Why do people get phished? Testing individual differences in phishing vulnerability within an integrated, information processing model

被引:239
作者
Vishwanath, Arun [1 ]
Herath, Tejaswini [2 ]
Chen, Rui [3 ]
Wang, Jingguo [4 ]
Rao, H. Raghav
机构
[1] SUNY Buffalo, Dept Commun Management Sci & Syst, Buffalo, NY 14260 USA
[2] Brock Univ, Dept Finance Operat & Informat Syst, St Catharines, ON L2S 3A1, Canada
[3] Ball State Univ, Dept Informat Syst & Operat Management, Muncie, IN 47306 USA
[4] Univ Texas Arlington, Dept Informat Syst & Operat Management, Arlington, TX USA
基金
美国国家科学基金会;
关键词
Social engineering; Phishing; Phishing vulnerability; Information processing; Message cues; Attention; Elaboration; DECEPTION; FAILURE; PRIVACY; THREATS;
D O I
10.1016/j.dss.2011.03.002
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
This research presents an integrated information processing model of phishing susceptibility grounded in the prior research in information process and interpersonal deception. We refine and validate the model using a sample of intended victims of an actual phishing attack. The data provides strong support for the model's theoretical structure and causative sequence. Overall, the model explains close to 50% of the variance in individual phishing susceptibility. The results indicate that most phishing emails are peripherally processed and individuals make decisions based on simple cues embedded in the email. Interestingly, urgency cues in the email stimulated increased information processing thereby short circuiting the resources available for attending to other cues that could potentially help detect the deception. Additionally, the findings suggest that habitual patterns of media use combined with high levels of email load have a strong and significant influence on individuals' likelihood to be phished. Consistent with social cognitive theory, computer self-efficacy was found to significantly influence elaboration, but its influence was diminished by domain specific-knowledge. (C) 2011 Elsevier B.V. All rights reserved.
引用
收藏
页码:576 / 586
页数:11
相关论文
共 47 条
  • [1] ADAMS W, 2000, J BROADCAST ELECTRON, P78
  • [2] [Anonymous], 2006, P SIGCHI C HUM FACT, DOI 10.1145/1124772.1124861
  • [3] Bandura A, 1986, Social Foundations of Thought and Action: A Social Cognitive Theory, DOI DOI 10.5465/AMR.1987.4306538
  • [4] BARGH JA, 1994, NEBR SYM MOTIV, V41, P71
  • [5] BARKHI R, 2002, INFORM MANAGE, P677
  • [6] The impact of personality type on purchasing decisions in virtual stores
    Barkhi, Reza
    Wallace, Linda
    [J]. INFORMATION TECHNOLOGY & MANAGEMENT, 2007, 8 (04) : 313 - 330
  • [7] Trustworthiness in electronic commerce: the role of privacy, security, and site attributes
    Belanger, F
    Hiller, JS
    Smith, WJ
    [J]. JOURNAL OF STRATEGIC INFORMATION SYSTEMS, 2002, 11 (3-4) : 245 - 270
  • [8] A framework for e-government: privacy implications
    Belanger, France
    Hiller, Janine S.
    [J]. BUSINESS PROCESS MANAGEMENT JOURNAL, 2006, 12 (01) : 48 - 60
  • [9] Assessing anti-phishing preparedness: A study of online banks in Hong Kong
    Bose, Indranil
    Leung, Alvin Chung Man
    [J]. DECISION SUPPORT SYSTEMS, 2008, 45 (04) : 897 - 912
  • [10] Bose I, 2007, COMMUN ASSOC INF SYS, V19, P544