Loading...
Paper Type
ERF
Description
Phishing remains the most commonly employed technique for executing cybercrime activity. At its core, phishing relies on persuasive techniques that exploit human vulnerabilities. Yet, the current knowledge and understanding of how people respond to persuasiveness in phishing are scarce. Looking through the lens of cognitive dissonance theory, this research proposes a five-step theoretical framework and derives an initial psychometric model to examine and compare the six persuasion techniques on phishing susceptibility. We argue that the cognitive dissonance generated by persuasive techniques influences phishing susceptibility. We also argue for the mediating mechanism of preference for cognitive consistency and mindful attention awareness. This research contributes to understanding human vulnerabilities to phishing by introducing a general sequential model. The model permits the manipulation and testing of different contextual and individual attributes’ constructs, provides flexibility to the whole and part assessment, and allows building and expanding knowledge about the persuasive effect of phishing.
Paper Number
1622
Recommended Citation
Xie, Wei and Iyer, Lakshmi, "Phishing Susceptibility – a Cognitive Dissonance Persuasion View" (2023). AMCIS 2023 Proceedings. 22.
https://aisel.aisnet.org/amcis2023/sig_sec/sig_sec/22
Phishing Susceptibility – a Cognitive Dissonance Persuasion View
Phishing remains the most commonly employed technique for executing cybercrime activity. At its core, phishing relies on persuasive techniques that exploit human vulnerabilities. Yet, the current knowledge and understanding of how people respond to persuasiveness in phishing are scarce. Looking through the lens of cognitive dissonance theory, this research proposes a five-step theoretical framework and derives an initial psychometric model to examine and compare the six persuasion techniques on phishing susceptibility. We argue that the cognitive dissonance generated by persuasive techniques influences phishing susceptibility. We also argue for the mediating mechanism of preference for cognitive consistency and mindful attention awareness. This research contributes to understanding human vulnerabilities to phishing by introducing a general sequential model. The model permits the manipulation and testing of different contextual and individual attributes’ constructs, provides flexibility to the whole and part assessment, and allows building and expanding knowledge about the persuasive effect of phishing.
When commenting on articles, please be friendly, welcoming, respectful and abide by the AIS eLibrary Discussion Thread Code of Conduct posted here.
Comments
SIG SEC