Situational Contingencies in Susceptibility of Social Media to Phishing: A Temptation and Restraint Model

IF 5.9 2区 管理学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS
Hamed Qahri-Saremi, O. Turel
{"title":"Situational Contingencies in Susceptibility of Social Media to Phishing: A Temptation and Restraint Model","authors":"Hamed Qahri-Saremi, O. Turel","doi":"10.1080/07421222.2023.2196779","DOIUrl":null,"url":null,"abstract":"ABSTRACT User susceptibility to phishing messages on social media is a growing information security concern. Contingency factors that can influence this susceptibility and the theoretical mechanisms through which they operate need more scholarly attention. To bridge this gap, we present a temptation and restraint (TR) model (a specific manifestation of the dual–system theory) of social media phishing susceptibility, which explains it as an outcome of a struggle between users’ temptation toward engaging with a social media phishing message and their cognitive and behavioral restraint against it. The balance in this struggle is a function of various situational contingencies. First, via a Delphi study, we identify four key situational contingency factors in the context of social media that can influence this balance: (1) poor sleep quality, (2) social media ostracism, (3) source likability, and (4) fear appeals. Next, via five randomized controlled experiments using an ostensible social media paradigm with social media users, we show that the TR model explains (a) why and how users engage with social media phishing messages, and (b) when users are more or less susceptible to it based on key situational contingency factors. Our findings offer a nuanced perspective on social media phishing susceptibility, elucidate the fundamental roles of situational contingencies in the genesis of social media phishing victimization, and delineate important directions for future research in this area","PeriodicalId":50154,"journal":{"name":"Journal of Management Information Systems","volume":"40 1","pages":"503 - 540"},"PeriodicalIF":5.9000,"publicationDate":"2023-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Journal of Management Information Systems","FirstCategoryId":"91","ListUrlMain":"https://doi.org/10.1080/07421222.2023.2196779","RegionNum":2,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"COMPUTER SCIENCE, INFORMATION SYSTEMS","Score":null,"Total":0}
引用次数: 0

Abstract

ABSTRACT User susceptibility to phishing messages on social media is a growing information security concern. Contingency factors that can influence this susceptibility and the theoretical mechanisms through which they operate need more scholarly attention. To bridge this gap, we present a temptation and restraint (TR) model (a specific manifestation of the dual–system theory) of social media phishing susceptibility, which explains it as an outcome of a struggle between users’ temptation toward engaging with a social media phishing message and their cognitive and behavioral restraint against it. The balance in this struggle is a function of various situational contingencies. First, via a Delphi study, we identify four key situational contingency factors in the context of social media that can influence this balance: (1) poor sleep quality, (2) social media ostracism, (3) source likability, and (4) fear appeals. Next, via five randomized controlled experiments using an ostensible social media paradigm with social media users, we show that the TR model explains (a) why and how users engage with social media phishing messages, and (b) when users are more or less susceptible to it based on key situational contingency factors. Our findings offer a nuanced perspective on social media phishing susceptibility, elucidate the fundamental roles of situational contingencies in the genesis of social media phishing victimization, and delineate important directions for future research in this area
社交媒体易受网络钓鱼影响的情景偶然性:一个诱惑和约束模型
摘要用户对社交媒体上钓鱼消息的易感性是一个日益增长的信息安全问题。可以影响这种易感性的偶然因素及其运作的理论机制需要更多的学术关注。为了弥补这一差距,我们提出了一个社交媒体钓鱼易感性的诱惑和约束(TR)模型(双系统理论的具体表现),该模型将其解释为用户参与社交媒体钓鱼消息的诱惑与他们对其的认知和行为约束之间斗争的结果。这场斗争的平衡是各种突发情况的作用。首先,通过德尔菲研究,我们确定了社交媒体背景下四个关键的情境偶然因素,这些因素可以影响这种平衡:(1) 睡眠质量差,(2) 社交媒体排斥,(3) 来源喜爱度,以及(4) 恐惧诉求。接下来,通过对社交媒体用户使用表面上的社交媒体范式进行的五项随机对照实验,我们发现TR模型解释了(a)用户为什么以及如何参与社交媒体钓鱼消息,以及(b)基于关键的情境偶然性因素,用户何时或多或少地容易受到影响。我们的研究结果为社交媒体网络钓鱼的易感性提供了一个细致入微的视角,阐明了情境突发事件在社交媒体网络捕鱼受害发生中的基本作用,并为该领域未来的研究指明了重要方向
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
Journal of Management Information Systems
Journal of Management Information Systems 工程技术-计算机:信息系统
CiteScore
10.20
自引率
13.00%
发文量
34
审稿时长
6 months
期刊介绍: Journal of Management Information Systems is a widely recognized forum for the presentation of research that advances the practice and understanding of organizational information systems. It serves those investigating new modes of information delivery and the changing landscape of information policy making, as well as practitioners and executives managing the information resource.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信