Is Human Behavior the Real Challenge in Combating Phishing

  • Chapter
  • First Online:
Cyber Physical, Computer and Automation System

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 1291))

  • 337 Accesses

Abstract

Computers can enhance our work activities, e.g., through greater efficiency in document production and through ease of communication. Although reliance on e-mail has reduced with the introduction of instant messaging applications, it continues to hold its own as a preeminent Internet-based communication service. Along with this eminence, we have persistent issues arising from e-mail-borne malware, phishing, and embedded malicious Web links. Existing steps to protect e-mail users still fail to address a significant proportion of online threats every year. A widely held view that we endorse is that this continuing challenge of e-mail is not wholly technical in nature and thereby cannot be entirely resolved through technical measures. Rather, we have here a socio-technical problem whose resolution requires attention to both technical issues and the specific attitudes and behavioral characteristics of end users. In this study, a structured questionnaire was used to collect data from 181 respondents while an experiment was used to identify the significant relation between respondents and their behavior in the broad diversity of one Malaysian organization.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
EUR 32.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or Ebook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
EUR 29.95
Price includes VAT (France)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
EUR 106.99
Price includes VAT (France)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
EUR 137.14
Price includes VAT (France)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free ship** worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Radicati, S., Analyst, P., Levenstein, J.: Email Statistics Report, 2013–2017 44(0), 2013–2017 (2013)

    Google Scholar 

  2. Aaron, G., Rasmussen, R.: Global phishing survey : trends and domain name use in 2H2013. Apwg, no. April, pp. 1–31 (2014)

    Google Scholar 

  3. Wombat, S.: A Wombat Security Research Report, January 2016 (2017)

    Google Scholar 

  4. Louho, R., Kallioja, M., Oittinen, P.: Factors affecting the use of hybrid media applications. Graph. Arts Finl. 35(3), 11–21 (2006)

    Google Scholar 

  5. Iahad, A., Rahim, A.: A comparative study of acceptance and use of ICT among university academic staff of ADSU and LASU: Nigeria 2(1), 103–115 (2012)

    Google Scholar 

  6. de Paula, R., et al.: In the eye of the beholder: a visualization-based approach to information system security. Int. J. Hum Comput Stud. 63(1–2), 5–24 (2005)

    Article  Google Scholar 

  7. Dillon, A.: User Acceptance of Information Technology (2001)

    Google Scholar 

  8. Morris, M.G., Davis, G.B., Davis, F.D., Venkatesh, V.: User acceptance of information technology: toward a unified view. MIS Q. 27(3), 425–478 (2003)

    Article  Google Scholar 

  9. Davis, F.D.: Perceived usefulness, perceived ease of use, and user acceptance. MIS Q. 13(3), 319–339 (1989)

    Article  Google Scholar 

  10. Davis, F.D., Bagozzi, R.P., Warshaw, P.R.: Extrinsic and intrinsic motivation to use computers in the workplace. J. Appl. Soc. Psychol. 22(14), 1111–1132 (1992)

    Article  Google Scholar 

  11. Ajzen, I., Ajzen, I.: The theory of planned behavior. Organ. Behav. Human Decis. Process. 50(2), 179–211 (1991)

    Google Scholar 

  12. Davis, F.D., Bagozzi, R.P., Warshaw, P.R.: User acceptance of computer technology: a comparison of two theoretical models. Manag. Sci. 35(8), 982 (1989)

    Google Scholar 

  13. Rogers, E.M.; Diffusion of Innovations (1995)

    Google Scholar 

  14. Bandura, A.: Social foundations of thought and action: a social cognitive theory (1986)

    Google Scholar 

  15. Thompson, R.L., Higgins, C.A., Howell, J.M.: Personal computing: toward a conceptual model of utilization. MIS Q. 15(1), 125 (1991)

    Article  Google Scholar 

  16. Chang, I.-C., Hwang, H.-G., Hung, W.-F., Li, Y.-C.: Physicians’ acceptance of pharmacokinetics-based clinical decision support systems. Expert Syst. Appl. 33(2), 296–303 (2007)

    Article  Google Scholar 

  17. Neufeld, D.J., Dong, L., Higgins, C.: Charismatic leadership and user acceptance of information technology. Eur. J. Inf. Syst. 16(4), 494–510 (2007)

    Article  Google Scholar 

  18. Venkatesh, V., Thong, J., Xu, X.: Consumer acceptance and user of information technology: Extending the unified theory of acceptance and use of technology. MIS Q. 36

    Google Scholar 

  19. Carlson, J.R., Robert W.: Channel expansion theory and the experiential nature of media richness perceptions. Zmud Sour. Acad. Manag. J. 42(2), 153–170 (1999)

    Google Scholar 

  20. Mackay, W.: Diversity in the use of electronic mail: a preliminary inquiry. ACM Trans. Inf. Syst. 6(4), 380–397 (1988)

    Article  Google Scholar 

  21. Whittaker, S., Sidner, C.: Email overload: exploring personal information management of email. Proc. SIGCHI Conf. Hum. Factors Comput. Syst. Common Gr. 35, 276–283 (1996)

    Google Scholar 

  22. Vishwanath, A., Herath, T., Chen, R., Wang, J., Rao, H.R.: Why do people get phished? Testing individual differences in phishing vulnerability within an integrated, information processing model. Decis. Support Syst. 51(3), 576–586 (2011)

    Article  Google Scholar 

  23. Shajari, M., Ismail, Z.: Jurnal Teknologi Constructing an adoption model for e-government services. J. Teknol. 2, 29–37 (2014)

    Google Scholar 

  24. Grabner-Kräuter, S., Kaluscha, E., M. Fladnitzer, Perspectives of online trust and similar constructs: a conceptual clarification. In: 8th International Conference on Electronics and Commerce, pp. 235–243, Oct 2006

    Google Scholar 

  25. Pavlou, PA.: Consumer acceptance of electronic commerce: integrating trust and risk with the technology acceptance model. Int. J. Electron. Commer. 7(3), 69–103 (2003)

    Google Scholar 

  26. D. H. McKnight, L. L. Cummings, and N. L. Chervany, “Initial Trust Formation in New

    Google Scholar 

  27. Carter, L., Bélanger, F.: The utilization of e-government services: citizen trust, innovation and acceptance factors. Inf. Syst. J. 15(1), 5–25 (2005)

    Article  Google Scholar 

  28. Costa, P.T., McCrae, R.R.: Professional manual: revised NEO personality inventory (NEO-PI-R) and NEO five-factor inventory (NEO-FFI). Odessa FL Psychol. Assess. Resour. 3, 101 (1992)

    Google Scholar 

  29. McCrae, R.R., Costa, P.T.J.: Personality trait structure as a human universal. Am. Psychol. 52(5), 509–516 (1997)

    Article  Google Scholar 

  30. Hair, J.F., Blackk, W.C., Babin, B.J., Anderson, R.E.: Multivariate data analysis (6th ed.) Analysis, pp. 4–4 (2006)

    Google Scholar 

  31. Hair, J.F., Black, W.C., Babin, B.J., Anderson, R.E., Tatham R.L.: Multivariate Data Analysis (2010)

    Google Scholar 

  32. Nunnally, J., Bernstein, I.: Psychometric theory, 3rd edn., vol. 3, p. 701 McGraw-Hill, New York (1994)

    Google Scholar 

  33. Alseadoon, I., Chan, T., Foo, E., Nieto, J.G.: Who is more susceptible to phishing emails? A Saudi Arabian study. In: 23rd Australas. Conference on Information Systems Trusteer 2009, pp. 1–11 (2012)

    Google Scholar 

  34. Landers, R.N., Lounsbury, J.W.: An investigation of big five and narrow personality traits in relation to Internet usage. Comput. Human Behav. 22(2), 283–293 (2006)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to George R. S. Weir .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2021 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Ayob, Z., Weir, G.R.S. (2021). Is Human Behavior the Real Challenge in Combating Phishing. In: Joelianto, E., Turnip, A., Widyotriatmo, A. (eds) Cyber Physical, Computer and Automation System. Advances in Intelligent Systems and Computing, vol 1291. Springer, Singapore. https://doi.org/10.1007/978-981-33-4062-6_3

Download citation

Publish with us

Policies and ethics

Navigation