|
网络钓鱼的影响因素:心理学的视角
|
Abstract:
[1] | 顾威(2017). 防火防盗反钓鱼2016年全球网络钓鱼总汇概览. 计算机与网络, 43(Z1), 78-84. |
[2] | 吴少华, 胡勇(2014).社会工程在APT攻击中的应用与防御. 信息安全与通信保密, (10), 93-95. |
[3] | 杨明, 杜彦辉, 刘晓娟(2012). 网络钓鱼邮件分析系统的设计与实现. 中国人民公安大学学报(自然科学版), 18(2), 61-65. |
[4] | Aaron, G. (2019). Phishing Attack Trends Report-1Q 2019. https://apwg.org/ |
[5] | Alseadoon, I., Othman, F. I., & Chan, T. Z. (2015). What Is the Influence of Users’ Characteristics on Their Ability to Detect Phishing Emails? Advanced Computer and Communication Engineering Technology, 315, 949-962.
https://doi.org/10.1007/978-3-319-07674-4_89 |
[6] | Alsharnouby, M., Alaca, F., & Chiasson, S. (2015). Why Phishing Still Works: User Strategies for Combating Phishing Attacks. International Journal of Human-Computer Studies, 82, 69-82. https://doi.org/10.1016/j.ijhcs.2015.05.005 |
[7] | Barlow, R. E. (1984). Mathematical-Theory of Reliability—A Historical-Perspective. IEEE Transactions on Reliability, 33, 16-20. https://doi.org/10.1109/TR.1984.6448269 |
[8] | Bullee, J.-W., Montoya, L., Junger, M., & Hartel, P. (2017). Spear Phishing in Organisations Explained. Information & Computer Security, 25, 593-613. https://doi.org/10.1108/ICS-03-2017-0009 |
[9] | Chancey, E. T., Bliss, J. P., Proaps, A. B., & Madhavan, P. (2015). The Role of Trust as a Mediator between System Characteristics and Response Behaviors. Human Factors: The Journal of the Human Factors and Ergonomics Society, 57, 947- 958. https://doi.org/10.1177/0018720815582261 |
[10] | Chancey, E. T., Bliss, J. P., Yamani, Y., & Handley, H. A. H. (2017).Trust and the Compliance-Reliance Paradigm: The Effects of Risk, Error Bias, and Reliability on Trust and Dependence. Human Factors: The Journal of the Human Factors and Ergonomics Society, 59, 333-345. https://doi.org/10.1177/0018720816682648 |
[11] | Chavaillaz, A., Wastell, D., & Sauer, J. (2016). System Reliability, Performance and Trust in Adaptable Automation. Applied Ergonomics, 52, 333-342. https://doi.org/10.1016/j.apergo.2015.07.012 |
[12] | Chen, J., Mishler, S., Hu, B., Li, N., & Proctor, R. W. (2018). The Description-Experience Gap in the Effect of Warning Reliability on User Trust and Performance in a Phishing-Detection Context. International Journal of Human-Computer Studies, 119, 35-47. https://doi.org/10.1016/j.ijhcs.2018.05.010 |
[13] | Chou, N., Ledesma, R., Teraguchi, Y., & Mitchell, J. C. (2004). Client-Side Defense against Web-Based Identity Theft. Proceedings of the Network and Distributed System Security Symposium (NDSS’04), San Diego, 1-8. |
[14] | Dambacher, M., Hübner, R. (2015). Time Pressure Affects the Efficiency of Perceptual Processing in Decisions under Conflict. Psychological Research, 79, 83-94. https://doi.org/10.1007/s00426-014-0542-z |
[15] | de Vries, P., Midden, C., & Bouwhuis, D. (2003). The Effects of Errors on System Trust, Self-Confidence, and the Allocation of Control in Route Planning. International Journal of Human-Computer Studies, 58, 719-735.
https://doi.org/10.1016/S1071-5819(03)00039-9 |
[16] | Downs, J. S., Holbrook, M., & Cranor, L. F. (2007). Behavioral Response to Phishing Risk. Proceedings of the Anti-Phishing Working Groups 2nd Annual eCrime Researchers Summit (eCrime’07), October 2007, 37-44.
https://doi.org/10.1145/1299015.1299019 |
[17] | Egelman, S., Cranor, L. F., & Hong, J. (2008). You’ve Been Warned: An Empirical Study of the Effectiveness of Web Browser Phishing Warnings. Proceedings of the 26th Annual Chi Conference on Human Factors in Computing Systems, April 2008, 1065-1074. https://doi.org/10.1145/1357054.1357219 |
[18] | Gefen, D., Karahanna, E., & Straub, D. W. (2003). Trust and TAM in Online Shopping: An Integrated Model. MIS Quarterly, 27, 51-90. https://doi.org/10.2307/30036519 |
[19] | Goel, S., Williams, K., & Dincelli, E. (2017). Got Phished? Internet Security and Human Vulnerability. Journal of the Asso-ciation for Information Systems, 18, 22-44. https://doi.org/10.17705/1jais.00447 |
[20] | Griffin, R. J., Neuwirth, K., Giese, J., & Dunwoody, S. (2002). Linking the Heuristic-Systematic Model and Depth of Processing. Communication Research, 29, 705-732. https://doi.org/10.1177/009365002237833 |
[21] | Halevi, T., Lewis, J., & Memon, N. (2013). A Pilot Study of Cyber Security and Privacy Related Behavior and Personality Traits. Proceedings of the 22nd International Conference on World Wide Web (IW3C2), May 2013, 737-744.
https://doi.org/10.1108/OIR-04-2015-0106 |
[22] | Harrison, B., Svetieva, E., & Vishwanath, A. (2016). Individual Processing of Phishing Emails: How Attention and Elaboration Protect against Phishing. Online Information Review, 40, 265-281. https://doi.org/10.1108/OIR-04-2015-0106 |
[23] | Hillesheim, A. J., & Rusnock, C. F. (2016). Predicting the Effects of Automation Reliability Rates on Human-Automation Team Performance. Proceedings of the 2016 Winter Simulation Conference (WSC), Washington DC, 11-14 December 2016, 1802-1813. https://doi.org/10.1109/WSC.2016.7822227 |
[24] | Holm, H., Flores, W. R., Nohlberg, M., & Ekstedt, M. (2014). An Empirical Investigation of the Effect of Target-Related Information in Phishing Attacks. Proceedings of IEEE 18th International Enterprise Distributed Object Computing Conference Workshops and Demonstrations, Ulm, 1-2 September 2014, 357-363. https://doi.org/10.1109/EDOCW.2014.59 |
[25] | Jagatic, T. N., Johnson, N. A., Jakobsson, M., & Menczer, F. (2007). Social Phishing. Communications of the ACM, 50, 94-100.
https://doi.org/10.1145/1290958.1290968 |
[26] | Modic, D., & Lea, S. E. G. (2011). How Neurotic Are Scam Victims, Really? The Big Five and Internet Scams. Proceedings of the 2011 Conference of the International Confederation for the Advancement of Behavioral Economics and Economic Psychology, 1-23. https://doi.org/10.2139/ssrn.2448130 |
[27] | Moody, G. D., Galletta, D. F., & Dunn, B. K. (2017). Which Phish Get Caught? An Exploratory Study of Individuals’ Susceptibility to Phishing. European Journal of Information Systems, 26, 564-584.
https://doi.org/10.1057/s41303-017-0058-x |
[28] | Nicholson, J., Coventry, L., & Briggs, P. (2017). Can We Fight Social Engineering Attacks by Social Means? Assessing Social Salience as a Means to Improve Phish Detection. Proceedings of the Thirteenth Symposium on Usable Privacy and Security (SOUPS13), Santa Clara, 12-14 July 2017, 285-298. |
[29] | Ramesh, G., Selvakumar, K., & Venugopal, A. (2017). Intelligent Explanation Generation System for Phishing Webpages by Employing an Inference System. Behaviour& Information Technology, 36, 1244-1260.
https://doi.org/10.1080/0144929X.2017.1369569 |
[30] | Sharples, S., Stedmon, A., Cox, G. et al. (2007). Flightdeck and Air Traffic Control Collaboration Evaluation (FACE): Evaluating Aviation Communication in the Laboratory and Field. Applied Ergonomics, 38, 399-407.
https://doi.org/10.1016/j.apergo.2007.01.012 |
[31] | Spain, R. D., & Bliss, J. P. (2008). The Effect of Sonification Display pulse Rate and Reliability on Operator Trust and Perceived Workload during a Simulated Patient Monitoring Task. Ergonomics, 51, 1320-1337.
https://doi.org/10.1080/00140130802120234 |
[32] | Vishwanath, A. (2015). Examining the Distinct Antecedents of E-Mail Habits and Its Influence on the Outcomes of a Phishing Attack. Journal of Computer-Mediated Communication, 20, 570-584. https://doi.org/10.1111/jcc4.12126 |
[33] | Vishwanath, A., Harrison, B., & Ng, Y. J. (2018). Suspicion, Cognition, and Automaticity Model of Phishing Susceptibility. Communication Research, 45, 1146-1166. https://doi.org/10.1177/0093650215627483 |
[34] | Vishwanath, A., Herath, T., Chen, R. et al. (2011). Why Do People Get Phished? Testing Individual Differences in Phishing vulnerability within an Integrated, Information Processing Model. Decision Support Systems, 51, 576-586.
https://doi.org/10.1016/j.dss.2011.03.002 |
[35] | Wang, J. G., Herath, T., Chen, R., Vishwanath, A., & Rao, H. R. (2012). Phishing Susceptibility: An Investigation Into the Processing of a Targeted Spear Phishing Email. IEEE Transactions on Professional Communication, 55, 345-362.
https://doi.org/10.1109/TPC.2012.2208392 |
[36] | Weirich, D., & Sasse, M. A. (2001). Pretty Good Persuasion: A First Step towards Effective Password Security in the Real World. Proceedings of the 2001 Workshop on New Security Paradigms (NSPW’12), September 2001, 137-143.
https://doi.org/10.1145/508171.508195 |
[37] | Welk, A. K., Hong, K. W., Zielinska, O. A. et al. (2015). Will the Phisher-Men” Reel You In?: Assessing Individual Differences in a Phishing Detection Task. International Journal of Cyber Behavior, Psychology and Learning, 5, 1-17.
https://doi.org/10.4018/IJCBPL.2015100101 |
[38] | Wright, R. T., Jensen, M. L., Thatcher, J. B. et al. (2014). Influence Techniques in Phishing Attacks: An Examination of Vulnerability and Resistance. Information Systems Research, 25, 385-400. https://doi.org/10.1287/isre.2014.0522 |
[39] | Wright, R., Chakraborty, S., Basoglu, A., & Marett, K. (2010). Where Did They Go Right? Understanding the Deception in Phishing Communications. Group Decision and Negotiation, 19, 391-416. https://doi.org/10.1007/s10726-009-9167-9 |