Deceit and Deception: A Large User Study of Phishing

نویسندگان

  • Alex Tsow
  • Markus Jakobsson
چکیده

This study is a large scale investigation of trust manipulation tactics used by phishing web sites and email messages. The experiment focuses on media authenticity evaluations, rather than content credibility with the assumption that its authors are known. It tests the effect of features ranging from URL plausibility to trust endorsement graphics on a population of 398 subjects. The experiment presents these trust indicators in a variety of stimuli since reactions will vary according to context. In addition to testing specific features, the test gauges the potential of a phishing tactic that spoofs third party program administrators rather than a brand itself. The results show that indeed graphic design can change authenticity evaluations and that their impact varies with context. We expected that authenticity inspiring design changes would have the opposite effect when paired with an unreasonable request, however our data suggest that narrative strength – rather than underlying legitimacy – limits the impact of graphic design on trust and that these authenticity-inspiring design features improve trust in both genuine and forged media.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Technical Report: Detecting Mobile Application Spoofing Attacks by Leveraging User Visual Similarity Perception

Mobile application spoofing is an attack where a malicious mobile app mimics the visual appearance of another one. A common example of mobile application spoofing is a phishing attack where the adversary tricks the user into revealing her password to a malicious app that resembles the legitimate one. In this paper, we propose a novel spoofing detection approach, tailored to the protection of mo...

متن کامل

Designing and Conducting Phishing Experiments

We describe ethical and procedural aspects of setting up and conducting phishing experiments, drawing on experience gained from being involved in the design and execution of a sequence of phishing experiments (second author), and from being involved in the review of such experiments at the Institutional Review Board (IRB) level (first author). We describe the roles of consent, deception, debrie...

متن کامل

CERIAS Tech Report 2015-11 Using Deception to Enhance Security: A Taxonomy, Model, and Novel Uses

Almeshekah, Mohammed H. PhD, Purdue University, August 2015. Using Deception to Enhance Security: A Taxonomy, Model, and Novel Uses. Major Professors: Eugene H. Spafford and Mikhail J. Atallah. As the convergence between our physical and digital worlds continue at a rapid pace, securing our digital information is vital to our prosperity. Most current typi­ cal computer systems are unwittingly h...

متن کامل

Unweaving the Phisher's Net: An Exploratory Study

Over 29,000 phishing emails are reported each month on average to the AntiPhishing Working Group. If we consider that at least 5% of these emails achieve their target, at least 1,450 distinct email users a month are caught in the phisher’s net. This study attempts to understand the basic deception techniques utilized by phishers when creating the phishing emails. Exploratory content and linguis...

متن کامل

Extending Ecommerce Deception to Phishing

Phishing threatens the information security of Internet users and corporations. Where most research focuses on the phisher’s website, i.e., how to determine if a website is legitimate or not, this study examines the email that begins the phishing process. To understand why Internet consumers respond to phisher’s emails by sharing sensitive information, we draw on models of e-commerce deception ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2007