Got Phished? Internet Security and Human Vulnerability

Citation data:

Journal of the Association for Information Systems, Vol: 18, Issue: 1, Page: 22-44

Publication Year:
Usage 928
Abstract Views 592
Downloads 336
Social Media 4
Shares, Likes & Comments 3
Tweets 1
Citations 1
Citation Indexes 1
Repository URL:
Goel, Sanjay; Williams, Kevin; Dincelli, Ersin
Association for Information Systems
Phishing; Information Security; Social Engineering; Behavioral Security; Heuristic-Systematic Processing Model; Deception; Cognitive Biases; Vulnerabilities; Security Risk; Threats
Most Recent Tweet View All Tweets
article description
A leading cause of security breaches is a basic human vulnerability: our susceptibility to deception. Hackers exploit this vulnerability by sending phishing emails that induce users to click on malicious links that then download malware or trick the victim into revealing personal confidential information to the hacker. Past research has focused on human susceptibility to generic phishing emails or individually targeted spear-phishing emails. This study addresses how contextualization of phishing emails for targeted groups impacts their susceptibility to phishing. We manipulated the framing and content of email messages and tested the effects on users’ susceptibility to phishing. We constructed phishing emails to elicit either the fear of losing something valuable (e.g., course registrations, tuition assistance) or the anticipation of gaining something desirable (e.g., iPad, gift card, social networks). We designed the emails’ context to manipulate human psychological weaknesses such as greed, social needs, and so on. We sent fictitious (benign) emails to 7,225 undergraduate students and recorded their responses. Results revealed that contextualizing messages to appeal to recipients’ psychological weaknesses increased their susceptibility to phishing. The fear of losing or anticipation of gaining something valuable increased susceptibility to deception and vulnerability to phishing. The results of our study provide important contributions to information security research, including a theoretical framework based on the heuristic-systematic processing model to study the susceptibility of users to deception. We demonstrate through our experiment that several situational factors do, in fact, alter the effectiveness of phishing attempts.