JURNAL Riset Akuntansi dan Keuangan Indonesia URL : http://journals. id/index. php/reaksi/index INDONESIAN SMEs AND CYBERSECURITY: DEVELOPING INSTRUMENT TO TEST SMEs OWNERSAo CAPABILITY IN DETECTING PHISHING EMAILS Ratna Yudhiyati1. Diana Rahmawati2. Afrida Putritama3 University of Wollongong. Australia Universitas Negeri Yogyakarta. Indonesia *ryudhiyati@uow. Keywords: phishing email, small and medium-sized enterprises (SME. , knowledge assessment, information system, cybersecurity ABSTRACT This study identified the characteristics of phishing emails and designed an instrument to assess the level of individual knowledge in detecting various phishing messages. This instrument is primarily designed for SMEs. The instrument is to be used not only as a testing tool for phishing detection skills, but also as the foundation for generating training materials or phishing detection guidelines for SMEs. This study developed a test of phishing susceptibility by collecting various real-life legitimate and phishing emails, and ask test takers to identify which emails are legitimate and which emails are phishing. Based on the validity and reliability tests, the created instrument has high content validity for all question items but only reaches medium reliability. The test reliability can be improved by adding questions, or modify the question by having multiple-choice of answers for each question instead of Yes/No answer choices. A 2025 The Author. This work licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 0 International License. Vol. 9 No. 3 Desember 2024 JURNAL Riset Akuntansi dan Keuangan Indonesia INTRODUCTION The risks of phishing are increasing due to increased uses of email in modern communication. Phishing attacks are acts of cybercriminals who manipulate electronic messages using social engineering tactics to deceive the recipients of the messages, so that they believe that the message came from a trustworthy or legitimate source (Wright et al. , 2. When individuals are deceived by phishing messages and follow the instructions listed, phishers . he perpetrator of phishing attack. can steal information and identities, access accounts, and sell them to other parties or use them to commit financial fraud (Jensen et al. , 2. Phishing attacks have gotten more sophisticated in recent years (Furnell, 2007. Symantec, 2. Initially, most phishing attacks were carried out by sending mass e-mails to a large number of people, with an expectation that some of the receivers would be deceived (Wright et al. , 2. However, in recent years, phishing has evolved and harder to detect, as phishers develop custom messages to specific people or groups (Jensen et al. Symantec, 2. Phishing that specifically targets specific individuals or small groups is called spear-phishing. Spear-phishing emails are typically designed to meet the expectations of their intended receivers, and some communications may even contain information that only the recipient or group of recipients is aware of, which improve the chance of success for the phishing attack. Symantec . , found that regular phishing attacks decreased between 2013 and 2015, while spearphishing attacks increased significantly. Given the increasing number of spear-phishing where the phishing messages are developed specifically for each target group, technology-based safeguards are becoming unreliable. Email users are ultimately the most crucial factor in identifying phishing schemes (Wang et al. , 2. Since the Covid-19 pandemic, many SMEs have relied on information technology to conduct their business (Falch et al. , 2. SMEs adoption of information technology is not only about generating competitive advantage, but also a matter of business survival (Yudhiyati et al. , 2. yet, the adoption of new technologies introduces new business risks for SMEs, namely cybersecurity risk (Rahmawati et , 2. Thus, cybersecurity is an important topic Indonesian SMEs and. p-ISSN:1411-6510 e-ISSN :2541-6111 for SMEs. However, most SMEs do not have proper cybersecurity measure. Most of them rely on the cybersecurity measures embedded in the solutions they bought form the third-party providers (Falch et al. , 2023. Yudhiyati et al. , 2021. Renaud, 2. They have limited financial and human resources to devote to cybersecurity. (Burda et al. , 2023. Corzo et al. , 2. , so they are generally considered vulnerable to cybersecurity threats (Yudhiyati et al. , 2. Several surveys also found that individuals in SMEs are more likely to be targeted by cybersecurity threat (Symantec, 2019. Wilson et al. , 2. Phishing and email-based cyberattacks are great concerns for SMEs (Falch et al. According to Wilson et al, . , phishing is one of the cybersecurity risks to which SMEs are most vulnerable. The frequency of phishing targeted on small firms has increased in recent years, and its success rate is relatively high. Emailbased cyber-attacks have a greater chance of success in organisations with less formal procedures to manage information systems, such as SMEs (Falch et al. , 2. This situation is concerning since email service and other internet services that require email are the most commonly used information technology for SMEs. Most research on phishing focus on large corporations, while SMEs are frequently not studied due to SMEsAo low interest in this subject (Burda et al. , 2. However. SMEs have different business profiles, organisational cultures, and social dynamics, which may cause them to respond to phishing differently than large organisations, which are normally the focus of phishing study (Burda et , 2. Given the growing number of spear-phishing attacks in which the phishing electronic messages are tailored to each target group, technology-based preventive measures are becoming ineffective. The users of email service are ultimately the final and most essential factor in identifying phishing attacks (Wang et al. , 2. There were several studies examining the human or user side of phishing. The topics that were raised were diverse. Several studies examined factors that affect individualsAo susceptibility to phishing attacks or their ability in detecting phishing attacks (Wright et al. , 2014. Wang et al. Vishwanath et al. , 2011. Kimpe at al. , 2. p-ISSN:1411-6510 e-ISSN :2541-6111 JURNAL Riset Akuntansi dan Keuangan Indonesia Several research developed training strategies that are successful in educating individuals to recognise phishing attempts (Jensen et al. , 2017. Zielinska et , 2. Unfortunately, only few studies about phishing specifically focus on SMEs (Burda et al. Corzo et al. , 2. Most studies about phishing require an instrument to assess an individualAos capacity to identify phishing. Researchers have a difficulty in selecting a suitable instrument to quantify these Several researchers conducted a phishing experiment by delivering a phishing message to respondents, aimed to be as authentic as possible, without their knowledge. However, this strategy is difficult to implement because it involves the agreement of many stakeholders and there are ethical concerns to be considered (Vishwanath et , 2. Another strategy is to perform controlled experiments in which respondents are aware that they will get a phishing message, although not knowing the form of the message or the time of Unfortunately, this strategy has also been criticised for its potential bias (Vishwanath et , 2. Several studies employed a questionnaire to assess an individualAos ability to detect phishing rather than a simulation of sending phishing messages in their study (Wang et al. , 2. , (Zielinska et , 2. This technique enables researchers to assess how accurate respondents are in detecting individual phishing messages with minimum bias (Falch et al. , 2. This instrument is not suitable for measuring the effect of psychological and environmental factors experienced by respondents after receiving phishing mails. However, this instrument is helpful when researchers want to examine the level of individual expertise in recognising the characteristics and signs of phishing This study identified the characteristics of phishing messages and developed an instrument to assess the individualAos proficiency in detecting various phishing messages. This instrument is primarily designed for SMEs. There is a need to equip SMEs against phishing, because the frequency of spear phishing attacks on SMEs have increased significantly for recent years (Symantec, 2. Indonesian SMEs are especially vulnerable in safeguarding against phishing since most Indonesian SMEs rely on internet-based Vol. 9 No. 3 Desember 2024 applications offered by third parties, and they have limited understanding of information technology fraud prevention measures (Yudhiyati et al. , 2. To the best of the researcherAos knowledge, no study has assessed SMEsAo abilities to prevent phishing in Indonesia. This instrument is also designed not only as a tool for testing individual abilities in detecting phishing messages, but also as a basis for creating training materials or guidelines in phishing prevention for SMEs. LITERATURE REVIEW Cybersecurity Threat for SMEs Cybersecurity is an important issue for SMEs. Most cybersecurity studies focusing on SMEs explored how SMEs perceived cybersecurity threat and how they implement cybersecurity Berry & Berry . , found that small business owners identified that three out of six top critical issues for small businesses are information technology-related. SMEs understand that when businesses use information technology, they risk being attacked by cybercriminals. However, for most SMEs, the cyber risks are ambiguous, and they do not know exactly what they can lose from cyber assaults (Yudhiyati et al. , 2. Most SMEs also believe that they only need to adopt basic cybersecurity measures since most SMEs employ IT services provided by third-party (Rahmawati et al. Berry & Berry, 2. , and they believe that the main burden of providing cybersecurity measures falls with the third-party providers (Yudhiyati et al. Khan et al. , 2020. Le et al. , 2. SMEsAo low cybersecurity awareness is a prevalent issue in most nations, such as the UK (Renaud, 2016. Wilson et al. , 2. , the US (Berry & Berry, 2. Denmark (Falch et al. , 2. , and developing countries such as Indonesia (Yudhiyati et al. , 2. They do not believe that they are worth being targeted by cybercriminals due to their size, thus they merely apply the minimal security measures (Symantec, 2. However, while SMEs may experience fewer cyber-attacks compared to larger companies, cyberattack impacts are generally more severe for SMEs (Wilson et al. Rawindaran & N, 2023. Fagbule & O, 2. Cybercrimes also have a detrimental effect on SMEsAo opportunities since many large companies avoid doing business with SMEs that have been victims of severe cyber attacks (Renaud, 2016. Yudhiyati et al. Vol. 9 No. 3 Desember 2024 JURNAL Riset Akuntansi dan Keuangan Indonesia et al. , 2. Several studies observed that one of the reasons why most SMEs do not adopt proper security measures, although recognising that there are risks in employing information technology, is the high level of uncertainty they face in respect to cybersecurity. Research and knowledge gaps in cybersecurity awarness for small and medium-size enterprises (Chaudhary et al. , 2. Renaund . claimed that many SMEs requested cybersecurity information and training, indicating the SMEs are experiencing a high degree of uncertainty about this topic. SMEs are overwhelmed by the options of internet security measures and recommendations provided by various institutions, which may be varied, and they are unclear about what they need to do. This uncertainty is the reason why most SMEs hope that they get cybersecurity training authorised from governments, which are regarded legitimate parties (Yudhiyati et al. , 2021. Renaud. Papathanasiou et al. , 2. Previous Studies about Phishing Unfortunately, there are only few studies about phishing that focus on SMEs owners or Most phishing studies focus on individuals without differentiating their occupation background, so their findings are also relevant for this study. Most studies about phishing aimed to identify factors that affect individuals susceptibility to phishing attacks. Kimpe et al, . revealed that persons who frequently use online features for commerce or acquiring resources are more likely to be targeted by phishing attempts than those who rarely do so. They are more exposed to cyber community and they are used to received high number of emails. Viswanath et al, . observed that individuals that receive a large number of emails and rely heavily on emails for important communication are more likely to fall victim to phishing because they frequently ignore several phishing signals due to the volume of emails they These findings appear to contradict another study, which revealed that individuals with more extensive internet experience and computer use are more likely to not be deceived by phishing attacks (Wright & Marett, 2. However, it is important to understand the difference between being targeted Indonesian SMEs and. p-ISSN:1411-6510 e-ISSN :2541-6111 by phishing and falling victim to phishing. The former implies that persons may receive a phishing message but are not necessarily deceived by it, whereas the latter focuses on those who are deceived by the message. The high frequency of internet use may raise the chance of being targeted by phishing. yet, less expertise and exposure to the internet will increase the chance of successful phishing attacks. Individuals who rarely use internet are more likely to have low computer self-efficacy and exposure, which increase their chance of being deceived when they receive phishing emails (Wright & Marett. Wright and Marett . suggested that the best way to prepare against phishing is having adequate experience in internet and computer use, alongside proper security knowledge and a healthy dose of suspicion. There are only handful phishing studies that focus on SMEs. Rodriguez-Corzo et al. Wright et al, . suggested a cybersecurity risk management that can be implemented by SMEs which address characteristic of company, technology used, and the people in the company. Burda et al, . conducted a phishing experiment with employees in an SME and observed that detection of inconsistent pattern was the primary method how these employees detect the spear-phishing attack. These employees know each other and the firm well and notice some inconsistent pattern of communication in the phishing message, such as the tiny variation in the corporate logo or the different email signature used by the CEO. This study showed a unique character of SMEs in relation to phishing susceptibility. How Phishing was Measured in Previous Studies Quantitative studies about phishing measure it in various ways. Several studies specifically selected phishing victims or people that ever receive phishing emails as respondents. These studies explored the characteristics of these respondents who were actually targeted by phishing attacks, and whether they fell victim to the attack or not (Vishwanath et al. , 2011. Kimpe et al. , 2018. Ascic & H. J, 2. However, only a few studies use this method since the experience of being a fraud victim is sensitive and rarely discussed, thus researchers have a limited number of possible respondents. Other studies conduct experiment by sending simulated phishing emails to respondents and assess whether they fall for the deception or not (Wright et p-ISSN:1411-6510 e-ISSN :2541-6111 JURNAL Riset Akuntansi dan Keuangan Indonesia , 2014. Burda et al. , 2023. Wright & Marett, 2. The key issue of using this approach is obtaining sufficient approval from relevant authorities and managing the unfavourable responses from the respondents after the research, because some of them may be unhappy to be deceived. Another limitation is that this technique can only assess individualsAo abilities to identify phishing for a specific email. However, this approach arguably provides the best way to measure how individualsAo environment contribute in their ability in detect Another approach commonly used to measure phishing is to run a test to examine respondentsAo ability to detect phishing among a handful of phishing messages that researchers ask them to analyse (Furnell, 2007. Wang et al. , 2017. Zielinska et al. , 2. This technique has limitations in its ability to simulate the environmental factors that may affect individualsAo response to phishing emails, but this approach is the easiest to perform compared to the previous ones, and it is also a good measure to assess individualsAo phishing susceptibility without any influence from other external factors. RESEARCH METHODS This research is development research using the ADDIE model. The model provides a step-bystep process that are often used to develop training instrument (Pears & Konstantinidis, 2. The five stages of the model are: Analysis. Design. Development. Implementation, and Evaluation. Throughout the 5 stages, this research identified what are the topics to be tested, how it should be tested, develop the test, implement the test in realworld setting, and analyse the impact to both the test and process. Phase I Ae Analyse the topics to be tested The main objective of Phase I is identifying a list of phishing message characteristics and prioritise their importance to be included in the testing instrument This phase entailed doing a literature review to determine topics or skills required to identify phishing messages that should be included in the test. This literature review focuses on assessment tools used in past studies of competence and literacy in the use of information Vol. 9 No. 3 Desember 2024 Based on the result of the literature review, the research team interviewed small business owners and IT practitioners to analyse the urgency of the identified topics, and prioritise the topics to be included in the test. Phase II Ae Design the test Phase II included designing the test design, such as choosing the format of the test and how many of question items in the test. The initial draft is designed using a simple template in Microsoft Word which clearly showed the aspect tested in each question. The research team analysed each question item to make sure that the test addressed all the topics identified in the Phase I. In this phase, the research team also decided on the arrangement of the test items. The research team conducted content validity test based on the initial draft. Content validity test is carried out by a panel of experts. Each of the expert needs to fulfill one of the following conditions. works in fields related to auditing, fraud or information systems, or . have an educational background in fraud or information systems. The testing technique used is the V formula suggested by Aiken (Azwar, 2. , (Retnawati, 2. Each expert gave a score between 1 . ery irrelevan. to 5 . ery relevan. for each test item related to the targeted topic and subtopic. The form used by the raters for the validity test is shown in Table 1. Phase i Ae Develop the test Table 1. The Form for Expert to Evaluate the Content Validity Subtopic Indicator Items Relevance Assessment 2 3 4 Based on the original draft generated in Phase II, the research team inserted the picture of each selected email in the Google Form as a quiz and put the question and directions for the test that were designed in Phase II. Phase IV Ae Implement the test Phase IV involved the field test of the The research team distributed the developed instrument to respondents. The respondents of the field test are 31 SMEs owners Yudhiyati et al. Vol. 9 No. 3 Desember 2024 JURNAL Riset Akuntansi dan Keuangan Indonesia in DI Yogyakarta province which attended an information security workshop held by Faculty of Economics. Universitas Negeri Yogyakarta. Phase V Ae Evaluate the test The research team evaluate the test using the data collected form the fieldwork in Phase IV. There are two aspects that that the team evaluated. First, the research team evaluate the reliability of the test. Reliability refers to how consistent a measurement tool is. Consistency in this case suggests that the variety in scores obtained by test participants represents differences in the level of ability predicted by the test, instead of faults in the assessment instrument (Azwar, 2. This research measures test reliability with a coefficient of 20 or KR-20 (Azwar, 2. The research team tallied the scores of respondents who take the exam and calculate the p-ISSN:1411-6510 e-ISSN :2541-6111 reliability coefficient based on this data. The team evaluates if the instrument is acceptable or if there are any improvements that can be made. Second, the research team also evaluate findings or interesting information about the Indonesian SMEsAo capability in detecting phishing emails based on data collected from the field test. While the collected information may not be able to be generalised to the Indonesian SMEs as a whole, it can provide interesting information for future RESULTS AND DISCUSSION This research study produced an instrument for assessing individualsAo proficiency in identifying phishing emails, particularly SMEsAo owners or Findings Ae Phase I Table 2. The Aspects and Indicators in the Testing Instrument Aspect Phishing cues Indicator How it will be incorporated in the test Attention to email The email address of the sender is not the legitimate email address for the assumed Attention to grammar and spelling There are misspelling and typos in the email that should not exist in formal emails sent by legal institutions. Attention to urgency The email talks about urgent matter and important issues, which are relevant for those who have business interest with the . email senders. Attention to resources The email contains attached file or hyperlink. in the emails In f lu e nc i ng Liking The sentences in emails emphasises closeness to the recipient, such as AuWeAod like to give you the best shopping experience possibleAu. Reciprocity The sentences in the email asks for the recipientAos help to repay for previous favours, such as AuPlease help us to keep your bank account secure by. Au Social proof The sentences in the email emphasises that there there are many people doing the same thing that the emailAos recipient are asked to do, such as AuAll bank account holders need to update . Au. Consistency The emails ask the recipients to take actions which are a continuation as their previous decision, such as AuBecause you registered as a new account holders, please update you personal information. Au Authority The emails look like that they were sent by people with proper authority to convey the message. Scarcity The emails ask recipients to do some actions within certain time limit or imply that the recipients will lose an opportunity if the do not do what the emails ask. Based on literature review, this study concluded that the test should include two main aspects: . the individuals capability in detecting physical cues in emails that indicate phishing emails (Vishwanath et al. , 2. , and . the individuals ability to resist the influencing technique used in phishing emails (Wright et al. , 2. Influencing Indonesian SMEs and. technique is how email writers select specific wordings for their sentences to lessen the readerAos The existence of influencing technique in emails does not mean that those emails are phishing, since this technique is also often used by However, email readers can increase their vigilance when receiving emails if they notice p-ISSN:1411-6510 e-ISSN :2541-6111 JURNAL Riset Akuntansi dan Keuangan Indonesia these techniques. The details of physical cues and influencing techniques are described in Table 2. Based on initial interviews with SMEsAo owners. SMEs are more likely to suffer financial loss due to emails purportedly sent by institutions SMEsAo owners rarely communicated with individual peers and colleagues using emails, and most of them only use emails to communicate with the providers of internet-based applications they use in their business. Hence, the research team decided to focus on phishing messages purportedly sent by institutions, instead of personal emails. Table 3. The Analysis of How Each Question in the Test Includes the Identified Topics Aspect and Indicator Phishing Cues Attention to email source Attention to grammar and Attention to urgency cues Attention to resources in the Influencing technique Liking Reciprocity Social proof Consistency Authority Scarcity Question Number 2 3 4 5 6 7 V V V V V V V Findings Ae Phase II After deciding the main topics that should be included in the test, the research team decide on the how the test items are arranged and presented to the test takers. The designs are as follows: Each question will include a picture of an email that participants must identify as phishing or legitimate email. Emails included in the test were retrieved from the phishing email reporting database or the research teamAos email inbox, hence the emails included in the test are genuine emails. The emails shown in the test and test instructions are written in Indonesian since this test is targeted to Indonesian SMEs. Each question is multiple choice, with just two response options: . phishing/fake emails and . legitimate emails. The correct answer will receive a score of one, while the incorrect answer will receive a score of zero. There will be eight questions in the test, with the maximum score that the participant can obtain is 8. The test is delivered as a quiz on Google Forms. Based on the analysis Table 2, the research team selected eight emails, which cover both phishing and legitimate emails, to be included in the test. The team analysed each email and make sure that all question items covered the identified topics as described in the Phase I. The analysis was described in Table 3. V V V Vol. 9 No. 3 Desember 2024 A brief explanation of each email is as follows. Email presumed to have been sent by LinkAja . hishing emai. Email presumed to have been sent by JNE . hishing emai. Email presumed to have been sent by Eraclub . egitimate emai. Email presumed to have been sent by BCA . hishing emai. Email presumed to have been sent by IMF . hishing emai. Email presumed to have been sent by COVID-19 Committee . hishing emai. Email presumed to have been sent by Grab . egitimate emai. Email presumed to have been sent by Tokopedia . hishing emai. Developing questions that incorporated all of the identified characteristics of phishing emails is tough because the research team used real-life emails, admittedly with small alterations to suit the intended participants of test, which are the Indonesian SMEs owners. The research team conducted the content validity test based on the initial draft. The expert panel consists of five people who meet predetermined criteria. Based on their assessment in the provided form, the team calculated the V-Aiken score as shown in the Table 4. Every test item has a high V-Aiken score, indicating good content validity, as the table illustrates. Yudhiyati et al. Vol. 9 No. 3 Desember 2024 JURNAL Riset Akuntansi dan Keuangan Indonesia 20 coefficient. The calculation result was shown in Table 6. Table 4. V-Aiken Calculation Result Question Item Expert Reviewer Aiken Findings Ae Phase i The research team finalised the test by putting the pictures of selected emails in the Google Form. The detailed pictures of the eight emails and an explanation for each email were shown in the Appendix 1. Findings Ae Phase IV The research team delivered the test to 31 respondents which were SMEsAo owner manager who use email to communicate and conduct business regularly. The research team observed that the greatest score that respondents manage to earn in the test is 7, while the lowest score is 1. The scores obtained by the respondents are shown in Table 5. Respondents can be classified into four groups based on their test score: very high, high, low, and very low. Table 5 shows that the majority of respondents, 52. 8% of the total respondents, can be classified into Very High category. Table 5. The Scores of Test Takers in the Field Test Test Score XOu6 4OX<6 2OX<4 X<2 Percentage of Respondents Category Very high High Low Very low Table 6. The Calculation of the KR-20 Subject Question Item KR-20 Findings Ae Phase V The research team conducted reliability test based on data collected from Phase IV. The study performed the reliability test using the -20 or KRIndonesian SMEs and. p-ISSN:1411-6510 e-ISSN :2541-6111 There are several ways to determine if a test has strong reliability or not. One commonly used guideline defines a test as having low reliability if the KR-20 is less than 0. 50, medium reliability for score between 0. 50 and 0. 80, and high reliability for the KR-20 which is greater than 0. 80 (Tan, 2. The KR-20 of the test developed in this study yields a value of 0. 5054, as shown in Table 6, indicating that the degree of reliability of this exam is barely reach the Medium level. The more reliable a test is, the more accurately the differences in results achieved by test takers represent different levels of skill intended by the tests. The questions in this test is a Yes/No question which only provides two possible option for each question. The test also only has eight questions. Hence, it may be possible that the test cannot generate adequate level of variance to assess individualsAo skills reliably. Table 7. Correct Answer Analysis for Each Question Question Number Percentage of Respondents who answer Considering that the KR-20 value is significantly affected by the number of items, it is necessary to consider increasing the number of item items to increase the reliability of the test. Another alternative is to increase the number of response options for each question, which will also fit the respondentsAo recommendation to avoid having too many questions in the test. The research team also evaluate each question to find out how many respondents answer each question perfectly. This evaluation is helpful for two First, in order for the test to be reliable, the difficulty level of the questions must vary. Second, the team can determine what kinds of phishing or legitimate emails that may mislead the test takers. The result of analysis was shown in Table 7. Two questions have a much lower percentage of respondents who answer correctly than other p-ISSN:1411-6510 e-ISSN :2541-6111 JURNAL Riset Akuntansi dan Keuangan Indonesia questions, as shown in Table 7. Question 2 is a phishing email, although most respondents failed to identify it as such, whereas Question 3 is a legitimate email that most respondents mistook for a phishing The presence of images, colours, and logos tend to be more convincing to email recipients than plain text (Furnell, 2. , and Question 2 and 3 have images in the emails. However, it is important to note that most respondents believed Email 2 was legitimate, despite multiple strong indications of a phishing email. First, there are multiple typos that should not be in an official email issued by a major organisation. Second, the email includes an attached file with the . zip extension, which is a major warning indicator because . zip files are a kind of file we should only get from colleagues, friends, or associates, not from an email sent by an organisation without a close relationship with the Vol. 9 No. 3 Desember 2024 with too many pictures and over-fancy wordings. Legitimate emails who have these features may be regarded as phishing email. Figure 2. Email 3 Ae Legimate Email CONCLUSION Figure 1. Email 2 Ae Phishing Email Another interesting aspect is how Email 3 was identified by most respondents as phishing email, despite it is actually a legitimate email. Follow-up interviews with some SMEs owners found that SMEs owners have preference to trust urgent and relevant emails, where the emails are designed with proper logo and pictures, as supported by Furnell . However, they are suspicious of emails SMEs owners needs to know the various ways to identify phishing messages so as not to become victims of phishing. Phishing emails can be identified based on several physical cues, and recipients can also increase vigilance when receiving an email that contains several influencing Several physical cues of phishing emails are original senderAos email that does not match the topic discussed in the email, spelling and typos in emails supposedly sent by official institutions, and emails which talks about urgent matters, and emails that have files or hyperlink attached in it. Influencing technique does not provide obvious sign of phishing emails, but indicating that email recipients must be very careful when receiving email related to banking, credit cards, investment institutions, or other things that are considered important by the recipients. This study developed a test of phishing susceptibility by collecting various real-life legitimate and phishing emails, and ask test takers to identify which emails are legitimate and which Yudhiyati et al. Vol. 9 No. 3 Desember 2024 JURNAL Riset Akuntansi dan Keuangan Indonesia emails are phishing. Based on the validity and reliability tests, the created instrument has high content validity for all question items but only reaches medium reliability. The test reliability can be improved by adding questions, or modify the question by having multiple-choice of answers for each question instead of Yes/No answer choices. Indonesian SMEs and. p-ISSN:1411-6510 e-ISSN :2541-6111 This study contributes to cybersecurity studies focusing on SMEs, particularly in Indonesia, by presenting preliminary findings on the characteristics of phishing emails that SMEs find difficult to identify. The test developed during this study can also be used as an instrument in future phishing studies in Indonesia. p-ISSN:1411-6510 e-ISSN :2541-6111 JURNAL Riset Akuntansi dan Keuangan Indonesia Vol. 9 No. 3 Desember 2024 REFERENCE