The Influence of Experiential and Dispositional Factors in Phishing: An Empirical Investigation of the Deceived

Phishing has been a major problem for information systems managers and users for several years now. In 2008, it was estimated that phishing resulted in close to $50 billion in damages to U.S. consumers and businesses. Even so, research has yet to explore many of the reasons why Internet users contin...

Full description

Saved in:
Bibliographic Details
Published inJournal of management information systems Vol. 27; no. 1; pp. 273 - 303
Main Authors Wright, Ryan T., Marett, Kent
Format Journal Article
LanguageEnglish
Published Abingdon Routledge 01.07.2010
M. E. Sharpe
Sharpe
Taylor & Francis Ltd
Subjects
Online AccessGet full text

Cover

Loading…
Abstract Phishing has been a major problem for information systems managers and users for several years now. In 2008, it was estimated that phishing resulted in close to $50 billion in damages to U.S. consumers and businesses. Even so, research has yet to explore many of the reasons why Internet users continue to be exploited. The goal of this paper is to better understand the behavioral factors that may increase one's susceptibility for complying with a phisher's request for personal information. Using past research on deception detection, a research model was developed to help explain compliant phishing responses. The model was tested using a field study in which each participant received a phishing e-mail asking for sensitive information. It was found that four behavioral factors were influential as to whether the phishing e-mails were answered with sensitive information. The paper concludes by suggesting that the behavioral aspect of susceptible users be integrated into the current tools and materials used in antiphishing efforts.
AbstractList Phishing has been a major problem for information systems managers and users for several years now. In 2008, it was estimated that phishing resulted in close to $50 billion in damages to U.S. consumers and businesses. Even so, research has yet to explore many of the reasons why Internet users continue to be exploited. The goal of this paper is to better understand the behavioral factors that may increase one's susceptibility for complying with a phisher's request for personal information. Using past research on deception detection, a research model was developed to help explain compliant phishing responses. The model was tested using a field study in which each participant received a phishing e-mail asking for sensitive information. It was found that four behavioral factors were influential as to whether the phishing e-mails were answered with sensitive information. The paper concludes by suggesting that the behavioral aspect of susceptible users be integrated into the current tools and materials used in antiphishing efforts.
Phishing has been a major problem for information systems managers and users for several years now. In 2008, it was estimated that phishing resulted in close to $50 billion in damages to U.S. consumers and businesses. Even so, research has yet to explore many of the reasons why Internet users continue to be exploited. The goal of this paper is to better understand the behavioral factors that may increase one's susceptibility for complying with a phisher's request for personal information. Using past research on deception detection, a research model was developed to help explain compliant phishing responses. The model was tested using a field study in which each participant received a phishing e-mail asking for sensitive information. It was found that four behavioral factors were influential as to whether the phishing e-mails were answered with sensitive information. The paper concludes by suggesting that the behavioral aspect of susceptible users be integrated into the current tools and materials used in antiphishing efforts. [PUBLICATION ABSTRACT]
Author Wright, Ryan T.
Marett, Kent
Author_xml – sequence: 1
  givenname: Ryan T.
  surname: Wright
  fullname: Wright, Ryan T.
  organization: Department of Technology, Innovation, and Entrepreneurship, University of San Francisco
– sequence: 2
  givenname: Kent
  surname: Marett
  fullname: Marett, Kent
  organization: Mississippi State University
BackLink http://www.econis.eu/PPNSET?PPN=635395622$$DView this record in ZBW - Deutsche Zentralbibliothek für Wirtschaftswissenschaften
BookMark eNp9kV1rFDEUhoO04Lb6BwQx4IVXo_mYJBPBi9Ju60JLBSt4F7KZpJtlNhmTbLX_vlmnbKEXzc2BnOc9X-8ROAgxWADeYfSZCEa_XC1-ItGSBpP6BMIYvwIzzJhoJOl-H4DZPvsaHOW8RghhSeQMxJuVhYvghq0NxsLo4PzfaJO3oXg9QB16eObzGLMvPob6c65NiSlDH-CPlc8rH26_wpMA55vRJ28qsQh3Nhd_q3eKXcVSW5xZY_2d7d-AQ6eHbN8-xmPw63x-c_q9uby-WJyeXDampV1pHJNCO4q1YVSKjrWiR8wwueTYSMy61uFu2QsqOHEtwbQjlPR66TTnFrVLQ4_Bp6numOKfbZ1HbXw2dhh0sHGblWCSESQYquTHZ-Q6blNdNStMOcdE1ItW6sNEWRODz2pMfqPTveK0Dsg4IZUgE2FSzDlZt2cwUjuT1KNJ6smkKuqeiYwv_w9XkvbDy9L3k3SdqyH7ZoRxKTmWNf9tyvvgYtrovzENvSr6fojJJR1M3YK-UP8Bv5WzdA
CitedBy_id crossref_primary_10_1109_COMST_2019_2957750
crossref_primary_10_1080_07421222_2016_1205927
crossref_primary_10_3389_fpsyg_2020_01755
crossref_primary_10_1080_07421222_2016_1205929
crossref_primary_10_1093_cybsec_tyaa001
crossref_primary_10_1016_j_im_2025_104110
crossref_primary_10_4018_JDM_2020040102
crossref_primary_10_1080_0144929X_2019_1653992
crossref_primary_10_1080_07421222_2016_1205924
crossref_primary_10_1111_isj_12338
crossref_primary_10_1371_journal_pone_0205089
crossref_primary_10_1016_j_chb_2017_06_021
crossref_primary_10_1108_ITP_12_2017_0434
crossref_primary_10_1016_j_cose_2012_09_010
crossref_primary_10_1016_j_cose_2024_103875
crossref_primary_10_1016_j_ipm_2016_06_004
crossref_primary_10_1080_10447318_2024_2415750
crossref_primary_10_1080_07421222_2020_1790187
crossref_primary_10_1080_07421222_2015_1138375
crossref_primary_10_1016_j_ijhcs_2015_05_005
crossref_primary_10_1080_07421222_2016_1205934
crossref_primary_10_1080_08874417_2020_1812134
crossref_primary_10_1111_itor_12963
crossref_primary_10_2139_ssrn_4088873
crossref_primary_10_1016_j_cose_2016_10_011
crossref_primary_10_2308_ISYS_19_053
crossref_primary_10_3389_fpsyg_2022_1030670
crossref_primary_10_1287_isre_2016_0680
crossref_primary_10_3389_fpsyg_2023_1087463
crossref_primary_10_1108_JFC_06_2018_0053
crossref_primary_10_1016_j_cose_2023_103487
crossref_primary_10_3390_fi16010031
crossref_primary_10_1177_0268396220918594
crossref_primary_10_1287_isre_2014_0522
crossref_primary_10_1057_s41303_017_0058_x
crossref_primary_10_3390_ijerph20043514
crossref_primary_10_1145_3447934_3447940
crossref_primary_10_1016_j_dss_2017_09_004
crossref_primary_10_1080_0960085X_2023_2186275
crossref_primary_10_1016_j_cose_2023_103249
crossref_primary_10_1016_j_cose_2020_101862
crossref_primary_10_1177_02683962231226397
crossref_primary_10_1016_j_obhdp_2019_08_001
crossref_primary_10_1080_0960085X_2020_1771222
crossref_primary_10_3390_su13041651
crossref_primary_10_1080_0144929X_2025_2469657
crossref_primary_10_1109_TDSC_2022_3151103
crossref_primary_10_1016_j_jeconc_2025_100125
crossref_primary_10_1016_j_procs_2021_01_103
crossref_primary_10_1080_0960085X_2021_1931494
crossref_primary_10_1109_TEM_2020_3002784
crossref_primary_10_1186_s40163_022_00177_w
crossref_primary_10_1080_07421222_2017_1334499
crossref_primary_10_3390_fi15010029
crossref_primary_10_1016_j_chb_2017_03_002
crossref_primary_10_1016_j_im_2021_103447
crossref_primary_10_1016_j_dss_2020_113287
crossref_primary_10_1145_3715966_3715971
crossref_primary_10_1108_09685221211286548
crossref_primary_10_2308_HORIZONS_2020_101
crossref_primary_10_1111_ijcs_12886
crossref_primary_10_2139_ssrn_4147323
crossref_primary_10_1108_ICS_06_2017_0040
crossref_primary_10_1177_1071181321651330
crossref_primary_10_1287_isre_1100_0320
crossref_primary_10_1057_ejis_2015_21
crossref_primary_10_1016_j_paid_2021_111335
crossref_primary_10_1177_0093650215627483
crossref_primary_10_1080_15536548_2011_10855910
crossref_primary_10_1177_14614448231209475
crossref_primary_10_1093_cybsec_tyae010
crossref_primary_10_1016_j_tele_2018_02_009
crossref_primary_10_1016_j_im_2023_103858
crossref_primary_10_1109_ACCESS_2016_2616285
crossref_primary_10_1016_j_cose_2017_04_006
crossref_primary_10_1080_15536548_2016_1243857
crossref_primary_10_1016_j_ijhcs_2018_12_004
crossref_primary_10_1365_s40702_020_00613_y
crossref_primary_10_1016_j_cose_2012_12_003
crossref_primary_10_1016_j_cose_2023_103655
crossref_primary_10_1080_08946566_2023_2240005
crossref_primary_10_1145_3635149
crossref_primary_10_1108_AJIM_01_2021_0016
crossref_primary_10_1186_s13673_018_0128_7
crossref_primary_10_1016_j_jnca_2014_10_009
crossref_primary_10_1186_s42400_020_00047_5
crossref_primary_10_3390_ijerph19148294
crossref_primary_10_1007_s11896_019_09334_5
crossref_primary_10_1016_j_chb_2016_02_050
crossref_primary_10_1016_j_cose_2015_02_008
crossref_primary_10_1016_j_compeleceng_2025_110097
crossref_primary_10_4018_IJSSSP_315766
crossref_primary_10_1007_s11292_024_09648_3
crossref_primary_10_1057_s41284_024_00457_x
crossref_primary_10_1016_j_im_2021_103482
crossref_primary_10_1080_10919392_2019_1552745
crossref_primary_10_1111_isj_12317
crossref_primary_10_1145_3325522
crossref_primary_10_1109_TDSC_2021_3118931
crossref_primary_10_1111_isj_12318
crossref_primary_10_1111_risa_12917
crossref_primary_10_1080_08874417_2020_1858730
crossref_primary_10_1080_0144929X_2019_1657180
crossref_primary_10_1002_asi_23849
crossref_primary_10_1177_03063070231200512
crossref_primary_10_1080_07421222_2014_1001260
crossref_primary_10_1080_07421222_2022_2096551
crossref_primary_10_1016_j_ijinfomgt_2019_04_009
crossref_primary_10_1057_s41284_020_00270_2
crossref_primary_10_1016_j_cose_2016_04_001
crossref_primary_10_1080_07421222_2019_1598696
crossref_primary_10_1016_j_dss_2022_113846
crossref_primary_10_1016_j_cose_2023_103558
crossref_primary_10_1016_j_cose_2023_103435
crossref_primary_10_1080_15228053_2024_2439192
crossref_primary_10_1177_0011128720968504
crossref_primary_10_1016_j_jisa_2020_102614
crossref_primary_10_1108_IMCS_05_2013_0032
crossref_primary_10_1080_0144929X_2018_1519599
crossref_primary_10_1177_0018720816665025
crossref_primary_10_1287_isre_2020_0973
crossref_primary_10_3389_fpsyg_2018_00466
crossref_primary_10_1080_0960085X_2024_2351442
crossref_primary_10_1108_OIR_04_2015_0106
crossref_primary_10_1371_journal_pone_0224216
Cites_doi 10.2307/249688
10.1287/isre.1040.0032
10.1080/07421222.2004.11045779
10.1093/oso/9780195152661.001.0001
10.1145/1121949.1121968
10.1108/09685229510792988
10.1207/s15327957pspr1003_2
10.1016/S1071-5819(03)00111-3
10.5465/amr.1987.4306516
10.1023/B:GRUP.0000021841.01346.35
10.1109/HICSS.2008.6
10.4135/9781483385693
10.1023/B:GRUP.0000011942.31158.d8
10.1287/isre.13.3.334.81
10.2307/25148744
10.1080/10864415.2003.11044283
10.1109/MSP.2005.21
10.2979/esj.2004.3.2.35
10.1145/1280680.1280692
10.2307/256844
10.2753/MIS0742-1222240411
10.1145/1290958.1290968
10.1109/TDSC.2006.50
10.5465/amr.1998.926620
10.1145/1143120.1143131
10.2307/249551
10.2753/MIS0742-1222220302
10.1016/j.cose.2004.07.001
10.2753/MIS0742-1222220303
10.1109/MTAS.2006.1700023
10.1109/HICSS.2003.1174393
10.1109/MIC.2006.23
10.1145/1035134.1035159
10.2753/MIS0742-1222240407
10.2753/JEC1086-4415110204
10.1007/BF00998267
10.1287/isre.1070.0141
10.1002/asi.20530
10.2753/JEC1086-4415100201
10.5465/amr.1992.4279564
10.2307/25148830
10.2307/4132323
10.1080/714041710
10.1177/002224378101800104
10.1287/mnsc.43.2.123
10.5465/amr.1998.926622
10.1080/07421222.2003.11045754
10.1086/210179
10.1080/07421222.1991.11517925
10.1080/10864415.2001.11044235
10.1016/S1353-4858(05)70285-3
10.1109/3468.852434
10.1080/03637759409376340
10.1145/299157.299175
10.1109/TPC.2005.849652
10.1287/isre.6.2.118
10.2307/25148857
10.2307/25148691
10.1111/j.1468-2885.1996.tb00127.x
10.5465/amr.1995.9508080335
10.1037/0033-2909.129.1.74
10.1287/isre.1.3.255
ContentType Journal Article
Copyright Copyright Taylor & Francis Group, LLC 2010
2010 M.E. Sharpe, Inc.
Copyright M. E. Sharpe Inc. Summer 2010
Copyright_xml – notice: Copyright Taylor & Francis Group, LLC 2010
– notice: 2010 M.E. Sharpe, Inc.
– notice: Copyright M. E. Sharpe Inc. Summer 2010
DBID AAYXX
CITATION
OQ6
8BJ
FQK
JBE
JQ2
DOI 10.2753/MIS0742-1222270111
DatabaseName CrossRef
ECONIS
International Bibliography of the Social Sciences (IBSS)
International Bibliography of the Social Sciences
International Bibliography of the Social Sciences
ProQuest Computer Science Collection
DatabaseTitle CrossRef
International Bibliography of the Social Sciences (IBSS)
ProQuest Computer Science Collection
DatabaseTitleList
International Bibliography of the Social Sciences (IBSS)

DeliveryMethod fulltext_linktorsrc
Discipline Engineering
EISSN 1557-928X
EndPage 303
ExternalDocumentID 2992164341
635395622
10_2753_MIS0742_1222270111
25699619
11046072
Genre Feature
GeographicLocations United States--US
GeographicLocations_xml – name: United States--US
GroupedDBID -~X
.4S
.DC
0BK
0R~
2AX
4.4
4R4
5GY
61N
7WY
85S
8FL
8VB
AAFTK
AAMFJ
AAMIU
AAPUL
AAVDF
AAZMC
ABBHK
ABCCY
ABFIM
ABJNI
ABKVW
ABLIJ
ABPEM
ABPPZ
ABSGB
ABTAH
ABTAI
ABXSQ
ABXUL
ABXYU
ABYYQ
ACDEK
ACGFO
ACGFS
ACHQT
ACNCT
ACTIO
ACTOA
ACXJH
ACYUN
ADAAO
ADAHI
ADCVX
ADGDI
ADKVQ
ADMHG
ADULT
AECIN
AEGXH
AEISY
AEMOZ
AENEX
AEOZU
AEULS
AEUPB
AEYOC
AEZRU
AFFNX
AGDLA
AGRBW
AHAJD
AHDZW
AHIZY
AHQJS
AI.
AIAGR
AIJEM
AJBCO
AKBVH
AKVCP
ALMA_UNASSIGNED_HOLDINGS
ALQZU
APTMU
ARCSS
AVBZW
AWYRJ
BEJHT
BIPZW
BLEHA
BMOTO
BOHLJ
BXSLM
CAG
CBXGM
CCCUG
CMDUG
COF
CS3
DGFLZ
DKSSO
DU5
E.L
EBE
EBO
EBR
EBS
EBU
ECR
ECS
EDO
EHE
EJD
EMK
EPL
GTTXZ
H13
HZ~
H~9
I-F
IPSME
JAAYA
JBMMH
JENOY
JHFFW
JKQEH
JLEZI
JLXEF
JPL
JPPEU
JSODD
JST
K1G
K60
K6~
KYCEM
M4Z
MAY
MES
MET
NB9
O-X
O9-
P2P
QWB
RNANH
ROSJB
RSYQP
SA0
STATR
TBQAZ
TDBHL
TFH
TFL
TFW
TGZ
TH9
TN5
TNTFI
TRJHH
TUROJ
TUS
U5U
UPT
VH1
WH7
YF5
YQT
ZCG
ZL0
ZY4
AAGDL
AAHIA
AATGJ
ADYSH
AEFOU
AFRVT
AIYEW
AMPGV
ASMEE
1OL
29K
41~
6TJ
8FE
8FG
8G5
8R4
8R5
AASPC
AAWNQ
AAYXX
ABBOH
ABFWB
ABUWG
ACYNR
AFARG
AFKRA
AICBI
AICXO
AMATQ
ARAPS
AS~
AVKUR
AZQEC
BENPR
BETGC
BEZIV
BGLVJ
BKOMP
BMHKA
BPHCQ
CCPQU
CITATION
CPEAS
D-I
DJVHL
DKJDH
DWQXO
FRNLG
GNUQQ
GROUPED_ABI_INFORM_RESEARCH
GUQSH
HCIFZ
HF~
HVGLF
INYZX
IPNFZ
K6V
K7-
LJTGL
M0C
M2O
NHB
P62
PHGZM
PHGZT
PQBIZ
PQBZA
PQQKQ
PRG
PROAC
Q2X
QBZMT
QCKGC
QF4
QM6
RIG
TAE
TLJZZ
WHG
OQ6
8BJ
FQK
JBE
JQ2
TASJS
ID FETCH-LOGICAL-c438t-f597af31ac53978547d05c59b61c91584f18bd73762f42138232dabfa66e04bc3
ISSN 0742-1222
IngestDate Fri Jul 11 05:33:17 EDT 2025
Fri Jul 25 04:05:57 EDT 2025
Sat Mar 08 16:22:34 EST 2025
Tue Jul 01 01:50:38 EDT 2025
Thu Apr 24 23:03:15 EDT 2025
Thu Jul 03 21:32:29 EDT 2025
Wed Dec 25 09:04:35 EST 2024
IsPeerReviewed true
IsScholarly true
Issue 1
Language English
LinkModel OpenURL
MergedId FETCHMERGED-LOGICAL-c438t-f597af31ac53978547d05c59b61c91584f18bd73762f42138232dabfa66e04bc3
Notes SourceType-Scholarly Journals-1
ObjectType-Feature-1
content type line 14
ObjectType-Article-2
content type line 23
PQID 1366127227
PQPubID 3397
PageCount 31
ParticipantIDs proquest_miscellaneous_759520750
jstor_primary_25699619
proquest_journals_1366127227
crossref_primary_10_2753_MIS0742_1222270111
econis_primary_635395622
crossref_citationtrail_10_2753_MIS0742_1222270111
informaworld_taylorfrancis_310_2753_MIS0742_1222270111
ProviderPackageCode CITATION
AAYXX
PublicationCentury 2000
PublicationDate 2010-07-01
PublicationDateYYYYMMDD 2010-07-01
PublicationDate_xml – month: 07
  year: 2010
  text: 2010-07-01
  day: 01
PublicationDecade 2010
PublicationPlace Abingdon
PublicationPlace_xml – name: Abingdon
PublicationSubtitle JMIS
PublicationTitle Journal of management information systems
PublicationYear 2010
Publisher Routledge
M. E. Sharpe
Sharpe
Taylor & Francis Ltd
Publisher_xml – name: Routledge
– name: M. E. Sharpe
– name: Sharpe
– name: Taylor & Francis Ltd
References J. Downs (21) 2006
A. Everard (23) 2005; 22
R. Santhanam (73) 2008; 19
J. Hair, Jr. (41) 1998
A. Dennis (17) 2008; 32
G. Goth (35) 2005; 3
R. Gulati (40) 1999; 104
S. Jarvenpaa (48) 2000; 5
B. Muthen (65) 1993
S. Sheng (74) 2007
J. Greenberg (38) 1987; 12
D. McKnight (59) 2002; 13
T. Kline (51) 2005
T. Dinev (20) 2005-6; 10
H. Berghel (3) 2006; 49
M. Yao (85) 2007; 58
S. Grazioli (36) 2000; 30
J. Goldsmith (33) 2006
D. Hoffman (43) 1999; 42
M. Ahuja (1) 2005; 29
J. Carlson (12) 2004; 13
U. Gretzel (39) 2006-7; 11
E. Weber (82) 1997; 43
G. Miller (63) 1993
J. Burgoon (8) 2004
D. McKnight (58) 2001-2; 6
J. Burgoon (9) 1994; 61
J. Carlson (11) 1999; 42
T. Hess (42) 2005-6; 22
C. Hughes (45) 1991; 8
L. Zhou (87) 2004; 20
D. Gefen (30) 2008; 24
J. George (32) 1999
R. Dhamija (19) 2006
R. Cooper (16) 2003; 20
J. Hsieh (44) 2008; 32
G. Larcom (53) 2006; 25
J. Nunnally (68) 1994
S. Rao (72) 2000
M. Charki (13) 2008; 24
S. Grazioli (37) 2003; 7
61
J. Stanton (78) 2005; 24
K. Mitnick (64) 2005
67
24
D. McKnight (60) 2004; 3
L. Muthen (66) 2007
R. Mayer (57) 1995; 20
D. Biros (4) 2002; 26
M. Featherman (25) 2003; 59
28
29
P. Kumaraguru (52) 2007
M. Wu (84) 2006
P. Spurling (77) 1995; 3
P. Ekman (22) 1991; 15
C. Bond (5) 2006; 10
D. Straub (79) 1990; 1
S. Sitkin (75) 1992; 17
T. Brown (6) 2006
N. Malhotra (56) 2004; 15
T. Jagatic (46) 2007; 50
L. Jessup (49) 2005
D. Gefen (31) 2000; 4
L. Zhou (86) 2005; 48
C. Fornell (26) 1981; 18
D. Straub (80) 1998; 22
70
71
S. Sitkin (76) 1995; 38
J. Carlson (10) 2004; 13
R. Lewicki (54) 1998; 23
W. Liu (55) 2006; 10
H. McKnight (62) 1998; 23
34
D. Buller (7) 1996; 6
S. Jarvenpaa (47) 1997; 2
J. Webster (83) 2006; 30
A. Fu (27) 2006; 3
M. Kacmar (50) 1989
B. DePaulo (18) 2003; 129
A. Vrij (81) 2000
H. Park (69) 2002; 69
D. Compeau (15) 1995; 19
S. Bellovin (2) 2004; 47
D. Compeau (14) 1995; 6
References_xml – volume: 19
  start-page: 189
  issue: 2
  year: 1995
  ident: 15
  article-title: Computer self-efficacy: Development of a measure and initial test
  publication-title: MIS Quarterly
  doi: 10.2307/249688
– volume: 5
  start-page: 45
  issue: 2
  year: 2000
  ident: 48
  article-title: Consumer trust in an Internet store: A cross-cultural validation
  publication-title: Journal of Computer-Mediated Communication
– volume: 15
  start-page: 336
  issue: 4
  year: 2004
  ident: 56
  article-title: Internet users' information privacy concerns (IUIPC): The construct, the scale, and a causal model
  publication-title: Information Systems Research
  doi: 10.1287/isre.1040.0032
– volume: 20
  start-page: 139
  issue: 4
  year: 2004
  ident: 87
  article-title: A comparison of classification methods for predicting deception in computer-mediated communication
  publication-title: Journal of Management Information Systems
  doi: 10.1080/07421222.2004.11045779
– volume-title: Who Controls the Internet? Illusions of a Borderless World
  year: 2006
  ident: 33
  doi: 10.1093/oso/9780195152661.001.0001
– volume: 49
  start-page: 21
  issue: 4
  year: 2006
  ident: 3
  article-title: Phishing mongers and posers
  publication-title: Communications of the ACM
  doi: 10.1145/1121949.1121968
– start-page: 581
  year: 2006
  ident: 19
  article-title: Why phishing works
– start-page: 32
  volume-title: The Employment Interview: Theory, Research, and Practice
  year: 1989
  ident: 50
– ident: 70
– volume: 3
  start-page: 20
  issue: 2
  year: 1995
  ident: 77
  article-title: Promoting security awareness and commitment
  publication-title: Information Management & Computer Security
  doi: 10.1108/09685229510792988
– volume: 10
  start-page: 214
  issue: 3
  year: 2006
  ident: 5
  article-title: Accuracy of deception judgments
  publication-title: Personality and Social Psychology Review
  doi: 10.1207/s15327957pspr1003_2
– year: 2007
  ident: 52
– volume: 59
  start-page: 451
  issue: 4
  year: 2003
  ident: 25
  article-title: Predicting e-services adoption: A perceived risk facets perspective
  publication-title: International Journal of Human-Computer Studies
  doi: 10.1016/S1071-5819(03)00111-3
– year: 2006
  ident: 84
  article-title: Do security toolbars actually prevent phishing attacks?
– volume: 12
  start-page: 157
  issue: 1
  year: 1987
  ident: 38
  article-title: The college sophomore as guinea pig: Setting the record straight
  publication-title: Academy of Management Review
  doi: 10.5465/amr.1987.4306516
– volume: 13
  start-page: 191
  issue: 2
  year: 2004
  ident: 10
  article-title: Media appropriateness in the conduct and discovery of deceptive communication: The relative influence of richness and synchronicity
  publication-title: Group Decision and Negotiation
  doi: 10.1023/B:GRUP.0000021841.01346.35
– ident: 28
  doi: 10.1109/HICSS.2008.6
– volume-title: Psychological Testing: A Practical Approach to Design and Evaluation
  year: 2005
  ident: 51
  doi: 10.4135/9781483385693
– volume: 13
  start-page: 5
  issue: 1
  year: 2004
  ident: 12
  article-title: Deception in computer-mediated communication
  publication-title: Group Decision and Negotiation
  doi: 10.1023/B:GRUP.0000011942.31158.d8
– volume: 13
  start-page: 334
  issue: 3
  year: 2002
  ident: 59
  article-title: Developing and validating trust measures for e-commerce: An integrative typology
  publication-title: Information Systems Research
  doi: 10.1287/isre.13.3.334.81
– start-page: 205
  volume-title: Testing Structural Equation Models
  year: 1993
  ident: 65
– volume: 30
  start-page: 661
  issue: 3
  year: 2006
  ident: 83
  article-title: Enhancing the design of web navigation systems: The influence of user disorientation on engagement and performance
  publication-title: MIS Quarterly
  doi: 10.2307/25148744
– volume: 7
  start-page: 93
  issue: 4
  year: 2003
  ident: 37
  article-title: Consumer and business deception on the Internet: Content analysis of documentary evidence
  publication-title: International Journal of Electronic Commerce
  doi: 10.1080/10864415.2003.11044283
– ident: 71
– volume: 3
  start-page: 8
  issue: 1
  year: 2005
  ident: 35
  article-title: Phishing attacks rising, but dollar losses down
  publication-title: IEEE Security & Privacy
  doi: 10.1109/MSP.2005.21
– volume: 3
  start-page: 35
  issue: 2
  year: 2004
  ident: 60
  article-title: Dispositional trust and distrust distinctions in predicting high- and low-risk Internet expert advice site perceptions
  publication-title: e-Service Journal
  doi: 10.2979/esj.2004.3.2.35
– volume-title: Psychometric Theory
  year: 1994
  ident: 68
– year: 2007
  ident: 74
  article-title: Anti-phishing Phil: The design and evaluation of a game that teaches people not to fall for phish
  doi: 10.1145/1280680.1280692
– volume: 38
  start-page: 1573
  issue: 6
  year: 1995
  ident: 76
  article-title: Determinants of risky decision-making behavior: A test of the mediating role of risk perceptions and propensity
  publication-title: Academy of Management Journal
  doi: 10.2307/256844
– volume: 24
  start-page: 275
  issue: 4
  year: 2008
  ident: 30
  article-title: A research agenda for trust in online environments
  publication-title: Journal of Management Information Systems
  doi: 10.2753/MIS0742-1222240411
– volume: 50
  start-page: 94
  issue: 10
  year: 2007
  ident: 46
  article-title: Social phishing
  publication-title: Communications of the ACM
  doi: 10.1145/1290958.1290968
– volume-title: Detecting Lies and Deceit: The Psychology of Lying and the Implications for Professional Practice
  year: 2000
  ident: 81
– volume: 3
  start-page: 301
  issue: 4
  year: 2006
  ident: 27
  article-title: Detecting phishing Web pages with visual similarity assessment based on earth mover's distance (EMD)
  publication-title: IEEE Transactions on Dependable and Secure Computing
  doi: 10.1109/TDSC.2006.50
– volume: 23
  start-page: 438
  issue: 3
  year: 1998
  ident: 54
  article-title: Trust and distrust: New relationships and realities
  publication-title: Academy of Management Review
  doi: 10.5465/amr.1998.926620
– year: 2006
  ident: 21
  article-title: Decision strategies and susceptibility to phishing
  doi: 10.1145/1143120.1143131
– volume-title: Multivariate Data Analysis with Readings
  year: 1998
  ident: 41
– volume: 22
  start-page: 441
  issue: 4
  year: 1998
  ident: 80
  article-title: Coping with systems risk: Security planning models for management decision making
  publication-title: MIS Quarterly
  doi: 10.2307/249551
– volume: 22
  start-page: 15
  issue: 3
  year: 2005-6
  ident: 42
  article-title: Involvement and decision-making performance with a decision aid: The influence of social multimedia, gender, and playfulness
  publication-title: Journal of Management Information Systems
  doi: 10.2753/MIS0742-1222220302
– volume-title: The Art of Intrusion
  year: 2005
  ident: 64
– volume: 24
  start-page: 124
  issue: 2
  year: 2005
  ident: 78
  article-title: Analysis of end user security behaviors
  publication-title: Computers & Security
  doi: 10.1016/j.cose.2004.07.001
– volume-title: Information Systems Today
  year: 2005
  ident: 49
– volume: 22
  start-page: 55
  issue: 3
  year: 2005
  ident: 23
  article-title: How presentation flaws affect perceived site quality, trust, and intention to purchase from an online store
  publication-title: Journal of Management Information Systems
  doi: 10.2753/MIS0742-1222220303
– volume-title: Confirmatory Factory Analysis for Applied Research
  year: 2006
  ident: 6
– volume-title: Leadership at a Distance
  year: 2004
  ident: 8
– volume-title: Mplus User's Guide
  year: 2007
  ident: 66
– volume: 42
  start-page: 153
  issue: 2
  year: 1999
  ident: 11
  article-title: Channel expansion theory and the experiential nature of media richness perceptions
  publication-title: Academy of Management Review
– volume: 25
  start-page: 52
  issue: 3
  year: 2006
  ident: 53
  article-title: Gone phishing
  publication-title: IEEE Technology and Society Magazine
  doi: 10.1109/MTAS.2006.1700023
– ident: 61
  doi: 10.1109/HICSS.2003.1174393
– volume-title: Deceptive Communication
  year: 1993
  ident: 63
– year: 2000
  ident: 72
  article-title: The impact of involuntary cues on media effects
– volume: 10
  start-page: 58
  issue: 2
  year: 2006
  ident: 55
  article-title: An antiphishing strategy based on visual similarity assessment
  publication-title: IEEE Internet Computing
  doi: 10.1109/MIC.2006.23
– volume: 47
  start-page: 144
  issue: 12
  year: 2004
  ident: 2
  article-title: Spamming, phishing, authentication, and privacy
  publication-title: Communications of the ACM
  doi: 10.1145/1035134.1035159
– volume: 24
  start-page: 175
  issue: 4
  year: 2008
  ident: 13
  article-title: Online reverse auctions and the dynamics of trust
  publication-title: Journal of Management Information Systems
  doi: 10.2753/MIS0742-1222240407
– volume: 11
  start-page: 81
  issue: 2
  year: 2006-7
  ident: 39
  article-title: Persuasion in recommender systems
  publication-title: International Journal of Electronic Commerce
  doi: 10.2753/JEC1086-4415110204
– volume: 2
  start-page: 59
  issue: 1
  year: 1997
  ident: 47
  article-title: Consumer reactions to electronic shopping on the World Wide Web
  publication-title: International Journal of Electronic Commerce
– volume: 15
  start-page: 125
  issue: 2
  year: 1991
  ident: 22
  article-title: Face, voice, and body in detecting deceit
  publication-title: Journal of Nonverbal Behavior
  doi: 10.1007/BF00998267
– volume: 19
  start-page: 26
  issue: 1
  year: 2008
  ident: 73
  article-title: Using self-regulatory learning to enhance e-learning-based information technology training
  publication-title: Information Systems Research
  doi: 10.1287/isre.1070.0141
– volume: 58
  start-page: 710
  issue: 5
  year: 2007
  ident: 85
  article-title: Predicting user concerns about online privacy
  publication-title: Journal of the American Society for Information Science & Technology
  doi: 10.1002/asi.20530
– ident: 24
– volume: 10
  start-page: 7
  issue: 2
  year: 2005-6
  ident: 20
  article-title: Internet privacy concerns and social awareness as determinants of intention to transact
  publication-title: International Journal of Electronic Commerce
  doi: 10.2753/JEC1086-4415100201
– volume: 17
  start-page: 9
  issue: 1
  year: 1992
  ident: 75
  article-title: Reconceptualizing the determinants of risk behavior
  publication-title: Academy of Management Review
  doi: 10.5465/amr.1992.4279564
– volume: 32
  start-page: 97
  issue: 1
  year: 2008
  ident: 44
  article-title: Understanding digital inequality: Comparing continued use behavioral models of the socio-economically advantaged and disadvantaged
  publication-title: MIS Quarterly
  doi: 10.2307/25148830
– ident: 67
– start-page: 1
  year: 1999
  ident: 32
  article-title: Group support systems and deceptive communications
– volume: 26
  start-page: 119
  issue: 2
  year: 2002
  ident: 4
  article-title: Inducing sensitivity to deception in order to improve decision making performance: A field study
  publication-title: MIS Quarterly
  doi: 10.2307/4132323
– volume: 69
  start-page: 144
  issue: 2
  year: 2002
  ident: 69
  article-title: How people really detect lies
  publication-title: Communication Monographs
  doi: 10.1080/714041710
– volume: 18
  start-page: 39
  issue: 1
  year: 1981
  ident: 26
  article-title: Evaluating structural equations models with unobservable variables and measurement error
  publication-title: Journal of Marketing Research
  doi: 10.1177/002224378101800104
– volume: 43
  start-page: 123
  issue: 2
  year: 1997
  ident: 82
  article-title: Perceived risk attitudes: Relating risk perception to risky choice
  publication-title: Management Science
  doi: 10.1287/mnsc.43.2.123
– volume: 23
  start-page: 473
  issue: 3
  year: 1998
  ident: 62
  article-title: Initial trust formation in new organizational relationships
  publication-title: Academy of Management Review
  doi: 10.5465/amr.1998.926622
– volume: 20
  start-page: 263
  issue: 1
  year: 2003
  ident: 16
  article-title: Exploring the core concepts of media richness theory: The impact of cue multiplicity and feedback immediacy on decision quality
  publication-title: Journal of Management Information Systems
  doi: 10.1080/07421222.2003.11045754
– volume: 104
  start-page: 1439
  issue: 1
  year: 1999
  ident: 40
  article-title: Where do interorganizational networks come from?
  publication-title: American Journal of Sociology
  doi: 10.1086/210179
– volume: 8
  start-page: 153
  issue: 2
  year: 1991
  ident: 45
  article-title: Students as surrogates for managers in a decision-making environment: An experimental study
  publication-title: Journal of Management Information Systems
  doi: 10.1080/07421222.1991.11517925
– volume: 4
  start-page: 1
  issue: 7
  year: 2000
  ident: 31
  article-title: Structural equation modeling and regression: Guidelines for research practice
  publication-title: Communications of the AIS
– volume: 6
  start-page: 35
  issue: 2
  year: 2001-2
  ident: 58
  article-title: What trust means in e-commerce customer relationships: An interdisciplinary conceptual typology
  publication-title: International Journal of Electronic Commerce
  doi: 10.1080/10864415.2001.11044235
– ident: 29
– ident: 34
  doi: 10.1016/S1353-4858(05)70285-3
– volume: 30
  start-page: 395
  issue: 4
  year: 2000
  ident: 36
  article-title: Perils of Internet fraud: An empirical investigation of deception and trust with experienced Internet consumers
  publication-title: IEEE Transactions on System, Man, and Cybernetics
  doi: 10.1109/3468.852434
– volume: 61
  start-page: 303
  issue: 4
  year: 1994
  ident: 9
  article-title: Interpersonal deception: V. Accuracy in deception detection
  publication-title: Communication Monographs
  doi: 10.1080/03637759409376340
– volume: 42
  start-page: 80
  issue: 4
  year: 1999
  ident: 43
  article-title: Building consumer trust online
  publication-title: Communications of the ACM
  doi: 10.1145/299157.299175
– volume: 48
  start-page: 147
  issue: 2
  year: 2005
  ident: 86
  article-title: An empirical investigation of deception behavior in instant messaging
  publication-title: IEEE Transactions on Professional Communication
  doi: 10.1109/TPC.2005.849652
– volume: 6
  start-page: 118
  issue: 2
  year: 1995
  ident: 14
  article-title: Application of social cognitive theory to training for computer skills
  publication-title: Information Systems Research
  doi: 10.1287/isre.6.2.118
– volume: 32
  start-page: 575
  issue: 3
  year: 2008
  ident: 17
  article-title: Media, tasks, and communication processes: A theory of media synchronicity
  publication-title: MIS Quarterly
  doi: 10.2307/25148857
– volume: 29
  start-page: 427
  issue: 3
  year: 2005
  ident: 1
  article-title: Moving beyond intentions and toward the theory of trying: Effects of work environment and gender on post-adoption information technology use
  publication-title: MIS Quarterly
  doi: 10.2307/25148691
– volume: 6
  start-page: 203
  issue: 3
  year: 1996
  ident: 7
  article-title: Interpersonal deception theory
  publication-title: Communication Theory
  doi: 10.1111/j.1468-2885.1996.tb00127.x
– volume: 20
  start-page: 709
  issue: 3
  year: 1995
  ident: 57
  article-title: An integrative model of organizational trust
  publication-title: Academy of Management Review
  doi: 10.5465/amr.1995.9508080335
– volume: 129
  start-page: 74
  issue: 1
  year: 2003
  ident: 18
  article-title: Cues to deception
  publication-title: Psychological Bulletin
  doi: 10.1037/0033-2909.129.1.74
– volume: 1
  start-page: 255
  issue: 2
  year: 1990
  ident: 79
  article-title: Effective IS security: An empirical study
  publication-title: Information Systems Research
  doi: 10.1287/isre.1.3.255
SSID ssj0001929
Score 2.4261863
Snippet Phishing has been a major problem for information systems managers and users for several years now. In 2008, it was estimated that phishing resulted in close...
SourceID proquest
econis
crossref
jstor
informaworld
SourceType Aggregation Database
Index Database
Enrichment Source
Publisher
StartPage 273
SubjectTerms computer-mediated deception
Cybercrime
Cybersecurity
Datensicherheit
E-Mail
electronic mail fraud
Electronic mail systems
Email
Empirical research
Information and communication technologies
Information storage and retrieval systems
Information systems
Information technology
Internet
Internet fraud
Internet security
interpersonal deception theory
IT-Kriminalität
Management information systems
Personal information
Phishing
Piracy
Research design
Software
Studies
Trust
Verhalten
Title The Influence of Experiential and Dispositional Factors in Phishing: An Empirical Investigation of the Deceived
URI https://www.tandfonline.com/doi/abs/10.2753/MIS0742-1222270111
https://www.jstor.org/stable/25699619
http://www.econis.eu/PPNSET?PPN=635395622
https://www.proquest.com/docview/1366127227
https://www.proquest.com/docview/759520750
Volume 27
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1Nb5tAEF1ZSQ_tIepXFNK02kNvFi7sLmB6sxonOJVzcImUXorYBSSkBls1vvTXd_aDDdRN1PZiW3wMkt9j9u2wvEHoPYUxuCBe7sLoHLigb2M3rsTUFYyxIo4IDHqyoL-8DpMbdnUb3I5G33qrlnYtn4iff3yv5H9QhW2Aq3xL9h-QtUFhA_wGfOETEIbPv8Z40XUZUWsEjXFxWxsLgPPaLsuCLRemuU7dyEKKKj6ZwuD8blNrs5Ce8YaWklKZnpeihLQ4aOrZk7J3dg3N2BixqpO3PTd0mfdXi8skVZh-nV2P04kFe7aap2rH566zgKlDyEfoUb8OsZyM5xPlMr0pezkMZt6uT8gg4WozgAGxTPbUXU3MQEyV-cFejieRatSxXHyxwUnkdSl76J0Neg7mc9IV9pDANALy4GG6ukoSO1aDvo21UauOpF-rkpf4sH-BgXR5IusV9fY3h9tuVeveyK7kSvocHRlw8EyT5gUalc1L9KznPvkKrYE-2NIHryvcpw8G-uABfbChD64b3NHnI5412JIHD8gjIwJ5cEee1-jmYp5-SlzTfwPuVDpt3Qomm3lF_VwEoFqnAYsKLxBBzENfxD4o18qf8iKCIYpUjEgzS0qKnFd5GJYe44Ieo4Nm3ZQnCIeeIGHFeA7fjFOSQ0zZhZNzllPGQwf53V-bCWNOL3ukfM9gkirhyAwc2T0cDhrbczbamuXRo080YvZYkNo0BvlPHBT2McxaVSurdGObjD4W81ihbUN2fHPQWQd_ZvLFNvMpaGESwbkOwnY3ZHP5iC5vyvVum0VBHBCp4k8fCv0GPb2_-87QQftjV74FXdzyd4bcvwBIe7FA
linkProvider Taylor & Francis
linkToHtml http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwpV1Lb9QwEB7BFolyKM-qgQI-cEMpGz-SmFvVdpUt3QrBVurNxE4sVm2Tqpu98OsZx0lYiugBTpESexI745lvnMk3AO8Y-uCCjvMQvbMIEd_KUFqThoZzXsiEotNzG_qz0zg748fn4ryrc7rs0ipdDG09UURrq93idpvRbd4ywusPs-lXF9KFEXV_crpq6fdhQ0jO0hFszL8cZ9lgjBHASM_E6Zv7_2b-IuU33_TABaSL5S0K0z5t8Q_T3fqjyWP41o_Ep6Fc7K0avWd-3CJ5_I-hPoGtDquSfa9cT-FeWT2DR2sMhs-hRjUj077QCakt6bmT0XJcErwvOVwMmWF4ZuLr-5BFRT5_9_tfH8l-RY6urhctWwlZY_6oKycRISo5LE2Jdrl4AWeTo_lBFnY1HPBts7QJLQYsuWVRbgQin1TwpBgLI6SOIyMjRD82SnWRoJmjllNHiMhokWubx3E55tqwbRhVdVXuAInHhsaW6xyPXDOao0xXyVFrnjOu4wCi_u0p0xGcuzoblwoDHTeZqptM9WsyA3g_9Ln29B53tt7xSjG0RbjGMMKkNIB4XU1U0-63WF8cRbG7ZG63CjWIRAyKMWgkA9jtNUx1dmWpIoZ4iibYNwAyXEaL4D7z5FVZr5YqEVJQhwRf_uszvYWH2Xx2ok6mp59ewaZPmHAZyrswam5W5WvEYY1-0621n_cVJHo
linkToPdf http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1NT9wwEB3RpargQL9ABCj1obcqdGM7zoYbYlnt0oJQCxI3y3ZidVVIVmz2wq9nHCfpQlUOnCIl9iR2xjNvnMkbgC8MfXBG-ypE7xyHiG_TMLVmEBrOeZYmFJ2e29A_OxfjK356HV83G27zJq3SxdDWE0XUttot7llm67RlRNffzia_XEQXRtT9yOmKpb-CVeG48HqwevnzdDzubDHil9QTcfrm_reZ_0h55Jpeu3h0On_CYNpmLf5juWt3NHoLsh2Iz0L5c7Co9IG5f8Lx-PKRvoONBqmSI69a72ElLz7A-hJ_4UcoUcnIpC1zQkpLWuZktBs3BG9LhtMuLwzPjHx1HzItyMVvv_t1SI4KcnI7m9ZcJWSJ96MsnEQEqGSYmxytcrYJV6OTy-Nx2FRwwHfNBlVoMVxRlkXKxIh7BjFPsn5s4lSLyKQRYh8bDXSWoJGjllNHh8hoprRVQuR9rg3bgl5RFvk2ENE3VFiuFR65ZlShTFfHUWuuGNcigKh9edI09OauysaNxDDHTaZsJlP-ncwAvnZ9Zp7c49nW214nurYI1hjGl5QGIJa1RFb1bov1pVEke07mVq1PnUhEoBiBRmkAe62CycaqzGXEEE3RBPsGQLrLaA_cRx5V5OViLpM4janDgTsvfabP8OZiOJI_Juffd2HNZ0u49OQ96FV3i_wTgrBK7zcr7QE3NSMe
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=The+Influence+of+Experiential+and+Dispositional+Factors+in+Phishing%3A+An+Empirical+Investigation+of+the+Deceived&rft.jtitle=Journal+of+management+information+systems&rft.au=WRIGHT%2C+RYAN+T.&rft.au=MARETT%2C+KENT&rft.date=2010-07-01&rft.pub=M.+E.+Sharpe&rft.issn=0742-1222&rft.volume=27&rft.issue=1&rft.spage=273&rft.epage=303&rft_id=info:doi/10.2753%2FMIS0742-1222270111&rft.externalDocID=25699619
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=0742-1222&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=0742-1222&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=0742-1222&client=summon