2020
DOI: 10.3127/ajis.v24i0.2693
|View full text |Cite
|
Sign up to set email alerts
|

The Role of Contextualization in Individuals’ Vulnerability to Phishing Attempts

Abstract: Hackers who engage in phishing manipulate their victims into revealing confidential information by exploiting their motives, habits, and cognitive biases. Drawing on heuristic-systematic processing and the anchoring effect, this study examines how the contextualization of phishing messages, in the form of modifications to their framing and content, affects individuals’ susceptibility to phishing. This study also investigates if there is a discrepancy between the way individuals believe they will react to phish… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(2 citation statements)
references
References 62 publications
0
2
0
Order By: Relevance
“…As the simulation ran in Iran, we had to respect national regulations; however, we were not subject to other data protection regulations such as the EU GDPR 5 . We took into consideration the recommendations of previous studies in these matters and a roadmap to carry out ethical phishing [61][62][63][64][65]. We did not, for instance, store any data submitted by participants on the simulated phishing webpage, and we did not use any trademark.…”
Section: Methodsmentioning
confidence: 99%
“…As the simulation ran in Iran, we had to respect national regulations; however, we were not subject to other data protection regulations such as the EU GDPR 5 . We took into consideration the recommendations of previous studies in these matters and a roadmap to carry out ethical phishing [61][62][63][64][65]. We did not, for instance, store any data submitted by participants on the simulated phishing webpage, and we did not use any trademark.…”
Section: Methodsmentioning
confidence: 99%
“…The role of context in a phishing email was analysed by [61]. Students either got either an email about winning an I-Pad, or a course-related email.…”
Section: Coordinating Ddos Phishing and Ransomware Attacksmentioning
confidence: 99%