The impact of formal and informal organizational norms on susceptibility to phishing: Combining survey and field experiment data

被引:11
作者
Petric, Gregor [1 ]
Roer, Kai [2 ]
机构
[1] Univ Ljubljana, Fac Social Sci, Kardeljeva Ploscad 5, SI-1000 Ljubljana, Slovenia
[2] KnowBe4 Res AS, Kristian Augustsgate 13, Oslo, Norway
关键词
Information security; Norms; Phishing; Human factors; Social engineering; Organizational behavior; SECURITY POLICY; INDIVIDUAL-DIFFERENCES; SOCIAL NORMS; BEHAVIOR; CULTURE; AWARENESS; BELIEFS;
D O I
10.1016/j.tele.2021.101766
中图分类号
G25 [图书馆学、图书馆事业]; G35 [情报学、情报工作];
学科分类号
1205 ; 120501 ;
摘要
Phishing is one of the most common forms of social engineering that exploits human vulnerabilities and causes immense personal and organizational costs. This study advances the research on the factors of susceptibility to phishing in three regards. First, it addressed the role of organizational norms in susceptibility to phishing. Second, it aimed for high external and ecological validity by combining survey and phishing experiments data on large samples of organizations and their employees. Third, it employed a two-level design that considered explanatory variables at the individual and organizational levels. The study chiefly explored how formal, descriptive, injunctive, and personal norms influence employee interactions with phishing emails. To this end, an explanatory model was tested on 83,269 employees in 510 organizations using a multilevel modeling approach. Clicking on links in simulated phishing emails and entering personal information in simulated fraudulent websites were deemed as two types of susceptibility to phishing. Formal norms and collectively shared injunctive norms were found to exert the strongest effects on susceptibility to phishing; in contrast, personal norms exert a weak influence, and descriptive norms can result in a boomerang effect. These results have significant theoretical and practical implications for both researchers and managers seeking organizational-level mechanisms to reduce the threat of phishing emails.
引用
收藏
页数:15
相关论文
共 75 条
[1]   THE THEORY OF PLANNED BEHAVIOR [J].
AJZEN, I .
ORGANIZATIONAL BEHAVIOR AND HUMAN DECISION PROCESSES, 1991, 50 (02) :179-211
[2]   Phishing environments, techniques, and countermeasures: A survey [J].
Aleroud, Ahmed ;
Zhou, Lina .
COMPUTERS & SECURITY, 2017, 68 :160-196
[3]   Developing an Information Security Policy: A Case Study Approach [J].
Alqahtani, Fayez Hussain .
4TH INFORMATION SYSTEMS INTERNATIONAL CONFERENCE (ISICO 2017), 2017, 124 :691-697
[4]   PREDICTING THE PERFORMANCE OF MEASURES IN A CONFIRMATORY FACTOR-ANALYSIS WITH A PRETEST ASSESSMENT OF THEIR SUBSTANTIVE VALIDITIES [J].
ANDERSON, JC ;
GERBING, DW .
JOURNAL OF APPLIED PSYCHOLOGY, 1991, 76 (05) :732-740
[5]  
APWG, 2021, PHISH ACT TRENDS REP
[6]   Security awareness of computer users: A phishing threat avoidance perspective [J].
Arachchilage, Nalin Asanka Gamagedara ;
Love, Steve .
COMPUTERS IN HUMAN BEHAVIOR, 2014, 38 :304-312
[7]  
Bassett G., 2020, 2020 VERIZON DATA BR
[8]   Response to a phishing attack: persuasion and protection motivation in an organizational context [J].
Bayl-Smith, Piers ;
Taib, Ronnie ;
Yu, Kun ;
Wiggins, Mark .
INFORMATION AND COMPUTER SECURITY, 2022, 30 (01) :63-78
[9]  
Beenen G., 2004, Computer Supported Cooperative Work Conference Proceedings, P212, DOI 10.1145/1031607.1031642
[10]  
Bulgurcu B, 2010, MIS QUART, V34, P523