Why do people get phished? Testing individual differences in phishing vulnerability within an integrated, information processing model

@article{Vishwanath2011WhyDP,
  title={Why do people get phished? Testing individual differences in phishing vulnerability within an integrated, information processing model},
  author={Arun Vishwanath and Tejaswini Herath and Rui Chen and Jingguo Wang and Hejamadi Raghav Rao},
  journal={Decision Support Systems},
  year={2011},
  volume={51},
  pages={576-586}
}
This research presents an integrated information processing model of phishing susceptibility grounded in the prior research in information process and interpersonal deception. We refine and validate the model using a sample of intended victims of an actual phishing attack. The data provides strong support for the model's theoretical structure and causative sequence. Overall, the model explains close to 50% of the variance in individual phishing susceptibility. The results indicate that most… CONTINUE READING

Figures, Tables, and Topics from this paper.

Citations

Publications citing this paper.
SHOWING 1-10 OF 96 CITATIONS

Exploring susceptibility to phishing in the workplace

  • Int. J. Hum.-Comput. Stud.
  • 2018
VIEW 17 EXCERPTS
CITES BACKGROUND & METHODS
HIGHLY INFLUENCED

An analysis of social engineering principles in effective phishing

  • 2015 Workshop on Socio-Technical Aspects in Security and Trust
  • 2015
VIEW 6 EXCERPTS
CITES BACKGROUND
HIGHLY INFLUENCED

How people help fraudsters steal their money: an analysis of 600 online banking fraud cases

  • 2015 Workshop on Socio-Technical Aspects in Security and Trust
  • 2015
VIEW 5 EXCERPTS
CITES BACKGROUND
HIGHLY INFLUENCED

FILTER CITATIONS BY YEAR

2012
2019

CITATION STATISTICS

  • 24 Highly Influenced Citations

  • Averaged 13 Citations per year from 2017 through 2019