The Influence of Experiential and Dispositional Factors in Phishing: An Empirical Investigation of the Deceived

نویسندگان

  • Ryan T. Wright
  • Kent Marett
چکیده

Phishing has been a major problem for information systems managers and users for several years now. In 2008, it was estimated that phishing resulted in close to $50 billion in damages to U.S. consumers and businesses. Even so, research has yet to explore many of the reasons why Internet users continue to be exploited. The goal of this paper is to better understand the behavioral factors that may increase one’s susceptibility for complying with a phisher’s request for personal information. Using past research on deception detection, a research model was developed to help explain compliant phishing responses. The model was tested using a field study in which each participant received a phishing e-mail asking for sensitive information. It was found that four behavioral factors were influential as to whether the phishing e-mails were answered with sensitive information. The paper concludes by suggesting that the behavioral aspect of susceptible users be integrated into the current tools and materials used in antiphishing efforts. Key WoRds and phRases: computer-mediated deception, electronic mail fraud, Internet security, interpersonal deception theory, phishing. The inTeRneT has opened up a WealTh of oppoRTuniTies for individuals and businesses to expand the reach and range of their personal and commercial transactions, but these 274 WRIghT aND MaRETT openings have also created a venue for a number of computer security issues that must be addressed. Investments in security hardware and software are now fundamental parts of a company’s information technology (IT) budget. also, security policies are continually developed and refined to reduce technical vulnerabilities. however, the frequent use of Internet technologies by corporations can also introduce new vulnerabilities. One recent phenomenon that exploits end users’ carelessness is phishing. Phishing uses obfuscation of both e-mails and Web sites to trick Web users into complying with a request for personal information [5, 27]. The deceitful people behind the scam, the “phishers,” are then able to use the personal information for a number of illicit activities, ranging from individual identity theft to the theft of a company’s intellectual property. according to some estimates, phishing results in close to $50 billion of damage to U.S. consumers and businesses a year [49, 71]. In 2007, phishing attacks increased and some 3 million adults lost over $3 billion in the 12 months ending in august 2007 [29]. although some reports indicate that the annual financial damage is not rising dramatically from year to year, the number of reported victims is increasing at a significant rate [35]. Phishing continues to be a very real problem for Web users in all walks of life. Consistent with the “fishing” homonym, phishing attacks are often described by using a “bait-and-hook” metaphor [70]. The “bait” consists of a mass e-mail submission sent to a large number of random and unsuspecting recipients. The message strongly mimics the look and feel of a legitimate business, including the use of familiar logos and slogans. The e-mail often requests the recipient’s aid in correcting a technical problem with his or her user account, ostensibly by confirming or “resupplying” a user ID, a password, a credit card number, or other personal information. The message typically encourages recipients to visit a bogus Web site (the “hook”) that is similar in appearance to an actual corporate Web site, except that user-supplied information is not sent to the legitimate company’s Web server, but to a server of the phisher’s choosing. The phishing effort is relatively low in terms of cost and risk for the phishers. Further, phishers may reside in international locations that place them out of reach of authorities in the victim’s jurisdiction, making prosecution much more difficult [33]. Phishers are rarely apprehended and prosecuted for the fraud they commit. Developing methods for detecting phishing before any damage is inflicted is a priority, and several approaches for detection have resulted from the effort. Technical countermeasures, such as e-mail filtering and antiphishing toolbars, successfully detect phishing attempts in about 35 percent of cases [84]. Updating fraud definitions, flagging bogus Web sites, and preventing false alarms from occurring continues to challenge individual users and IT departments alike. an automated comparison of the design, layout, and style characteristics between authentic and fraudulent Web sites has been shown to be more promising than a simple visual inspection made by a visitor, but an up-to-date registry of valid and invalid Web sites must be available for such a method to be practical [55]. Because of ineffective technological methods of prevention, much of the responsibility for detecting phishing lies with the end user, and an effective strategy for guarding against phishing should include both technological and human detectors. however, prior research has shown that, like technology, people ThE INFlUENCES OF ExPERIENTIal aND DISPOSITIONal FaCTORS IN PhIShINg 275 are also limited in terms of detecting the fraud once they are coerced into visiting a bogus Web site [19]. Once the message recipient chooses to visit a fraudulent Web site, he or she is unlikely to detect the fraudulent nature of the request and the “hook” will have been set. In order to prevent users from sending sensitive information to phishers, educating and training e-mail users about fraud prevention and detection at the “bait” stage must be considered the first line of defense [53]. The goal of this paper is to better understand, given the large number of phishing attempts and the vast amount of attention given to phishing in the popular press, why users of online applications such as e-mail and instant messaging still fall prey to these fraudulent efforts.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Supplier Development Activities and Buying Firm’s Performance: An Empirical Investigation of Iranian SMEs

This study attempts to investigate the major antecedent factors that influence manufacturing SMEs intentions toward the implementation of supplier development activities in Iranian SMEs. In order to achieve this objective, the research constructs were developed. The conceptual framework underlying this study was based on the theories of supplier development activities and social capital.  These...

متن کامل

An Empirical Examination of the Major Relationship Factors Affecting Franchisees’ Overall Satisfaction and Intention to Stay

The Nigerian franchise sector witnessed a rapid growth at the turn of the century, from 2001 to 2010, and thereafter started declining. Disputes, relational conflicts, and high rate of outlets closure have characterized the industry over the years. Meanwhile, studies show that to a large extent, success of franchisees depends on the quality of relationship they have with their franchisors. No p...

متن کامل

Improvement of project management office performance: An empirical investigation of effective factors in iranian construction industry

Project management office (PMO) is a new emerging concept in Iranian construction industry. Executives expect this organizational unit to add value to the business, and meet the demands of stakeholders by performing specialized tasks ranging from providing project management support to portfolio management. In this regard, PMO managers have long faced the question of how to improve the performa...

متن کامل

Investigation into Family Traits Impact on Tax Non –compliance of Family Firms (Case Study of Family Firms in Tehran Province)

Tax is one of the effective factors on the decisions and strategies of companies and decision makers in small and medium-sized family firms. The theoretical foundations and empirical evidence indicate that power structures, experiences and culture of family members of these companies can be considered as factors influencing tax aggressiveness. Therefore, the main objective of this study is to e...

متن کامل

Phishing counter measures and their effectiveness - literature review

Purpose – Phishing is essentially a social engineering crime on the Web, whose rampant occurrences and technique advancements are posing big challenges for researchers in both academia and the industry. The purpose of this study is to examine the available phishing literatures and phishing countermeasures, to determine how research has evolved and advanced in terms of quantity, content and publ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • J. of Management Information Systems

دوره 27  شماره 

صفحات  -

تاریخ انتشار 2010