737
Views
0
CrossRef citations to date
0
Altmetric
Research Article

Situational Contingencies in Susceptibility of Social Media to Phishing: A Temptation and Restraint Model

ORCID Icon & ORCID Icon

References

  • Turel, O.; He, Q.; and Wen, Y. Examining the neural basis of information security policy violations: a noninvasive brain stimulation approach. MIS quarterly, 45, 4 (2021),1715–1744.
  • Abbasi, A.; Dobolyi, D.; Vance, A.; and Zahedi, F.M. The phishing funnel model: A design artifact to predict user susceptibility to phishing websites. Information Systems Research, 32, 2 (2021), 301–674.
  • Algarni, A.; Xu, Y., and Chan, T. An empirical study on the susceptibility to social engineering in social networking sites: The case of facebook. European Journal of Information Systems, 26, 6 (2017), 661–687.
  • Allgeier, A.R.; and Byrne, D. Attraction toward the opposite sex as a determinant of physical proximity. The Journal of Social Psychology, 90, 2 (1973), 213–219.
  • Anderson, C.; and Platten, C.R. Sleep deprivation lowers inhibition and enhances impulsivity to negative stimuli. Behavioural Brain Research, 217, 2 (2011), 463–466.
  • Azen, R.; and Budescu, D.V. The dominance analysis approach for comparing predictors in multiple regression. Psychological Methods, 8, 2 (2003), 129–148.
  • Balduzzi, M.; Platzer, C.; Holz, T.; Kirda, E.; Balzarotti, D.; and Kruegel, C. Abusing social networks for automated user profiling. In J. Somesh, R. Summer, and C. Kreibich (eds.), Recent Advances in Intrusion Detection. Berlin: Springer, 2010, pp. 422–441.
  • Barnes, C.M.; and Spreitzer, G. Why sleep is a strategic resource. MIT Sloan Management Review, 56, 2 (2015), 19.
  • Baumeister, R.F. Yielding to temptation: Self-control failure, impulsive purchasing, and consumer behavior. Journal of Consumer Research, 28, 4 (2002), 670–676.
  • Baumeister, R.F.; DeWall, C.N.; Ciarocco, N.J.; and Twenge, J.M. Social exclusion impairs self-regulation. Journal of Personality and Social Psychology, 88, 4 (2005), 589–604.
  • Baumeister, R.F. Self-regulation, ego depletion, and inhibition. Neuropsychologia, 65 (2014), 313–319.
  • Bossetta, M. The weaponization of social media: Spear phishing and cyberattacks on democracy. Journal of International Affairs, 71, 1.5 (2018), 97–106.
  • Botvinick, M.M.; Cohen, J.D.; and Carter, C.S. Conflict monitoring and anterior cingulate cortex: An update. Trends in Cognitive Sciences, 8, 12 (2004), 539–546.
  • Burger, J.M.; Messian, N.; Patel, S.; Del Prado, A.; and Anderson, C. What a coincidence! The effects of incidental similarity on compliance. Personality and Social Psychology Bulletin, 30, 1 (2004), 35–43.
  • Burns, A.; Roberts, T.L.; Posey, C.; Bennett, R.J.; and Courtney, J.F. Intentions to comply versus intentions to protect: A vie theory approach to understanding the influence of insiders’ awareness of organizational seta efforts. Decision Sciences, 49, 6 (2018), 1187–1228.
  • Buysse, D.J.; Reynolds, C.F.; Monk, T.H.; Berman, S.R.; and Kupfer, D.J. The pittsburgh sleep quality index (psqi): A new instrument for psychiatric research and practice. Psychiatry research, 28, 2 (1989), 193–213.
  • Chau, M.; Li, T.M.; Wong, P.W.; Xu, J.J.; Yip, P.S.; and Chen, H. Finding people with emotional distress in online social media: A design combining machine learning and rule-based classification. MIS Quarterly, 44, 2 (2020).
  • Chou, C.-H.; Zahedi, F.M.; and Zhao, H. Ontology-based evaluation of natural disaster management websites: A multistakeholder perspective. MIS Quarterly, 38, 4 (2014), 997–1016.
  • Clithero, J.A.; Karmarkar, U.R.; and Hsu, M. Toward an integrative conceptualization of maladaptive consumer behavior. Journal of the Association for Consumer Research, 6, 3 (2021), 334–341.
  • Cohn, A.M.; Cameron, A.Y.; Udo, T.; Hagman, B.T.; Mitchell, J.; Bramm, S.; and Ehlke, S. Delineating potential mechanisms of implicit alcohol cognitions: Drinking restraint, negative affect, and their relationship with approach alcohol associations. Psychology of Addictive Behaviors, 26, 2 (2012), 318.
  • Collins, R.L.; and Lapp, W.M. The temptation and restraint inventory for measuring drinking restraint. British Journal of Addiction, 87, 4 (1992), 625–633.
  • Dion, K.L.; and Dion, K.K. Love, liking, and trust in heterosexual relationships. Personality and Social Psychology Bulletin, 2, 2 (1976), 187–190.
  • Du, J.; Kerkhof, P.; and van Koningsbruggen, G.M. Predictors of social media self-control failure: Immediate gratifications, habitual checking, ubiquity, and notifications. Cyberpsychology, Behavior, and Social Networking, 22, 7 (2019), 477–485.
  • Evans, J.S.B.T. Dual system theories of cognition: Some issues. Proceedings of the Cognitive Science Society, 28, 28 (2006), 202–207.
  • Eyal, N.; and Hoover, R. Hooked: How to Build Habit Forming Products. New York: Portfolio Hardcover, 2014.
  • FBI. Internet crime report 2021. 2022, https://www.ic3.gov/Home/AnnualReports. (Accessed on October 22, 2022).
  • Fleming, K.A.; and Bartholow, B.D. Alcohol cues, approach bias, and inhibitory control: Applying a dual process model of addiction to alcohol sensitivity. Psychology of Addictive Behaviors, 28, 1 (2014), 85.
  • Fletcher, E. Romance scams take record dollars in 2020. Federal Trade Commission (FTC): Data Spotlight, https://www.ftc.gov/news-events/data-visualizations/data-spotlight/2021/02/romance-scams-take-record-dollars-2020/, 2021. (Accessed on October 22, 2022).
  • Floyd, D.L.; Prentice‐Dunn, S.; and Rogers, R.W. A meta-analysis of research on protection motivation theory. Journal of Applied Social Psychology, 30, 2 (2000), 407–429.
  • Frauenstein, E.D.; and Flowerday, S. Susceptibility to phishing on social network sites: A personality information processing model. Computers & Security, 94 (2020), 1–18.
  • Friedman, N.P.; and Miyake, A. The relations among inhibition and interference control functions: A latent-variable analysis. Journal of Experimental Psychology: General, 133, 1 (2004), 101–135.
  • Goel, S.; Williams, K.; and Dincelli, E. Got phished? Internet security and human vulnerability. Journal of the Association for Information Systems, 18, 1 (2017), 22–44.
  • Guo, K.H.; Yuan, Y.; Archer, N.P.; and Connelly, C.E. Understanding nonmalicious security violations in the workplace: A composite behavior model. Journal of Management Information Systems, 28, 2 (2011), 203–236.
  • Hofmann, W.; Friese, M.; and Roefs, A. Three ways to resist temptation: The independent contributions of executive attention, inhibitory control, and affect regulation to the impulse control of eating behavior. Journal of Experimental Social Psychology, 45, 2 (2009), 431–435.
  • Hofmann, W.; Friese, M.; and Strack, F. Impulse and self-control from a dual-systems perspective. Perspectives on Psychological Science, 4, 2 (2009), 162–176.
  • Hofmann, W.; Baumeister, R.F.; Förster, G.; and Vohs, K.D. Everyday temptations: An experience sampling study of desire, conflict, and self-control. Journal of Personality and Social Psychology, 102, 6 (2012), 1318.
  • Holte, A.J.; Fisher, W.N., and Ferraro, F.R. Afraid of social exclusion: Fear of missing out predicts cyberball-induced ostracism. Journal of Technology in Behavioral Science, 7, September (2022), 315–324.
  • Hong, W.; Chan, F.K.; Thong, J.Y.; Chasalow, L.C.; and Dhillon, G. A framework and guidelines for context-specific theorizing in information systems research. Information Systems Research, 25, 1 (2014), 111–136.
  • Introzzi, I.; Andrés, M.L.; Canet-Juric, L.; Stelzer, F.; and Richard’s, M.M. The relationship between the rumination style and perceptual, cognitive, and behavioral inhibition. Psychology & Neuroscience, 9, 4 (2016), 444–456.
  • Jaeger, L.; and Eckhardt, A. Eyes wide open: The role of situational information security awareness for security-related behaviour. Information Systems Journal, 31, 3 (2021), 429–472.
  • James, T.; Lowry, P.B.; Wallace, L.G.; and Warkentin, M. The effect of belongingness on obsessive-compulsive disorder in the use of online social networks. Journal of Management Information Systems, 34, 2 (2017), 560–596.
  • Johnston, A.C.; Warkentin, M.; and Siponen, M. An enhanced fear appeal rhetorical framework: Leveraging threats to the human asset through sanctioning rhetoric. MIS Quarterly, 39, 1 (2015), 113–134.
  • Kahneman, D. Thinking, Fast and Slow. New York: Farrar, Straus and Giroux, 2011.
  • Kahneman, D.; and Frederick, S. Representativeness revisited: Attribute substitution in intuitive judgment. In T. Gilovich, D. Griffin, and D. Kahneman (eds.), Heuristics and Biases: The Psychology of Intuitive Judgment. Cambridge, U.K.: Cambridge University Press, 2002, pp. 49–81.
  • Karahanna, E.; Benbasat, I.; Bapna, R.; and Rai, A. Editor’s comments: Opportunities and challenges for different types of online experiments. MIS Quarterly, 42, 4 (2018), iii–x.
  • Karahanna, E.; Xu, S.X.; Xu, Y.; and Zhang, N.A. The needs–affordances–features perspective for the use of social media. MIS Quarterly, 42, 3 (2018), 737–756.
  • Kleiman, T.; Trope, Y.; and Amodio, D.M. Cognitive control modulates attention to food cues: Support for the control readiness model of self-control. Brain and Cognition, 110 (2016), 94–101.
  • Lauriola, M.; Litman, J.A.; Mussel, P.; De Santis, R.; Crowson, H.M.; and Hoffman, R.R. Epistemic curiosity and self-regulation. Personality and Individual Differences, 83 (2015), 202–207.
  • Limayem, M.; Hirt, S.G.; and Cheung, C.M.K. How habit limits the predictive power of intention: The case of information systems continuance. MIS Quarterly, 31, 4 (2007), 705–737.
  • Lindgren, K.P.; Neighbors, C.; Westgate, E.; and Salemink, E. Self-control and implicit drinking identity as predictors of alcohol consumption, problems, and cravings. Journal of Studies on Alcohol and Drugs, 75, 2 (2014), 290–298.
  • Luo, X.; Zhang, W.; Burd, S.; and Seazzu, A. Investigating phishing victimization with the heuristic–systematic model: A theoretical framework and an exploration. Computers & Security, 38 (2013), 28–38.
  • McGrath, J.E.; Martin, J.; and Kulka, R.A. Judgment Calls in Research. Newbury Park, CA: SAGE Publications, 1982.
  • Meldrum, R.C.; Barnes, J.; and Hay, C. Sleep deprivation, low self-control, and delinquency: A test of the strength model of self-control. Journal of Youth and Adolescence, 44, 2 (2015), 465–477.
  • Messner, M.; Reinhard, M.A.; and Sporer, S.L. Compliance through direct persuasive appeals: The moderating role of communicator’s attractiveness in interpersonal persuasion. Social Influence, 3, 2 (2008), 67–83.
  • Milyavskaya, M.; Inzlicht, M.; Hope, N.; and Koestner, R. Saying “no” to temptation: Want-to motivation improves self-regulation by reducing temptation rather than by increasing self-control. Journal of Personality and Social Psychology, 109, 4 (2015), 677.
  • Moody, G.D.; Galletta, D.F.; and Dunn, B.K. Which phish get caught? An exploratory study of individuals′ susceptibility to phishing. European Journal of Information Systems, 26, 6 (2017), 564–584.
  • Navarro, R.; Larrañaga, E.; Yubero, S.; and Víllora, B. Psychological correlates of ghosting and breadcrumbing experiences: A preliminary study among adults. International Journal of Environmental Research and Public Health, 17, 1116 (2020), 1–23.
  • Nguyen, C.; Jensen, M.L.; Durcikova, A.; and Wright, R.T. A comparison of features in a crowdsourced phishing warning system. Information Systems Journal, 31, 3 (2021), 473–513.
  • Nguyen, K.D.; Rosoff, H.; and John, R.S. Valuing information security from a phishing attack. Journal of Cybersecurity, 3, 3 (2017), 159–171.
  • Nigg, J.T. On inhibition/disinhibition in developmental psychopathology: Views from cognitive and personality psychology and a working inhibition taxonomy. Psychological Bulletin, 126, 2 (2000), 220–246.
  • Nisbett, R.E.; and Wilson, T.D. The halo effect: Evidence for unconscious alteration of judgments. Journal of Personality and Social Psychology, 35, 4 (1977), 250.
  • Nowak, K.L.; and Rauh, C. The influence of the avatar on online perceptions of anthropomorphism, androgyny, credibility, homophily, and attraction. Journal of Computer-Mediated Communication, 11, 1 (2005), 153–178.
  • Osborne, C. Hook, line and sinker: How i fell victim to phishing attacks - again and again. ZDNet, https://www.zdnet.com/article/reel-her-in-what-happens-when-tech-journalists-fall-prey-to-spear-phishing-campaigns/ , 2019. (Accessed on October 22, 2022).
  • Pavlou, P.A.; and Gefen, D. Psychological contract violation in online marketplaces: Antecedents, consequences, and moderating role. Information Systems Research, 16, 4 (2005), 372–399.
  • PhishLabs. Quarterly threat trends & intelligence report: February 2022. 2022.
  • PhishLabs. Navigating social media threats. 2022.
  • Qahri-Saremi, H.; and Montazemi, A.R. Factors affecting the adoption of an electronic word of mouth message: A meta-analysis. Journal of Management Information Systems, 36, 3 (2019), 969–1001.
  • Qahri-Saremi, H.; and Turel, O. Ambivalence and coping responses in post-adoptive information systems use. Journal of Management Information Systems, 37, 3 (2020), 820–848.
  • Reeves, A.; Delfabbro, P.; and Calic, D. Encouraging employee engagement with cybersecurity: How to tackle cyber fatigue. SAGE Open, 11, 1 (2021), 1–18.
  • Reich, S.; Schneider, F.M.; and Heling, L. Zero likes–symbolic interactions and need satisfaction online. Computers in Human Behavior, 80 (2018), 97–102.
  • Reynolds, W.M. Development of reliable and valid short forms of the marlowe‐crowne social desirability scale. Journal of Clinical Psychology, 38, 1 (1982), 119–125.
  • Rhodes, N. Fear-appeal messages: Message processing and affective attitudes. Communication Research, 44, 7 (2017), 952–975.
  • Ryan, R.M., and Martela, F. Eudaimonia as a way of living: Connecting aristotle with self-determination theory. In J. Vittersø (ed.), Handbook of Eudaimonic Well-Being. Switzerland: Springer, 2016, pp. 109–122.
  • Schmidt, R.C. Managing delphi surveys using nonparametric statistical techniques. Decision Sciences, 28, 3 (1997), 763–774.
  • Schneider, F.M.; Zwillich, B.; Bindl, M.J.; Hopp, F.R.; Reich, S.; and Vorderer, P. Social media ostracism: The effects of being excluded online. Computers in Human Behavior, 73 (2017), 385–393.
  • Schoenberg, N. My suitors are handsome, successful and ready for love. But are they real? My journey through the seamy world of romance scams. Chicago Tribune, 2021. https://www.chicagotribune.com/lifestyles/ct-life-romance-scammers-inside-look-tt-02082021-20210209-v4dn7rqdeng27cs4hkdgnkjyyq-story.html (Accessed on October 22, 2022).
  • Schuetz, S.; Lowry, P.B.; Pienta, D.; and Thatcher, J. The effectiveness of abstract versus concrete fear appeals in information security. Journal of Management Information Systems, 37, 3 (2020), 723–757.
  • Shaffer, J.P. Likability as a function of age, sex, and personality description. Bulletin of the Psychonomic Society, 9, 6 (1977), 402–404.
  • Smith, C.T.; and Houwer, J.D. The impact of persuasive messages on iat performance is moderated by source attractiveness and likeability. Social Psychology, 45, 6 (2014), 437–448.
  • Solomon, S.E. Social media: The fastest growing vulnerability to the air force mission. 2017, https://apps.dtic.mil/sti/pdfs/AD1122598.pdf. (Accessed on October 22, 2022).
  • Stenseng, F.; Belsky, J.; Skalicka, V.; and Wichstrøm, L. Social exclusion predicts impaired self-regulation:A 2-year longitudinal panel study including the transition from preschool to school. Journal of Personality, 83, 2 (2015), 212–220.
  • Strack, F.; and Deutsch, R. Reflective and impulsive determinants of social behavior. Personality and Social Psychology Review, 8, 3 (2004), 220–247.
  • Terranova Security. 2020. Terranova Security is a company with headquarters in Laval. Quebec, Canada.
  • Turel, O.; and Qahri-Saremi, H. Problematic use of social networking sites: Antecedents and consequence from a dual system theory perspective. Journal of Management Information Systems, 33, 4 (2016), 1087–1116.
  • Turel, O.; and Bechara, A. Effects of motor impulsivity and sleep quality on swearing, interpersonally deviant and disadvantageous behaviors on online social networking sites. Personality and Individual Differences, 108 (2017), 91–97.
  • Turel, O.; and Qahri-Saremi, H. Explaining unplanned online media behaviors: Dual-system theory models of impulsive use and swearing on social networking sites. New Media & Society, 20, 8 (2018), 3050–3067.
  • Turel, O. Technology-mediated dangerous behaviors as foraging for social-hedonic rewards: The role of implied inequality. MIS Quarterly, 45, 3 (2021), 1249–1286.
  • Turel, O., and Qahri-Saremi, H. Responses to ambivalence toward social networking sites: A typological perspective. Information Systems Journal, Forthcoming (2023), 1–32.
  • Twenge, J.; Catanese, K.; and Baumeister, R. Social exclusion causes self-defeating behavior. Journal of Personality and Social Psychology, 83, 3 (2002), 606–615.
  • Twenge, J.; Catanese, K.; and Baumeister, R. Social exclusion and the deconstructed state: Time perception, meaninglessness, lethargy, lack of emotion, and self-awareness. Journal of Personality and Social Psychology, 85, 3 (2003), 409–423.
  • Vartanian, L.R.; Trewartha, T.; and Vanman, E.J. Disgust predicts prejudice and discrimination toward individuals with obesity. Journal of Applied Social Psychology, 46, 6 (2016), 369–375.
  • Vishwanath, A. Habitual facebook use and its impact on getting deceived on social media. Journal of Computer‐Mediated Communication, 20, 1 (2015), 83–98.
  • Vishwanath, A. Diffusion of deception in social media: Social contagion effects and its antecedents. Information Systems Frontiers, 17, 6 (2015), 1353–1367.
  • Vishwanath, A. Examining the distinct antecedents of e-mail habits and its influence on the outcomes of a phishing attack. Journal of Computer-Mediated Communication, 20, 5 (2015), 570–584.
  • Vishwanath, A. Getting phished on social media. Decision Support Systems, 103 (2017), 70–81.
  • Vohs, K.D.; and Heatherton, T.F. Self-regulatory failure: A resource-depletion approach. Psychological Science, 11, 3 (2000), 249–254.
  • Wang, J.; Shan, Z.; Gupta, M.; and Rao, H.R. A longitudinal study of unauthorized access attempts on information systems: The role of opportunity contexts. MIS Quarterly, 43, 2 (2019), 601–622.
  • Warren, C.R.; Zanhour, M.; Washburn, M.; and Odom, B. Helping or hurting? Effects of sexism and likeability on third party perceptions of women. Social Behavior and Personality: An International Journal, 48, 10 (2020), 1–13.
  • Weisbaum, H. Looking for love online? Romance scammers steal your heart to steal your money. NBC News, 2020.
  • Whittaker, Z. Facebook ran ads for a fake ‘clubhouse for pc’ app planted with malware. TechCrunch, 2021.
  • Qahri-Saremi, H.; Vaghefi, I.; and Turel, O. Addiction to social networking sites and user responses: Toward a typological theory and its relation to users’ personality traits. ACM SIGMIS Database: the DATABASE for Advances in Information Systems, 52, 4 (2021), 65–91.
  • Turel, O.; He, Q.; Xue, G.; Xiao, L.; and Bechara, A. Examination of neural systems sub-serving facebook “addiction”. Psychological reports, 115, 3 (2014), 675–695.
  • Vaghefi, I.; Qahri-Saremi, H.; and Turel, O. Dealing with social networking site addiction: A cognitive-affective model of discontinuance decisions. Internet Research, 30, 5 (2020), 1427–1453.
  • Qahri-Saremi, H., and Montazemi, A.R. Negativity bias in the diagnosticity of online review content: The effects of consumers’ prior experience and need for cognition. European Journal of Information Systems, Forthcoming (2022), 1–18.
  • Williams, K.D. Chapter 6 ostracism: A temporal need‐threat model. Advances in Experimental Social Psychology, 41 (2009), 275–314.
  • Wolf, W.; Levordashka, A.; Ruff, J.R.; Kraaijeveld, S.; Lueckmann, J.-M.; and Williams, K.D. Ostracism online: A social media ostracism paradigm. Behavior Research Methods, 47, 2 (2015), 361–373.
  • Wright, R.; Johnson, S.L.; and Kitchens, B. Phishing susceptibility in context: A multi-level information processing perspective on deception detection. MIS Quarterly, Forthcoming (2022), 1–35.
  • Algarni A.; Xu, Y.; and Chan, T. An empirical study on the susceptibility to social engineering in social networking sites: The case of facebook. European Journal of Information Systems, 26, 6 (2017), 661–687.
  • Turel, O.;, and Bechara, A. A triple-system neural model of maladaptive consumption. Journal of the Association for Consumer Research, 6, 3 (2021), 324–333.
  • Turel, O.; and Bechara, A. A triadic reflectiveimpulsive-interoceptive awareness model of general and impulsive information system use: Behavioral tests of neuro-cognitive theory. Frontiers in psychology, 7, 601 (2016), –601.
  • Zhao, H.; Turel, O.; Bechara, A.; and He, Q. How distinct functional insular subdivisions mediate interacting neurocognitive systems. Cerebral Cortex, 33, 5 (2023), 1739–1751.
  • He, Q.; Turel, O.; and Bechara, A. Brain anatomy alterations associated with Social Networking Site (SNS) addiction. Scientific reports, 7, 1 (2017), 1–8.
  • Turel, O.; Romashkin, A.; and Morrison, K.M. Health outcomes of information system use lifestyles among adolescents: Videogame addiction, sleep curtailment and cardio-metabolic deficiencies. PloS One, 11, 5 (2016), 1–14.
  • Wright, R.T.; Jensen, M.L.; Thatcher, J.B.; Dinger, M.; and Marett, K. Research note—influence techniques in phishing attacks: An examination of vulnerability and resistance. Information Systems Research, 25, 2 (2014), 385–400.
  • Serenko, A.; and Turel, O. Measuring implicit attitude in information systems research with the implicit association test. Communications of the Association for Information Systems, 47, 1 (2020), 397–431.
  • He, Q.; Huang, X.; Zhang, S.; Turel, O.; Ma, L.; and Bechara, A. Dynamic causal modeling of insular, striatal, and prefrontal cortex activities during a food-specific Go/NoGo task. Biological Psychiatry: Cognitive Neuroscience and Neuroimaging, 4, 12 (2019), 1080–1089.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.