Mobile device users' susceptibility to phishing attacks

03/02/2022
by   F. Ley Sylvester, et al.
0

The mobile device is one of the fasted growing technologies that is widely used in a diversifying sector. Mobile devices are used for everyday life, such as personal information exchange - chatting, email, shopping, and mobile banking, contributing to information security threats. Users' behavior can influence information security threats. More research is needed to understand users' threat avoidance behavior and motivation. Using Technology threat avoidance theory (TTAT), this study assessed factors that influenced mobile device users' threat avoidance motivations and behaviors as it relates to phishing attacks. From the data collected from 137 mobile device users using a questionnaire, the findings indicate that (1) mobile device users' perceived susceptibility and severity of phishing attacks have a significant correlation with a users' perception of the threat; (2) mobile device users' motivation to avoid a threat is correlated to a users' behavior in avoiding threat; and (3) a mobile device user's susceptibility to phishing attacks can be reduced by their perception of the threat. These findings reveal that a user's perception of threat increases if they perceive that the consequence of such threat to their mobile devices will be severe, thereby increasing a user's motivation and behavior to avoid phishing attack threats. This study is beneficial to mobile device users in personal and organizational settings.

READ FULL TEXT

page 8

page 9

research
04/03/2023

What You See is Not What You Get: The Role of Email Presentation in Phishing Susceptibility

Phishing is one of the most prevalent social engineering attacks that ta...
research
02/23/2022

BYOD Security: A Study of Human Dimensions

The prevalence and maturity of Bring Your Own Device (BYOD) security alo...
research
06/24/2019

Evaluating the Information Security Awareness of Smartphone Users

Information security awareness (ISA) is a practice focused on the set of...
research
09/01/2018

A Graph Based Framework for Malicious Insider Threat Detection

While most security projects have focused on fending off attacks coming ...
research
11/19/2020

KeyGuard: Using Selective Encryption to Mitigate Keylogging in Third-Party IME

As mobile devices become ubiquitous, people around the world have enjoye...
research
05/11/2020

Threat modeling framework for mobile communication systems

Due to the complex nature of mobile communication systems, most of the s...

Please sign up or login with your details

Forgot password? Click here to reset