Influence Techniques in Phishing Attacks: An Examination of Vulnerability and Resistance

被引:112
|
作者
Wright, Ryan T. [1 ]
Jensen, Matthew L. [2 ]
Thatcher, Jason Bennett [3 ]
Dinger, Michael [4 ]
Marett, Kent [5 ]
机构
[1] Univ Massachusetts, Isenberg Sch Management, Amherst, MA 01003 USA
[2] Univ Oklahoma, Ctr Appl Social Res, Div MIS, Norman, OK 73019 USA
[3] Clemson Univ, Dept Management, Social Analyt Inst, Clemson, SC 29634 USA
[4] Univ South Carolina Upstate, Johnson Coll Business & Econ, Spartanburg, SC 29306 USA
[5] Mississippi State Univ, Coll Business, Dept Management & Informat Syst, Mississippi State, MS 39762 USA
关键词
persuasion theory; influence techniques; motivation theory; self-determination; perceived locus of causality; social engineering; online deception; mediated deception; deception; field experiments; SELF-DETERMINATION THEORY; INTRINSIC MOTIVATION; INTERPERSONAL DECEPTION; E-COMMERCE; PERSUASION; INOCULATION; MODEL; COMMUNICATION; QUALITY; LOGIT;
D O I
10.1287/isre.2014.0522
中图分类号
G25 [图书馆学、图书馆事业]; G35 [情报学、情报工作];
学科分类号
1205 ; 120501 ;
摘要
Phishing is a major threat to individuals and organizations. Along with billions of dollars lost annually, phishing attacks have led to significant data breaches, loss of corporate secrets, and espionage. Despite the significant threat, potential phishing targets have little theoretical or practical guidance on which phishing tactics are most dangerous and require heightened caution. The current study extends persuasion and motivation theory to postulate why certain influence techniques are especially dangerous when used in phishing attacks. We evaluated our hypotheses using a large field experiment that involved sending phishing messages to more than 2,600 participants. Results indicated a disparity in levels of danger presented by different influence techniques used in phishing attacks. Specifically, participants were less vulnerable to phishing influence techniques that relied on fictitious prior shared experience and were more vulnerable to techniques offering a high level of self-determination. By extending persuasion and motivation theory to explain the relative efficacy of phishers' influence techniques, this work clarifies significant vulnerabilities and lays the foundation for individuals and organizations to combat phishing through awareness and training efforts.
引用
收藏
页码:385 / 400
页数:16
相关论文
共 50 条
  • [31] Mobile device affordance: Explicating how smartphones influence the outcome of phishing attacks
    Vishwanath, Arun
    COMPUTERS IN HUMAN BEHAVIOR, 2016, 63 : 198 - 207
  • [32] Phishing susceptibility across industries: The differential impact of influence techniques
    Tian, Chuan
    Jensen, Matthew L.
    Durcikova, Alexandra
    COMPUTERS & SECURITY, 2023, 135
  • [33] Recognition of genuine and phishing emails may not be associated with response to phishing attacks
    Crgol, Alex
    Vrhovec, Simon
    JOURNAL OF UNIVERSAL COMPUTER SCIENCE, 2024, 30 (09) : 1265 - 1283
  • [34] Protecting users against phishing attacks
    Kirda, Engin
    Kruegel, Christopher
    COMPUTER JOURNAL, 2006, 49 (05): : 554 - 561
  • [35] Tracking Phishing Attacks Over Time
    Cui, Qian
    Jourdan, Guy-Vincent
    Bochmann, Gregor, V
    Couturier, Russell
    Onut, Iosif-Viorel
    PROCEEDINGS OF THE 26TH INTERNATIONAL CONFERENCE ON WORLD WIDE WEB (WWW'17), 2017, : 667 - 676
  • [36] Phishing attacks and how to prevent them
    Guana-Moya, Javier
    Antonio Chiluisa-Chiluisa, Marco
    del Carmen Jaramillo-Flores, Paulina
    Naranjo-Villota, Darwin
    Rafael Mora-Zambrano, Eugenio
    Gerardo Larrea-Torres, Lenin
    2022 17TH IBERIAN CONFERENCE ON INFORMATION SYSTEMS AND TECHNOLOGIES (CISTI), 2022,
  • [37] Phishing Attacks and Protection against Them
    Ivanov, Michael A.
    Kliuchnikova, Bogdana V.
    Chugunkov, Ilya V.
    Plaksina, Anna M.
    Proceedings of the 2021 IEEE Conference of Russian Young Researchers in Electrical and Electronic Engineering, ElConRus 2021, 2021, : 425 - 428
  • [38] On the Influence of Ageing on Face Morph Attacks: Vulnerability and Detection
    Venkatesh, Sushma
    Raja, Kiran
    Ramachandra, Raghavendra
    Busch, Christoph
    IEEE/IAPR INTERNATIONAL JOINT CONFERENCE ON BIOMETRICS (IJCB 2020), 2020,
  • [39] A Review on Recent Phishing Attacks in Internet
    Lakhita
    Yadav, Surendra
    Bohra, Brahmdutt
    Pooja
    2015 INTERNATIONAL CONFERENCE ON GREEN COMPUTING AND INTERNET OF THINGS (ICGCIOT), 2015, : 1312 - 1315
  • [40] Analysis of phishing attacks against students
    Andric, Jakov
    Oreski, Dijana
    Kisasondi, Tonimir
    2016 39TH INTERNATIONAL CONVENTION ON INFORMATION AND COMMUNICATION TECHNOLOGY, ELECTRONICS AND MICROELECTRONICS (MIPRO), 2016, : 1423 - 1429