Why do some people manage phishing e-mails better than others?

dc.contributor.authorPattinson, M.
dc.contributor.authorJerram, C.
dc.contributor.authorParsons, K.
dc.contributor.authorMcCormac, A.
dc.contributor.authorButavicius, M.
dc.contributor.editorClarke, N.
dc.date.issued2012
dc.description.abstractPURPOSE: The purpose of this paper is to investigate the behaviour response of computer users when either phishing e-mails or genuine e-mails arrive in their inbox. The paper describes how this research was conducted and presents and discusses the findings. DESIGN/METHODOLOGY/APPROACH: This study was a scenario-based role-play experiment that involved the development of a web-based questionnaire that was only accessible by invited participants when they attended a one-hour, facilitated session in a computer laboratory. FINDINGS: The findings indicate that overall, genuine e-mails were managed better than phishing e-mails. However, informed participants managed phishing e-mails better than not-informed participants. Other findings show how familiarity with computers, cognitive impulsivity and personality traits affect behavioural responses to both types of e-mail. RESEARCH LIMITATIONS/IMPLICATIONS : This study does not claim to evaluate actual susceptibility to phishing emails. The subjects were University students and therefore the conclusions are not necessarily representative of the general population of e-mail users. PRACTICAL IMPLICATIONS: The outcomes of this research would assist management in their endeavours to improve computer user behaviour and, as a result, help to mitigate risks to their organisational information systems. ORIGINALITY/VALUE : The literature review indicates that this paper addresses a genuine gap in the research.
dc.description.statementofresponsibilityMalcolm Pattinson, Cate Jerram, Kathryn Parsons, Agata McCormac and Marcus Butavicius
dc.identifier.citationInformation Management and Computer Security, 2012; 20(1):18-28
dc.identifier.doi10.1108/09685221211219173
dc.identifier.issn0968-5227
dc.identifier.orcidPattinson, M. [0000-0002-6129-436X]
dc.identifier.orcidJerram, C. [0000-0002-4884-0709]
dc.identifier.orcidParsons, K. [0000-0001-7040-8376]
dc.identifier.urihttp://hdl.handle.net/2440/72956
dc.language.isoen
dc.publisherEmerald Group Publishing Ltd
dc.rights© Emerald Group Publishing Limited
dc.source.urihttps://doi.org/10.1108/09685221211219173
dc.titleWhy do some people manage phishing e-mails better than others?
dc.typeJournal article
pubs.publication-statusPublished

Files

Original bundle
Now showing 1 - 1 of 1
No Thumbnail Available
Name:
RA_hdl_72956.pdf
Size:
145.43 KB
Format:
Adobe Portable Document Format
Description:
Restricted Access