You are not logged in.
Openly accessible

Who is more susceptible to phishing emails?: a Saudi Arabian study

Alseadoon, Ibrahim, Chan, Taizan, Foo, Ernest and Gonzales Nieto, Juan 2012, Who is more susceptible to phishing emails?: a Saudi Arabian study, in ACIS 2012 : Location, location, location : Proceedings of the 23rd Australasian Conference on Information Systems 2012, ACIS, [Geelong, Vic.], pp. 1-11.

Attached Files
Name Description MIMEType Size Downloads
alseadoon-whoismore-2012.pdf Published version application/pdf 241.81KB 1059

Title Who is more susceptible to phishing emails?: a Saudi Arabian study
Author(s) Alseadoon, Ibrahim
Chan, Taizan
Foo, Ernest
Gonzales Nieto, Juan
Conference name Australasian Conference on Information Systems (23rd : 2012 : Geelong, Victoria)
Conference location Geelong, Victoria
Conference dates 3-5 Dec. 2012
Title of proceedings ACIS 2012 : Location, location, location : Proceedings of the 23rd Australasian Conference on Information Systems 2012
Editor(s) Lamp, JohnORCID iD for Lamp, John orcid.org/0000-0003-1891-0400
Publication date 2012
Conference series Australasian Conference on Information Systems
Start page 1
End page 11
Total pages 11
Publisher ACIS
Place of publication [Geelong, Vic.]
Keyword(s) phishing emails
phishing attacks
ability to suspect phishing emails
human factors
human behaviour
Summary Phishing emails cause enormous losses to both users and organisations. The goal of this study is to determine which individuals are more vulnerable to phishing emails. To gain this information an experiment has been developed which involves sending phishing email to users and collecting information about users. The detection deception model has been applied to identify users’ detection behaviour. We find that users who have less email experience and high levels of submissiveness have increased susceptibility. Among those, users who have high susceptibility levels and high openness and extraversion are more likely to carry on the harmful action embedded in phishing emails.
Notes Reproduced with the kind permission of the copyright owner.
Language eng
Field of Research 089999 Information and Computing Sciences not elsewhere classified
Socio Economic Objective 970108 Expanding Knowledge in the Information and Computing Sciences
Related work DU:30049020
Copyright notice ©2012, The Authors/ACIS
Persistent URL http://hdl.handle.net/10536/DRO/DU:30049075

Connect to link resolver
 
Link to Related Work
 
Unless expressly stated otherwise, the copyright for items in DRO is owned by the author, with all rights reserved.

Every reasonable effort has been made to ensure that permission has been obtained for items included in DRO. If you believe that your rights have been infringed by this repository, please contact drosupport@deakin.edu.au.

Versions
Version Filter Type
Citation counts: TR Web of Science Citation Count  Cited 0 times in TR Web of Science
Scopus Citation Count Cited 0 times in Scopus
Google Scholar Search Google Scholar
Access Statistics: 407 Abstract Views, 1059 File Downloads  -  Detailed Statistics
Created: Fri, 26 Oct 2012, 11:24:52 EST

Every reasonable effort has been made to ensure that permission has been obtained for items included in DRO. If you believe that your rights have been infringed by this repository, please contact drosupport@deakin.edu.au.