ScienceDaily (6 month 2011) communications researchers at four major found that if you get lots of email, habitually respond to the substantial part of it to keep a lot of online relationships, manage a large number of transactions over the Internet, they are more sensitive e-mail phishing expeditions than those who restrict their online activity.
The research, "why do people get Phished?" forthcoming in the journal, decision support systems, e-commerce, an integrated information processing model to examine differences in the individual vulnerability to phishing.
The research is relevant, given the rash of phishing expeditions that have become public, the online marketing firm Epsilon, the database whose last week was breached by hackers, which could affect millions of network marketing distributors and retail customers banking involving your invitation.
The authors are closet "Vish" Vishwanath, PhD, Professor in the College of communication arts and Sciences, UB, an expert in consumer behavior, especially diffusion and acceptance of information technology; H. Raghav Rao, Professor Emeritus, SUNY UB Department of science of service systems management, school of management, who conducts research on decision support systems, e-business, systems, emergency management and security; Brock University, Tejaswini Herath, Dr., (Ont, CA); Dr Rui Chen, Ball State University, and Wang Jingguo, PhD, University of Texas, Arlington. Herath, Chen, Wang earned degrees from all UB.
Email "phishing" is a process that employs techniques such as using names of reputable businesses (American Express, eBay), government institutions (the internal revenue service, Department of motor vehicles) or current events (political donations, Beijing Olympic tickets, and assists the victims of Katrina) in combination with a fear, Threat, excitement, or urgency, and convince people to respond with personal and sensitive information, such as user names, passwords, credit card information.
Phishing exploits what are typically have poor security technologies of the Internet, but Vishwanath says, "the way of avoiding spam blockers, we are required to reduce the number of unnecessary emails to people who could potentially confuse their judgment information processing.
"At the other end," he says, "people should be careful when taking advantage of very mailbox unit to respond to all email. An effective strategy is to use a different e-mail accounts for different purposes. If one e-mail address is used only for the banking, another is used only for personal communication with family and friends, this increase the attention to details email, reduce the likelihood of a chance of misleading due to the load. "
Vishwanath also advocates setting time aside to focus on and respond to email messages separately from personal e-mail in matters of work. For example, setting aside time each day for a personal reply email banking gives you time to process them clearly consider the legitimacy of their before responding.
Integrated information processing model of this study were phishing mtltlim, and previous research in interpersonal and level information processing.
We refined and validated our "model with a sample of the intended victims of an attack from an actual phishing," Vishwanath said.
In General, their model explains nearly fifty percent of phishing bmatltlim.
"Our results indicate that people process the most phishing emails are interested in making decisions based on the simple clues embedded in the email. Interestingly, the urgency for clues, that is, threats and warnings, stimulation email is processed, the short-circuiting the resources available to address other clues that can help identify potentially the deception.
"Our findings suggest that media usage patterns of mhsorm combined with high levels of email load must have a strong and significant effect on the chances of people being phished".
The study also showed that the competency of a person with computing does not protect you from phishing scams, but their awareness about healthy habits with phishing emails, help them prevent online fraud.
Email or share this story:
The source of the story:
The above story printed (with writers adaptations by a teamdaily science) from materials provided by University at Buffalo.
A journal:
- Arun Vishwanath, Tejaswini Herath, Rui Chen, Wang Jingguo, h. Raghav Rao. Why do people get phished? phishing vulnerability checking individual differences within an integrated information processing model,. Decision support systems, 2011; DOI: 10.1016/j. dss. March .002 2011.
Note: If no source is cited, instead.
Disclaimer: hdioth in this article do not necessarily reflect those of his team or ScienceDaily.