Presentation is loading. Please wait.

Presentation is loading. Please wait.

The Influence of Experiential and Dispositional Factors in Phishing: An Empirical Investigation of the Deceived Journal of Management Information Systems.

Similar presentations


Presentation on theme: "The Influence of Experiential and Dispositional Factors in Phishing: An Empirical Investigation of the Deceived Journal of Management Information Systems."— Presentation transcript:

1 The Influence of Experiential and Dispositional Factors in Phishing: An Empirical Investigation of the Deceived Journal of Management Information Systems Summer 2010, Vol. 27, No. 1, pp. 273–303. 報告者:淡江大學資管所 胡淯婷 699630082 淡江大學資管所 高珮庭 699630389 2015/4/30 1 Ryan T. Wright and Kent Marett

2 Abstract Phishing has been a major problem for information systems managers and users for several years now The goal of this paper is to better understand the behavioral factors that may increase one’s susceptibility for complying with a phisher’s request for personal information. It was found that four behavioral factors were influential as to whether the phishing e ‑ mails were answered with sensitive information. 2015/4/30 2

3 Introduction 1/2 The Internet has created a venue for a number of computer security issues that must be addressed. Phishing uses obfuscation of both e ‑ mails and Web sites to trick Web users into complying with a request for personal information The deceitful people behind the scam, the “phishers,” are then able to use the personal information for a number of illicit activities. 2015/4/30 3

4 Consistent with the “fishing” homonym, phishing attacks are often described by using a “bait ‑ and- hook” metaphor. Because of ineffective technological methods of prevention, much of the responsibility for detecting phishing lies with the end user. Educating and training e ‑ mail users about fraud prevention and detection at the “bait” stage must be considered the first line of defense. Introduction 2/2 2015/4/30 4

5 Interpersonal Deception Theory and Phishing 1/2 In the case of phishing, however, the deceiver only has one opportunity to modify the false message, before the message is sent, because the communication takes place via e ‑ mail. The phisher cannot see the receiver’s nonverbal behavior when reacting to the message and thus cannot monitor signs of disbelief and make strategic alterations to the message. 2015/4/30 5

6 Past research has suggested that after receivers “click” on the e ‑ mail message, they rarely detect the phishing Web site. Thus, the initial detection of the fraudulent e ‑ mail is critical but can be difficult. Detecting the deceptive nature of a phishing e ‑ mail is expected to depend on individual experiential and dispositional factors, which will now be discussed. Interpersonal Deception Theory and Phishing 2/2 2015/4/30 6

7 A Model for Deception in Phishing 1/5 Due to the inherent differences between users, this study focuses on examining what behavioral factors influence one’s decision to respond to phishers. The communication medium is also modeled as having an influence, as its potential to convey the deceptive message should impact the outcome. 2015/4/30 7

8 The medium being used to transmit the message influences the deceptive message potential for several reasons. First, the lower social richness and asynchronous nature of electronic media. Second, different media provide deceivers varying amounts of tailorability. Finally, different media transmit varied amounts of social cues that offer receivers a greater opportunity to develop suspicion and detect deception. A Model for Deception in Phishing 2/5 2015/4/30 8

9 Phishing differs from face-to-face communication. The research model presented here has been designed to reflect a less interactive environment than the previous models. A Model for Deception in Phishing 3/5 2015/4/30 9

10 The current model includes two categories of individual factors. Experiential factors computer self-efficacy Web experience knowledge of appropriate security policies Dispositional factors disposition to trust perceived risk suspicion of humanity A Model for Deception in Phishing 4/5 2015/4/30 10

11 Because the goal of the current research is to explore factors that can lead to the successful deception of a phishing receiver. the outcome variable of interest is labeled deception success. RQ: How do the experiential and dispositional characteristics of online users affect their susceptibility to potentially malicious phishing e ‑ mails? A Model for Deception in Phishing 5/5 2015/4/30 11

12 Research Model 12 2015/4/30

13 Theoretical Analysis 1/2 Experiential Factors Hypothesis 1: Higher perceptions of Computer self-efficacy decrease the likelihood a person will be deceived by a phishing e ‑ mail. Hypothesis 2: Web experience decreases the likelihood that a person will be deceived by a phishing e ‑ mail. Hypothesis 3: Security awareness decreases the likelihood a person will be deceived by a phishing e ‑ mail. 2015/4/30 13

14 Dispositional Factors Hypothesis 4: Disposition to trust increases the likelihood a person will be deceived by a phishing e ‑ mail. Hypothesis 5: Higher perceived risk decreases the likelihood a person will be deceived by a phishing e ‑ mail. Hypothesis 6: Suspicion of humanity decreases the likelihood a person will be deceived by a phishing e ‑ mail. Theoretical Analysis 1/2 2015/4/30 14

15 Research Methods Participants final sample : 189 male and 110 female subjects spend 3.5 hours per week using pilot study(30 subjects ) Phase 1: Code and Policy Dissemination Phase 2: SSC Usage and Security Training Phase 3: The Phishing Attack 15 2015/4/30

16 Data Analysis The message was sent to 446 subjects , but 147 subjects were excluded. (1) dropped the class (11 subjects) (2) did not receive the e ‑ mail (101 subjects), 1 (3) did not complete all the items (27 subjects) (4) did not complete phase two of the study (8 subjects). the subject answered the deception e ‑ mail with the correct SSC 97 out of 299 subjects = 32 percent 16 2015/4/30

17 Results 17 2015/4/30 Mplus version 5.1 was used for data analysis 統計軟體工具分析數據 分析變數類型的組合 (continuous 、 ordered…) 功能:驗証性因素分析、結構方程模型 驗證性因素分析 (CFA) :信度、效度 (1) the reliability of items (2) the composite reliability of the constructs, (3) the average variance extracted (AVE) by the constructs

18 Results 18 2015/4/30

19 Results 19 2015/4/30

20 Results 20 2015/4/30

21 Discussion four of the six hypothesized factors had a significant influence on the likelihood that Web users will be successfully deceived by a phishing e ‑ mail. The hypotheses for disposition to trust and risk beliefs were not supported. 21 2015/4/30

22 謝謝指教 Q & A The Influence of Experiential and Dispositional Factors in Phishing: An Empirical Investigation of the Deceive d 報告者:淡江大學資管所 胡淯婷 699630082 淡江大學資管所 高珮庭 699630389 2015/4/30 22


Download ppt "The Influence of Experiential and Dispositional Factors in Phishing: An Empirical Investigation of the Deceived Journal of Management Information Systems."

Similar presentations


Ads by Google