Multivariate data analysis (4th ed.): with readings
Multivariate data analysis (4th ed.): with readings
Perceived risk attitudes: relating risk perception to risky choice
Management Science
Building consumer trust online
Communications of the ACM
Consumer trust in an Internet store
Information Technology and Management
Developing and Validating Trust Measures for e-Commerce: An Integrative Typology
Information Systems Research
The Impacts of Involuntary Cues on Media Effects
HICSS '00 Proceedings of the 33rd Hawaii International Conference on System Sciences-Volume 1 - Volume 1
Group Support Systems and Deceptive Communication
HICSS '99 Proceedings of the Thirty-Second Annual Hawaii International Conference on System Sciences-Volume 1 - Volume 1
Predicting e-services adoption: a perceived risk facets perspective
International Journal of Human-Computer Studies - Special issue on HCI and MIS
Spamming, phishing, authentication, and privacy
Communications of the ACM - The Blogosphere
HICSS '05 Proceedings of the Proceedings of the 38th Annual Hawaii International Conference on System Sciences (HICSS'05) - Track 1 - Volume 01
Internet Users' Information Privacy Concerns (IUIPC): The Construct, the Scale, and a Causal Model
Information Systems Research
Phishing Attacks Rising, But Dollar Losses Down
IEEE Security and Privacy
Communications of the ACM - Supporting exploratory search
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Do security toolbars actually prevent phishing attacks?
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
An Antiphishing Strategy Based on Visual Similarity Assessment
IEEE Internet Computing
Decision strategies and susceptibility to phishing
SOUPS '06 Proceedings of the second symposium on Usable privacy and security
Detecting Phishing Web Pages with Visual Similarity Assessment Based on Earth Mover's Distance (EMD)
IEEE Transactions on Dependable and Secure Computing
Students as Surrogates for managers in a decision-making environment: an experimental study
Journal of Management Information Systems - Special section: Strategic and competitive information systems
Consumer reactions to electronic shopping on the world wide web
International Journal of Electronic Commerce
Information Systems Today
Who Controls the Internet?: Illusions of a Borderless World
Who Controls the Internet?: Illusions of a Borderless World
Predicting user concerns about online privacy
Journal of the American Society for Information Science and Technology
Protecting people from phishing: the design and evaluation of an embedded training email system
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
A Comparison of Classification Methods for Predicting Deception in Computer-Mediated Communication
Journal of Management Information Systems
Journal of Management Information Systems
Journal of Management Information Systems
Internet Privacy Concerns and Social Awareness as Determinants of Intention to Transact
International Journal of Electronic Commerce
Persuasion in Recommender Systems
International Journal of Electronic Commerce
Anti-Phishing Phil: the design and evaluation of a game that teaches people not to fall for phish
Proceedings of the 3rd symposium on Usable privacy and security
What Trust Means in E-Commerce Customer Relationships: An Interdisciplinary Conceptual Typology
International Journal of Electronic Commerce
Consumer and Business Deception on the Internet: Content Analysis of Documentary Evidence
International Journal of Electronic Commerce
Journal of Management Information Systems
Communications of the ACM
A Cognitive Map of People's Online Risk Perceptions and Attitudes: An Empirical Study
HICSS '08 Proceedings of the Proceedings of the 41st Annual Hawaii International Conference on System Sciences
Online Reverse Auctions and the Dynamics of Trust
Journal of Management Information Systems
A Research Agenda for Trust in Online Environments
Journal of Management Information Systems
Using Self-Regulatory Learning to Enhance E-Learning-Based Information Technology Training
Information Systems Research
IEEE Transactions on Systems, Man, and Cybernetics, Part A: Systems and Humans
Comparative eye tracking of experts and novices in web single sign-on
Proceedings of the third ACM conference on Data and application security and privacy
Hi-index | 0.00 |
Phishing has been a major problem for information systems managers and users for several years now. In 2008, it was estimated that phishing resulted in close to $50 billion in damages to U.S. consumers and businesses. Even so, research has yet to explore many of the reasons why Internet users continue to be exploited. The goal of this paper is to better understand the behavioral factors that may increase one's susceptibility for complying with a phisher's request for personal information. Using past research on deception detection, a research model was developed to help explain compliant phishing responses. The model was tested using a field study in which each participant received a phishing e-mail asking for sensitive information. It was found that four behavioral factors were influential as to whether the phishing e-mails were answered with sensitive information. The paper concludes by suggesting that the behavioral aspect of susceptible users be integrated into the current tools and materials used in antiphishing efforts.