The effects of personal values and message values on vulnerability to phishing

被引:2
作者
Caspi, Avner [1 ]
Sayag, Maayan [1 ]
Gross, Maya [1 ]
Weinstein, Zohar [1 ]
Etgar, Shir [1 ]
机构
[1] Open Univ Israel, Dept Educ & Psychol, 1st Univ Rd, Raanana, Israel
关键词
Phishing; Human values; Personality; Social design; SUSCEPTIBILITY; TRUST; CONSUMPTION; CONSUMERS; CULTURE; FRAUD;
D O I
10.1016/j.paid.2021.111335
中图分类号
B84 [心理学];
学科分类号
04 ; 0402 ;
摘要
Phishing messages are designed to establish believability in the recipients, and to make them feel that the message is authentic. The current study examines the effect of personal values and of the values associated with the presumed sender on perceived authenticity of phishing messages. We tested two alternative hypotheses: (a) the value-congruency hypothesis contends that when the recipient's values match the underlying value of the message, the perception of authenticity increases; (b) the socially-shared values hypothesis suggests that messages that reflect the social image of the sender increase perception of authenticity. We further hypothesized that trust propensity moderates the effect of values on perception of phishing messages. Study 1 (N = 624) investigated and validated the values conveyed by bank messages. Study 2 (N = 309) tested the main hypotheses. Results supported the socially-shared values hypothesis. Trust propensity did not predict perceived authenticity of messages, and did not moderate the effect of the message value on perceived authenticity. The findings suggest that messages that fit the presumed sender's attributed values may be more risky, regardless of the receiver's values.
引用
收藏
页数:11
相关论文
共 47 条
[1]   Consumption symbols as carriers of culture:: A study of Japanese and Spanish brand personality constructs [J].
Aaker, JL ;
Benet-Martínez, V ;
Garolera, J .
JOURNAL OF PERSONALITY AND SOCIAL PSYCHOLOGY, 2001, 81 (03) :492-508
[2]   Human values and product symbolism: Do consumers form product preference by comparing the human values symbolized by a product to the human values that they endorse? [J].
Allen, MW .
JOURNAL OF APPLIED SOCIAL PSYCHOLOGY, 2002, 32 (12) :2475-2501
[3]   What Is the Influence of Users' Characteristics on Their Ability to Detect Phishing Emails? [J].
Alseadoon, Ibrahim ;
Othman, F. I. ;
Chan, Taizan .
ADVANCED COMPUTER AND COMMUNICATION ENGINEERING TECHNOLOGY, 2015, 315
[4]  
Anandpara V, 2007, LECT NOTES COMPUT SC, V4886, P362, DOI 10.1007/978-3-540-77366-5_33
[5]  
Anawar S, 2019, J ENG SCI TECHNOL, V14, P2865
[6]  
Caspi A., 2021, ATTRIBUTING VALUES D
[7]   Phishing attempts among the dark triad: Patterns of attack and vulnerability [J].
Curtis, Shelby R. ;
Rajivan, Prashanth ;
Jones, Daniel N. ;
Gonzalez, Cleotilde .
COMPUTERS IN HUMAN BEHAVIOR, 2018, 87 :174-182
[8]   Susceptibility to phishing on social network sites: A personality information processing model [J].
Frauenstein, Edwin Donald ;
Flowerday, Stephen .
COMPUTERS & SECURITY, 2020, 94 (94)
[9]   Personal value priorities of economists [J].
Gandal, N ;
Roccas, S ;
Sagiv, L ;
Wrzesniewski, A .
HUMAN RELATIONS, 2005, 58 (10) :1227-1252
[10]   The Phishing Email Suspicion Test (PEST) a lab-based task for evaluating the cognitive mechanisms of phishing detection [J].
Hakim, Ziad M. ;
Ebner, Natalie C. ;
Oliveira, Daniela S. ;
Getz, Sarah J. ;
Levin, Bonnie E. ;
Lin, Tian ;
Lloyd, Kaitlin ;
Lai, Vicky T. ;
Grilli, Matthew D. ;
Wilson, Robert C. .
BEHAVIOR RESEARCH METHODS, 2021, 53 (03) :1342-1352