2016 49th Hawaii International Conference on System Sciences (HICSS) 2016
DOI: 10.1109/hicss.2016.696
|View full text |Cite
|
Sign up to set email alerts
|

A User-Centered Approach to Phishing Susceptibility: The Role of a Suspicious Personality in Protecting Against Phishing

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

1
29
0

Year Published

2018
2018
2024
2024

Publication Types

Select...
5
4

Relationship

0
9

Authors

Journals

citations
Cited by 34 publications
(30 citation statements)
references
References 13 publications
1
29
0
Order By: Relevance
“…We believe that current anti-phishing solutions are useful though insufficient, as phishers always use people's psychological weaknesses to design new types of phishing attacks. Several studies [3,4] have already identified some of the above-mentioned factors, but none of them have carried out a root cause analysis to list all the possible psychological factors at play and the tricks that scammers use to fool people.…”
Section: Introductionmentioning
confidence: 99%
“…We believe that current anti-phishing solutions are useful though insufficient, as phishers always use people's psychological weaknesses to design new types of phishing attacks. Several studies [3,4] have already identified some of the above-mentioned factors, but none of them have carried out a root cause analysis to list all the possible psychological factors at play and the tricks that scammers use to fool people.…”
Section: Introductionmentioning
confidence: 99%
“…However, such methodologies are still limited by the explicit nature of the legitimacy judgments, which does not reflect the complexity of the decision-making process that likely occurs in real life. Instead, participants are encouraged to engage in certain behaviours, such as employing more rational decision-making strategies, which results in an artificially high accurate response rate to the email stimulus (Yan & Gozu, 2012;Harrison, Vishwanath, & Rao, 2016).…”
Section: Methodsmentioning
confidence: 99%
“…[266] 4 [225], [229], [247], [265] 2 [233], [252] 1 [219] No 6 [10], [230], [238], [249], [250], [258] 3 [242], [260], [263] Webpage Yes 5 [204], [239], [245], [253], [261] No 4 [203], [212], [236], [264] 3 [211], [213], [216] 3 [61], [217], [ [232] in [211] and [214] used Functional Magnetic Resonance Imaging (fMRI) and Electroencephalogram (EEG) to measure brain's electrical activity and an eye-tracker to have a better understanding of users' decision-making process. They used both existing phishing websites (by downloading and hosting them on their own network) and manually created ones.…”
Section: Selected User Study Literaturementioning
confidence: 99%