The Influence of Experiential and Dispositional Factors in Phishing: An Empirical Investigation of the Deceived
Phishing has been a major problem for information systems managers and users for several years now. In 2008, it was estimated that phishing resulted in close to $50 billion in damages to U.S. consumers and businesses. Even so, research has yet to explore many of the reasons why Internet users contin...
Saved in:
Published in | Journal of management information systems Vol. 27; no. 1; pp. 273 - 303 |
---|---|
Main Authors | , |
Format | Journal Article |
Language | English |
Published |
Abingdon
Routledge
01.07.2010
M. E. Sharpe Sharpe Taylor & Francis Ltd |
Subjects | |
Online Access | Get full text |
Cover
Loading…
Abstract | Phishing has been a major problem for information systems managers and users for several years now. In 2008, it was estimated that phishing resulted in close to $50 billion in damages to U.S. consumers and businesses. Even so, research has yet to explore many of the reasons why Internet users continue to be exploited. The goal of this paper is to better understand the behavioral factors that may increase one's susceptibility for complying with a phisher's request for personal information. Using past research on deception detection, a research model was developed to help explain compliant phishing responses. The model was tested using a field study in which each participant received a phishing e-mail asking for sensitive information. It was found that four behavioral factors were influential as to whether the phishing e-mails were answered with sensitive information. The paper concludes by suggesting that the behavioral aspect of susceptible users be integrated into the current tools and materials used in antiphishing efforts. |
---|---|
AbstractList | Phishing has been a major problem for information systems managers and users for several years now. In 2008, it was estimated that phishing resulted in close to $50 billion in damages to U.S. consumers and businesses. Even so, research has yet to explore many of the reasons why Internet users continue to be exploited. The goal of this paper is to better understand the behavioral factors that may increase one's susceptibility for complying with a phisher's request for personal information. Using past research on deception detection, a research model was developed to help explain compliant phishing responses. The model was tested using a field study in which each participant received a phishing e-mail asking for sensitive information. It was found that four behavioral factors were influential as to whether the phishing e-mails were answered with sensitive information. The paper concludes by suggesting that the behavioral aspect of susceptible users be integrated into the current tools and materials used in antiphishing efforts. Phishing has been a major problem for information systems managers and users for several years now. In 2008, it was estimated that phishing resulted in close to $50 billion in damages to U.S. consumers and businesses. Even so, research has yet to explore many of the reasons why Internet users continue to be exploited. The goal of this paper is to better understand the behavioral factors that may increase one's susceptibility for complying with a phisher's request for personal information. Using past research on deception detection, a research model was developed to help explain compliant phishing responses. The model was tested using a field study in which each participant received a phishing e-mail asking for sensitive information. It was found that four behavioral factors were influential as to whether the phishing e-mails were answered with sensitive information. The paper concludes by suggesting that the behavioral aspect of susceptible users be integrated into the current tools and materials used in antiphishing efforts. [PUBLICATION ABSTRACT] |
Author | Wright, Ryan T. Marett, Kent |
Author_xml | – sequence: 1 givenname: Ryan T. surname: Wright fullname: Wright, Ryan T. organization: Department of Technology, Innovation, and Entrepreneurship, University of San Francisco – sequence: 2 givenname: Kent surname: Marett fullname: Marett, Kent organization: Mississippi State University |
BackLink | http://www.econis.eu/PPNSET?PPN=635395622$$DView this record in ZBW - Deutsche Zentralbibliothek für Wirtschaftswissenschaften |
BookMark | eNp9kV1rFDEUhoO04Lb6BwQx4IVXo_mYJBPBi9Ju60JLBSt4F7KZpJtlNhmTbLX_vlmnbKEXzc2BnOc9X-8ROAgxWADeYfSZCEa_XC1-ItGSBpP6BMIYvwIzzJhoJOl-H4DZPvsaHOW8RghhSeQMxJuVhYvghq0NxsLo4PzfaJO3oXg9QB16eObzGLMvPob6c65NiSlDH-CPlc8rH26_wpMA55vRJ28qsQh3Nhd_q3eKXcVSW5xZY_2d7d-AQ6eHbN8-xmPw63x-c_q9uby-WJyeXDampV1pHJNCO4q1YVSKjrWiR8wwueTYSMy61uFu2QsqOHEtwbQjlPR66TTnFrVLQ4_Bp6numOKfbZ1HbXw2dhh0sHGblWCSESQYquTHZ-Q6blNdNStMOcdE1ItW6sNEWRODz2pMfqPTveK0Dsg4IZUgE2FSzDlZt2cwUjuT1KNJ6smkKuqeiYwv_w9XkvbDy9L3k3SdqyH7ZoRxKTmWNf9tyvvgYtrovzENvSr6fojJJR1M3YK-UP8Bv5WzdA |
CitedBy_id | crossref_primary_10_1109_COMST_2019_2957750 crossref_primary_10_1080_07421222_2016_1205927 crossref_primary_10_3389_fpsyg_2020_01755 crossref_primary_10_1080_07421222_2016_1205929 crossref_primary_10_1093_cybsec_tyaa001 crossref_primary_10_1016_j_im_2025_104110 crossref_primary_10_4018_JDM_2020040102 crossref_primary_10_1080_0144929X_2019_1653992 crossref_primary_10_1080_07421222_2016_1205924 crossref_primary_10_1111_isj_12338 crossref_primary_10_1371_journal_pone_0205089 crossref_primary_10_1016_j_chb_2017_06_021 crossref_primary_10_1108_ITP_12_2017_0434 crossref_primary_10_1016_j_cose_2012_09_010 crossref_primary_10_1016_j_cose_2024_103875 crossref_primary_10_1016_j_ipm_2016_06_004 crossref_primary_10_1080_10447318_2024_2415750 crossref_primary_10_1080_07421222_2020_1790187 crossref_primary_10_1080_07421222_2015_1138375 crossref_primary_10_1016_j_ijhcs_2015_05_005 crossref_primary_10_1080_07421222_2016_1205934 crossref_primary_10_1080_08874417_2020_1812134 crossref_primary_10_1111_itor_12963 crossref_primary_10_2139_ssrn_4088873 crossref_primary_10_1016_j_cose_2016_10_011 crossref_primary_10_2308_ISYS_19_053 crossref_primary_10_3389_fpsyg_2022_1030670 crossref_primary_10_1287_isre_2016_0680 crossref_primary_10_3389_fpsyg_2023_1087463 crossref_primary_10_1108_JFC_06_2018_0053 crossref_primary_10_1016_j_cose_2023_103487 crossref_primary_10_3390_fi16010031 crossref_primary_10_1177_0268396220918594 crossref_primary_10_1287_isre_2014_0522 crossref_primary_10_1057_s41303_017_0058_x crossref_primary_10_3390_ijerph20043514 crossref_primary_10_1145_3447934_3447940 crossref_primary_10_1016_j_dss_2017_09_004 crossref_primary_10_1080_0960085X_2023_2186275 crossref_primary_10_1016_j_cose_2023_103249 crossref_primary_10_1016_j_cose_2020_101862 crossref_primary_10_1177_02683962231226397 crossref_primary_10_1016_j_obhdp_2019_08_001 crossref_primary_10_1080_0960085X_2020_1771222 crossref_primary_10_3390_su13041651 crossref_primary_10_1080_0144929X_2025_2469657 crossref_primary_10_1109_TDSC_2022_3151103 crossref_primary_10_1016_j_jeconc_2025_100125 crossref_primary_10_1016_j_procs_2021_01_103 crossref_primary_10_1080_0960085X_2021_1931494 crossref_primary_10_1109_TEM_2020_3002784 crossref_primary_10_1186_s40163_022_00177_w crossref_primary_10_1080_07421222_2017_1334499 crossref_primary_10_3390_fi15010029 crossref_primary_10_1016_j_chb_2017_03_002 crossref_primary_10_1016_j_im_2021_103447 crossref_primary_10_1016_j_dss_2020_113287 crossref_primary_10_1145_3715966_3715971 crossref_primary_10_1108_09685221211286548 crossref_primary_10_2308_HORIZONS_2020_101 crossref_primary_10_1111_ijcs_12886 crossref_primary_10_2139_ssrn_4147323 crossref_primary_10_1108_ICS_06_2017_0040 crossref_primary_10_1177_1071181321651330 crossref_primary_10_1287_isre_1100_0320 crossref_primary_10_1057_ejis_2015_21 crossref_primary_10_1016_j_paid_2021_111335 crossref_primary_10_1177_0093650215627483 crossref_primary_10_1080_15536548_2011_10855910 crossref_primary_10_1177_14614448231209475 crossref_primary_10_1093_cybsec_tyae010 crossref_primary_10_1016_j_tele_2018_02_009 crossref_primary_10_1016_j_im_2023_103858 crossref_primary_10_1109_ACCESS_2016_2616285 crossref_primary_10_1016_j_cose_2017_04_006 crossref_primary_10_1080_15536548_2016_1243857 crossref_primary_10_1016_j_ijhcs_2018_12_004 crossref_primary_10_1365_s40702_020_00613_y crossref_primary_10_1016_j_cose_2012_12_003 crossref_primary_10_1016_j_cose_2023_103655 crossref_primary_10_1080_08946566_2023_2240005 crossref_primary_10_1145_3635149 crossref_primary_10_1108_AJIM_01_2021_0016 crossref_primary_10_1186_s13673_018_0128_7 crossref_primary_10_1016_j_jnca_2014_10_009 crossref_primary_10_1186_s42400_020_00047_5 crossref_primary_10_3390_ijerph19148294 crossref_primary_10_1007_s11896_019_09334_5 crossref_primary_10_1016_j_chb_2016_02_050 crossref_primary_10_1016_j_cose_2015_02_008 crossref_primary_10_1016_j_compeleceng_2025_110097 crossref_primary_10_4018_IJSSSP_315766 crossref_primary_10_1007_s11292_024_09648_3 crossref_primary_10_1057_s41284_024_00457_x crossref_primary_10_1016_j_im_2021_103482 crossref_primary_10_1080_10919392_2019_1552745 crossref_primary_10_1111_isj_12317 crossref_primary_10_1145_3325522 crossref_primary_10_1109_TDSC_2021_3118931 crossref_primary_10_1111_isj_12318 crossref_primary_10_1111_risa_12917 crossref_primary_10_1080_08874417_2020_1858730 crossref_primary_10_1080_0144929X_2019_1657180 crossref_primary_10_1002_asi_23849 crossref_primary_10_1177_03063070231200512 crossref_primary_10_1080_07421222_2014_1001260 crossref_primary_10_1080_07421222_2022_2096551 crossref_primary_10_1016_j_ijinfomgt_2019_04_009 crossref_primary_10_1057_s41284_020_00270_2 crossref_primary_10_1016_j_cose_2016_04_001 crossref_primary_10_1080_07421222_2019_1598696 crossref_primary_10_1016_j_dss_2022_113846 crossref_primary_10_1016_j_cose_2023_103558 crossref_primary_10_1016_j_cose_2023_103435 crossref_primary_10_1080_15228053_2024_2439192 crossref_primary_10_1177_0011128720968504 crossref_primary_10_1016_j_jisa_2020_102614 crossref_primary_10_1108_IMCS_05_2013_0032 crossref_primary_10_1080_0144929X_2018_1519599 crossref_primary_10_1177_0018720816665025 crossref_primary_10_1287_isre_2020_0973 crossref_primary_10_3389_fpsyg_2018_00466 crossref_primary_10_1080_0960085X_2024_2351442 crossref_primary_10_1108_OIR_04_2015_0106 crossref_primary_10_1371_journal_pone_0224216 |
Cites_doi | 10.2307/249688 10.1287/isre.1040.0032 10.1080/07421222.2004.11045779 10.1093/oso/9780195152661.001.0001 10.1145/1121949.1121968 10.1108/09685229510792988 10.1207/s15327957pspr1003_2 10.1016/S1071-5819(03)00111-3 10.5465/amr.1987.4306516 10.1023/B:GRUP.0000021841.01346.35 10.1109/HICSS.2008.6 10.4135/9781483385693 10.1023/B:GRUP.0000011942.31158.d8 10.1287/isre.13.3.334.81 10.2307/25148744 10.1080/10864415.2003.11044283 10.1109/MSP.2005.21 10.2979/esj.2004.3.2.35 10.1145/1280680.1280692 10.2307/256844 10.2753/MIS0742-1222240411 10.1145/1290958.1290968 10.1109/TDSC.2006.50 10.5465/amr.1998.926620 10.1145/1143120.1143131 10.2307/249551 10.2753/MIS0742-1222220302 10.1016/j.cose.2004.07.001 10.2753/MIS0742-1222220303 10.1109/MTAS.2006.1700023 10.1109/HICSS.2003.1174393 10.1109/MIC.2006.23 10.1145/1035134.1035159 10.2753/MIS0742-1222240407 10.2753/JEC1086-4415110204 10.1007/BF00998267 10.1287/isre.1070.0141 10.1002/asi.20530 10.2753/JEC1086-4415100201 10.5465/amr.1992.4279564 10.2307/25148830 10.2307/4132323 10.1080/714041710 10.1177/002224378101800104 10.1287/mnsc.43.2.123 10.5465/amr.1998.926622 10.1080/07421222.2003.11045754 10.1086/210179 10.1080/07421222.1991.11517925 10.1080/10864415.2001.11044235 10.1016/S1353-4858(05)70285-3 10.1109/3468.852434 10.1080/03637759409376340 10.1145/299157.299175 10.1109/TPC.2005.849652 10.1287/isre.6.2.118 10.2307/25148857 10.2307/25148691 10.1111/j.1468-2885.1996.tb00127.x 10.5465/amr.1995.9508080335 10.1037/0033-2909.129.1.74 10.1287/isre.1.3.255 |
ContentType | Journal Article |
Copyright | Copyright Taylor & Francis Group, LLC 2010 2010 M.E. Sharpe, Inc. Copyright M. E. Sharpe Inc. Summer 2010 |
Copyright_xml | – notice: Copyright Taylor & Francis Group, LLC 2010 – notice: 2010 M.E. Sharpe, Inc. – notice: Copyright M. E. Sharpe Inc. Summer 2010 |
DBID | AAYXX CITATION OQ6 8BJ FQK JBE JQ2 |
DOI | 10.2753/MIS0742-1222270111 |
DatabaseName | CrossRef ECONIS International Bibliography of the Social Sciences (IBSS) International Bibliography of the Social Sciences International Bibliography of the Social Sciences ProQuest Computer Science Collection |
DatabaseTitle | CrossRef International Bibliography of the Social Sciences (IBSS) ProQuest Computer Science Collection |
DatabaseTitleList | International Bibliography of the Social Sciences (IBSS) |
DeliveryMethod | fulltext_linktorsrc |
Discipline | Engineering |
EISSN | 1557-928X |
EndPage | 303 |
ExternalDocumentID | 2992164341 635395622 10_2753_MIS0742_1222270111 25699619 11046072 |
Genre | Feature |
GeographicLocations | United States--US |
GeographicLocations_xml | – name: United States--US |
GroupedDBID | -~X .4S .DC 0BK 0R~ 2AX 4.4 4R4 5GY 61N 7WY 85S 8FL 8VB AAFTK AAMFJ AAMIU AAPUL AAVDF AAZMC ABBHK ABCCY ABFIM ABJNI ABKVW ABLIJ ABPEM ABPPZ ABSGB ABTAH ABTAI ABXSQ ABXUL ABXYU ABYYQ ACDEK ACGFO ACGFS ACHQT ACNCT ACTIO ACTOA ACXJH ACYUN ADAAO ADAHI ADCVX ADGDI ADKVQ ADMHG ADULT AECIN AEGXH AEISY AEMOZ AENEX AEOZU AEULS AEUPB AEYOC AEZRU AFFNX AGDLA AGRBW AHAJD AHDZW AHIZY AHQJS AI. AIAGR AIJEM AJBCO AKBVH AKVCP ALMA_UNASSIGNED_HOLDINGS ALQZU APTMU ARCSS AVBZW AWYRJ BEJHT BIPZW BLEHA BMOTO BOHLJ BXSLM CAG CBXGM CCCUG CMDUG COF CS3 DGFLZ DKSSO DU5 E.L EBE EBO EBR EBS EBU ECR ECS EDO EHE EJD EMK EPL GTTXZ H13 HZ~ H~9 I-F IPSME JAAYA JBMMH JENOY JHFFW JKQEH JLEZI JLXEF JPL JPPEU JSODD JST K1G K60 K6~ KYCEM M4Z MAY MES MET NB9 O-X O9- P2P QWB RNANH ROSJB RSYQP SA0 STATR TBQAZ TDBHL TFH TFL TFW TGZ TH9 TN5 TNTFI TRJHH TUROJ TUS U5U UPT VH1 WH7 YF5 YQT ZCG ZL0 ZY4 AAGDL AAHIA AATGJ ADYSH AEFOU AFRVT AIYEW AMPGV ASMEE 1OL 29K 41~ 6TJ 8FE 8FG 8G5 8R4 8R5 AASPC AAWNQ AAYXX ABBOH ABFWB ABUWG ACYNR AFARG AFKRA AICBI AICXO AMATQ ARAPS AS~ AVKUR AZQEC BENPR BETGC BEZIV BGLVJ BKOMP BMHKA BPHCQ CCPQU CITATION CPEAS D-I DJVHL DKJDH DWQXO FRNLG GNUQQ GROUPED_ABI_INFORM_RESEARCH GUQSH HCIFZ HF~ HVGLF INYZX IPNFZ K6V K7- LJTGL M0C M2O NHB P62 PHGZM PHGZT PQBIZ PQBZA PQQKQ PRG PROAC Q2X QBZMT QCKGC QF4 QM6 RIG TAE TLJZZ WHG OQ6 8BJ FQK JBE JQ2 TASJS |
ID | FETCH-LOGICAL-c438t-f597af31ac53978547d05c59b61c91584f18bd73762f42138232dabfa66e04bc3 |
ISSN | 0742-1222 |
IngestDate | Fri Jul 11 05:33:17 EDT 2025 Fri Jul 25 04:05:57 EDT 2025 Sat Mar 08 16:22:34 EST 2025 Tue Jul 01 01:50:38 EDT 2025 Thu Apr 24 23:03:15 EDT 2025 Thu Jul 03 21:32:29 EDT 2025 Wed Dec 25 09:04:35 EST 2024 |
IsPeerReviewed | true |
IsScholarly | true |
Issue | 1 |
Language | English |
LinkModel | OpenURL |
MergedId | FETCHMERGED-LOGICAL-c438t-f597af31ac53978547d05c59b61c91584f18bd73762f42138232dabfa66e04bc3 |
Notes | SourceType-Scholarly Journals-1 ObjectType-Feature-1 content type line 14 ObjectType-Article-2 content type line 23 |
PQID | 1366127227 |
PQPubID | 3397 |
PageCount | 31 |
ParticipantIDs | proquest_miscellaneous_759520750 jstor_primary_25699619 proquest_journals_1366127227 crossref_primary_10_2753_MIS0742_1222270111 econis_primary_635395622 crossref_citationtrail_10_2753_MIS0742_1222270111 informaworld_taylorfrancis_310_2753_MIS0742_1222270111 |
ProviderPackageCode | CITATION AAYXX |
PublicationCentury | 2000 |
PublicationDate | 2010-07-01 |
PublicationDateYYYYMMDD | 2010-07-01 |
PublicationDate_xml | – month: 07 year: 2010 text: 2010-07-01 day: 01 |
PublicationDecade | 2010 |
PublicationPlace | Abingdon |
PublicationPlace_xml | – name: Abingdon |
PublicationSubtitle | JMIS |
PublicationTitle | Journal of management information systems |
PublicationYear | 2010 |
Publisher | Routledge M. E. Sharpe Sharpe Taylor & Francis Ltd |
Publisher_xml | – name: Routledge – name: M. E. Sharpe – name: Sharpe – name: Taylor & Francis Ltd |
References | J. Downs (21) 2006 A. Everard (23) 2005; 22 R. Santhanam (73) 2008; 19 J. Hair, Jr. (41) 1998 A. Dennis (17) 2008; 32 G. Goth (35) 2005; 3 R. Gulati (40) 1999; 104 S. Jarvenpaa (48) 2000; 5 B. Muthen (65) 1993 S. Sheng (74) 2007 J. Greenberg (38) 1987; 12 D. McKnight (59) 2002; 13 T. Kline (51) 2005 T. Dinev (20) 2005-6; 10 H. Berghel (3) 2006; 49 M. Yao (85) 2007; 58 S. Grazioli (36) 2000; 30 J. Goldsmith (33) 2006 D. Hoffman (43) 1999; 42 M. Ahuja (1) 2005; 29 J. Carlson (12) 2004; 13 U. Gretzel (39) 2006-7; 11 E. Weber (82) 1997; 43 G. Miller (63) 1993 J. Burgoon (8) 2004 D. McKnight (58) 2001-2; 6 J. Burgoon (9) 1994; 61 J. Carlson (11) 1999; 42 T. Hess (42) 2005-6; 22 C. Hughes (45) 1991; 8 L. Zhou (87) 2004; 20 D. Gefen (30) 2008; 24 J. George (32) 1999 R. Dhamija (19) 2006 R. Cooper (16) 2003; 20 J. Hsieh (44) 2008; 32 G. Larcom (53) 2006; 25 J. Nunnally (68) 1994 S. Rao (72) 2000 M. Charki (13) 2008; 24 S. Grazioli (37) 2003; 7 61 J. Stanton (78) 2005; 24 K. Mitnick (64) 2005 67 24 D. McKnight (60) 2004; 3 L. Muthen (66) 2007 R. Mayer (57) 1995; 20 D. Biros (4) 2002; 26 M. Featherman (25) 2003; 59 28 29 P. Kumaraguru (52) 2007 M. Wu (84) 2006 P. Spurling (77) 1995; 3 P. Ekman (22) 1991; 15 C. Bond (5) 2006; 10 D. Straub (79) 1990; 1 S. Sitkin (75) 1992; 17 T. Brown (6) 2006 N. Malhotra (56) 2004; 15 T. Jagatic (46) 2007; 50 L. Jessup (49) 2005 D. Gefen (31) 2000; 4 L. Zhou (86) 2005; 48 C. Fornell (26) 1981; 18 D. Straub (80) 1998; 22 70 71 S. Sitkin (76) 1995; 38 J. Carlson (10) 2004; 13 R. Lewicki (54) 1998; 23 W. Liu (55) 2006; 10 H. McKnight (62) 1998; 23 34 D. Buller (7) 1996; 6 S. Jarvenpaa (47) 1997; 2 J. Webster (83) 2006; 30 A. Fu (27) 2006; 3 M. Kacmar (50) 1989 B. DePaulo (18) 2003; 129 A. Vrij (81) 2000 H. Park (69) 2002; 69 D. Compeau (15) 1995; 19 S. Bellovin (2) 2004; 47 D. Compeau (14) 1995; 6 |
References_xml | – volume: 19 start-page: 189 issue: 2 year: 1995 ident: 15 article-title: Computer self-efficacy: Development of a measure and initial test publication-title: MIS Quarterly doi: 10.2307/249688 – volume: 5 start-page: 45 issue: 2 year: 2000 ident: 48 article-title: Consumer trust in an Internet store: A cross-cultural validation publication-title: Journal of Computer-Mediated Communication – volume: 15 start-page: 336 issue: 4 year: 2004 ident: 56 article-title: Internet users' information privacy concerns (IUIPC): The construct, the scale, and a causal model publication-title: Information Systems Research doi: 10.1287/isre.1040.0032 – volume: 20 start-page: 139 issue: 4 year: 2004 ident: 87 article-title: A comparison of classification methods for predicting deception in computer-mediated communication publication-title: Journal of Management Information Systems doi: 10.1080/07421222.2004.11045779 – volume-title: Who Controls the Internet? Illusions of a Borderless World year: 2006 ident: 33 doi: 10.1093/oso/9780195152661.001.0001 – volume: 49 start-page: 21 issue: 4 year: 2006 ident: 3 article-title: Phishing mongers and posers publication-title: Communications of the ACM doi: 10.1145/1121949.1121968 – start-page: 581 year: 2006 ident: 19 article-title: Why phishing works – start-page: 32 volume-title: The Employment Interview: Theory, Research, and Practice year: 1989 ident: 50 – ident: 70 – volume: 3 start-page: 20 issue: 2 year: 1995 ident: 77 article-title: Promoting security awareness and commitment publication-title: Information Management & Computer Security doi: 10.1108/09685229510792988 – volume: 10 start-page: 214 issue: 3 year: 2006 ident: 5 article-title: Accuracy of deception judgments publication-title: Personality and Social Psychology Review doi: 10.1207/s15327957pspr1003_2 – year: 2007 ident: 52 – volume: 59 start-page: 451 issue: 4 year: 2003 ident: 25 article-title: Predicting e-services adoption: A perceived risk facets perspective publication-title: International Journal of Human-Computer Studies doi: 10.1016/S1071-5819(03)00111-3 – year: 2006 ident: 84 article-title: Do security toolbars actually prevent phishing attacks? – volume: 12 start-page: 157 issue: 1 year: 1987 ident: 38 article-title: The college sophomore as guinea pig: Setting the record straight publication-title: Academy of Management Review doi: 10.5465/amr.1987.4306516 – volume: 13 start-page: 191 issue: 2 year: 2004 ident: 10 article-title: Media appropriateness in the conduct and discovery of deceptive communication: The relative influence of richness and synchronicity publication-title: Group Decision and Negotiation doi: 10.1023/B:GRUP.0000021841.01346.35 – ident: 28 doi: 10.1109/HICSS.2008.6 – volume-title: Psychological Testing: A Practical Approach to Design and Evaluation year: 2005 ident: 51 doi: 10.4135/9781483385693 – volume: 13 start-page: 5 issue: 1 year: 2004 ident: 12 article-title: Deception in computer-mediated communication publication-title: Group Decision and Negotiation doi: 10.1023/B:GRUP.0000011942.31158.d8 – volume: 13 start-page: 334 issue: 3 year: 2002 ident: 59 article-title: Developing and validating trust measures for e-commerce: An integrative typology publication-title: Information Systems Research doi: 10.1287/isre.13.3.334.81 – start-page: 205 volume-title: Testing Structural Equation Models year: 1993 ident: 65 – volume: 30 start-page: 661 issue: 3 year: 2006 ident: 83 article-title: Enhancing the design of web navigation systems: The influence of user disorientation on engagement and performance publication-title: MIS Quarterly doi: 10.2307/25148744 – volume: 7 start-page: 93 issue: 4 year: 2003 ident: 37 article-title: Consumer and business deception on the Internet: Content analysis of documentary evidence publication-title: International Journal of Electronic Commerce doi: 10.1080/10864415.2003.11044283 – ident: 71 – volume: 3 start-page: 8 issue: 1 year: 2005 ident: 35 article-title: Phishing attacks rising, but dollar losses down publication-title: IEEE Security & Privacy doi: 10.1109/MSP.2005.21 – volume: 3 start-page: 35 issue: 2 year: 2004 ident: 60 article-title: Dispositional trust and distrust distinctions in predicting high- and low-risk Internet expert advice site perceptions publication-title: e-Service Journal doi: 10.2979/esj.2004.3.2.35 – volume-title: Psychometric Theory year: 1994 ident: 68 – year: 2007 ident: 74 article-title: Anti-phishing Phil: The design and evaluation of a game that teaches people not to fall for phish doi: 10.1145/1280680.1280692 – volume: 38 start-page: 1573 issue: 6 year: 1995 ident: 76 article-title: Determinants of risky decision-making behavior: A test of the mediating role of risk perceptions and propensity publication-title: Academy of Management Journal doi: 10.2307/256844 – volume: 24 start-page: 275 issue: 4 year: 2008 ident: 30 article-title: A research agenda for trust in online environments publication-title: Journal of Management Information Systems doi: 10.2753/MIS0742-1222240411 – volume: 50 start-page: 94 issue: 10 year: 2007 ident: 46 article-title: Social phishing publication-title: Communications of the ACM doi: 10.1145/1290958.1290968 – volume-title: Detecting Lies and Deceit: The Psychology of Lying and the Implications for Professional Practice year: 2000 ident: 81 – volume: 3 start-page: 301 issue: 4 year: 2006 ident: 27 article-title: Detecting phishing Web pages with visual similarity assessment based on earth mover's distance (EMD) publication-title: IEEE Transactions on Dependable and Secure Computing doi: 10.1109/TDSC.2006.50 – volume: 23 start-page: 438 issue: 3 year: 1998 ident: 54 article-title: Trust and distrust: New relationships and realities publication-title: Academy of Management Review doi: 10.5465/amr.1998.926620 – year: 2006 ident: 21 article-title: Decision strategies and susceptibility to phishing doi: 10.1145/1143120.1143131 – volume-title: Multivariate Data Analysis with Readings year: 1998 ident: 41 – volume: 22 start-page: 441 issue: 4 year: 1998 ident: 80 article-title: Coping with systems risk: Security planning models for management decision making publication-title: MIS Quarterly doi: 10.2307/249551 – volume: 22 start-page: 15 issue: 3 year: 2005-6 ident: 42 article-title: Involvement and decision-making performance with a decision aid: The influence of social multimedia, gender, and playfulness publication-title: Journal of Management Information Systems doi: 10.2753/MIS0742-1222220302 – volume-title: The Art of Intrusion year: 2005 ident: 64 – volume: 24 start-page: 124 issue: 2 year: 2005 ident: 78 article-title: Analysis of end user security behaviors publication-title: Computers & Security doi: 10.1016/j.cose.2004.07.001 – volume-title: Information Systems Today year: 2005 ident: 49 – volume: 22 start-page: 55 issue: 3 year: 2005 ident: 23 article-title: How presentation flaws affect perceived site quality, trust, and intention to purchase from an online store publication-title: Journal of Management Information Systems doi: 10.2753/MIS0742-1222220303 – volume-title: Confirmatory Factory Analysis for Applied Research year: 2006 ident: 6 – volume-title: Leadership at a Distance year: 2004 ident: 8 – volume-title: Mplus User's Guide year: 2007 ident: 66 – volume: 42 start-page: 153 issue: 2 year: 1999 ident: 11 article-title: Channel expansion theory and the experiential nature of media richness perceptions publication-title: Academy of Management Review – volume: 25 start-page: 52 issue: 3 year: 2006 ident: 53 article-title: Gone phishing publication-title: IEEE Technology and Society Magazine doi: 10.1109/MTAS.2006.1700023 – ident: 61 doi: 10.1109/HICSS.2003.1174393 – volume-title: Deceptive Communication year: 1993 ident: 63 – year: 2000 ident: 72 article-title: The impact of involuntary cues on media effects – volume: 10 start-page: 58 issue: 2 year: 2006 ident: 55 article-title: An antiphishing strategy based on visual similarity assessment publication-title: IEEE Internet Computing doi: 10.1109/MIC.2006.23 – volume: 47 start-page: 144 issue: 12 year: 2004 ident: 2 article-title: Spamming, phishing, authentication, and privacy publication-title: Communications of the ACM doi: 10.1145/1035134.1035159 – volume: 24 start-page: 175 issue: 4 year: 2008 ident: 13 article-title: Online reverse auctions and the dynamics of trust publication-title: Journal of Management Information Systems doi: 10.2753/MIS0742-1222240407 – volume: 11 start-page: 81 issue: 2 year: 2006-7 ident: 39 article-title: Persuasion in recommender systems publication-title: International Journal of Electronic Commerce doi: 10.2753/JEC1086-4415110204 – volume: 2 start-page: 59 issue: 1 year: 1997 ident: 47 article-title: Consumer reactions to electronic shopping on the World Wide Web publication-title: International Journal of Electronic Commerce – volume: 15 start-page: 125 issue: 2 year: 1991 ident: 22 article-title: Face, voice, and body in detecting deceit publication-title: Journal of Nonverbal Behavior doi: 10.1007/BF00998267 – volume: 19 start-page: 26 issue: 1 year: 2008 ident: 73 article-title: Using self-regulatory learning to enhance e-learning-based information technology training publication-title: Information Systems Research doi: 10.1287/isre.1070.0141 – volume: 58 start-page: 710 issue: 5 year: 2007 ident: 85 article-title: Predicting user concerns about online privacy publication-title: Journal of the American Society for Information Science & Technology doi: 10.1002/asi.20530 – ident: 24 – volume: 10 start-page: 7 issue: 2 year: 2005-6 ident: 20 article-title: Internet privacy concerns and social awareness as determinants of intention to transact publication-title: International Journal of Electronic Commerce doi: 10.2753/JEC1086-4415100201 – volume: 17 start-page: 9 issue: 1 year: 1992 ident: 75 article-title: Reconceptualizing the determinants of risk behavior publication-title: Academy of Management Review doi: 10.5465/amr.1992.4279564 – volume: 32 start-page: 97 issue: 1 year: 2008 ident: 44 article-title: Understanding digital inequality: Comparing continued use behavioral models of the socio-economically advantaged and disadvantaged publication-title: MIS Quarterly doi: 10.2307/25148830 – ident: 67 – start-page: 1 year: 1999 ident: 32 article-title: Group support systems and deceptive communications – volume: 26 start-page: 119 issue: 2 year: 2002 ident: 4 article-title: Inducing sensitivity to deception in order to improve decision making performance: A field study publication-title: MIS Quarterly doi: 10.2307/4132323 – volume: 69 start-page: 144 issue: 2 year: 2002 ident: 69 article-title: How people really detect lies publication-title: Communication Monographs doi: 10.1080/714041710 – volume: 18 start-page: 39 issue: 1 year: 1981 ident: 26 article-title: Evaluating structural equations models with unobservable variables and measurement error publication-title: Journal of Marketing Research doi: 10.1177/002224378101800104 – volume: 43 start-page: 123 issue: 2 year: 1997 ident: 82 article-title: Perceived risk attitudes: Relating risk perception to risky choice publication-title: Management Science doi: 10.1287/mnsc.43.2.123 – volume: 23 start-page: 473 issue: 3 year: 1998 ident: 62 article-title: Initial trust formation in new organizational relationships publication-title: Academy of Management Review doi: 10.5465/amr.1998.926622 – volume: 20 start-page: 263 issue: 1 year: 2003 ident: 16 article-title: Exploring the core concepts of media richness theory: The impact of cue multiplicity and feedback immediacy on decision quality publication-title: Journal of Management Information Systems doi: 10.1080/07421222.2003.11045754 – volume: 104 start-page: 1439 issue: 1 year: 1999 ident: 40 article-title: Where do interorganizational networks come from? publication-title: American Journal of Sociology doi: 10.1086/210179 – volume: 8 start-page: 153 issue: 2 year: 1991 ident: 45 article-title: Students as surrogates for managers in a decision-making environment: An experimental study publication-title: Journal of Management Information Systems doi: 10.1080/07421222.1991.11517925 – volume: 4 start-page: 1 issue: 7 year: 2000 ident: 31 article-title: Structural equation modeling and regression: Guidelines for research practice publication-title: Communications of the AIS – volume: 6 start-page: 35 issue: 2 year: 2001-2 ident: 58 article-title: What trust means in e-commerce customer relationships: An interdisciplinary conceptual typology publication-title: International Journal of Electronic Commerce doi: 10.1080/10864415.2001.11044235 – ident: 29 – ident: 34 doi: 10.1016/S1353-4858(05)70285-3 – volume: 30 start-page: 395 issue: 4 year: 2000 ident: 36 article-title: Perils of Internet fraud: An empirical investigation of deception and trust with experienced Internet consumers publication-title: IEEE Transactions on System, Man, and Cybernetics doi: 10.1109/3468.852434 – volume: 61 start-page: 303 issue: 4 year: 1994 ident: 9 article-title: Interpersonal deception: V. Accuracy in deception detection publication-title: Communication Monographs doi: 10.1080/03637759409376340 – volume: 42 start-page: 80 issue: 4 year: 1999 ident: 43 article-title: Building consumer trust online publication-title: Communications of the ACM doi: 10.1145/299157.299175 – volume: 48 start-page: 147 issue: 2 year: 2005 ident: 86 article-title: An empirical investigation of deception behavior in instant messaging publication-title: IEEE Transactions on Professional Communication doi: 10.1109/TPC.2005.849652 – volume: 6 start-page: 118 issue: 2 year: 1995 ident: 14 article-title: Application of social cognitive theory to training for computer skills publication-title: Information Systems Research doi: 10.1287/isre.6.2.118 – volume: 32 start-page: 575 issue: 3 year: 2008 ident: 17 article-title: Media, tasks, and communication processes: A theory of media synchronicity publication-title: MIS Quarterly doi: 10.2307/25148857 – volume: 29 start-page: 427 issue: 3 year: 2005 ident: 1 article-title: Moving beyond intentions and toward the theory of trying: Effects of work environment and gender on post-adoption information technology use publication-title: MIS Quarterly doi: 10.2307/25148691 – volume: 6 start-page: 203 issue: 3 year: 1996 ident: 7 article-title: Interpersonal deception theory publication-title: Communication Theory doi: 10.1111/j.1468-2885.1996.tb00127.x – volume: 20 start-page: 709 issue: 3 year: 1995 ident: 57 article-title: An integrative model of organizational trust publication-title: Academy of Management Review doi: 10.5465/amr.1995.9508080335 – volume: 129 start-page: 74 issue: 1 year: 2003 ident: 18 article-title: Cues to deception publication-title: Psychological Bulletin doi: 10.1037/0033-2909.129.1.74 – volume: 1 start-page: 255 issue: 2 year: 1990 ident: 79 article-title: Effective IS security: An empirical study publication-title: Information Systems Research doi: 10.1287/isre.1.3.255 |
SSID | ssj0001929 |
Score | 2.4261863 |
Snippet | Phishing has been a major problem for information systems managers and users for several years now. In 2008, it was estimated that phishing resulted in close... |
SourceID | proquest econis crossref jstor informaworld |
SourceType | Aggregation Database Index Database Enrichment Source Publisher |
StartPage | 273 |
SubjectTerms | computer-mediated deception Cybercrime Cybersecurity Datensicherheit electronic mail fraud Electronic mail systems Empirical research Information and communication technologies Information storage and retrieval systems Information systems Information technology Internet Internet fraud Internet security interpersonal deception theory IT-Kriminalität Management information systems Personal information Phishing Piracy Research design Software Studies Trust Verhalten |
Title | The Influence of Experiential and Dispositional Factors in Phishing: An Empirical Investigation of the Deceived |
URI | https://www.tandfonline.com/doi/abs/10.2753/MIS0742-1222270111 https://www.jstor.org/stable/25699619 http://www.econis.eu/PPNSET?PPN=635395622 https://www.proquest.com/docview/1366127227 https://www.proquest.com/docview/759520750 |
Volume | 27 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1Nb5tAEF1ZSQ_tIepXFNK02kNvFi7sLmB6sxonOJVzcImUXorYBSSkBls1vvTXd_aDDdRN1PZiW3wMkt9j9u2wvEHoPYUxuCBe7sLoHLigb2M3rsTUFYyxIo4IDHqyoL-8DpMbdnUb3I5G33qrlnYtn4iff3yv5H9QhW2Aq3xL9h-QtUFhA_wGfOETEIbPv8Z40XUZUWsEjXFxWxsLgPPaLsuCLRemuU7dyEKKKj6ZwuD8blNrs5Ce8YaWklKZnpeihLQ4aOrZk7J3dg3N2BixqpO3PTd0mfdXi8skVZh-nV2P04kFe7aap2rH566zgKlDyEfoUb8OsZyM5xPlMr0pezkMZt6uT8gg4WozgAGxTPbUXU3MQEyV-cFejieRatSxXHyxwUnkdSl76J0Neg7mc9IV9pDANALy4GG6ukoSO1aDvo21UauOpF-rkpf4sH-BgXR5IusV9fY3h9tuVeveyK7kSvocHRlw8EyT5gUalc1L9KznPvkKrYE-2NIHryvcpw8G-uABfbChD64b3NHnI5412JIHD8gjIwJ5cEee1-jmYp5-SlzTfwPuVDpt3Qomm3lF_VwEoFqnAYsKLxBBzENfxD4o18qf8iKCIYpUjEgzS0qKnFd5GJYe44Ieo4Nm3ZQnCIeeIGHFeA7fjFOSQ0zZhZNzllPGQwf53V-bCWNOL3ukfM9gkirhyAwc2T0cDhrbczbamuXRo080YvZYkNo0BvlPHBT2McxaVSurdGObjD4W81ihbUN2fHPQWQd_ZvLFNvMpaGESwbkOwnY3ZHP5iC5vyvVum0VBHBCp4k8fCv0GPb2_-87QQftjV74FXdzyd4bcvwBIe7FA |
linkProvider | Taylor & Francis |
linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwpV1Lb9QwEB7BFolyKM-qgQI-cEMpGz-SmFvVdpUt3QrBVurNxE4sVm2Tqpu98OsZx0lYiugBTpESexI745lvnMk3AO8Y-uCCjvMQvbMIEd_KUFqThoZzXsiEotNzG_qz0zg748fn4ryrc7rs0ipdDG09UURrq93idpvRbd4ywusPs-lXF9KFEXV_crpq6fdhQ0jO0hFszL8cZ9lgjBHASM_E6Zv7_2b-IuU33_TABaSL5S0K0z5t8Q_T3fqjyWP41o_Ep6Fc7K0avWd-3CJ5_I-hPoGtDquSfa9cT-FeWT2DR2sMhs-hRjUj077QCakt6bmT0XJcErwvOVwMmWF4ZuLr-5BFRT5_9_tfH8l-RY6urhctWwlZY_6oKycRISo5LE2Jdrl4AWeTo_lBFnY1HPBts7QJLQYsuWVRbgQin1TwpBgLI6SOIyMjRD82SnWRoJmjllNHiMhokWubx3E55tqwbRhVdVXuAInHhsaW6xyPXDOao0xXyVFrnjOu4wCi_u0p0xGcuzoblwoDHTeZqptM9WsyA3g_9Ln29B53tt7xSjG0RbjGMMKkNIB4XU1U0-63WF8cRbG7ZG63CjWIRAyKMWgkA9jtNUx1dmWpIoZ4iibYNwAyXEaL4D7z5FVZr5YqEVJQhwRf_uszvYWH2Xx2ok6mp59ewaZPmHAZyrswam5W5WvEYY1-0621n_cVJHo |
linkToPdf | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1NT9wwEB3RpargQL9ABCj1obcqdGM7zoYbYlnt0oJQCxI3y3ZidVVIVmz2wq9nHCfpQlUOnCIl9iR2xjNvnMkbgC8MfXBG-ypE7xyHiG_TMLVmEBrOeZYmFJ2e29A_OxfjK356HV83G27zJq3SxdDWE0XUttot7llm67RlRNffzia_XEQXRtT9yOmKpb-CVeG48HqwevnzdDzubDHil9QTcfrm_reZ_0h55Jpeu3h0On_CYNpmLf5juWt3NHoLsh2Iz0L5c7Co9IG5f8Lx-PKRvoONBqmSI69a72ElLz7A-hJ_4UcoUcnIpC1zQkpLWuZktBs3BG9LhtMuLwzPjHx1HzItyMVvv_t1SI4KcnI7m9ZcJWSJ96MsnEQEqGSYmxytcrYJV6OTy-Nx2FRwwHfNBlVoMVxRlkXKxIh7BjFPsn5s4lSLyKQRYh8bDXSWoJGjllNHh8hoprRVQuR9rg3bgl5RFvk2ENE3VFiuFR65ZlShTFfHUWuuGNcigKh9edI09OauysaNxDDHTaZsJlP-ncwAvnZ9Zp7c49nW214nurYI1hjGl5QGIJa1RFb1bov1pVEke07mVq1PnUhEoBiBRmkAe62CycaqzGXEEE3RBPsGQLrLaA_cRx5V5OViLpM4janDgTsvfabP8OZiOJI_Juffd2HNZ0u49OQ96FV3i_wTgrBK7zcr7QE3NSMe |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=The+Influence+of+Experiential+and+Dispositional+Factors+in+Phishing%3A+An+Empirical+Investigation+of+the+Deceived&rft.jtitle=Journal+of+management+information+systems&rft.au=WRIGHT%2C+RYAN+T.&rft.au=MARETT%2C+KENT&rft.date=2010-07-01&rft.pub=M.+E.+Sharpe&rft.issn=0742-1222&rft.volume=27&rft.issue=1&rft.spage=273&rft.epage=303&rft_id=info:doi/10.2753%2FMIS0742-1222270111&rft.externalDocID=25699619 |
thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=0742-1222&client=summon |
thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=0742-1222&client=summon |
thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=0742-1222&client=summon |