Unmasking persuasion in phishing: a content analysis of principles of persuasion in emails and subject lines

Saved in:
Bibliographic Details
Published inInformation and computer security
Main Authors Khadka, Kalam, Ullah, Abu Barkat, Martinez Marroquin, Elisa
Format Journal Article
LanguageEnglish
Published 22.08.2025
Online AccessGet full text

Cover

Loading…
Author Khadka, Kalam
Ullah, Abu Barkat
Martinez Marroquin, Elisa
Author_xml – sequence: 1
  givenname: Kalam
  surname: Khadka
  fullname: Khadka, Kalam
– sequence: 2
  givenname: Abu Barkat
  surname: Ullah
  fullname: Ullah, Abu Barkat
– sequence: 3
  givenname: Elisa
  surname: Martinez Marroquin
  fullname: Martinez Marroquin, Elisa
BookMark eNpVkE9LAzEQxYNUsNbePeYLrM4km2zWmxT_FAoerOAtZLNZm7rNLjvtod_eLRXB08w83jwev2s2SV0KjN0i3CGCuV8u3jMUmQCRZyAFXrCpAKWzvCw-J3-7xis2J9oCAJaopcYpaz_SztF3TF-8DwMdHMUu8Zh4v4m0GeUH7rjv0j6kPXfJtUeKxLuG90NMPvZtOF__fsPOxZZGe83pUG2D3_M2pkA37LJxLYX575yx9fPTevGard5elovHVeaNxAxrB5VGFHUZtM99ANX42qkSlBCFrCXUDRZaoXS5qsrC6EI6b4IrTGWUUXLG4Bzrh45oCI0dy-7ccLQI9sTLjrwsCnviZU-85A-DgGEE
Cites_doi 10.1016/j.ijhcs.2018.12.004
10.1109/STAST.2015.10
10.31234/osf.io/uxeth
10.1016/j.ijhcs.2019.02.007
10.1145/3450614.3464472
10.1108/OIR-03-2012-0037
10.4236/jss.2013.13004
10.1007/978-3-319-20376-8_4
10.1177/21582440211031879
10.1109/ITNEC48623.2020.9084766
10.1108/ICS-02-2021-0021
10.1109/ISSA.2014.6950510
10.1108/OIR-04-2015-0106
10.1016/j.cose.2017.04.006
10.5815/ijem.2021.04.01
10.32604/csse.2022.019938
10.1177/1541931213601175
10.1108/09685220910944768
10.1080/10439463.2014.942848
10.1007/978-3-030-52581-1_7
10.1007/978-3-030-29381-9_35
10.1177/1541931213601815
10.1080/0144929X.2018.1519599
10.1016/j.chb.2017.03.002
10.1016/j.cose.2020.101862
10.22541/au.170534654.48067877/v1
10.1002/asi.20779
10.1016/j.dss.2011.03.002
10.1108/ITP-12-2017-0434
10.1109/access.2022.3151903
10.1145/1897852.1897872
10.48550/arxiv.2107.10655
10.21833/ijaas.2024.04.016
10.37074/jalt.2023.6.2.17
10.1007/978-3-031-38530-8_26
10.1109/TrustCom60117.2023.00222
10.1007/978-3-319-96077-7_42
ContentType Journal Article
DBID AAYXX
CITATION
DOI 10.1108/ICS-12-2024-0321
DatabaseName CrossRef
DatabaseTitle CrossRef
DeliveryMethod fulltext_linktorsrc
Discipline Computer Science
EISSN 2056-497X
ExternalDocumentID 10_1108_ICS_12_2024_0321
GroupedDBID .WU
3FY
5VS
7WY
9F-
AAGBP
AAKOT
AAMCF
AAUDR
AAXBI
AAYXX
ABIJV
ABJNI
ABSDC
ABYQI
ACGFS
ACTSA
ACZKX
ADBBV
ADOMW
ADQHX
ADWNT
AFNTC
AGTVX
AHMHQ
AJEBP
ALMA_UNASSIGNED_HOLDINGS
ALSLI
AODMV
ARAPS
AUCOK
BENPR
CITATION
EBS
ECCUG
FNNZZ
GEA
GEI
GMX
GQ.
H13
HCIFZ
K6~
KBGRL
M0O
M1O
PQBIZ
SLOBJ
TEM
TGG
TMF
TMI
TMT
Z11
Z12
Z21
ZYZAG
ID FETCH-LOGICAL-c831-1da0b6112d9e6c4ce05fcda59052273d30df176513a45b978673ac8ea78b85853
IEDL.DBID GEI
ISSN 2056-4961
IngestDate Wed Aug 27 16:30:08 EDT 2025
IsDoiOpenAccess false
IsOpenAccess true
IsPeerReviewed true
IsScholarly true
Language English
License https://creativecommons.org/licences/by/4.0
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c831-1da0b6112d9e6c4ce05fcda59052273d30df176513a45b978673ac8ea78b85853
OpenAccessLink https://www.emerald.com/ics/article-pdf/doi/10.1108/ICS-12-2024-0321/10079554/ics-12-2024-0321en.pdf
ParticipantIDs crossref_primary_10_1108_ICS_12_2024_0321
PublicationCentury 2000
PublicationDate 2025-08-22
PublicationDateYYYYMMDD 2025-08-22
PublicationDate_xml – month: 08
  year: 2025
  text: 2025-08-22
  day: 22
PublicationDecade 2020
PublicationTitle Information and computer security
PublicationYear 2025
References APWG (2025082110165949500_ref008) 2024
2025082110165949500_ref012
Goodman-Delahunty (2025082110165949500_ref019) 2016; 26
Ferreira (2025082110165949500_ref016) 2019; 125
Ahmad (2025082110165949500_ref003) 2023
Stajano (2025082110165949500_ref038) 2011; 54
Atkins (2025082110165949500_ref009) 2013; 1
Jones (2025082110165949500_ref023) 2020
Shi (2025082110165949500_ref037) 2021
Akbar (2025082110165949500_ref004) 2014
Lawson (2025082110165949500_ref029) 2017
Taib (2025082110165949500_ref039) 2019
Limna (2025082110165949500_ref031) 2023; 6
Khadka (2025082110165949500_ref025) 2023
Harrison (2025082110165949500_ref021) 2016; 40
Zielinska (2025082110165949500_ref045) 2016
Sharma (2025082110165949500_ref036) 2020
Ojugo (2025082110165949500_ref034) 2021; 11
Parsons (2025082110165949500_ref035) 2019; 128
Lawson (2025082110165949500_ref028) 2019
Bakhshi (2025082110165949500_ref010) 2009; 17
Bayl-Smith (2025082110165949500_ref011) 2021; 30
Kalio (2025082110165949500_ref024) 2022
Williams (2025082110165949500_ref043) 2017; 72
Akdemir (2025082110165949500_ref005) 2021; 11
Alsharif (2025082110165949500_ref007) 2022; 40
Aleroud (2025082110165949500_ref006) 2017; 68
Cialdini (2025082110165949500_ref013) 2007
Li (2025082110165949500_ref030) 2020
Gragg (2025082110165949500_ref020) 2003; 13
Kim (2025082110165949500_ref027) 2013; 37
Abroshan (2025082110165949500_ref001) 2021
Ferreira (2025082110165949500_ref015) 2015
Naz (2025082110165949500_ref033) 2024; 11
Jakobsson (2025082110165949500_ref022) 2007
Do (2025082110165949500_ref014) 2022; 10
Vishwanath (2025082110165949500_ref041) 2011; 51
Kheruddin (2025082110165949500_ref026) 2024
Frauenstein (2025082110165949500_ref018) 2020; 94
Mouton (2025082110165949500_ref032) 2014
ACCC (2025082110165949500_ref002) 2024
Ferreira (2025082110165949500_ref017) 2015
Williams (2025082110165949500_ref042) 2019; 38
Workman (2025082110165949500_ref044) 2008; 59
Tambe Ebot (2025082110165949500_ref040) 2019; 32
References_xml – volume: 125
  start-page: 19
  year: 2019
  ident: 2025082110165949500_ref016
  article-title: Persuasion: how phishing emails can influence users and bypass security measures [article]
  publication-title: International Journal of Human Computer Studies
  doi: 10.1016/j.ijhcs.2018.12.004
– year: 2024
  ident: 2025082110165949500_ref008
  article-title: Unifying the global response to cybercrime (phishing activity trends report 2nd quarter 2024
– year: 2015
  ident: 2025082110165949500_ref015
  article-title: An analysis of social engineering principles in effective phishing
  doi: 10.1109/STAST.2015.10
– year: 2022
  ident: 2025082110165949500_ref024
  article-title: Phishing attack: raising awareness and protection techniques
  doi: 10.31234/osf.io/uxeth
– volume: 128
  start-page: 17
  year: 2019
  ident: 2025082110165949500_ref035
  article-title: Predicting susceptibility to social influence in phishing emails [article]
  publication-title: International Journal of Human-Computer Studies
  doi: 10.1016/j.ijhcs.2019.02.007
– start-page: 345
  year: 2021
  ident: 2025082110165949500_ref001
  article-title: A phishing mitigation solution using human behaviour and emotions that influence the success of phishing attacks
  doi: 10.1145/3450614.3464472
– volume: 37
  start-page: 835
  issue: 6
  year: 2013
  ident: 2025082110165949500_ref027
  article-title: Understanding persuasive elements in phishing e-mails
  publication-title: Online Information Review
  doi: 10.1108/OIR-03-2012-0037
– volume: 1
  start-page: 23
  issue: 3
  year: 2013
  ident: 2025082110165949500_ref009
  article-title: A study of social engineering in online frauds
  publication-title: Open Journal of Social Sciences
  doi: 10.4236/jss.2013.13004
– start-page: 36
  volume-title: Principles of Persuasion in Social Engineering and Their Use in Phishing
  year: 2015
  ident: 2025082110165949500_ref017
  doi: 10.1007/978-3-319-20376-8_4
– volume: 13
  start-page: 1
  year: 2003
  ident: 2025082110165949500_ref020
  article-title: A multi-level defense against social engineering
  publication-title: SANS Reading Room
– volume: 11
  start-page: 21582440211031879
  issue: 3
  year: 2021
  ident: 2025082110165949500_ref005
  article-title: How phishers exploit the coronavirus pandemic: a content analysis of covid-19 themed phishing emails
  publication-title: Sage Open
  doi: 10.1177/21582440211031879
– volume-title: Proceedings of 2020 IEEE 4th Information Technology, Networking, Electronic and Automation Control Conference, ITNEC 2020.
  year: 2020
  ident: 2025082110165949500_ref030
  article-title: Detection method of phishing email based on persuasion principle
  doi: 10.1109/ITNEC48623.2020.9084766
– volume-title: Influence: The Psychology of Persuasion
  year: 2007
  ident: 2025082110165949500_ref013
– volume: 30
  issue: 1
  year: 2021
  ident: 2025082110165949500_ref011
  article-title: Response to a phishing attack: persuasion and protection motivation in an organizational context
  publication-title: Information and Computer Security
  doi: 10.1108/ICS-02-2021-0021
– volume-title: 2014 Information Security for South Africa.
  year: 2014
  ident: 2025082110165949500_ref032
  article-title: Social engineering attack framework
  doi: 10.1109/ISSA.2014.6950510
– volume: 40
  start-page: 265
  issue: 2
  year: 2016
  ident: 2025082110165949500_ref021
  article-title: Individual processing of phishing emails
  publication-title: Online Information Review
  doi: 10.1108/OIR-04-2015-0106
– volume: 68
  start-page: 160
  year: 2017
  ident: 2025082110165949500_ref006
  article-title: Phishing environments, techniques, and countermeasures: a survey
  publication-title: Computers and Security
  doi: 10.1016/j.cose.2017.04.006
– volume-title: Phishing and Countermeasures: understanding the Increasing Problem of Electronic Identity Theft
  year: 2007
  ident: 2025082110165949500_ref022
– volume: 11
  start-page: 1
  issue: 4
  year: 2021
  ident: 2025082110165949500_ref034
  article-title: Tree-Classification algorithm to ease user detection of predatory hijacked journals: empirical analysis of journal metrics rankings
  publication-title: International Journal of Engineering and Manufacturing
  doi: 10.5815/ijem.2021.04.01
– volume: 40
  start-page: 1153
  issue: 3
  year: 2022
  ident: 2025082110165949500_ref007
  article-title: Impact of human vulnerabilities on cybersecurity
  publication-title: Computer Systems Science and Engineering
  doi: 10.32604/csse.2022.019938
– ident: 2025082110165949500_ref012
– year: 2016
  ident: 2025082110165949500_ref045
  article-title: A temporal analysis of persuasion principles in phishing emails
  doi: 10.1177/1541931213601175
– volume: 17
  start-page: 53
  issue: 1
  year: 2009
  ident: 2025082110165949500_ref010
  article-title: Social engineering: assessing vulnerabilities in practice
  publication-title: Information Management and Computer Security
  doi: 10.1108/09685220910944768
– volume: 26
  start-page: 270
  issue: 3
  year: 2016
  ident: 2025082110165949500_ref019
  article-title: Social persuasion to develop rapport in high-stakes interviews: qualitative analyses of Asian-Pacific practices
  publication-title: Policing and Society
  doi: 10.1080/10439463.2014.942848
– volume-title: Advances in Human Factors in Cybersecurity: AHFE 2020 Virtual Conference on Human Factors in Cybersecurity, July 16–20, 2020, USA.
  year: 2020
  ident: 2025082110165949500_ref036
  article-title: An analysis of phishing emails and how the human vulnerabilities are exploited
  doi: 10.1007/978-3-030-52581-1_7
– year: 2019
  ident: 2025082110165949500_ref039
  article-title: Social engineering and organisational dependencies in phishing attacks
  doi: 10.1007/978-3-030-29381-9_35
– start-page: 1331
  year: 2017
  ident: 2025082110165949500_ref029
  article-title: Interaction of personality and persuasion tactics in email phishing attacks
  doi: 10.1177/1541931213601815
– volume: 38
  start-page: 184
  issue: 2
  year: 2019
  ident: 2025082110165949500_ref042
  article-title: How persuasive is phishing email? The role of authentic design, influence and current events in email judgements
  publication-title: Behaviour and Information Technology
  doi: 10.1080/0144929X.2018.1519599
– volume: 72
  start-page: 412
  year: 2017
  ident: 2025082110165949500_ref043
  article-title: Individual differences in susceptibility to online influence: a theoretical review
  publication-title: Computers in Human Behavior
  doi: 10.1016/j.chb.2017.03.002
– volume: 94
  start-page: 101862
  year: 2020
  ident: 2025082110165949500_ref018
  article-title: Susceptibility to phishing on social network sites: a personality information processing model
  publication-title: Computers and Security
  doi: 10.1016/j.cose.2020.101862
– year: 2024
  ident: 2025082110165949500_ref026
  article-title: Phishing attacks: unraveling tactics, threats, and defenses in the cybersecurity landscape
  doi: 10.22541/au.170534654.48067877/v1
– volume: 59
  start-page: 662
  issue: 4
  year: 2008
  ident: 2025082110165949500_ref044
  article-title: Wisecrackers: a theory-grounded investigation of phishing and pretext social engineering threats to information security
  publication-title: Journal of the American Society for Information Science and Technology
  doi: 10.1002/asi.20779
– volume: 51
  start-page: 576
  issue: 3
  year: 2011
  ident: 2025082110165949500_ref041
  article-title: Why do people get phished? Testing individual differences in phishing vulnerability within an integrated, information processing model
  publication-title: Decision Support Systems
  doi: 10.1016/j.dss.2011.03.002
– volume: 32
  start-page: 828
  issue: 4
  year: 2019
  ident: 2025082110165949500_ref040
  article-title: How stage theorizing can improve recommendations against phishing attacks
  publication-title: Information Technology and People
  doi: 10.1108/ITP-12-2017-0434
– volume: 10
  start-page: 36429
  year: 2022
  ident: 2025082110165949500_ref014
  article-title: Deep learning for phishing detection: taxonomy, current challenges and future directions
  publication-title: IEEE Access
  doi: 10.1109/access.2022.3151903
– volume: 54
  start-page: 70
  issue: 3
  year: 2011
  ident: 2025082110165949500_ref038
  article-title: Understanding scam victims: seven principles for systems security
  publication-title: Communications of the ACM
  doi: 10.1145/1897852.1897872
– volume-title: Analysing Persuasion Principles in Phishing Emails
  year: 2014
  ident: 2025082110165949500_ref004
– year: 2021
  ident: 2025082110165949500_ref037
  article-title: Lumen: a machine learning framework to expose influence cues in text
  doi: 10.48550/arxiv.2107.10655
– year: 2020
  ident: 2025082110165949500_ref023
  article-title: How social engineers use persuasion principles during vishing attacks
  publication-title: Information and Computer Security.
– volume: 11
  start-page: 139
  issue: 4
  year: 2024
  ident: 2025082110165949500_ref033
  article-title: A comprehensive survey on social engineering-based attacks on social networks
  publication-title: International Journal of Advanced and Applied Sciences
  doi: 10.21833/ijaas.2024.04.016
– volume: 6
  issue: 2
  year: 2023
  ident: 2025082110165949500_ref031
  article-title: The impact of NVivo in qualitative research: perspectives from graduate students
  publication-title: Journal of Applied Learning and Teaching
  doi: 10.37074/jalt.2023.6.2.17
– year: 2024
  ident: 2025082110165949500_ref002
  article-title: Scam statistics
– year: 2023
  ident: 2025082110165949500_ref003
  article-title: Content analysis of persuasion principles in mobile instant message phishing
  doi: 10.1007/978-3-031-38530-8_26
– volume-title: 2023 IEEE 22nd International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom).
  year: 2023
  ident: 2025082110165949500_ref025
  article-title: A survey on the principles of persuasion as a social engineering strategy in phishing
  doi: 10.1109/TrustCom60117.2023.00222
– year: 2019
  ident: 2025082110165949500_ref028
  article-title: Baiting the hook: exploring the interaction of personality and persuasion tactics in email phishing attacks
  publication-title: Advances in Intelligent Systems and Computing.
  doi: 10.1007/978-3-319-96077-7_42
SSID ssj0001916361
Score 2.3793423
SourceID crossref
SourceType Index Database
Title Unmasking persuasion in phishing: a content analysis of principles of persuasion in emails and subject lines
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwrV07T8MwELYKLCy8EW95YGEw9St2wlZVQEGiCyBBl8iObbWiTSvSLvx67DxQQSxIbInkOMn5dPfd5_MdAOfCYZo4JZDQiUbcRgb5C4IoNyE912ipAt_x0Be9Z37_Er20QL85C1OmVVZ0TGmnR3kRgtR2SNz2Vvir4EDoXnPXfQyJBT585wgzStqBsW4P55Pxitf0SDZHfxvGxSMhVhZQpd7rI54I0uxb_jLZkp9acjg3m2DafGqVZ_J2uZjry-zjRxXH__uXLbBRY1PYqZRpG7RsvgM2m74PsDYDu2D8nE9UETh2OPPocaEC4wZHOZwNK0brCipYvx6quuoJnDo4a5j96u7bs3aiRuPCDzewWOjADsGAgIs98HRz_dTtobprA8piRhAxCmvhUZxJrMh4ZnHkMqOiBHukJ5lh2DgiRUSY4pH2MayQTGWxVTLWYY-S7YPVfJrbAwATH-wx7pRkWvMoEcpJR23MneDSEIoPwUWzROmsqs2RljENjlMvz5TQNMgzDfI8-sPYY7BOQ5df7G0IPQGr8_eFPfXQY67PSo06A2uD10Hn9hM-ktbm
linkProvider Emerald
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Unmasking+persuasion+in+phishing%3A+a+content+analysis+of+principles+of+persuasion+in+emails+and+subject+lines&rft.jtitle=Information+and+computer+security&rft.au=Khadka%2C+Kalam&rft.au=Ullah%2C+Abu+Barkat&rft.au=Martinez+Marroquin%2C+Elisa&rft.date=2025-08-22&rft.issn=2056-4961&rft.eissn=2056-497X&rft_id=info:doi/10.1108%2FICS-12-2024-0321&rft.externalDBID=n%2Fa&rft.externalDocID=10_1108_ICS_12_2024_0321
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=2056-4961&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=2056-4961&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=2056-4961&client=summon