IDEAS home Printed from https://ideas.repec.org/a/inm/orisre/v25y2014i2p385-400.html
   My bibliography  Save this article

Research Note ---Influence Techniques in Phishing Attacks: An Examination of Vulnerability and Resistance

Author

Listed:
  • Ryan T. Wright

    (Isenberg School of Management, University of Massachusetts, Amherst, Massachusetts 01003)

  • Matthew L. Jensen

    (Division of MIS, Center for Applied Social Research, University of Oklahoma, Norman, Oklahoma 73019)

  • Jason Bennett Thatcher

    (Social Analytics Institute, Department of Management, Clemson University, Clemson, South Carolina 29634)

  • Michael Dinger

    (Johnson College of Business and Economics, University of South Carolina Upstate, Spartanburg, South Carolina 29306)

  • Kent Marett

    (Department of Management and Information Systems, College of Business, Mississippi State University, Mississippi State, Mississippi 39762)

Abstract

Phishing is a major threat to individuals and organizations. Along with billions of dollars lost annually, phishing attacks have led to significant data breaches, loss of corporate secrets, and espionage. Despite the significant threat, potential phishing targets have little theoretical or practical guidance on which phishing tactics are most dangerous and require heightened caution. The current study extends persuasion and motivation theory to postulate why certain influence techniques are especially dangerous when used in phishing attacks. We evaluated our hypotheses using a large field experiment that involved sending phishing messages to more than 2,600 participants. Results indicated a disparity in levels of danger presented by different influence techniques used in phishing attacks. Specifically, participants were less vulnerable to phishing influence techniques that relied on fictitious prior shared experience and were more vulnerable to techniques offering a high level of self-determination. By extending persuasion and motivation theory to explain the relative efficacy of phishers' influence techniques, this work clarifies significant vulnerabilities and lays the foundation for individuals and organizations to combat phishing through awareness and training efforts.

Suggested Citation

  • Ryan T. Wright & Matthew L. Jensen & Jason Bennett Thatcher & Michael Dinger & Kent Marett, 2014. "Research Note ---Influence Techniques in Phishing Attacks: An Examination of Vulnerability and Resistance," Information Systems Research, INFORMS, vol. 25(2), pages 385-400, June.
  • Handle: RePEc:inm:orisre:v:25:y:2014:i:2:p:385-400
    DOI: 10.1287/isre.2014.0522
    as

    Download full text from publisher

    File URL: http://dx.doi.org/10.1287/isre.2014.0522
    Download Restriction: no

    File URL: https://libkey.io/10.1287/isre.2014.0522?utm_source=ideas
    LibKey link: if access is restricted and if your library uses this service, LibKey will redirect you to where you can use your library subscription to access this item
    ---><---

    References listed on IDEAS

    as
    1. Viswanath Venkatesh, 2000. "Determinants of Perceived Ease of Use: Integrating Control, Intrinsic Motivation, and Emotion into the Technology Acceptance Model," Information Systems Research, INFORMS, vol. 11(4), pages 342-365, December.
    2. Friestad, Marian & Wright, Peter, 1994. "The Persuasion Knowledge Model: How People Cope with Persuasion Attempts," Journal of Consumer Research, Journal of Consumer Research Inc., vol. 21(1), pages 1-31, June.
    3. Edward C. Norton & Hua Wang & Chunrong Ai, 2004. "Computing interaction effects and standard errors in logit and probit models," Stata Journal, StataCorp LP, vol. 4(2), pages 154-167, June.
    4. Crowley, Ayn E & Hoyer, Wayne D, 1994. "An Integrative Framework for Understanding Two-Sided Persuasion," Journal of Consumer Research, Journal of Consumer Research Inc., vol. 20(4), pages 561-574, March.
    5. Anthony Vance & Christophe M. Elie-Dit-Cosaque & Detmar W. Straub, 2008. "Examining Trust in Information Technology Artifacts: The Effects of System Quality and Culture," Post-Print halshs-00641137, HAL.
    6. John R. Carlson & Joey F. George, 2004. "Media Appropriateness in the Conduct and Discovery of Deceptive Communication: The Relative Influence of Richness and Synchronicity," Group Decision and Negotiation, Springer, vol. 13(2), pages 191-210, March.
    7. Glenn Hoetker, 2007. "The use of logit and probit models in strategic management research: Critical issues," Strategic Management Journal, Wiley Blackwell, vol. 28(4), pages 331-343, April.
    8. Samuel Myers, 1987. "Introduction," The Review of Black Political Economy, Springer;National Economic Association, vol. 16(1), pages 5-15, June.
    9. repec:dau:papers:123456789/2723 is not listed on IDEAS
    10. John R. Carlson & Joey F. George & Judee K. Burgoon & Mark Adkins & Cindy H. White, 2004. "Deception in Computer-Mediated Communication," Group Decision and Negotiation, Springer, vol. 13(1), pages 5-28, January.
    11. Tamara Dinev & Paul Hart, 2006. "An Extended Privacy Calculus Model for E-Commerce Transactions," Information Systems Research, INFORMS, vol. 17(1), pages 61-80, March.
    12. Michael Workman, 2008. "Wisecrackers: A theory‐grounded investigation of phishing and pretext social engineering threats to information security," Journal of the American Society for Information Science and Technology, Association for Information Science & Technology, vol. 59(4), pages 662-674, February.
    Full references (including those not matched with items on IDEAS)

    Citations

    Citations are extracted by the CitEc Project, subscribe to its RSS feed for this item.
    as


    Cited by:

    1. Naci Akdemir & Serkan Yenal, 2021. "How Phishers Exploit the Coronavirus Pandemic: A Content Analysis of COVID-19 Themed Phishing Emails," SAGE Open, , vol. 11(3), pages 21582440211, July.
    2. Severin Weiler & Christian Matt & Thomas Hess, 2022. "Immunizing with information – Inoculation messages against conversational agents’ response failures," Electronic Markets, Springer;IIM University of St. Gallen, vol. 32(1), pages 239-258, March.
    3. Ahmed Abbasi & David Dobolyi & Anthony Vance & Fatemeh Mariam Zahedi, 2021. "The Phishing Funnel Model: A Design Artifact to Predict User Susceptibility to Phishing Websites," Information Systems Research, INFORMS, vol. 32(2), pages 410-436, June.
    4. Jingguo Wang & Yuan Li & H. Raghav Rao, 2017. "Coping Responses in Phishing Detection: An Investigation of Antecedents and Consequences," Information Systems Research, INFORMS, vol. 28(2), pages 378-396, June.

    Most related items

    These are the items that most often cite the same works as this one and are cited by the same works as this one.
    1. Jarle Aarstad & Olav Andreas Kvitastein & Stig-Erik Jakobsen, 2019. "What Drives Enterprise Product Innovation? Assessing How Regional, National, And International Inter-Firm Collaboration Complement Or Substitute For R&D Investments," International Journal of Innovation Management (ijim), World Scientific Publishing Co. Pte. Ltd., vol. 23(05), pages 1-25, June.
    2. Carolin Bock & Maximilian Schmidt, 2015. "Should I stay, or should I go? – How fund dynamics influence venture capital exit decisions," Review of Financial Economics, John Wiley & Sons, vol. 27(1), pages 68-82, November.
    3. Ashraf Sharif & Saira Hanif Soroya & Shakil Ahmad & Khalid Mahmood, 2021. "Antecedents of Self-Disclosure on Social Networking Sites (SNSs): A Study of Facebook Users," Sustainability, MDPI, vol. 13(3), pages 1-21, January.
    4. Chengguang Li & Rodrigo Isidor & Luis Alfonso Dau & Rudy Kabst, 2018. "The More the Merrier? Immigrant Share and Entrepreneurial Activities," Entrepreneurship Theory and Practice, , vol. 42(5), pages 698-733, September.
    5. Yi Sun & Shihui Li & Lingling Yu, 2022. "The dark sides of AI personal assistant: effects of service failure on user continuance intention," Electronic Markets, Springer;IIM University of St. Gallen, vol. 32(1), pages 17-39, March.
    6. Christopher Marquis & Cuili Qian, 2014. "Corporate Social Responsibility Reporting in China: Symbol or Substance?," Organization Science, INFORMS, vol. 25(1), pages 127-148, February.
    7. Jabbar, Abdul & Geebren, Ahmed & Hussain, Zahid & Dani, Samir & Ul-Durar, Shajara, 2023. "Investigating individual privacy within CBDC: A privacy calculus perspective," Research in International Business and Finance, Elsevier, vol. 64(C).
    8. Yli-Renko, Helena & Denoo, Lien & Janakiraman, Ramkumar, 2020. "A knowledge-based view of managing dependence on a key customer: Survival and growth outcomes for young firms," Journal of Business Venturing, Elsevier, vol. 35(6).
    9. Gaétan de Rassenfosse & Emilio Raiteri, 2022. "Technology Protectionism and the Patent System: Evidence from China," Journal of Industrial Economics, Wiley Blackwell, vol. 70(1), pages 1-43, March.
    10. Xindong Xue & W. Robert Reed, 2015. "The Relationship Between Social Capital And Health In China," Working Papers in Economics 15/05, University of Canterbury, Department of Economics and Finance.
    11. K. Parboteeah & Sascha Walter & Jörn Block, 2015. "When Does Christian Religion Matter for Entrepreneurial Activity? The Contingent Effect of a Country’s Investments into Knowledge," Journal of Business Ethics, Springer, vol. 130(2), pages 447-465, August.
    12. Fathi Fakhfakh & Virginie Pérotin & Andrew Robinson, 2011. "Workplace Change and Productivity: Does Employee Voice Make a Difference?," Chapters, in: Susan Hayter (ed.), The Role of Collective Bargaining in the Global Economy, chapter 5, Edward Elgar Publishing.
    13. Roper, Stephen & Hewitt-Dundas, Nola, 2015. "Knowledge stocks, knowledge flows and innovation: Evidence from matched patents and innovation panel data," Research Policy, Elsevier, vol. 44(7), pages 1327-1340.
    14. Francois Collet & Déborah Philippe, 2014. "From Hot Cakes to Cold Feet: A Contingent Perspective on the Relationship between Market Uncertainty and Status Homophily in the Formation of Alliances," Journal of Management Studies, Wiley Blackwell, vol. 51(3), pages 406-432, May.
    15. Yue Maggie Zhou & Xiang Wan, 2017. "Product variety and vertical integration," Strategic Management Journal, Wiley Blackwell, vol. 38(5), pages 1134-1150, May.
    16. Iryna Y. Johnson, 2019. "Destinations of Admitted Out-of-State Students: A Case of One Institution," Research in Higher Education, Springer;Association for Institutional Research, vol. 60(3), pages 315-337, May.
    17. Diana De Alwis & Ilan Noy, 2019. "The Cost of Being Under the Weather: Droughts, Floods, and Health-Care Costs in Sri Lanka," Asian Development Review, MIT Press, vol. 36(2), pages 185-214, September.
    18. Jason R.V. Franken & Joost M.E. Pennings & Philip Garcia, 2018. "Graphical Illustration of Interaction Effects in Binary Choice Models: A Note," Journal of Agricultural Economics, Wiley Blackwell, vol. 69(3), pages 852-858, September.
    19. Walter, Sascha & Heinrichs, Simon & Walter, Achim, 2013. "Hostile Parent Firms and Child Firm Performance," EconStor Preprints 68592, ZBW - Leibniz Information Centre for Economics.
    20. Avagyan, Vardan & Camacho, Nuno & Van der Stede, Wim A. & Stremersch, Stefan, 2022. "Financial projections in innovation selection: The role of scenario presentation, expertise, and risk," International Journal of Research in Marketing, Elsevier, vol. 39(3), pages 907-926.

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:inm:orisre:v:25:y:2014:i:2:p:385-400. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    If CitEc recognized a bibliographic reference but did not link an item in RePEc to it, you can help with this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Chris Asher (email available below). General contact details of provider: https://edirc.repec.org/data/inforea.html .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.