The Phishing Funnel Model: A Design Artifact to Predict User Susceptibility to Phishing Websites
Author
Abstract
Suggested Citation
DOI: 10.1287/isre.2020.0973
Download full text from publisher
References listed on IDEAS
- Bonnie Brinton Anderson & Anthony Vance & C Brock Kirwan & David Eargle & Jeffrey L Jenkins, 2016. "How users perceive and respond to security messages: a NeuroIS research agenda and empirical study," European Journal of Information Systems, Taylor & Francis Journals, vol. 25(4), pages 364-390, July.
- Huseyin Cavusoglu & Birendra Mishra & Srinivasan Raghunathan, 2005. "The Value of Intrusion Detection Systems in Information Technology Security Architecture," Information Systems Research, INFORMS, vol. 16(1), pages 28-46, March.
- Porter, Constance Elise & Donthu, Naveen, 2006. "Using the technology acceptance model to explain how attitudes determine Internet usage: The role of perceived access barriers and demographics," Journal of Business Research, Elsevier, vol. 59(9), pages 999-1007, September.
- Jingguo Wang & Yuan Li & H. Raghav Rao, 2017. "Coping Responses in Phishing Detection: An Investigation of Antecedents and Consequences," Information Systems Research, INFORMS, vol. 28(2), pages 378-396, June.
- Daniel Kahneman & Amos Tversky, 2013.
"Prospect Theory: An Analysis of Decision Under Risk,"
World Scientific Book Chapters, in: Leonard C MacLean & William T Ziemba (ed.), HANDBOOK OF THE FUNDAMENTALS OF FINANCIAL DECISION MAKING Part I, chapter 6, pages 99-127,
World Scientific Publishing Co. Pte. Ltd..
- Kahneman, Daniel & Tversky, Amos, 1979. "Prospect Theory: An Analysis of Decision under Risk," Econometrica, Econometric Society, vol. 47(2), pages 263-291, March.
- Amos Tversky & Daniel Kahneman, 1979. "Prospect Theory: An Analysis of Decision under Risk," Levine's Working Paper Archive 7656, David K. Levine.
- Casey Inez Canfield & Baruch Fischhoff, 2018. "Setting Priorities in Behavioral Interventions: An Application to Reducing Phishing Risk," Risk Analysis, John Wiley & Sons, vol. 38(4), pages 826-838, April.
- D. Harrison McKnight & Vivek Choudhury & Charles Kacmar, 2002. "Developing and Validating Trust Measures for e-Commerce: An Integrative Typology," Information Systems Research, INFORMS, vol. 13(3), pages 334-359, September.
- Ryan T. Wright & Matthew L. Jensen & Jason Bennett Thatcher & Michael Dinger & Kent Marett, 2014. "Research Note ---Influence Techniques in Phishing Attacks: An Examination of Vulnerability and Resistance," Information Systems Research, INFORMS, vol. 25(2), pages 385-400, June.
- Judit Bar‐Ilan & Kevin Keenoy & Mark Levene & Eti Yaari, 2009. "Presentation bias is significant in determining user preference for search results—A user study," Journal of the American Society for Information Science and Technology, Association for Information Science & Technology, vol. 60(1), pages 135-149, January.
- Jeffrey L. Jenkins & Bonnie Brinton Anderson & Anthony Vance & C. Brock Kirwan & David Eargle, 2016. "More Harm Than Good? How Messages That Interrupt Can Make Us Vulnerable," Information Systems Research, INFORMS, vol. 27(4), pages 880-896, December.
- Sam Ransbotham & Sabyasachi Mitra, 2009. "Choice and Chance: A Conceptual Model of Paths to Information Security Compromise," Information Systems Research, INFORMS, vol. 20(1), pages 121-139, March.
- Paul A. Pavlou & David Gefen, 2004. "Building Effective Online Marketplaces with Institution-Based Trust," Information Systems Research, INFORMS, vol. 15(1), pages 37-59, March.
- Indranil Bardhan & Jeong-ha (Cath) Oh & Zhiqiang (Eric) Zheng & Kirk Kirksey, 2015. "Predictive Analytics for Readmission of Patients with Congestive Heart Failure," Information Systems Research, INFORMS, vol. 26(1), pages 19-39, March.
- Sumantra Sarkar & Anthony Vance & Balasubramaniam Ramesh & Menelaos Demestihas & Daniel Thomas Wu, 2020. "The Influence of Professional Subculture on Information Security Policy Violations: A Field Study in a Healthcare Context," Information Systems Research, INFORMS, vol. 31(4), pages 1240-1259, December.
Citations
Citations are extracted by the CitEc Project, subscribe to its RSS feed for this item.
Cited by:
- Ahmed Abbasi & Jeffrey Parsons & Gautam Pant & Olivia R. Liu Sheng & Suprateek Sarker, 2024. "Pathways for Design Research on Artificial Intelligence," Information Systems Research, INFORMS, vol. 35(2), pages 441-459, June.
- Fatemeh Mariam Zahedi & Yan Chen & Huimin Zhao, 2024. "Ontology-Based Intelligent Interface Personalization for Protection Against Phishing Attacks," Information Systems Research, INFORMS, vol. 35(3), pages 1463-1478, September.
Most related items
These are the items that most often cite the same works as this one and are cited by the same works as this one.- Weck, Marina & Afanassieva, Marianne, 2023. "Toward the adoption of digital assistive technology: Factors affecting older people's initial trust formation," Telecommunications Policy, Elsevier, vol. 47(2).
- Ben Q. Liu & Dale L. Goodhue, 2012. "Two Worlds of Trust for Potential E-Commerce Users: Humans as Cognitive Misers," Information Systems Research, INFORMS, vol. 23(4), pages 1246-1262, December.
- Ahmed Ibrahim Alzahrani & T. Ramayah & Nalini Suppiah & Osama Alfarraj & Nasser Alalwan, 2020. "Modeling Blog Usage From a Developing Country Perspective Using Structural Equation Modeling (SEM)," SAGE Open, , vol. 10(3), pages 21582440209, July.
- Jung Lee & Jae-Nam Lee & Bernard C. Y. Tan, 2015. "Antecedents of cognitive trust and affective distrust and their mediating roles in building customer loyalty," Information Systems Frontiers, Springer, vol. 17(1), pages 159-175, February.
- Kjell Hausken, 2017. "Security Investment, Hacking, and Information Sharing between Firms and between Hackers," Games, MDPI, vol. 8(2), pages 1-23, May.
- Möhlmann, Mareike, 2021. "Unjustified trust beliefs: Trust conflation on sharing economy platforms," Research Policy, Elsevier, vol. 50(3).
- Yonghua Ji & Subodha Kumar & Vijay Mookerjee, 2016. "When Being Hot Is Not Cool: Monitoring Hot Lists for Information Security," Information Systems Research, INFORMS, vol. 27(4), pages 897-918, December.
- Timm Teubner & Marc T. P. Adam & Florian Hawlitschek, 2020. "Unlocking Online Reputation," Business & Information Systems Engineering: The International Journal of WIRTSCHAFTSINFORMATIK, Springer;Gesellschaft für Informatik e.V. (GI), vol. 62(6), pages 501-513, December.
- Luca Allodi & Fabio Massacci, 2017. "Security Events and Vulnerability Data for Cybersecurity Risk Estimation," Risk Analysis, John Wiley & Sons, vol. 37(8), pages 1606-1627, August.
- Stephen C. Wingreen & Natasha C. H. L. Mazey & Stephen L. Baglione & Gordon R. Storholm, 2019. "Transfer of electronic commerce trust between physical and virtual environments: experimental effects of structural assurance and situational normality," Electronic Commerce Research, Springer, vol. 19(2), pages 339-371, June.
- Kirs, Peeter & Bagchi, Kallol, 2012. "The impact of trust and changes in trust: A national comparison of individual adoptions of information and communication technologies and related phenomenon," International Journal of Information Management, Elsevier, vol. 32(5), pages 431-441.
- Heng Tang & Xiaowan Lin, 2019. "Curbing shopping cart abandonment in C2C markets — an uncertainty reduction approach," Electronic Markets, Springer;IIM University of St. Gallen, vol. 29(3), pages 533-552, September.
- Sumeet Gupta & Haejung Yun & Heng Xu & Hee-Woong Kim, 2017. "An exploratory study on mobile banking adoption in Indian metropolitan and urban areas: a scenario-based experiment," Information Technology for Development, Taylor & Francis Journals, vol. 23(1), pages 127-152, January.
- Carol Hsu & Jae-Nam Lee & Detmar W. Straub, 2012. "Institutional Influences on Information Systems Security Innovations," Information Systems Research, INFORMS, vol. 23(3-part-2), pages 918-939, September.
- Baozhou Lu & Rudy Hirschheim & Andrew Schwarz, 2015. "Examining the antecedent factors of online microsourcing," Information Systems Frontiers, Springer, vol. 17(3), pages 601-617, June.
- Rajković, Borislav & Đurić, Ivan & Zarić, Vlade & Glauben, Thomas, 2021.
"Gaining trust in the digital age: The potential of social media for increasing the competitiveness of small and medium enterprises,"
EconStor Open Access Articles and Book Chapters, ZBW - Leibniz Information Centre for Economics, vol. 13(4).
- Borislav Rajković & Ivan Đurić & Vlade Zarić & Thomas Glauben, 2021. "Gaining Trust in the Digital Age: The Potential of Social Media for Increasing the Competitiveness of Small and Medium Enterprises," Sustainability, MDPI, vol. 13(4), pages 1-22, February.
- Malhotra, Neeru & Sahadev, Sunil & Purani, Keyoor, 2017. "Psychological contract violation and customer intention to reuse online retailers: Exploring mediating and moderating mechanisms," Journal of Business Research, Elsevier, vol. 75(C), pages 17-28.
- Dan J. Kim & Donald L. Ferrin & H. Raghav Rao, 2009. "Trust and Satisfaction, Two Stepping Stones for Successful E-Commerce Relationships: A Longitudinal Exploration," Information Systems Research, INFORMS, vol. 20(2), pages 237-257, June.
- Richard, James E. & Purnell, Fruen, 2017. "Rethinking Catalogue and Online B2B Buyer Channel Preferences in the Education Supplies Market," Journal of Interactive Marketing, Elsevier, vol. 37(C), pages 1-15.
- Nguyen, Stephanie & Nicod, Lionel & Llosa, Sylvie, 2024. "Preventing bypass on sharing economy platforms: The impact of message framing on users’ bypass intention," Journal of Business Research, Elsevier, vol. 179(C).
More about this item
Keywords
phishing susceptibility; design science; predictive analytics; online security; longitudinal field experiment;All these keywords.
Statistics
Access and download statisticsCorrections
All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:inm:orisre:v:32:y:2021:i:2:p:410-436. See general information about how to correct material in RePEc.
If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.
If CitEc recognized a bibliographic reference but did not link an item in RePEc to it, you can help with this form .
If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.
For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Chris Asher (email available below). General contact details of provider: https://edirc.repec.org/data/inforea.html .
Please note that corrections may take a couple of weeks to filter through the various RePEc services.