Influence Techniques in Phishing Attacks: An Examination of Vulnerability and Resistance

被引:112
|
作者
Wright, Ryan T. [1 ]
Jensen, Matthew L. [2 ]
Thatcher, Jason Bennett [3 ]
Dinger, Michael [4 ]
Marett, Kent [5 ]
机构
[1] Univ Massachusetts, Isenberg Sch Management, Amherst, MA 01003 USA
[2] Univ Oklahoma, Ctr Appl Social Res, Div MIS, Norman, OK 73019 USA
[3] Clemson Univ, Dept Management, Social Analyt Inst, Clemson, SC 29634 USA
[4] Univ South Carolina Upstate, Johnson Coll Business & Econ, Spartanburg, SC 29306 USA
[5] Mississippi State Univ, Coll Business, Dept Management & Informat Syst, Mississippi State, MS 39762 USA
关键词
persuasion theory; influence techniques; motivation theory; self-determination; perceived locus of causality; social engineering; online deception; mediated deception; deception; field experiments; SELF-DETERMINATION THEORY; INTRINSIC MOTIVATION; INTERPERSONAL DECEPTION; E-COMMERCE; PERSUASION; INOCULATION; MODEL; COMMUNICATION; QUALITY; LOGIT;
D O I
10.1287/isre.2014.0522
中图分类号
G25 [图书馆学、图书馆事业]; G35 [情报学、情报工作];
学科分类号
1205 ; 120501 ;
摘要
Phishing is a major threat to individuals and organizations. Along with billions of dollars lost annually, phishing attacks have led to significant data breaches, loss of corporate secrets, and espionage. Despite the significant threat, potential phishing targets have little theoretical or practical guidance on which phishing tactics are most dangerous and require heightened caution. The current study extends persuasion and motivation theory to postulate why certain influence techniques are especially dangerous when used in phishing attacks. We evaluated our hypotheses using a large field experiment that involved sending phishing messages to more than 2,600 participants. Results indicated a disparity in levels of danger presented by different influence techniques used in phishing attacks. Specifically, participants were less vulnerable to phishing influence techniques that relied on fictitious prior shared experience and were more vulnerable to techniques offering a high level of self-determination. By extending persuasion and motivation theory to explain the relative efficacy of phishers' influence techniques, this work clarifies significant vulnerabilities and lays the foundation for individuals and organizations to combat phishing through awareness and training efforts.
引用
收藏
页码:385 / 400
页数:16
相关论文
共 50 条
  • [21] Solution prevents phishing attacks
    不详
    R&D MAGAZINE, 2004, 46 (10): : 17 - 17
  • [22] Phishing Attacks Modifications and Evolutions
    Cui, Qian
    Jourdan, Guy-Vincent
    Bochmann, Gregor V.
    Onut, Iosif-Viorel
    Flood, Jason
    COMPUTER SECURITY (ESORICS 2018), PT I, 2018, 11098 : 243 - 262
  • [23] Cognitive Triaging of Phishing Attacks
    van der Heijden, Amber
    Allodi, Luca
    PROCEEDINGS OF THE 28TH USENIX SECURITY SYMPOSIUM, 2019, : 1309 - 1326
  • [24] Analysis of phishing attacks and countermeasures
    Issac, Biju
    Chiong, Raymond
    Jacob, Seibu Mary
    MANAGING INFORMATION IN THE DIGITAL ECONOMY: ISSUES & SOLUTIONS, 2006, : 339 - +
  • [25] Phishing Attacks Root Causes
    Abroshan, Hossein
    Devos, Jan
    Poels, Geert
    Laermans, Eric
    RISKS AND SECURITY OF INTERNET AND SYSTEMS, CRISIS 2017, 2018, 10694 : 187 - 202
  • [26] Mitigating Phishing Attacks: An Overview
    Sumner, Alex
    Yuan, Xiaohong
    PROCEEDINGS OF THE 2019 ANNUAL ACM SOUTHEAST CONFERENCE (ACMSE 2019), 2019, : 72 - 77
  • [27] PhiKitA: Phishing Kit Attacks Dataset for Phishing Websites Identification
    Castano, Felipe
    Fernandez, Eduardo Fidalgo
    Alaiz-Rodriguez, Rocio
    Alegre, Enrique
    IEEE ACCESS, 2023, 11 : 40779 - 40789
  • [28] Machine-Learning Techniques for Predicting Phishing Attacks in Blockchain Networks: A Comparative Study
    Joshi, Kunj
    Bhatt, Chintan
    Shah, Kaushal
    Parmar, Dwireph
    Corchado, Juan M.
    Bruno, Alessandro
    Mazzeo, Pier Luigi
    ALGORITHMS, 2023, 16 (08)
  • [29] A Comprehensive Analysis of Social Engineering Attacks: From Phishing to Prevention - Tools, Techniques and Strategies
    Gupta, Sarthak
    Pritwani, Mayank
    Shrivastava, Adarsh
    Mohana
    Moharir, Minal
    Kumar, Ashok A. R.
    2024 SECOND INTERNATIONAL CONFERENCE ON INTELLIGENT CYBER PHYSICAL SYSTEMS AND INTERNET OF THINGS, ICOICI 2024, 2024, : 42 - 49
  • [30] An examination of the effect of recent phishing encounters on phishing susceptibility
    Chen, Rui
    Gaia, Joana
    Rao, H. Raghav
    DECISION SUPPORT SYSTEMS, 2020, 133