Loading...
Paper Type
Complete
Abstract
Phishing represents one of the most influential methods of cyber fraud, and the advent of digital technologies, such as Artificial Intelligence (AI), has made phishing attacks more efficient, effective, and innovative. These developments challenge traditional methods of processing malicious messages and ultimately impact user susceptibility to phishing. Existing literature predominantly attributes user susceptibility to the reliance on a low-thought processing route for handling deceitful information and proposes that employing a high-thought processing approach can reduce user vulnerability. However, in the context of complex AI-based phishing attempts, this paper argues that merely optimizing human information processing methods may not suffice to entirely prevent users' unsafe coping actions in response to phishing. Under such circumstances, technology-based information processing emerges as a potential strategy to diminish user susceptibility.
Paper Number
1009
Recommended Citation
Fu, Tiancong and Brohman, Kathryn, "AI-Based Phishing: A Double-Edged Sword of Innovation and Deception" (2024). AMCIS 2024 Proceedings. 19.
https://aisel.aisnet.org/amcis2024/security/security/19
AI-Based Phishing: A Double-Edged Sword of Innovation and Deception
Phishing represents one of the most influential methods of cyber fraud, and the advent of digital technologies, such as Artificial Intelligence (AI), has made phishing attacks more efficient, effective, and innovative. These developments challenge traditional methods of processing malicious messages and ultimately impact user susceptibility to phishing. Existing literature predominantly attributes user susceptibility to the reliance on a low-thought processing route for handling deceitful information and proposes that employing a high-thought processing approach can reduce user vulnerability. However, in the context of complex AI-based phishing attempts, this paper argues that merely optimizing human information processing methods may not suffice to entirely prevent users' unsafe coping actions in response to phishing. Under such circumstances, technology-based information processing emerges as a potential strategy to diminish user susceptibility.
When commenting on articles, please be friendly, welcoming, respectful and abide by the AIS eLibrary Discussion Thread Code of Conduct posted here.
Comments
SIGSEC