PHISHING SUSCEPTIBILITY IN CONTEXT: A MULTILEVEL INFORMATION PROCESSING PERSPECTIVE ON DECEPTION DETECTION.
Published In: MIS Quarterly, 2023, v. 47, n. 2. P. 803 1 of 3
Database: Academic Search Ultimate 2 of 3
Authored By: Wright, Ryan T.; Johnson, Steven L.; Kitchens, Brent 3 of 3
Abstract
Despite widespread awareness of risks, significant investments in cybersecurity protection, and substantial economic incentives to avoid security breaches, organizations remain vulnerable to phishing attacks. Phishing research has informed effective practical interventions to address phishing susceptibility that emphasize the importance of broadly applicable IT security knowledge. Yet employees still frequently fall victim to phishing attempts. To help understand why, we conceptualize phishing susceptibility as the failure to differentiate between deceptive and legitimate information processing requests that occur within the context of an employee's typical job responsibilities. We apply this contextual lens to identify characteristics of knowledge workers' organizational task and social context that may enhance or diminish performance in detecting deception in phishing email attempts. To test our hypotheses, we conducted a study in which employees of the finance division of a large university encountered simulated email-based phishing attempts as part of their normal work routine. We found evidence supporting our hypotheses that an individual's susceptibility to phishing attacks is influenced by their position in the knowledge flows of the organization and by the impact of workgroup responsibilities on their cognitive processing. We contend that phishing susceptibility is not merely a matter of IT security knowledge but is also influenced by contextualized, multilevel influences on information processing. As phishing attacks are increasingly targeted to specific organizational settings, it is even more important to incorporate this contextualized information processing view of phishing susceptibility. [ABSTRACT FROM AUTHOR]
Additional Information
- Source:MIS Quarterly. 2023/06, Vol. 47, Issue 2, p803
- Document Type:Article
- Subject Area:Information Technology
- Publication Date:2023
- ISSN:0276-7783
- DOI:10.25300/MISQ/2022/16625
- Accession Number:164038028
- Copyright Statement:Copyright of MIS Quarterly is the property of MIS Quarterly and its content may not be copied or emailed to multiple sites without the copyright holder's express written permission. Additionally, content may not be used with any artificial intelligence tools or machine learning technologies. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.)
Looking to go deeper into this topic? Look for more articles on EBSCOhost.