Author List: Abbasi, Ahmed; Zahedi, Fatemeh Mariam; Zeng, Daniel; Chen, Yan; Chen, Hsinchun; Nunamaker, Jr., Jay F.;
Journal of Management Information Systems, 2015, Volume 31, Issue 4, Page 109-157.
Phishing websites continue to successfully exploit user vulnerabilities in household and enterprise settings. Existing anti-phishing tools lack the accuracy and generalizability needed to protect Internet users and organizations from the myriad of attacks encountered daily. Consequently, users often disregard these tools' warnings. In this study, using a design science approach, we propose a novel method for detecting phishing websites. By adopting a genre theoretic perspective, the proposed genre tree kernel method utilizes fraud cues that are associated with differences in purpose between legitimate and phishing websites, manifested through genre composition and design structure, resulting in enhanced anti-phishing capabilities. To evaluate the genre tree kernel method, a series of experiments were conducted on a testbed encompassing thousands of legitimate and phishing websites. The results revealed that the proposed method provided significantly better detection capabilities than state-of-the-art anti-phishing methods. An additional experiment demonstrated the effectiveness of the genre tree kernel technique in user settings; users utilizing the method were able to better identify and avoid phishing websites, and were consequently less likely to transact with them. Given the extensive monetary and social ramifications associated with phishing, the results have important implications for future anti-phishing strategies. More broadly, the results underscore the importance of considering intention/purpose as a critical dimension for automated credibility assessment: focusing not only on the ÒwhatÓ but rather on operationalizing the ÒwhyÓ into salient detection cues. > >
Keywords: design science; data mining; phishing websites; genre theory; Internet fraud; website genres; credibility assessment ;phishing
Algorithm:

List of Topics

#7 0.294 detection deception assessment credibility automated fraud fake cues detecting results screening study detect design indicators science important theory performance improved
#284 0.159 users user new resistance likely benefits potential perspective status actual behavior recognition propose user's social associated existing base using acceptance
#215 0.104 data classification statistical regression mining models neural methods using analysis techniques performance predictive networks accuracy method variables prediction problem measure
#278 0.094 website users websites technostress stress time online wait delay aesthetics user model image elements longer waiting appeal attract utility internet
#287 0.090 design systems support development information proposed approach tools using engineering current described developing prototype flexible built architecture environment integrated designing
#51 0.089 results study research experiment experiments influence implications conducted laboratory field different indicate impact effectiveness future participants evidence test controlled involving
#56 0.058 information security interview threats attacks theory fear vulnerability visibility president vulnerabilities pmt behaviors enforcement appeals protection insiders attackers precautions vice