Unmasking persuasion in phishing: a content analysis of principles of persuasion in emails and subject lines
Saved in:
Published in | Information and computer security |
---|---|
Main Authors | , , |
Format | Journal Article |
Language | English |
Published |
22.08.2025
|
Online Access | Get full text |
Cover
Loading…
Author | Khadka, Kalam Ullah, Abu Barkat Martinez Marroquin, Elisa |
---|---|
Author_xml | – sequence: 1 givenname: Kalam surname: Khadka fullname: Khadka, Kalam – sequence: 2 givenname: Abu Barkat surname: Ullah fullname: Ullah, Abu Barkat – sequence: 3 givenname: Elisa surname: Martinez Marroquin fullname: Martinez Marroquin, Elisa |
BookMark | eNpVkE9LAzEQxYNUsNbePeYLrM4km2zWmxT_FAoerOAtZLNZm7rNLjvtod_eLRXB08w83jwev2s2SV0KjN0i3CGCuV8u3jMUmQCRZyAFXrCpAKWzvCw-J3-7xis2J9oCAJaopcYpaz_SztF3TF-8DwMdHMUu8Zh4v4m0GeUH7rjv0j6kPXfJtUeKxLuG90NMPvZtOF__fsPOxZZGe83pUG2D3_M2pkA37LJxLYX575yx9fPTevGard5elovHVeaNxAxrB5VGFHUZtM99ANX42qkSlBCFrCXUDRZaoXS5qsrC6EI6b4IrTGWUUXLG4Bzrh45oCI0dy-7ccLQI9sTLjrwsCnviZU-85A-DgGEE |
Cites_doi | 10.1016/j.ijhcs.2018.12.004 10.1109/STAST.2015.10 10.31234/osf.io/uxeth 10.1016/j.ijhcs.2019.02.007 10.1145/3450614.3464472 10.1108/OIR-03-2012-0037 10.4236/jss.2013.13004 10.1007/978-3-319-20376-8_4 10.1177/21582440211031879 10.1109/ITNEC48623.2020.9084766 10.1108/ICS-02-2021-0021 10.1109/ISSA.2014.6950510 10.1108/OIR-04-2015-0106 10.1016/j.cose.2017.04.006 10.5815/ijem.2021.04.01 10.32604/csse.2022.019938 10.1177/1541931213601175 10.1108/09685220910944768 10.1080/10439463.2014.942848 10.1007/978-3-030-52581-1_7 10.1007/978-3-030-29381-9_35 10.1177/1541931213601815 10.1080/0144929X.2018.1519599 10.1016/j.chb.2017.03.002 10.1016/j.cose.2020.101862 10.22541/au.170534654.48067877/v1 10.1002/asi.20779 10.1016/j.dss.2011.03.002 10.1108/ITP-12-2017-0434 10.1109/access.2022.3151903 10.1145/1897852.1897872 10.48550/arxiv.2107.10655 10.21833/ijaas.2024.04.016 10.37074/jalt.2023.6.2.17 10.1007/978-3-031-38530-8_26 10.1109/TrustCom60117.2023.00222 10.1007/978-3-319-96077-7_42 |
ContentType | Journal Article |
DBID | AAYXX CITATION |
DOI | 10.1108/ICS-12-2024-0321 |
DatabaseName | CrossRef |
DatabaseTitle | CrossRef |
DeliveryMethod | fulltext_linktorsrc |
Discipline | Computer Science |
EISSN | 2056-497X |
ExternalDocumentID | 10_1108_ICS_12_2024_0321 |
GroupedDBID | .WU 3FY 5VS 7WY 9F- AAGBP AAKOT AAMCF AAUDR AAXBI AAYXX ABIJV ABJNI ABSDC ABYQI ACGFS ACTSA ACZKX ADBBV ADOMW ADQHX ADWNT AFNTC AGTVX AHMHQ AJEBP ALMA_UNASSIGNED_HOLDINGS ALSLI AODMV ARAPS AUCOK BENPR CITATION EBS ECCUG FNNZZ GEA GEI GMX GQ. H13 HCIFZ K6~ KBGRL M0O M1O PQBIZ SLOBJ TEM TGG TMF TMI TMT Z11 Z12 Z21 ZYZAG |
ID | FETCH-LOGICAL-c831-1da0b6112d9e6c4ce05fcda59052273d30df176513a45b978673ac8ea78b85853 |
IEDL.DBID | GEI |
ISSN | 2056-4961 |
IngestDate | Wed Aug 27 16:30:08 EDT 2025 |
IsDoiOpenAccess | false |
IsOpenAccess | true |
IsPeerReviewed | true |
IsScholarly | true |
Language | English |
License | https://creativecommons.org/licences/by/4.0 |
LinkModel | DirectLink |
MergedId | FETCHMERGED-LOGICAL-c831-1da0b6112d9e6c4ce05fcda59052273d30df176513a45b978673ac8ea78b85853 |
OpenAccessLink | https://www.emerald.com/ics/article-pdf/doi/10.1108/ICS-12-2024-0321/10079554/ics-12-2024-0321en.pdf |
ParticipantIDs | crossref_primary_10_1108_ICS_12_2024_0321 |
PublicationCentury | 2000 |
PublicationDate | 2025-08-22 |
PublicationDateYYYYMMDD | 2025-08-22 |
PublicationDate_xml | – month: 08 year: 2025 text: 2025-08-22 day: 22 |
PublicationDecade | 2020 |
PublicationTitle | Information and computer security |
PublicationYear | 2025 |
References | APWG (2025082110165949500_ref008) 2024 2025082110165949500_ref012 Goodman-Delahunty (2025082110165949500_ref019) 2016; 26 Ferreira (2025082110165949500_ref016) 2019; 125 Ahmad (2025082110165949500_ref003) 2023 Stajano (2025082110165949500_ref038) 2011; 54 Atkins (2025082110165949500_ref009) 2013; 1 Jones (2025082110165949500_ref023) 2020 Shi (2025082110165949500_ref037) 2021 Akbar (2025082110165949500_ref004) 2014 Lawson (2025082110165949500_ref029) 2017 Taib (2025082110165949500_ref039) 2019 Limna (2025082110165949500_ref031) 2023; 6 Khadka (2025082110165949500_ref025) 2023 Harrison (2025082110165949500_ref021) 2016; 40 Zielinska (2025082110165949500_ref045) 2016 Sharma (2025082110165949500_ref036) 2020 Ojugo (2025082110165949500_ref034) 2021; 11 Parsons (2025082110165949500_ref035) 2019; 128 Lawson (2025082110165949500_ref028) 2019 Bakhshi (2025082110165949500_ref010) 2009; 17 Bayl-Smith (2025082110165949500_ref011) 2021; 30 Kalio (2025082110165949500_ref024) 2022 Williams (2025082110165949500_ref043) 2017; 72 Akdemir (2025082110165949500_ref005) 2021; 11 Alsharif (2025082110165949500_ref007) 2022; 40 Aleroud (2025082110165949500_ref006) 2017; 68 Cialdini (2025082110165949500_ref013) 2007 Li (2025082110165949500_ref030) 2020 Gragg (2025082110165949500_ref020) 2003; 13 Kim (2025082110165949500_ref027) 2013; 37 Abroshan (2025082110165949500_ref001) 2021 Ferreira (2025082110165949500_ref015) 2015 Naz (2025082110165949500_ref033) 2024; 11 Jakobsson (2025082110165949500_ref022) 2007 Do (2025082110165949500_ref014) 2022; 10 Vishwanath (2025082110165949500_ref041) 2011; 51 Kheruddin (2025082110165949500_ref026) 2024 Frauenstein (2025082110165949500_ref018) 2020; 94 Mouton (2025082110165949500_ref032) 2014 ACCC (2025082110165949500_ref002) 2024 Ferreira (2025082110165949500_ref017) 2015 Williams (2025082110165949500_ref042) 2019; 38 Workman (2025082110165949500_ref044) 2008; 59 Tambe Ebot (2025082110165949500_ref040) 2019; 32 |
References_xml | – volume: 125 start-page: 19 year: 2019 ident: 2025082110165949500_ref016 article-title: Persuasion: how phishing emails can influence users and bypass security measures [article] publication-title: International Journal of Human Computer Studies doi: 10.1016/j.ijhcs.2018.12.004 – year: 2024 ident: 2025082110165949500_ref008 article-title: Unifying the global response to cybercrime (phishing activity trends report 2nd quarter 2024 – year: 2015 ident: 2025082110165949500_ref015 article-title: An analysis of social engineering principles in effective phishing doi: 10.1109/STAST.2015.10 – year: 2022 ident: 2025082110165949500_ref024 article-title: Phishing attack: raising awareness and protection techniques doi: 10.31234/osf.io/uxeth – volume: 128 start-page: 17 year: 2019 ident: 2025082110165949500_ref035 article-title: Predicting susceptibility to social influence in phishing emails [article] publication-title: International Journal of Human-Computer Studies doi: 10.1016/j.ijhcs.2019.02.007 – start-page: 345 year: 2021 ident: 2025082110165949500_ref001 article-title: A phishing mitigation solution using human behaviour and emotions that influence the success of phishing attacks doi: 10.1145/3450614.3464472 – volume: 37 start-page: 835 issue: 6 year: 2013 ident: 2025082110165949500_ref027 article-title: Understanding persuasive elements in phishing e-mails publication-title: Online Information Review doi: 10.1108/OIR-03-2012-0037 – volume: 1 start-page: 23 issue: 3 year: 2013 ident: 2025082110165949500_ref009 article-title: A study of social engineering in online frauds publication-title: Open Journal of Social Sciences doi: 10.4236/jss.2013.13004 – start-page: 36 volume-title: Principles of Persuasion in Social Engineering and Their Use in Phishing year: 2015 ident: 2025082110165949500_ref017 doi: 10.1007/978-3-319-20376-8_4 – volume: 13 start-page: 1 year: 2003 ident: 2025082110165949500_ref020 article-title: A multi-level defense against social engineering publication-title: SANS Reading Room – volume: 11 start-page: 21582440211031879 issue: 3 year: 2021 ident: 2025082110165949500_ref005 article-title: How phishers exploit the coronavirus pandemic: a content analysis of covid-19 themed phishing emails publication-title: Sage Open doi: 10.1177/21582440211031879 – volume-title: Proceedings of 2020 IEEE 4th Information Technology, Networking, Electronic and Automation Control Conference, ITNEC 2020. year: 2020 ident: 2025082110165949500_ref030 article-title: Detection method of phishing email based on persuasion principle doi: 10.1109/ITNEC48623.2020.9084766 – volume-title: Influence: The Psychology of Persuasion year: 2007 ident: 2025082110165949500_ref013 – volume: 30 issue: 1 year: 2021 ident: 2025082110165949500_ref011 article-title: Response to a phishing attack: persuasion and protection motivation in an organizational context publication-title: Information and Computer Security doi: 10.1108/ICS-02-2021-0021 – volume-title: 2014 Information Security for South Africa. year: 2014 ident: 2025082110165949500_ref032 article-title: Social engineering attack framework doi: 10.1109/ISSA.2014.6950510 – volume: 40 start-page: 265 issue: 2 year: 2016 ident: 2025082110165949500_ref021 article-title: Individual processing of phishing emails publication-title: Online Information Review doi: 10.1108/OIR-04-2015-0106 – volume: 68 start-page: 160 year: 2017 ident: 2025082110165949500_ref006 article-title: Phishing environments, techniques, and countermeasures: a survey publication-title: Computers and Security doi: 10.1016/j.cose.2017.04.006 – volume-title: Phishing and Countermeasures: understanding the Increasing Problem of Electronic Identity Theft year: 2007 ident: 2025082110165949500_ref022 – volume: 11 start-page: 1 issue: 4 year: 2021 ident: 2025082110165949500_ref034 article-title: Tree-Classification algorithm to ease user detection of predatory hijacked journals: empirical analysis of journal metrics rankings publication-title: International Journal of Engineering and Manufacturing doi: 10.5815/ijem.2021.04.01 – volume: 40 start-page: 1153 issue: 3 year: 2022 ident: 2025082110165949500_ref007 article-title: Impact of human vulnerabilities on cybersecurity publication-title: Computer Systems Science and Engineering doi: 10.32604/csse.2022.019938 – ident: 2025082110165949500_ref012 – year: 2016 ident: 2025082110165949500_ref045 article-title: A temporal analysis of persuasion principles in phishing emails doi: 10.1177/1541931213601175 – volume: 17 start-page: 53 issue: 1 year: 2009 ident: 2025082110165949500_ref010 article-title: Social engineering: assessing vulnerabilities in practice publication-title: Information Management and Computer Security doi: 10.1108/09685220910944768 – volume: 26 start-page: 270 issue: 3 year: 2016 ident: 2025082110165949500_ref019 article-title: Social persuasion to develop rapport in high-stakes interviews: qualitative analyses of Asian-Pacific practices publication-title: Policing and Society doi: 10.1080/10439463.2014.942848 – volume-title: Advances in Human Factors in Cybersecurity: AHFE 2020 Virtual Conference on Human Factors in Cybersecurity, July 16–20, 2020, USA. year: 2020 ident: 2025082110165949500_ref036 article-title: An analysis of phishing emails and how the human vulnerabilities are exploited doi: 10.1007/978-3-030-52581-1_7 – year: 2019 ident: 2025082110165949500_ref039 article-title: Social engineering and organisational dependencies in phishing attacks doi: 10.1007/978-3-030-29381-9_35 – start-page: 1331 year: 2017 ident: 2025082110165949500_ref029 article-title: Interaction of personality and persuasion tactics in email phishing attacks doi: 10.1177/1541931213601815 – volume: 38 start-page: 184 issue: 2 year: 2019 ident: 2025082110165949500_ref042 article-title: How persuasive is phishing email? The role of authentic design, influence and current events in email judgements publication-title: Behaviour and Information Technology doi: 10.1080/0144929X.2018.1519599 – volume: 72 start-page: 412 year: 2017 ident: 2025082110165949500_ref043 article-title: Individual differences in susceptibility to online influence: a theoretical review publication-title: Computers in Human Behavior doi: 10.1016/j.chb.2017.03.002 – volume: 94 start-page: 101862 year: 2020 ident: 2025082110165949500_ref018 article-title: Susceptibility to phishing on social network sites: a personality information processing model publication-title: Computers and Security doi: 10.1016/j.cose.2020.101862 – year: 2024 ident: 2025082110165949500_ref026 article-title: Phishing attacks: unraveling tactics, threats, and defenses in the cybersecurity landscape doi: 10.22541/au.170534654.48067877/v1 – volume: 59 start-page: 662 issue: 4 year: 2008 ident: 2025082110165949500_ref044 article-title: Wisecrackers: a theory-grounded investigation of phishing and pretext social engineering threats to information security publication-title: Journal of the American Society for Information Science and Technology doi: 10.1002/asi.20779 – volume: 51 start-page: 576 issue: 3 year: 2011 ident: 2025082110165949500_ref041 article-title: Why do people get phished? Testing individual differences in phishing vulnerability within an integrated, information processing model publication-title: Decision Support Systems doi: 10.1016/j.dss.2011.03.002 – volume: 32 start-page: 828 issue: 4 year: 2019 ident: 2025082110165949500_ref040 article-title: How stage theorizing can improve recommendations against phishing attacks publication-title: Information Technology and People doi: 10.1108/ITP-12-2017-0434 – volume: 10 start-page: 36429 year: 2022 ident: 2025082110165949500_ref014 article-title: Deep learning for phishing detection: taxonomy, current challenges and future directions publication-title: IEEE Access doi: 10.1109/access.2022.3151903 – volume: 54 start-page: 70 issue: 3 year: 2011 ident: 2025082110165949500_ref038 article-title: Understanding scam victims: seven principles for systems security publication-title: Communications of the ACM doi: 10.1145/1897852.1897872 – volume-title: Analysing Persuasion Principles in Phishing Emails year: 2014 ident: 2025082110165949500_ref004 – year: 2021 ident: 2025082110165949500_ref037 article-title: Lumen: a machine learning framework to expose influence cues in text doi: 10.48550/arxiv.2107.10655 – year: 2020 ident: 2025082110165949500_ref023 article-title: How social engineers use persuasion principles during vishing attacks publication-title: Information and Computer Security. – volume: 11 start-page: 139 issue: 4 year: 2024 ident: 2025082110165949500_ref033 article-title: A comprehensive survey on social engineering-based attacks on social networks publication-title: International Journal of Advanced and Applied Sciences doi: 10.21833/ijaas.2024.04.016 – volume: 6 issue: 2 year: 2023 ident: 2025082110165949500_ref031 article-title: The impact of NVivo in qualitative research: perspectives from graduate students publication-title: Journal of Applied Learning and Teaching doi: 10.37074/jalt.2023.6.2.17 – year: 2024 ident: 2025082110165949500_ref002 article-title: Scam statistics – year: 2023 ident: 2025082110165949500_ref003 article-title: Content analysis of persuasion principles in mobile instant message phishing doi: 10.1007/978-3-031-38530-8_26 – volume-title: 2023 IEEE 22nd International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom). year: 2023 ident: 2025082110165949500_ref025 article-title: A survey on the principles of persuasion as a social engineering strategy in phishing doi: 10.1109/TrustCom60117.2023.00222 – year: 2019 ident: 2025082110165949500_ref028 article-title: Baiting the hook: exploring the interaction of personality and persuasion tactics in email phishing attacks publication-title: Advances in Intelligent Systems and Computing. doi: 10.1007/978-3-319-96077-7_42 |
SSID | ssj0001916361 |
Score | 2.3793423 |
SourceID | crossref |
SourceType | Index Database |
Title | Unmasking persuasion in phishing: a content analysis of principles of persuasion in emails and subject lines |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwrV07T8MwELYKLCy8EW95YGEw9St2wlZVQEGiCyBBl8iObbWiTSvSLvx67DxQQSxIbInkOMn5dPfd5_MdAOfCYZo4JZDQiUbcRgb5C4IoNyE912ipAt_x0Be9Z37_Er20QL85C1OmVVZ0TGmnR3kRgtR2SNz2Vvir4EDoXnPXfQyJBT585wgzStqBsW4P55Pxitf0SDZHfxvGxSMhVhZQpd7rI54I0uxb_jLZkp9acjg3m2DafGqVZ_J2uZjry-zjRxXH__uXLbBRY1PYqZRpG7RsvgM2m74PsDYDu2D8nE9UETh2OPPocaEC4wZHOZwNK0brCipYvx6quuoJnDo4a5j96u7bs3aiRuPCDzewWOjADsGAgIs98HRz_dTtobprA8piRhAxCmvhUZxJrMh4ZnHkMqOiBHukJ5lh2DgiRUSY4pH2MayQTGWxVTLWYY-S7YPVfJrbAwATH-wx7pRkWvMoEcpJR23MneDSEIoPwUWzROmsqs2RljENjlMvz5TQNMgzDfI8-sPYY7BOQ5df7G0IPQGr8_eFPfXQY67PSo06A2uD10Hn9hM-ktbm |
linkProvider | Emerald |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Unmasking+persuasion+in+phishing%3A+a+content+analysis+of+principles+of+persuasion+in+emails+and+subject+lines&rft.jtitle=Information+and+computer+security&rft.au=Khadka%2C+Kalam&rft.au=Ullah%2C+Abu+Barkat&rft.au=Martinez+Marroquin%2C+Elisa&rft.date=2025-08-22&rft.issn=2056-4961&rft.eissn=2056-497X&rft_id=info:doi/10.1108%2FICS-12-2024-0321&rft.externalDBID=n%2Fa&rft.externalDocID=10_1108_ICS_12_2024_0321 |
thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=2056-4961&client=summon |
thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=2056-4961&client=summon |
thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=2056-4961&client=summon |