Why do some people manage phishing e-mails better than others?
dc.contributor.author | Pattinson, M. | |
dc.contributor.author | Jerram, C. | |
dc.contributor.author | Parsons, K. | |
dc.contributor.author | McCormac, A. | |
dc.contributor.author | Butavicius, M. | |
dc.contributor.editor | Clarke, N. | |
dc.date.issued | 2012 | |
dc.description.abstract | PURPOSE: The purpose of this paper is to investigate the behaviour response of computer users when either phishing e-mails or genuine e-mails arrive in their inbox. The paper describes how this research was conducted and presents and discusses the findings. DESIGN/METHODOLOGY/APPROACH: This study was a scenario-based role-play experiment that involved the development of a web-based questionnaire that was only accessible by invited participants when they attended a one-hour, facilitated session in a computer laboratory. FINDINGS: The findings indicate that overall, genuine e-mails were managed better than phishing e-mails. However, informed participants managed phishing e-mails better than not-informed participants. Other findings show how familiarity with computers, cognitive impulsivity and personality traits affect behavioural responses to both types of e-mail. RESEARCH LIMITATIONS/IMPLICATIONS : This study does not claim to evaluate actual susceptibility to phishing emails. The subjects were University students and therefore the conclusions are not necessarily representative of the general population of e-mail users. PRACTICAL IMPLICATIONS: The outcomes of this research would assist management in their endeavours to improve computer user behaviour and, as a result, help to mitigate risks to their organisational information systems. ORIGINALITY/VALUE : The literature review indicates that this paper addresses a genuine gap in the research. | |
dc.description.statementofresponsibility | Malcolm Pattinson, Cate Jerram, Kathryn Parsons, Agata McCormac and Marcus Butavicius | |
dc.identifier.citation | Information Management and Computer Security, 2012; 20(1):18-28 | |
dc.identifier.doi | 10.1108/09685221211219173 | |
dc.identifier.issn | 0968-5227 | |
dc.identifier.orcid | Pattinson, M. [0000-0002-6129-436X] | |
dc.identifier.orcid | Jerram, C. [0000-0002-4884-0709] | |
dc.identifier.orcid | Parsons, K. [0000-0001-7040-8376] | |
dc.identifier.uri | http://hdl.handle.net/2440/72956 | |
dc.language.iso | en | |
dc.publisher | Emerald Group Publishing Ltd | |
dc.rights | © Emerald Group Publishing Limited | |
dc.source.uri | https://doi.org/10.1108/09685221211219173 | |
dc.title | Why do some people manage phishing e-mails better than others? | |
dc.type | Journal article | |
pubs.publication-status | Published |
Files
Original bundle
1 - 1 of 1
No Thumbnail Available
- Name:
- RA_hdl_72956.pdf
- Size:
- 145.43 KB
- Format:
- Adobe Portable Document Format
- Description:
- Restricted Access