Influence Techniques in Phishing Attacks: An Examination of Vulnerability and Resistance

被引:112
|
作者
Wright, Ryan T. [1 ]
Jensen, Matthew L. [2 ]
Thatcher, Jason Bennett [3 ]
Dinger, Michael [4 ]
Marett, Kent [5 ]
机构
[1] Univ Massachusetts, Isenberg Sch Management, Amherst, MA 01003 USA
[2] Univ Oklahoma, Ctr Appl Social Res, Div MIS, Norman, OK 73019 USA
[3] Clemson Univ, Dept Management, Social Analyt Inst, Clemson, SC 29634 USA
[4] Univ South Carolina Upstate, Johnson Coll Business & Econ, Spartanburg, SC 29306 USA
[5] Mississippi State Univ, Coll Business, Dept Management & Informat Syst, Mississippi State, MS 39762 USA
关键词
persuasion theory; influence techniques; motivation theory; self-determination; perceived locus of causality; social engineering; online deception; mediated deception; deception; field experiments; SELF-DETERMINATION THEORY; INTRINSIC MOTIVATION; INTERPERSONAL DECEPTION; E-COMMERCE; PERSUASION; INOCULATION; MODEL; COMMUNICATION; QUALITY; LOGIT;
D O I
10.1287/isre.2014.0522
中图分类号
G25 [图书馆学、图书馆事业]; G35 [情报学、情报工作];
学科分类号
1205 ; 120501 ;
摘要
Phishing is a major threat to individuals and organizations. Along with billions of dollars lost annually, phishing attacks have led to significant data breaches, loss of corporate secrets, and espionage. Despite the significant threat, potential phishing targets have little theoretical or practical guidance on which phishing tactics are most dangerous and require heightened caution. The current study extends persuasion and motivation theory to postulate why certain influence techniques are especially dangerous when used in phishing attacks. We evaluated our hypotheses using a large field experiment that involved sending phishing messages to more than 2,600 participants. Results indicated a disparity in levels of danger presented by different influence techniques used in phishing attacks. Specifically, participants were less vulnerable to phishing influence techniques that relied on fictitious prior shared experience and were more vulnerable to techniques offering a high level of self-determination. By extending persuasion and motivation theory to explain the relative efficacy of phishers' influence techniques, this work clarifies significant vulnerabilities and lays the foundation for individuals and organizations to combat phishing through awareness and training efforts.
引用
收藏
页码:385 / 400
页数:16
相关论文
共 50 条
  • [41] Evaluating user susceptibility to phishing attacks
    Das, Sanchari
    Nippert-Eng, Christena
    Camp, L. Jean
    INFORMATION AND COMPUTER SECURITY, 2022, 30 (01) : 1 - 18
  • [42] Why phishing still works: User strategies for combating phishing attacks
    Alsharnouby, Mohamed
    Alaca, Furkan
    Chiasson, Sonia
    INTERNATIONAL JOURNAL OF HUMAN-COMPUTER STUDIES, 2015, 82 : 69 - 82
  • [43] South Africans' susceptibility to phishing attacks
    Wannenburg, Mariska C.
    Nieman, Annamart
    Steyn, Blanche
    Wannenburg, Daniel G.
    SOUTHERN AFRICAN JOURNAL OF ACCOUNTABILITY AND AUDITING RESEARCH-SAJAAR, 2023, 25 : 53 - 72
  • [44] Phishing Attacks and Protection Against Them
    Ivanov, Michael A.
    Kliuchnikova, Bogdana, V
    Chugunkov, Ilya, V
    Plaksina, Anna M.
    PROCEEDINGS OF THE 2021 IEEE CONFERENCE OF RUSSIAN YOUNG RESEARCHERS IN ELECTRICAL AND ELECTRONIC ENGINEERING (ELCONRUS), 2021, : 425 - 428
  • [45] Tools for Investigating the Phishing Attacks Dynamics
    Lyashenko, Vyacheslav
    Kobylin, Oleg
    Minenko, Mykyta
    2018 INTERNATIONAL SCIENTIFIC-PRACTICAL CONFERENCE: PROBLEMS OF INFOCOMMUNICATIONS SCIENCE AND TECHNOLOGY (PIC S&T), 2018, : 43 - 46
  • [46] Generating Phishing Attacks using ChatGPT
    Roy, Sayak Saha
    Naragam, Krishna Vamsi
    Nilizadeh, Shirin
    arXiv, 2023,
  • [47] Online detection and prevention of phishing attacks
    Institute of Communications Engineering, PLA Univ. of Sci. and Tech., Nanjing 210007, China
    Jiefangjun Ligong Daxue Xuebao, 2007, 2 (133-138): : 133 - 138
  • [48] Examining the effectiveness of phishing filters against DNS based phishing attacks
    Purkait, Swapan
    INFORMATION AND COMPUTER SECURITY, 2015, 23 (03) : 333 - 346
  • [49] A Framework for Detection and Measurement of Phishing Attacks
    Garera, Sujata
    Provos, Niels
    Chew, Monica
    Rubin, Aviel D.
    WORM'07: PROCEEDINGS OF THE 2007 ACM WORKSHOP ON RECURRING MALCODE, 2007, : 1 - 8
  • [50] Alerting Users About Phishing Attacks
    Desolda, Giuseppe
    Di Nocera, Francesco
    Ferro, Lauren
    Lanzilotti, Rosa
    Maggi, Piero
    Marrella, Andrea
    HCI FOR CYBERSECURITY, PRIVACY AND TRUST, 2019, 11594 : 134 - 148