Abstract
Computers can enhance our work activities, e.g., through greater efficiency in document production and through ease of communication. Although reliance on e-mail has reduced with the introduction of instant messaging applications, it continues to hold its own as a preeminent Internet-based communication service. Along with this eminence, we have persistent issues arising from e-mail-borne malware, phishing, and embedded malicious Web links. Existing steps to protect e-mail users still fail to address a significant proportion of online threats every year. A widely held view that we endorse is that this continuing challenge of e-mail is not wholly technical in nature and thereby cannot be entirely resolved through technical measures. Rather, we have here a socio-technical problem whose resolution requires attention to both technical issues and the specific attitudes and behavioral characteristics of end users. In this study, a structured questionnaire was used to collect data from 181 respondents while an experiment was used to identify the significant relation between respondents and their behavior in the broad diversity of one Malaysian organization.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Radicati, S., Analyst, P., Levenstein, J.: Email Statistics Report, 2013–2017 44(0), 2013–2017 (2013)
Aaron, G., Rasmussen, R.: Global phishing survey : trends and domain name use in 2H2013. Apwg, no. April, pp. 1–31 (2014)
Wombat, S.: A Wombat Security Research Report, January 2016 (2017)
Louho, R., Kallioja, M., Oittinen, P.: Factors affecting the use of hybrid media applications. Graph. Arts Finl. 35(3), 11–21 (2006)
Iahad, A., Rahim, A.: A comparative study of acceptance and use of ICT among university academic staff of ADSU and LASU: Nigeria 2(1), 103–115 (2012)
de Paula, R., et al.: In the eye of the beholder: a visualization-based approach to information system security. Int. J. Hum Comput Stud. 63(1–2), 5–24 (2005)
Dillon, A.: User Acceptance of Information Technology (2001)
Morris, M.G., Davis, G.B., Davis, F.D., Venkatesh, V.: User acceptance of information technology: toward a unified view. MIS Q. 27(3), 425–478 (2003)
Davis, F.D.: Perceived usefulness, perceived ease of use, and user acceptance. MIS Q. 13(3), 319–339 (1989)
Davis, F.D., Bagozzi, R.P., Warshaw, P.R.: Extrinsic and intrinsic motivation to use computers in the workplace. J. Appl. Soc. Psychol. 22(14), 1111–1132 (1992)
Ajzen, I., Ajzen, I.: The theory of planned behavior. Organ. Behav. Human Decis. Process. 50(2), 179–211 (1991)
Davis, F.D., Bagozzi, R.P., Warshaw, P.R.: User acceptance of computer technology: a comparison of two theoretical models. Manag. Sci. 35(8), 982 (1989)
Rogers, E.M.; Diffusion of Innovations (1995)
Bandura, A.: Social foundations of thought and action: a social cognitive theory (1986)
Thompson, R.L., Higgins, C.A., Howell, J.M.: Personal computing: toward a conceptual model of utilization. MIS Q. 15(1), 125 (1991)
Chang, I.-C., Hwang, H.-G., Hung, W.-F., Li, Y.-C.: Physicians’ acceptance of pharmacokinetics-based clinical decision support systems. Expert Syst. Appl. 33(2), 296–303 (2007)
Neufeld, D.J., Dong, L., Higgins, C.: Charismatic leadership and user acceptance of information technology. Eur. J. Inf. Syst. 16(4), 494–510 (2007)
Venkatesh, V., Thong, J., Xu, X.: Consumer acceptance and user of information technology: Extending the unified theory of acceptance and use of technology. MIS Q. 36
Carlson, J.R., Robert W.: Channel expansion theory and the experiential nature of media richness perceptions. Zmud Sour. Acad. Manag. J. 42(2), 153–170 (1999)
Mackay, W.: Diversity in the use of electronic mail: a preliminary inquiry. ACM Trans. Inf. Syst. 6(4), 380–397 (1988)
Whittaker, S., Sidner, C.: Email overload: exploring personal information management of email. Proc. SIGCHI Conf. Hum. Factors Comput. Syst. Common Gr. 35, 276–283 (1996)
Vishwanath, A., Herath, T., Chen, R., Wang, J., Rao, H.R.: Why do people get phished? Testing individual differences in phishing vulnerability within an integrated, information processing model. Decis. Support Syst. 51(3), 576–586 (2011)
Shajari, M., Ismail, Z.: Jurnal Teknologi Constructing an adoption model for e-government services. J. Teknol. 2, 29–37 (2014)
Grabner-Kräuter, S., Kaluscha, E., M. Fladnitzer, Perspectives of online trust and similar constructs: a conceptual clarification. In: 8th International Conference on Electronics and Commerce, pp. 235–243, Oct 2006
Pavlou, PA.: Consumer acceptance of electronic commerce: integrating trust and risk with the technology acceptance model. Int. J. Electron. Commer. 7(3), 69–103 (2003)
D. H. McKnight, L. L. Cummings, and N. L. Chervany, “Initial Trust Formation in New
Carter, L., Bélanger, F.: The utilization of e-government services: citizen trust, innovation and acceptance factors. Inf. Syst. J. 15(1), 5–25 (2005)
Costa, P.T., McCrae, R.R.: Professional manual: revised NEO personality inventory (NEO-PI-R) and NEO five-factor inventory (NEO-FFI). Odessa FL Psychol. Assess. Resour. 3, 101 (1992)
McCrae, R.R., Costa, P.T.J.: Personality trait structure as a human universal. Am. Psychol. 52(5), 509–516 (1997)
Hair, J.F., Blackk, W.C., Babin, B.J., Anderson, R.E.: Multivariate data analysis (6th ed.) Analysis, pp. 4–4 (2006)
Hair, J.F., Black, W.C., Babin, B.J., Anderson, R.E., Tatham R.L.: Multivariate Data Analysis (2010)
Nunnally, J., Bernstein, I.: Psychometric theory, 3rd edn., vol. 3, p. 701 McGraw-Hill, New York (1994)
Alseadoon, I., Chan, T., Foo, E., Nieto, J.G.: Who is more susceptible to phishing emails? A Saudi Arabian study. In: 23rd Australas. Conference on Information Systems Trusteer 2009, pp. 1–11 (2012)
Landers, R.N., Lounsbury, J.W.: An investigation of big five and narrow personality traits in relation to Internet usage. Comput. Human Behav. 22(2), 283–293 (2006)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2021 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.
About this chapter
Cite this chapter
Ayob, Z., Weir, G.R.S. (2021). Is Human Behavior the Real Challenge in Combating Phishing. In: Joelianto, E., Turnip, A., Widyotriatmo, A. (eds) Cyber Physical, Computer and Automation System. Advances in Intelligent Systems and Computing, vol 1291. Springer, Singapore. https://doi.org/10.1007/978-981-33-4062-6_3
Download citation
DOI: https://doi.org/10.1007/978-981-33-4062-6_3
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-33-4061-9
Online ISBN: 978-981-33-4062-6
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)