Author List: Wright, Ryan T.; Jensen, Matthew L.; Thatcher, Jason Bennett;
Information Systems Research, 2014, Volume 25, Issue 2, Page 385-400.
Phishing is a major threat to individuals and organizations. Along with billions of dollars lost annually, phishing attacks have led to significant data breaches, loss of corporate secrets, and espionage. Despite the significant threat, potential phishing targets have little theoretical or practical guidance on which phishing tactics are most dangerous and require heightened caution. The current study extends persuasion and motivation theory to postulate why certain influence techniques are especially dangerous when used in phishing attacks. We evaluated our hypotheses using a large field experiment that involved sending phishing messages to more than 2,600 participants. Results indicated a disparity in levels of danger presented by different influence techniques used in phishing attacks. Specifically, participants were less vulnerable to phishing influence techniques that relied on fictitious prior shared experience and were more vulnerable to techniques offering a high level of self-determination. By extending persuasion and motivation theory to explain the relative efficacy of phishers' influence techniques, this work clarifies significant vulnerabilities and lays the foundation for individuals and organizations to combat phishing through awareness and training efforts.
Keywords: phishing;persuasion theory;influence techniques;motivation theory;self-determination;perceived locus of causality;social engineering;online deception;mediated deception;deception;field experiments
Algorithm:

List of Topics

#56 0.207 information security interview threats attacks theory fear vulnerability visibility president vulnerabilities pmt behaviors enforcement appeals protection insiders attackers precautions vice
#51 0.164 results study research experiment experiments influence implications conducted laboratory field different indicate impact effectiveness future participants evidence test controlled involving
#110 0.137 theory theories theoretical paper new understanding work practical explain empirical contribution phenomenon literature second implications different building based insights need
#60 0.109 analysis techniques structured categories protocol used evolution support methods protocols verbal improve object-oriented difficulties analyses category benchmark comparison provided recognition
#266 0.062 information presentation graphics format systems graphical graphs design recall representation comprehension experimental presentations experiment presented variables formats graphic tabular led
#130 0.061 online users active paper using increasingly informational user data internet overall little various understanding empirical despite lead cascades help availability
#7 0.058 detection deception assessment credibility automated fraud fake cues detecting results screening study detect design indicators science important theory performance improved