Loading...

Media is loading
 

Paper Type

Complete

Abstract

Phishing represents one of the most influential methods of cyber fraud, and the advent of digital technologies, such as Artificial Intelligence (AI), has made phishing attacks more efficient, effective, and innovative. These developments challenge traditional methods of processing malicious messages and ultimately impact user susceptibility to phishing. Existing literature predominantly attributes user susceptibility to the reliance on a low-thought processing route for handling deceitful information and proposes that employing a high-thought processing approach can reduce user vulnerability. However, in the context of complex AI-based phishing attempts, this paper argues that merely optimizing human information processing methods may not suffice to entirely prevent users' unsafe coping actions in response to phishing. Under such circumstances, technology-based information processing emerges as a potential strategy to diminish user susceptibility.

Paper Number

1009

Author Connect URL

https://authorconnect.aisnet.org/conferences/AMCIS2024/papers/1009

Comments

SIGSEC

Author Connect Link

Share

COinS
Top 25 Paper Badge
 
Aug 16th, 12:00 AM

AI-Based Phishing: A Double-Edged Sword of Innovation and Deception

Phishing represents one of the most influential methods of cyber fraud, and the advent of digital technologies, such as Artificial Intelligence (AI), has made phishing attacks more efficient, effective, and innovative. These developments challenge traditional methods of processing malicious messages and ultimately impact user susceptibility to phishing. Existing literature predominantly attributes user susceptibility to the reliance on a low-thought processing route for handling deceitful information and proposes that employing a high-thought processing approach can reduce user vulnerability. However, in the context of complex AI-based phishing attempts, this paper argues that merely optimizing human information processing methods may not suffice to entirely prevent users' unsafe coping actions in response to phishing. Under such circumstances, technology-based information processing emerges as a potential strategy to diminish user susceptibility.

When commenting on articles, please be friendly, welcoming, respectful and abide by the AIS eLibrary Discussion Thread Code of Conduct posted here.