8
views
0
recommends
+1 Recommend
0 collections
    0
    shares
      • Record: found
      • Abstract: found
      • Article: found
      Is Open Access

      Falling for Phishing: An Empirical Investigation into People's Email Response Behaviors

      Preprint

      Read this article at

      Bookmark
          There is no author summary for this article yet. Authors can add summaries to their articles on ScienceOpen to make them more accessible to a non-specialist audience.

          Abstract

          Despite the sophisticated phishing email detection systems, and training and awareness programs, humans continue to be tricked by phishing emails. In an attempt to understand why phishing email attacks still work, we have carried out an empirical study to investigate how people make response decisions while reading their emails. We used a "think aloud" method and follow-up interviews to collect data from 19 participants. The analysis of the collected data has enabled us to identify eleven factors that influence people's response decisions to both phishing and legitimate emails. Based on the identified factors, we discuss how people can be susceptible to phishing attacks due to the flaws in their decision-making processes. Furthermore, we propose design directions for developing a behavioral plugin for email clients that can be used to nudge people's secure behaviors enabling them to have a better response to phishing emails.

          Related collections

          Author and article information

          Journal
          10 August 2021
          Article
          2108.04766
          e4779e93-b1fd-4a9c-9b3a-974b5ba4f5bf

          http://creativecommons.org/licenses/by/4.0/

          History
          Custom metadata
          The 42nd International Conference on Information Systems (ICIS'21), Austin, Texas, USA, 2021, 17
          Accepted for publication at the 42nd International Conference on Information Systems (ICIS'21), Austin, Texas, USA, 2021, 17
          cs.CR cs.CY cs.HC

          Applied computer science,Security & Cryptology,Human-computer-interaction
          Applied computer science, Security & Cryptology, Human-computer-interaction

          Comments

          Comment on this article