  20. T. Lin, D.E. Capecci, D.M. Ellis, H.A. Rocha, S. Dommaraju, D.S. Oliveira, N.C. Ebner, Susceptibility to spear-phishing emails: Effects of internet user demographics and email content. ACM Trans. Comput.-Hum. Interact. 26(5) (2019). https://doi.org/10.1145/3336141

  21. D. Oliveira, H. Rocha, H. Yang, D. Ellis, S. Dommaraju, M. Muradoglu, D. Weir, A. Soliman, T. Lin, N. Ebner, in Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems. Dissecting Spear phishing emails for older vs young adults: On the interplay of weapons of influence and life domains in predicting susceptibility to phishing (2017), ser. CHI ’17, pp. 6412–6424. https://doi.org/10.1145/3025453.3025831

  22. E.J. Williams, J. Hinds, A.N. Joinson, Exploring susceptibility to phishing in the workplace. Int. J. Hum.-Comput. Stud. 120, 1–13 (2018). https://doi.org/10.1016/j.ijhcs.2018.06.004

    Article  Google Scholar 

  23. H. Gascon, S. Ullrich, B. Stritter, K. Rieck, in Research in Attacks, Intrusions, and Defenses. ed. by M. Bailey, T. Holz, M. Stamatogiannakis, S. Ioannidis, R. Between, the Lines: Content-Agnostic Detection of Spear-Phishing Emails, (Springer International Publishing, Cham, 2018), pp.69–91

  24. H. Chung, M. Iorga, J. Voas, S. Lee, Alexa, Can I Trust You? Computer 50(9), 100–104 (2017). https://doi.org/10.1109/MC.2017.3571053

    Article  Google Scholar 

  25. D.J. O’keefe, Persuasion: Theory and research (Sage Publications, 2015)

  26. D.D. Caputo, S.L. Pfleeger, J.D. Freeman, M.E. Johnson, Going spear phishing: Exploring embedded training and awareness. IEEE Secur. Priv. 12(1), 28–38 (2014)

    Article  Google Scholar 

  27. O. Zielinska, A. Welk, C.B. Mayhorn, E. Murphy-Hill, in Proceedings of the Symposium and Bootcamp on the Science of Security. The Persuasive Phish: Examining the Social Psychological Principles Hidden in Phishing Emails (Association for Computing Machinery, New York, 2016), HotSos ’16, p. 126. https://doi.org/10.1145/2898375.2898382

  28. A. Ferreira, L. Coventry, G. Lenzini, in Human Aspects of Information Security, Privacy, and Trust, ed. by T. Tryfonas, I. Askoxylakis. Principles of Persuasion in Social Engineering and Their Use in Phishing (Springer, 2015), pp. 36–47

  29. P. Lawson, C.J. Pearson, A. Crowson, C.B. Mayhorn, Email phishing and signal detection: how persuasion principles and personality influence response patterns and accuracy. Appl. Ergon. 86, 103084 (2020). https://doi.org/10.1016/j.apergo.2020.103084. http://www.sciencedirect.com/science/article/pii/S0003687020300478

  30. M. Blythe, H. Petrie, J.A. Clark, in Proceedings of the SIGCHI Conference on Human Factors in Computing Systems. F for Fake: Four Studies on How We Fall for Phish (Association for Computing Machinery, New York, 2011), CHI ’11, p. 3469–3478. https://doi.org/10.1145/1978942.1979459

  31. C. Gao. Use New Alexa Emotions and Speaking Styles to Create a More Natural and Intuitive Voice Experience (2019). Accessed 26 Nov 2019, https://developer.amazon.com/en-US/blogs/alexa/alexa-skills-kit/2019/11/new-alexa-emotions-and-speaking-styles

Download references

Funding

The authors have received no funding for this study.

Author information

Authors and Affiliations

Authors

Contributions

Both authors contributed equally to this study. The authors read and approved the final manuscript.

Authors’ information

Filipo Sharevski, PhD, is a cybersecurity researcher who is interested in reality manipulation as it unfolds across the cyberspace, particularly focused on social engineering, disinformation and opinion manipulation on social media, adversarial machine learning, and human-centered security. His research work yielded publications focused on malware-supported social media information campaigns, adversarial user experience designs, and data science-driven design of a prototype social media platform for socially calibrated (mis)information discourse. Dr. Sharevski holds a PhD in Interdisciplinary Cybersecurity from Purdue University, West Lafayette. He is currently an Assistant Professor in the College of Computing and Digital Media at DePaul University, where he is the director of the Adversarial Cybersecurity Automation Lab (ACAL) and the Divergent Design Lab (DDL).

Peter Jachim is a PhD student at the Adversarial Cybersecurity Automation Lab (ACAL) and a lead data scientist at the Divergent Design Lab (DDL) who uses computational linguistics and machine learning to collect information about targets. His research interests include ambient tactical deception, computational linguistics, adversarial machine learning, and social engineering. Peter is pursuing a PhD in Adversarial Cybersecurity from DePaul University, where he is a member of DePaul’s chapter of UPE, the International Honor Society for the Computing and Information Disciplines. He holds a BA in History with a Chinese minor from The College of Wooster and MS in Health Informatics.

Corresponding author

Correspondence to Filipo Sharevski.

Ethics declarations

Competing interests

The authors declare that they have no competing interests.

Additional information

Publisher’s Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Open Access This article is licensed under a Creative Commons Attribution 4.0 International License, which permits use, sharing, adaptation, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons licence, and indicate if changes were made. The images or other third party material in this article are included in the article's Creative Commons licence, unless indicated otherwise in a credit line to the material. If material is not included in the article's Creative Commons licence and your intended use is not permitted by statutory regulation or exceeds the permitted use, you will need to obtain permission directly from the copyright holder. To view a copy of this licence, visit http://creativecommons.org/licenses/by/4.0/.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Sharevski, F., Jachim, P. “Alexa, What’s a Phishing Email?”: Training users to spot phishing emails using a voice assistant. EURASIP J. on Info. Security 2022, 7 (2022). https://doi.org/10.1186/s13635-022-00133-w

Download citation

  • Received:

  • Accepted:

  • Published:

  • DOI: https://doi.org/10.1186/s13635-022-00133-w

Keywords