Research Article Phishing Susceptibility: An Investigation Into the Processing of a Targeted Spear Phishing Email

IEEE Transactions on Professional Communication - Tập 55 Số 4 - Trang 345-362 - 2012
Jingguo Wang1, Tejaswini Herath2, Rui Chen3, Arun Vishwanath4, Hengyi Rao5,6
1Department of Information Systems and Operations Management, College of Business, University ofTexas at Arlington, Arlington, TX, USA
2Department of Finance Operations and Information Systems, Brock University, Saint Catharines, ONT, Canada
3Department of Information Systems and Operations Management, Miller College of Business, Ball State University, Muncie, IN, USA
4Department of Communication Management Science and Systems, State University of New York, University at Buffalo, Buffalo, NY, USA
5Department of Global Service Management, Sogang University, Seoul, South Korea
6Department of Management Science and Systems School of Management, State University of New York, University at Buffalo, Buffalo, NY, USA

Tóm tắt

Từ khóa


Tài liệu tham khảo

carte, 2003, In pursuit of moderation: Nine common errors and their solutions, MIS Quart, 27, 479, 10.2307/30036541

10.1287/isre.14.2.189.16018

pavlou, 2007, Understanding and mitigating uncertainty in online exchange relationships: A principle-agent perspective, MIS Quart, 31, 105, 10.2307/25148783

10.1177/014920638601200408

chen, 1999, Dual-Process Theories in Social Psychology

martin, 0, Phishing for answers: Factors influencing a participant's ability to categorize email, Comput Changing World Portland OR

10.1109/47.372387

jakobsson (2012 aug 17), 2007, The human factor in phishing Privacy & Security of Consumer Information '07 Indiana Univ Bloomington IN

10.1109/47.365165

10.1145/1290958.1290968

10.1080/08824090701624239

frauenstein, 0, Phishing: How an organization can protect itself, Inf Security for South Africa Conf Johannesburg South Africa

0, How to recognize phishing e-mails or links

0, Consumer advice How to avoid phishing scams

10.1016/0022-1031(80)90032-3

10.1176/ajp.116.8.695

10.1016/j.dss.2009.06.012

10.1145/1124772.1124863

10.1109/TPC.2005.849652

0, Phishing A New Form of Identity Theft

chin, 1998, Issues and opinion on structural equation modeling, MIS Quart, 22, vii

10.2307/3151718

bagozzi, 1994, Advanced topics in structural equation models, Advanced Methods of Marketing Research, 1

ringle, 0, SmartPLS 2 0 (M3) Beta

10.1037/0033-2909.92.2.382

10.1037/0021-9010.88.5.879

10.1287/mnsc.31.4.395

10.1037/0033-2909.110.2.305

petter, 2007, Specifying formative constructs in information systems research, MIS Quart, 31, 623, 10.2307/25148814

10.1037/0022-3514.39.5.752

10.2307/3151312

nunally, 1978, Psychometric Theory

gefen, 2005, A practical guide to factorial validity using PLS-graph: Tutorial and annotated example, Commun Assoc Inf Syst, 16, 91

wang, 2009, Annals of Emerging Research in Information Assurance Security and Privacy Services

10.1016/j.dss.2005.11.004

10.1037/0022-3514.94.2.94.2.231

10.1006/obhd.1997.2717

10.1515/REVNEURO.2004.15.4.241

10.1016/0749-5978(86)90045-2

wright, 1974, The harassed decision maker: Time pressure, distraction and the use of evidence, J Appl Psychol, 59, 555, 10.1037/h0037186

10.2307/258395

johnson, 1993, Time Pressure and Stress in Human Judgment and Decision Making

10.1086/208537

10.1145/1299015.1299019

chin, 1998, Issues and opinion on structure equation modeling, MIS Quart, 22, vii

10.1037/0021-9010.88.5.879

10.2307/3150876

10.1145/217278.217286

10.1287/isre.1040.0026

10.1287/isre.13.2.205.83

10.1145/1231047.1231083

10.1145/1753326.1753383

2009, The psychology of scams Provoking and committing errors of judgement Prepared by the University of Exeter School of Psychology for Office of Fair Trading

10.1002/mar.1029

kahneman, 1973, Attention and Effort

10.1016/0749-5978(92)90061-B

10.1111/j.1468-2885.1996.tb00127.x

10.1023/B:GRUP.0000021839.04093.5d

10.1177/0093650203253369

10.1080/10919392.2010.516626

10.1023/B:GRUP.0000021839.04093.5d

10.1109/TPC.2007.2000052

10.1016/B978-0-12-526650-5.50012-5

10.1016/0001-4575(87)90022-4

10.1177/009365090017005005

10.4018/joeuc.2009010102

chaiken, 1989, Unintended Thought, 212

moore, 2010, From phishing to advanced persistent threats: The application of cybercrime risk to the enterprise risk management model, Rev Bus Inf Syst, 14, 27

10.1016/j.dss.2011.03.002

liu, 2006, An antiphishing strategy based on visual similarity assessment, IEEE Internet Comput, 10, 58, 10.1109/MIC.2006.23

10.1145/1143120.1143131

10.1145/1124772.1124861

fette, 2006, Learning to Detect Phishing Emails, 10.21236/ADA456046

10.1126/science.185.4157.1124

lewis, 2003, Sources of influence on beliefs about information technology use: An empirical study of knowledge workers, MIS Quart, 27, 657, 10.2307/30036552

brunswik, 1955, Representative design and probabilistic theory in functional psychology, Psychol Rev, 62, 193, 10.1037/h0047470

10.1146/annurev.ps.45.020194.001023

10.1017/CBO9781139173933

10.2307/3172593

10.1086/209158

10.1016/0001-6918(88)90056-X

10.1086/208954

10.1086/209181

10.1037/0021-9010.81.5.575

10.1086/208520

buller, 1994, Strategic Interpersonal Communication, 191