1,929
Views
71
CrossRef citations to date
0
Altmetric
Empirical Research

Which phish get caught? An exploratory study of individuals′ susceptibility to phishing

, &
Pages 564-584 | Received 31 Jan 2016, Accepted 14 Jun 2017, Published online: 15 Feb 2018

Keep up to date with the latest research on this topic with citation updates for this article.

Read on this site (5)

Andrew Harrison, Akmal Mirsadikov & Truong (Jack) Luu. (2023) Influence of Media Capabilities on Trust in the Sharing Economy. Journal of Management Information Systems 40:3, pages 953-982.
Read now
Hamed Qahri-Saremi & Ofir Turel. (2023) Situational Contingencies in Susceptibility of Social Media to Phishing: A Temptation and Restraint Model. Journal of Management Information Systems 40:2, pages 503-540.
Read now
Emmanuel W. Ayaburi & Francis Kofi Andoh-Baidoo. (2023) How do technology use patterns influence phishing susceptibility? A two-wave study of the role of reformulated locus of control. European Journal of Information Systems 0:0, pages 1-21.
Read now
Paul Benjamin Lowry, Tamara Dinev & Robert Willison. (2017) Why security and privacy research lies at the centre of the information systems (IS) artefact: proposing a bold research agenda. European Journal of Information Systems 26:6, pages 546-563.
Read now

Articles from other publishers (66)

Pavlo Burda, Luca Allodi & Nicola Zannone. (2024) Cognition in Social Engineering Empirical Research: A Systematic Literature Review. ACM Transactions on Computer-Human Interaction 31:2, pages 1-55.
Crossref
Hassan Jamil, Tanveer Zia, Tahmid Nayeem, Monica T. Whitty & Steven D'Alessandro. (2024) Human-centric cyber security: Applying protection motivation theory to analyse micro business owners’ security behaviours. Information & Computer Security.
Crossref
Mary C Lacity, Sebastian W Schuetz, Le Kuai & Zachary R Steelman. (2024) IT’s a matter of trust: Literature reviews and analyses of human trust in information technology. Journal of Information Technology.
Crossref
Heeyoung Choi, Sangun Park & Juyoung Kang. (2024) Enhancing Participatory Security Culture in Public Institutions: An Analysis of Organizational Employees’ Security Threat Recognition Processes. IEEE Access 12, pages 47543-47558.
Crossref
Liliana Ribeiro, Inês Sousa Guedes & Carla Sofia Cardoso. (2024) Which factors predict susceptibility to phishing? An empirical study. Computers & Security 136, pages 103558.
Crossref
Tom Cuchta, Brian Blackwood, Thomas R. Devine & Robert J. Niichel. (2023) Human risk factors in cybersecurity. Interaction Studies. Social Behaviour and Communication in Biological and Artificial Systems Interaction Studies / Social Behaviour and Communication in Biological and Artificial Systems Interaction Studies 24:3, pages 437-463.
Crossref
Edwin Donald Frauenstein, Stephen Flowerday, Syden Mishi & Merrill Warkentin. (2023) Unraveling the behavioral influence of social media on phishing susceptibility: A Personality-Habit-Information Processing model. Information & Management 60:7, pages 103858.
Crossref
Alain Tambe Ebot. (2023) Advance fee fraud scammers’ criminal expertise and deceptive strategies: a qualitative case study. Information & Computer Security 31:4, pages 478-503.
Crossref
Liliana Queirós Ribeiro, Inês Guedes & Carla Cardoso. 2023. Exploring Cyber Criminals and Data Privacy Measures. Exploring Cyber Criminals and Data Privacy Measures 76 93 .
Dawn M. Sarno, Maggie W. Harris & Jeffrey Black. (2023) Which phish is captured in the net? Understanding phishing susceptibility and individual differences. Applied Cognitive Psychology 37:4, pages 789-803.
Crossref
Wenjing Lei, Siqi Hu & Carol Hsu. (2023) Unveiling the process of phishing precautions taking: The moderating role of optimism bias. Computers & Security 129, pages 103249.
Crossref
Louis M. Shekhtman, Alon Sela & Shlomo Havlin. (2023) Percolation framework reveals limits of privacy in conspiracy, dark web, and blockchain networks. EPJ Data Science 12:1.
Crossref
Doriana Cucinelli & Maria Gaia Soana. (2023) Are financially illiterate individuals all the same? A study on incorrect and “do not know” answers to financial knowledge questions. International Journal of Bank Marketing 41:4, pages 697-726.
Crossref
Pierre‐Emmanuel Arduin. (2021) A cognitive approach to the decision to trust or distrust phishing emails. International Transactions in Operational Research 30:3, pages 1263-1298.
Crossref
Nicholas J. Kelley, Anna L. Hurley-Wallace, Katherine L. Warner & Yaniv Hanoch. (2023) Analytical reasoning reduces internet fraud susceptibility. Computers in Human Behavior 142, pages 107648.
Crossref
Md Lutfor Rahman, Daniel Timko, Hamid Wali & Ajaya Neupane. (2023) Users Really Do Respond To Smishing. Users Really Do Respond To Smishing.
Shahryar Baki & Rakesh M. Verma. (2023) Sixteen Years of Phishing User Studies: What Have We Learned?. IEEE Transactions on Dependable and Secure Computing 20:2, pages 1200-1212.
Crossref
Yuxi Shang, Kaijie Wang, Yuye Tian, Yingyu Zhou, Beibei Ma & Sanyang Liu. (2023) Theoretical basis and occurrence of internet fraud victimisation: Based on two systems in decision-making and reasoning. Frontiers in Psychology 14.
Crossref
Muriel Frank, Lennart Jaeger & Lukas Manuel Ranft. (2023) Using contextual factors to predict information security overconfidence: A machine learning approach. Computers & Security 125, pages 103046.
Crossref
J. Efrim Boritz, Chan (Jessie) Ge & Katharine Patterson. (2022) Factors Affecting Employees' Susceptibility to Cyber-Attacks. Journal of Information Systems 36:3, pages 27-60.
Crossref
Muriel Frank, Lennart Jaeger & Lukas Manuel Ranft. (2022) Contextual drivers of employees' phishing susceptibility: Insights from a field study. Decision Support Systems 160, pages 113818.
Crossref
Xin Wen, Liang Xu, Jie Wang, Yuan Gao, Jiaming Shi, Ke Zhao, Fuyang Tao & Xiuying Qian. (2022) Mental States: A Key Point in Scam Compliance and Warning Compliance in Real Life. International Journal of Environmental Research and Public Health 19:14, pages 8294.
Crossref
Hoon S. Choi, Darrell Carpenter & Myung S. Ko. (2021) Risk Taking Behaviors Using Public Wi-Fi™. Information Systems Frontiers 24:3, pages 965-982.
Crossref
Rundong Yang, Kangfeng Zheng, Bin Wu, Chunhua Wu & Xiujuan Wang. (2022) Prediction of Phishing Susceptibility Based on a Combination of Static and Dynamic Features. Mathematical Problems in Engineering 2022, pages 1-10.
Crossref
Mark I. Hwang & Susan Helser. (2021) Cybersecurity educational games: a theoretical framework. Information & Computer Security 30:2, pages 225-242.
Crossref
Mohammed A. Alqahtani. (2022) Cybersecurity Awareness Based on Software and E-mail Security with Statistical Analysis. Computational Intelligence and Neuroscience 2022, pages 1-12.
Crossref
Tara Zimmerman, Millicent Njeri, Malak Khader & Jeff Allen. (2022) Default to truth in information behavior: a proposed framework for understanding vulnerability to deceptive information. Information and Learning Sciences 123:1/2, pages 111-126.
Crossref
Avner Caspi, Maayan Sayag, Maya Gross, Zohar Weinstein & Shir Etgar. (2022) The effects of personal values and message values on vulnerability to phishing. Personality and Individual Differences 186, pages 111335.
Crossref
Piers Bayl-Smith, Ronnie Taib, Kun Yu & Mark Wiggins. (2021) Response to a phishing attack: persuasion and protection motivation in an organizational context. Information & Computer Security 30:1, pages 63-78.
Crossref
Rundong Yang, Kangfeng Zheng, Bin Wu, Di Li, Zhe Wang & Xiujuan Wang. (2022) Predicting User Susceptibility to Phishing Based on Multidimensional Features. Computational Intelligence and Neuroscience 2022, pages 1-11.
Crossref
Ayako A. Hasegawa, Naomi Yamashita, Mitsuaki Akiyama & Tatsuya Mori. (2022) Experiences, Behavioral Tendencies, and Concerns of Non-Native English Speakers in Identifying Phishing Emails. Journal of Information Processing 30:0, pages 841-858.
Crossref
Thomas Sutter, Ahmet Selman Bozkir, Benjamin Gehring & Peter Berlich. (2022) Avoiding the Hook: Influential Factors of Phishing Awareness Training on Click-Rates and a Data-Driven Approach to Predict Email Difficulty Perception. IEEE Access 10, pages 100540-100565.
Crossref
Rufai Ahmad & Sotirios Terzis. 2022. Human Aspects of Information Security and Assurance. Human Aspects of Information Security and Assurance 197 206 .
Yuan Li, Jingguo Wang & H. Raghav Rao. 2022. Secure Knowledge Management In The Artificial Intelligence Era. Secure Knowledge Management In The Artificial Intelligence Era 37 47 .
Naomi Woods. 2022. Cyber Security. Cyber Security 93 134 .
Yan Ge, Li Lu, Xinyue Cui, Zhe Chen & Weina Qu. (2021) How personal characteristics impact phishing susceptibility: The mediating role of mail processing. Applied Ergonomics 97, pages 103526.
Crossref
McKenna K. Tornblad, Keith S. Jones, Akbar Siami Namin & Jinwoo Choi. (2021) Characteristics that Predict Phishing Susceptibility: A Review. Proceedings of the Human Factors and Ergonomics Society Annual Meeting 65:1, pages 938-942.
Crossref
Sean R. Martin, Julia J. Lee & Bidhan Lalit Parmar. (2021) Social distance, trust and getting “hooked”: A phishing expedition. Organizational Behavior and Human Decision Processes 166, pages 39-48.
Crossref
Amy Hetro Washo. (2021) An interdisciplinary view of social engineering: A call to action for research. Computers in Human Behavior Reports 4, pages 100126.
Crossref
Pierre-Emmanuel Arduin, Kathia Marcai de Oliveira & Christophe Kolski. (2021) Trust me and Click! A Pilot Study of Cognitive Walkthrough for Phishing Emails. Trust me and Click! A Pilot Study of Cognitive Walkthrough for Phishing Emails.
Christopher Nguyen, Matthew L. Jensen, Alexandra Durcikova & Ryan T. Wright. (2021) A comparison of features in a crowdsourced phishing warning system. Information Systems Journal 31:3, pages 473-513.
Crossref
Lennart Jaeger & Andreas Eckhardt. (2020) Eyes wide open: The role of situational information security awareness for security‐related behaviour. Information Systems Journal 31:3, pages 429-472.
Crossref
Filipo Sharevski & Peter Jachim. (2021) Alexa in Phishingland: Empirical Assessment of Susceptibility to Phishing Pretexting in Voice Assistant Environments. Alexa in Phishingland: Empirical Assessment of Susceptibility to Phishing Pretexting in Voice Assistant Environments.
Melissa Portalatin, Omer Keskin, Sneha Malneedi, Owais Raza & Unal Tatar. (2021) Data Analytics for Cyber Risk Analysis Utilizing Cyber Incident Datasets. Data Analytics for Cyber Risk Analysis Utilizing Cyber Incident Datasets.
Frank Kun-Yueh Chou, Abbott Po-Shun Chen & Vincent Cheng-Lung Lo. (2021) Mindless Response or Mindful Interpretation: Examining the Effect of Message Influence on Phishing Susceptibility. Sustainability 13:4, pages 1651.
Crossref
燕 葛. (2021) Influencing Factors of Phishing: A Psychological Perspective. Advances in Psychology 11:04, pages 968-977.
Crossref
Matthew Canham, Clay Posey, Delainey Strickland & Michael Constantino. (2021) Phishing for Long Tails: Examining Organizational Repeat Clickers and Protective Stewards. SAGE Open 11:1, pages 215824402199065.
Crossref
Hossein Abroshan, Jan Devos, Geert Poels & Eric Laermans. (2021) COVID-19 and Phishing: Effects of Human Emotions, Behavior, and Demographics on the Success of Phishing Attempts During the Pandemic. IEEE Access 9, pages 121916-121929.
Crossref
Kilian Kluge & Regina Eckhardt. 2021. Innovation Through Information Systems. Innovation Through Information Systems 247 261 .
Courtney Crooks, Tom McNeil, Ben Sawyer, Matthew Canham & David Muchlinski. (2020) Understanding Online Information Operations: Development of an Influence Network for Scientific Inquiry Testing Environment (INSITE). Understanding Online Information Operations: Development of an Influence Network for Scientific Inquiry Testing Environment (INSITE).
Ahmed Aleroud, Emad Abu-Shanab, Ahmad Al-Aiad & Yazan Alshboul. (2020) An examination of susceptibility to spear phishing cyber attacks in non-English speaking communities. Journal of Information Security and Applications 55, pages 102614.
Crossref
Camelia Simoiu, Ali Zand, Kurt Thomas & Elie Bursztein. (2020) Who is targeted by email-based phishing and malware?. Who is targeted by email-based phishing and malware?.
Nuria Rodríguez-Priego, René van Bavel, José Vila & Pam Briggs. (2020) Framing Effects on Online Security Behavior. Frontiers in Psychology 11.
Crossref
Laila Dahabiyeh, Mohammad S. Najjar & Deepti Agrawal. (2020) The effect of risk levels on technology adoption decision: the case of online games. Information Technology & People 33:5, pages 1445-1464.
Crossref
Madeleine T. D’Agata & Peter J. Kwantes. (2020) Personality Factors Predicting Disinhibited and Risky Online Behaviors. Journal of Individual Differences 41:4, pages 199-206.
Crossref
Daniel Pienta, Jason Bennett Thatcher & Allen Johnston. (2020) Protecting a whale in a sea of phish. Journal of Information Technology 35:3, pages 214-231.
Crossref
Heather J. Parker & Stephen V. Flowerday. (2020) Contributing factors to increased susceptibility to social media phishing attacks. SA Journal of Information Management 22:1.
Crossref
David Gefen, Jorge E. Fresneda & Kai R. Larsen. (2020) Trust and Distrust as Artifacts of Language: A Latent Semantic Approach to Studying Their Linguistic Correlates. Frontiers in Psychology 11.
Crossref
Jan-Willem Bullée & Marianne Junger. 2020. The Palgrave Handbook of International Cybercrime and Cyberdeviance. The Palgrave Handbook of International Cybercrime and Cyberdeviance 849 875 .
Teodor Sommestad & Henrik Karlzen. (2019) A meta-analysis of field experiments on phishing susceptibility. A meta-analysis of field experiments on phishing susceptibility.
Tom Cuchta, Brian Blackwood, Thomas R. Devine, Robert J. Niichel, Kristina M. Daniels, Caleb H. Lutjens, Sydney Maibach & Ryan J. Stephenson. (2019) Human Risk Factors in Cybersecurity. Human Risk Factors in Cybersecurity.
Alain Tambe Ebot. (2019) How stage theorizing can improve recommendations against phishing attacks. Information Technology & People 32:4, pages 828-857.
Crossref
Ayman Alarabiat & Isabel Ramos. (2019) The Delphi Method in Information Systems Research (2004‑2017). Electronic Journal of Business Research Methods 17:2.
Crossref
Jan-Willem Bullée & Marianne Junger. 2019. The Palgrave Handbook of International Cybercrime and Cyberdeviance. The Palgrave Handbook of International Cybercrime and Cyberdeviance 1 28 .
Wenjing Lei, Siqi Hu & Carol Hsu. (2022) Unveiling the Process of Phishing Precautions Taking: The Moderating Role of Optimism Bias. SSRN Electronic Journal.
Crossref
Efrim Boritz, Chan Ge & Katharine Elizabeth Patterson. (2022) Factors Affecting Employees’ Susceptibility to Cyber Attacks. SSRN Electronic Journal.
Crossref

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.