746
Views
2
CrossRef citations to date
0
Altmetric
Research Articles

How do technology use patterns influence phishing susceptibility? A two-wave study of the role of reformulated locus of control

&
Pages 540-560 | Received 21 Nov 2021, Accepted 22 Feb 2023, Published online: 06 Mar 2023

References

  • Abbasi, A., Dobolyi, D., Vance, A., & Zahedi, F. M. (2021). The phishing funnel model: a design artifact to predict user susceptibility to phishing websites. Information Systems Research, 32(2), 410–436. https://doi.org/10.1287/isre.2020.0973
  • Abbasi, A., Zahedi, F., “Mariam”, Zeng, D., Chen, Y., Chen, H., Nunamaker, J. F., & “Mariam”. (2015). Enhancing predictive analytics for anti-phishing by exploiting website genre information. Journal of Management Information Systems, 31(4), 109–157. https://doi.org/10.1080/07421222.2014.1001260
  • Aleroud, A., & Zhou, L. (2017). Phishing environments, techniques, and countermeasures: A survey. Computers & Security, 68, 160–196. https://doi.org/10.1016/j.cose.2017.04.006
  • Algarni, A., Xu, Y., & Chan, T. (2017). An empirical study on the susceptibility to social engineering in social networking sites: The case of Facebook. European Journal of Information Systems, 26(6), 661–687. https://doi.org/10.1057/s41303-017-0057-y
  • APWG. (2022) Phishing activity trends report. Anti-Phishing Working Group (APWG). Available at: https://docs.apwg.org/reports/apwg_trends_report_q2_2022.pdf?_ga=2.97570719.1049884337.1667099674-445395558.1667099673&_gl=1*19gu8me*_ga*NDQ1Mzk1NTU4LjE2NjcwOTk2NzM.*_ga_55RF0RHXSR*MTY2NzA5OTY3My4xLjEuMTY2NzA5OTcxNi4wLjAuMA.
  • Arachchilage, N. A. G., Love, S., & Beznosov, K. (2016). Phishing threat avoidance behaviour: An empirical investigation. Computers in Human Behavior, 60, 185–197. https://doi.org/10.1016/j.chb.2016.02.065
  • Ayaburi, E. W., Wairimu, J., & ANDOH-BAIDOO, F. K. (2019). Antecedents and outcome of deficient self-regulation in unknown wireless networks use context: An exploratory study. Information Systems Frontiers, 21(6), 1–17. https://doi.org/10.1007/s10796-019-09942-w
  • Barlow, J. B., Warkentin, M., Ormond, D., & Dennis, A. R. (2018). Don’t even think about it! The effects of antineutralization, informational, and normative communication on information security compliance. Journal of the Association for Information Systems, 19, 689–715. https://doi.org/10.17705/1jais.00506
  • Benenson, Z., Gassmann, F., & Landwirth, R. (2017) Unpacking Spear Phishing Susceptibility. In Financial Cryptography and Data Security (M. Brenner, K. Rohloff, J. Bonneau, A. Miller, R. PYA, V. Teague, A. Bracciali, M. Sala, F. Pintore, & M. Jakobsson, Eds.), pp 610–627, Springer International Publishing, Available at: http://link.springer.com/ (accessed 19/02/2020).
  • Bose, I., Leung, M. A. N., & AC. (2019). Adoption of identity theft countermeasures and its short- and long-term impact on firm value. MIS Quarterly, 43(1), 313–327. https://doi.org/10.25300/MISQ/2019/14192
  • Brouwers, S., Wiggins, M. W., Helton, W., O’hare, D., & Griffin, B. 2016. Cue utilization and cognitive load in novel task performance. Frontiers in Psychology. 7. Available at. http://journal.frontiersin.org/Article/10.3389/fpsyg.2016.00435/abstract. accessed 19/02/2020. https://doi.org/10.3389/fpsyg.2016.00435
  • Buss, A. R. (1978). Causes and reasons in attribution theory: A conceptual critique. Journal of Personality and Social Psychology, 36(11), 1311–1321. https://doi.org/10.1037/0022-3514.36.11.1311
  • C-CH, H. U. I. (1982). Locus of control: A review of cross-cultural research. International Journal of Intercultural Relations, 6(3), 301–323. https://doi.org/10.1016/0147-1767(82)90036-0
  • Chen, R., Gaia, J., & Rao, H. R. (2020). An examination of the effect of recent phishing encounters on phishing susceptibility. Decision Support Systems, 133, 113287. https://doi.org/10.1016/j.dss.2020.113287
  • Chin, W. W., Marcolin, B. L., & Newsted, P. R. (2003). A partial least squares latent variable modeling approach for measuring interaction effects: Results from a Monte Carlo simulation study and an electronic-mail emotion/adoption study. Information Systems Research, 14(2), 189–217. https://doi.org/10.1287/isre.14.2.189.16018
  • Cohen, J., Cohen, P., West, S. G., & Aiken, L. S. (2013). Applied multiple regression/correlation analysis for the behavioral sciences. Routledge.
  • Crane, M. F., Brouwers, S., Wiggins, M. W., Loveday, T., Forrest, K., Tan, S. G. M., & Cyna, A. M. (2018). “Experience isn’t everything”: How emotion affects the relationship between experience and cue utilization. Human Factors: The Journal of the Human Factors and Ergonomics Society, 60(5), 685–698. https://doi.org/10.1177/0018720818765800
  • Dennis, A., & Valacich, J. (2014). A Replication Manifesto. AIS Transactions on Replication Research, 1, 1–4. https://doi.org/10.17705/1atrr.00001
  • Dhillon, G., Smith, K., & Dissanayaka, I. (2021). Information systems security research agenda: Exploring the gap between research and practice. Journal of Strategic Information Systems, 30(4), 101693. https://doi.org/10.1016/j.jsis.2021.101693
  • D-M, K. O. O. (2009). The moderating role of locus of control on the links between experiential motives and intention to play online games. Computers in Human Behavior, 25(2), 466–474. https://doi.org/10.1016/j.chb.2008.10.010
  • Dr, M. A. Y., Schwoerer, C. E., Reed, K., & Potter, P. (1997). Employee reactions to ergonomic job design: The moderating effects of health locus of control and self-efficacy. Journal of Occupational Health Psychology, 2(1), 11–24. https://doi.org/10.1037/1076-8998.2.1.11
  • Ersche, K. D., Lim, T. -V., Ward, L. H. E., Robbins, T. W., & Stochl, J. (2017). Creature of Habit: A self-report measure of habitual routines and automatic tendencies in everyday life. Personality and Individual Differences, 116, 73–85. https://doi.org/10.1016/j.paid.2017.04.024
  • Fiske, S. T., & Taylor, S. E. (1991). Social cognition. Mcgraw-Hill Book Company.
  • Fornell, C., & Larcker, D. F. (1981). Structural equation models with unobservable variables and measurement error: Algebra and statistics. Journal of Marketing Research, 18(3), 382–388. https://doi.org/10.1177/002224378101800313
  • George, J. F., Gupta, M., Giordano, G., Mills, A. M., Tennant, V. M., & Lewis, C. C. (2018). The effects of communication media and culture on deception detection accuracy. MIS Quarterly, 42(2), 551–575. https://doi.org/10.25300/MISQ/2018/13215
  • George, J., Marett, K., & Giordano, G. (2008). Deception: Toward AN INDIVIDUALISTIC VIEW OF GROUP SUPPORT SYSTEms. Journal of the Association for Information Systems, 9(10), 653–676. https://doi.org/10.17705/1jais.00174
  • Ginder, W., Kwon, W. -S., & Byun, S. -E. (2021). Effects of internal–external congruence-based CSR positioning: An attribution theory approach. Journal of Business Ethics, 169(2), 355–369. https://doi.org/10.1007/s10551-019-04282-w
  • Goel, S., Williams, K., & Dincelli, E. (2017). Got phished? Internet security and human vulnerability. Journal of the Association for Information Systems, 18(1), 22–44. https://doi.org/10.17705/1jais.00447
  • Goh, T. -T., Xin, Z., & Jin, D. (2019). Habit formation in social media consumption: A case of political engagement. Behaviour & Information Technology, 38(3), 273–288. https://doi.org/10.1080/0144929X.2018.1529197
  • Gökçearslan, Ş., Mumcu, F. K., Haşlaman, T., & Çevik, Y. D. (2016). Modelling smartphone addiction: The role of smartphone usage, self-regulation, general self-efficacy and cyberloafing in university students. Computers in Human Behavior, 63, 639–649. https://doi.org/10.1016/j.chb.2016.05.091
  • Hadlington, L., Popovac, M., Janicke, H., Yevseyeva, I., & Jones, K. (2019). Exploring the role of work identity and work locus of control in information security awareness. Computers & Security, 81, 41–48. https://doi.org/10.1016/j.cose.2018.10.006
  • Hair, J. F., Risher, J. J., Sarstedt, M., & Ringle, C. M. (2019). When to use and how to report the results of PLS-SEM. European Business Review, 31(1), 2–24. https://doi.org/10.1108/EBR-11-2018-0203
  • Hair, J. F., Sarstedt, M., Ringle, C. M., & Mena, J. A. (2012). An assessment of the use of partial least squares structural equation modeling in marketing research. Journal of the Academy of Marketing Science, 40(3), 414–433. https://doi.org/10.1007/s11747-011-0261-6
  • Hinkin, T. R. (1995). A review of scale development practices in the study of organizations. Journal of Management, 21(5), 967–988. https://doi.org/10.1177/014920639502100509
  • Ho, S. M., Hancock, J. T., Booth, C., & Liu, X. (2016). Computer-mediated deception: strategies revealed by language-action cues in spontaneous communication. Journal of Management Information Systems, 33(2), 393–420. https://doi.org/10.1080/07421222.2016.1205924
  • Hovav, A., & D’arcy, J. (2012). Applying an extended model of deterrence across cultures: An investigation of information systems misuse in the U.S. and South Korea. Information & Management, 49(2), 99–110. https://doi.org/10.1016/j.im.2011.12.005
  • Hu, L., & Bentler, P. M. (1999). Cutoff criteria for fit indices in covariance structure analysis: Conventional criteria versus new alternatives. Structural Equation Modeling: A Multidisciplinary Journal, 6(1), 1–55. https://doi.org/10.1080/10705519909540118
  • HULLAND. (1999). Use of partial least squares (PLS) in strategic management research: A review of four recent studies. Strategic Management Journal, 20(2), 195–204. https://doi.org/10.1002/(SICI)1097-0266(199902)20:2<195:AID-SMJ13>3.0.CO;2-7
  • Hu, X., Wu, G., Wu, Y., & Zhang, H. (2010). The effects of Web assurance seals on consumers’ initial trust in an online vendor: A functional perspective. Decision Support Systems, 48(2), 407–418. https://doi.org/10.1016/j.dss.2009.10.004
  • Iuga, C., Nurse, J. R. C., & Erola, A. (2016). Baiting the hook: Factors impacting susceptibility to phishing attacks. Human-Centric Computing and Information Sciences, 6(1), 8. https://doi.org/10.1186/s13673-016-0065-2
  • Jang, J., Shin, H., Aum, H., Kim, M., & Kim, J. (2016). Application of experiential locus of control to understand users’ judgments toward useful experience. Computers in Human Behavior, 54, 326–340. https://doi.org/10.1016/j.chb.2015.08.010
  • Jansson, K., & VON Solms, R. (2013). Phishing for phishing awareness. Behaviour & Information Technology, 32(6), 584–593. https://doi.org/10.1080/0144929X.2011.632650
  • Jensen, M. L., Dinger, M., Wright, R. T., & Thatcher, J. B. (2017). Training to mitigate phishing attacks using mindfulness techniques. Journal of Management Information Systems, 34(2), 597–626. https://doi.org/10.1080/07421222.2017.1334499
  • Jensen, M., Lowry, P. B., Burgoon, J. K., & Nunamaker, J. F. (2010). Technology dominance in complex decision making: The case of aided credibility assessment. Journal of Management Information Systems, 27(1), 175–202. https://doi.org/10.2753/MIS0742-1222270108
  • Jensen, M. L., Wright, R. T., Durcikova, A., & Karumbaiah, S. (2022). Improving phishing reporting using security gamification. Journal of Management Information Systems, 39(3), 793–823. https://doi.org/10.1080/07421222.2022.2096551
  • Johnston, A. C., Warkentin, M., Mcbride, M., & Carter, L. (2016). Dispositional and situational factors: Influences on information security policy violations. European Journal of Information Systems, 25(3), 231–251. https://doi.org/10.1057/ejis.2015.15
  • Junger, M., Montoya, L., & Overink, F. -J. (2017). Priming and warnings are not effective to prevent social engineering attacks. Computers in Human Behavior, 66, 75–87. https://doi.org/10.1016/j.chb.2016.09.012
  • Kao, K. C., & Hill, R. A. O. S and Troshani, I. (2017). Online consumers’ responses to deal popularity as an extrinsic cue. Journal of Computer Information Systems, 57(4), 374–384. https://doi.org/10.1080/08874417.2016.1232997
  • Keil, M., Park, E. H., & Ramesh, B. (2018). Violations of health information privacy: The role of attributions and anticipated regret in shaping whistle‐blowing intentions. Information Systems Journal, 28(5), 818–848. https://doi.org/10.1111/isj.12168
  • Khonji, M., Iraqi, Y., & Jones, A. (2013). Phishing detection: A literature survey. IEEE Communications Surveys & Tutorials, 15(4), 2091–2121. https://doi.org/10.1109/SURV.2013.032213.00009
  • Kim, S. S., Malhotra, N. K., & Narasimhan, S. (2005). Two competing perspectives on automatic use: A theoretical and empirical comparison. Information Systems Research, 16(4), 418–432. https://doi.org/10.1287/isre.1050.0070
  • KUKAR-KINNEY, M., & Xia, L. (2017). The effectiveness of number of deals purchased in influencing consumers’ response to daily deal promotions: A cue utilization approach. Journal of Business Research, 79, 189–197. https://doi.org/10.1016/j.jbusres.2017.06.012
  • Lee, Y. -K., Chang, C. -T., Lin, Y., & Cheng, Z. -H. (2014). The dark side of smartphone usage: Psychological traits, compulsive behavior and technostress. Computers in Human Behavior, 31, 373–383. https://doi.org/10.1016/j.chb.2013.10.047
  • Limayem, H. I. R. T., Cheung. (2007). How habit limits the predictive power of intention: The case of information systems continuance. MIS Quarterly, 31(4), 705. https://doi.org/10.2307/25148817
  • Lin, J., Carter, L., & Liu, D. (2021). Privacy concerns and digital government: Exploring citizen willingness to adopt the COVIDSafe app. European Journal of Information Systems, 30(4), 389–402. https://doi.org/10.1080/0960085X.2021.1920857
  • Liu, L., Li, C., & Zhu, D. (2012). A new approach to testing nomological validity and its application to a second-order measurement model of trust. Journal of the Association for Information Systems, 13(12), 950–975. https://doi.org/10.17705/1jais.00320
  • Maier, C., Laumer, S., Wirth, J., & Weitzel, T. (2019). Technostress and the hierarchical levels of personality: A two-wave study with multiple data samples. European Journal of Information Systems, 28(5), 496–522. https://doi.org/10.1080/0960085X.2019.1614739
  • Malhotra, Y., Galletta, D. F., & Kirsch, L. J. (2008). How endogenous motivations influence user intentions: Beyond the dichotomy of extrinsic and intrinsic user motivations. Journal of Management Information Systems, 25(1), 267–300. https://doi.org/10.2753/MIS0742-1222250110
  • Malhotra, N. K., Kim, S. S., & Patil, A. (2006). Common method variance in is research: A comparison of alternative approaches and a reanalysis of past research. Management Science, 52(12), 1865–1883. https://doi.org/10.1287/mnsc.1060.0597
  • Martinko, M. J., Gundlach, M. J., & Douglas, S. C. (2002). Toward an integrative theory of counterproductive workplace behavior: A causal reasoning perspective. International Journal of Selection and Assessment, 10(2), 36–50. https://doi.org/10.1111/1468-2389.00192
  • Matusik, J. G., Heidl, R., Hollenbeck, J. R., Yu, A., Lee, H. W., & Howe, M. (2019). Wearable bluetooth sensors for capturing relational variables and temporal variability in relationships: A construct validation study. The Journal of Applied Psychology, 104(3), 357–387. https://doi.org/10.1037/apl0000334
  • Moody, G. D., Galletta, D. F., & Dunn, B. K. (2017). Which phish get caught? An exploratory study of individuals′ susceptibility to phishing. European Journal of Information Systems, 26(6), 564–584. https://doi.org/10.1057/s41303-017-0058-x
  • Muthén, L. K., & Muthén, B. O. (2009). Mplus: Statistical analysis with latent variables: User’s guide. Wiley 123(6). New York.
  • Nguyen, C., Jensen, M., & Day, E. (2021). Learning not to take the bait: A longitudinal examination of digital training methods and overlearning on phishing susceptibility. European Journal of Information Systems, 1–25. https://doi.org/10.1080/0960085X.2021.1931494
  • Olson, J. C., & Jacob, J. (1972) Cue utilization in the quality perception process. ACR Special Volumes. Available at: http://www.acrwebsite.org/volumes/11997/volumes/sv02/SV-02.
  • Payne, J. W., Bettman, J. R., & Johnson, E. J. (1993). The adaptive decision maker. Cambridge university press.
  • Perlow, R., & Latham, L. L. (1993). Relationship of client abuse with locus of control and gender: A longitudinal study in mental retardation facilities. The Journal of Applied Psychology, 78(5), 831–834. https://doi.org/10.1037/0021-9010.78.5.831
  • Petter, S., Straub, D., & Rai, A. (2007). Specifying formative constructs in information systems research. MIS Quarterly, 31(4), 623–656. https://doi.org/10.2307/25148814
  • Pienta, D., Thatcher, J. B., & Johnston, A. (2020). Protecting a whale in a sea of phish. Journal of Information Technology, 35(3), 214–231. https://doi.org/10.1177/0268396220918594
  • Podsakoff, P. M., Mackenzie, S. B., Lee, J. -Y., & Podsakoff, N. P. (2003). Common method biases in behavioral research: A critical review of the literature and recommended remedies. The Journal of Applied Psychology, 88(5), 879–903. https://doi.org/10.1037/0021-9010.88.5.879
  • Porter, C. E., Devaraj, S., & Sun, D. (2013). A test of two models of value creation in virtual communities. Journal of Management Information Systems, 30(1), 261–292. https://doi.org/10.2753/MIS0742-1222300108
  • Rash, W. (2019) FBI crime report lists business email compromise as top scam. eWEEK. Available at: https://www.eweek.com/security/fbi-email-enterprises-scam?utm_medium=email&utm_campaign=B2B_NL_WHN_20190429_AR1&mkt_tok=eyJpIjoiTVRkbU16WmhaVGMzWVRjMSIsInQiOiJQVWlSNk1sN1NSMExjTkEyNVNFcVZEQmM3emJYMTNyaENIbW1lSklmMkpyNHZSTnJ6SWhpZEp0UCtLQlE1S0VtRkx3NHN3RzB4SkZrbFA4VG1cL1hxMVEydnlLU1kwZU9zVWdLUUxTRkZ2M1d6OTRmWHp5MW5McmtSazMrMHZJaGUifQ%3D%3D (accessed 30/04/2019).
  • Rezazade Mehrizi, M. H., VAN Den Hooff, B., & Yang, C. (2022). Breaking or keeping the habits: Exploring the role of legacy habits in the process of discontinuing organisational information systems. Information Systems Journal, 32(1), 192–221. https://doi.org/10.1111/isj.12341
  • Seo, D., & Ray, S. (2019). Habit and addiction in the use of social networking sites: Their nature, antecedents, and consequences. Computers in Human Behavior, 99, 109–125. https://doi.org/10.1016/j.chb.2019.05.018
  • Shahbaznezhad, H., Kolini, F., & Rashidirad, M. (2021). Employees’ behavior in phishing attacks: What individual, organizational, and technological factors matter? Journal of Computer Information Systems, 61(6), 539–550. https://doi.org/10.1080/08874417.2020.1812134
  • Sheng, S., Magnien, B., Kumaraguru, P., Acquisti, A., Cranor, L. F., Hong, J., & Nunge, E. (2007) Anti-Phishing Phil: The design and evaluation of a game that teaches people not to fall for phish. In Proceedings of the 3rd symposium on Usable privacy and security - SOUPS ’07 p 88, ACM Press, Pittsburgh, Pennsylvania. Available at: http://portal.acm.org/citation.cfm?doid=1280680.1280692 (accessed 4/09/2019).
  • Siala, H., Kutsch, E., & Jagger, S. (2019). Cultural influences moderating learners’ adoption of serious 3D games for managerial learning. Information Technology & People.
  • Simmering, M. J., Fuller, C. M., Richardson, H. A., Ocal, Y., & Atinc, G. M. (2015). Marker variable choice, reporting, and interpretation in the detection of common method variance: A review and demonstration. Organizational Research Methods, 18(3), 473–511. https://doi.org/10.1177/1094428114560023
  • SMITH HJ. (2003). The reluctance to report bad news on troubled software projects: A theoretical model. Information Systems Journal, 13(1), 69–95. https://doi.org/10.1046/j.1365-2575.2003.00139.x
  • Spector, P. E. (1982). Behavior in organizations as a function of employee’s locus of control. Psychological Bulletin, 91(3), 482–497. https://doi.org/10.1037/0033-2909.91.3.482
  • SYMANTEC. (2022) The ransomware threat landscape: What to expect in 2022. Symantec. Available at: https://symantec-enterprise-blogs.security.com/blogs/threat-intelligence/ransomware-threat-landscape-what-expect-2022.
  • Twyman, N. W., Proudfoot, J. G., Cameron, A. -F., Case, E., Burgoon, J. K., & Twitchell, D. P. (2020). Too busy to be manipulated: How multitasking with technology improves deception detection in collaborative teamwork. Journal of Management Information Systems, 37(2), 377–395. https://doi.org/10.1080/07421222.2020.1759938
  • Vance, A., Jenkins, J. L., Anderson, B. B., Bjornn, D. K., & Kirwan, C. B. (2018a). Tuning out security warnings: A longitudinal examination of habituation through fMRI, eye tracking, and field experiments. MIS Quarterly, 42(2), 355–380
  • Vance, A., Jenkins, J. L., Anderson, B. B., Bjornn, D. K., & Kirwan, C. B. (2018b). Tuning out security warnings: A longitudinal examination of habituation through fMRI, eye tracking, and field experiments. MIS Quarterly, 42(2), 355–380. https://doi.org/10.25300/MISQ/2018/14124
  • Vance, A., Lowry, P. B., & Eggett, D. (2015). Increasing accountability through user-interface design artifacts: A new approach to addressing the problem of access-policy violations. MIS Quarterly, 39(2), 345–366. https://doi.org/10.25300/MISQ/2015/39.2.04
  • Vardaman, J. M., Gondo, M. B., & Allen, D. G. (2014). Ethical climate and pro-social rule breaking in the workplace. Human Resource Management Review, 24(1), 108–118. https://doi.org/10.1016/j.hrmr.2012.05.001
  • VERKIJIKA SF. (2019). “If you know what to do, will you take action to avoid mobile phishing attacks”: Self-efficacy, anticipated regret, and gender. Computers in Human Behavior, 101, 286–296. https://doi.org/10.1016/j.chb.2019.07.034
  • Vishwanath, A., Herath, T., Chen, R., Wang, J., & Hr, R. A. O. (2011). Why do people get phished? Testing individual differences in phishing vulnerability within an integrated, information processing model. Decision Support Systems, 51(3), 576–586. https://doi.org/10.1016/j.dss.2011.03.002
  • Wang, Q., Cui, X., Huang, L., & Dai, Y. (2016). Seller reputation or product presentation? An empirical investigation from cue utilization perspective. International Journal of Information Management, 36(3), 271–283. https://doi.org/10.1016/j.ijinfomgt.2015.12.006
  • Wang, J., Li, Y., & Rao, H. R. (2016). Overconfidence in phishing email detection. Journal of the Association for Information Systems, 17(11), 759. https://doi.org/10.17705/1jais.00442
  • Wang, J., Li, Y., & Rao, H. R. (2017). Coping responses in phishing detection: An investigation of antecedents and consequences. Information Systems Research, 28(2), 378–396. https://doi.org/10.1287/isre.2016.0680
  • Williams, E. J., Hinds, J., & Joinson, A. N. (2018). Exploring susceptibility to phishing in the workplace. International Journal of Human-Computer Studies, 120, 1–13. https://doi.org/10.1016/j.ijhcs.2018.06.004
  • Workman, M., Bommer, W. H., & Straub, D. (2008). Security lapses and the omission of information security measures: A threat control model and empirical test. Computers in Human Behavior, 24(6), 2799–2816. https://doi.org/10.1016/j.chb.2008.04.005
  • Wright, R. T., Jensen, M. L., Thatcher, J. B., Dinger, M., & Marett, K. (2014). Influence techniques in phishing attacks: An examination of vulnerability and resistance. Information Systems Research, 25(2), 385–400. https://doi.org/10.1287/isre.2014.0522
  • Wright, R., Johnson, S. L., & Kitchens, B. (2022) Phishing susceptibility in context: A multi-level information processing perspective on deception detection. MIS Quarterly. Available at: https://www.ssrn.com/abstract=3622310 (accessed 15/11/2022).
  • Wright, R. T., & Marett, K. (2010). The influence of experiential and dispositional factors in phishing: An empirical investigation of the deceived. Journal of Management Information Systems, 27(1), 273–303. https://doi.org/10.2753/MIS0742-1222270111
  • Zahedi, F. M., Abbasi, A., & Chen, Y. (2015). Fake-website detection tools: Identifying elements that promote individuals’ use and enhance their performance. Journal of the Association for Information Systems, 16(6), 448. https://doi.org/10.17705/1jais.00399

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.