{"id":1233,"date":"2019-09-27T11:58:00","date_gmt":"2019-09-27T15:58:00","guid":{"rendered":"http:\/\/community.mis.temple.edu\/seminars\/?p=1233"},"modified":"2019-09-27T16:48:16","modified_gmt":"2019-09-27T20:48:16","slug":"dennis-galletta","status":"publish","type":"post","link":"https:\/\/community.mis.temple.edu\/seminars\/dennis-galletta\/","title":{"rendered":"Oct 4 &#8211; Dennis Galletta to present &#8220;Which Phish will Bite? Two Studies of Individual Susceptibility to Phishing&#8221;"},"content":{"rendered":"<p>&nbsp;<\/p>\n<h2 style=\"text-align: center\"><strong>Which Phish will Bite? Two Studies of Individual Susceptibility to Phishing<\/strong><\/h2>\n<p style=\"text-align: center\">by<\/p>\n<p><a href=\"http:\/\/community.mis.temple.edu\/seminars\/files\/2019\/09\/dennis-pic.jpg\"><br \/>\n<img loading=\"lazy\" decoding=\"async\" class=\"wp-image-1234 size-medium aligncenter\" src=\"http:\/\/community.mis.temple.edu\/seminars\/files\/2019\/09\/dennis-pic-300x265.jpg\" alt=\"Dennis Galletta\" width=\"300\" height=\"265\" srcset=\"https:\/\/community.mis.temple.edu\/seminars\/files\/2019\/09\/dennis-pic-300x265.jpg 300w, https:\/\/community.mis.temple.edu\/seminars\/files\/2019\/09\/dennis-pic.jpg 680w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a><\/p>\n<h2 style=\"text-align: center\"><a href=\"https:\/\/www.business.pitt.edu\/people\/dennis-galletta\"><strong>Dennis Galletta<\/strong><\/a><\/h2>\n<p style=\"text-align: center\">Ben L. Fryrear Faculty Fellow, Professor of Business Administration, Director of the Doctoral Program<br \/>\nUniversity of Pittsburgh<br \/>\nKatz Graduate School of Business<\/p>\n<h2 style=\"text-align: center\"><strong>Friday, October 4<\/strong><\/h2>\n<h2 style=\"text-align: center\"><strong>10:30 \u2013 12:00 pm | Speakman 200<\/strong><\/h2>\n<p style=\"text-align: center\"><strong>Abstact:<\/strong><\/p>\n<p style=\"text-align: center\">Phishing, or the practice of sending deceptive electronic communications to acquire private information from victims, results in significant financial losses to individuals and businesses. I will cover two studies in the area of phishing. The first study attempts to identify and test situational and personality factors that might explain why certain individuals are susceptible to such attacks. We employed the Delphi method to identify seven personality factors that may influence this susceptibility (trust, distrust, curiosity, entertainment drive, boredom proneness, lack of focus, and risk propensity). Our regression model included these as well as variables examined in previous studies. We found that emails sent from a known source significantly increase user susceptibility to phishing, as does a user\u2019s curiosity, risk propensity, general Internet usage, and Internet anxiety. In post hoc tests, we also find that trust and distrust can be significant predictors of susceptibility and that this significance is dependent on the characteristics of the message. However, the results are rather weak and do not explain more than 10% of the variance in individuals&#8217; propensity to click on a link in a phishing message. The second study, in process, follows from the weak results of the first study, which approaches the antecedents to clicking on a phishing message in a different manner. We focus on heredity in this study and in our study of twins, preliminary analysis has found that heredity explains over 40% of the variance in the ability of people to discern real websites and emails from fake ones. Our first three phishing attempts largely failed, with a very low propensity of anyone to click (contrary to our first study). We have since expanded our sample, verifying email addresses right at the subject recruiting site, and are currently preparing to phish the subjects over two dozen further times. Discerning the role of heredity might help practitioners understand the need to follow up, rather than simply assuming that all users respond similarly (and immediately) to warnings and training provided to them.<\/p>\n<p>Reference: Moody, G.D., Galletta, D.F. &amp; Dunn, B.K. Eur J Inf Syst (2017) 26: 564. https:\/\/doi.org\/10.1057\/s41303-017-0058-x<\/p>\n<p>Link to the first paper: <a href=\"https:\/\/link.springer.com\/article\/10.1057\/s41303-017-0058-x\">Click here<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>&nbsp; Which Phish will Bite? Two Studies of Individual Susceptibility to Phishing by Dennis Galletta Ben L. Fryrear Faculty Fellow, Professor of Business Administration, Director of the Doctoral Program University of Pittsburgh Katz Graduate School of Business Friday, October 4 10:30 \u2013 12:00 pm | Speakman 200 Abstact: Phishing, or the practice of sending deceptive [&hellip;]<\/p>\n","protected":false},"author":17227,"featured_media":1234,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"categories":[1],"tags":[783270,783269,783266,783271,783267,783268],"class_list":{"0":"post-1233","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-uncategorized","8":"tag-click","9":"tag-delphi-method","10":"tag-dennis-galletta","11":"tag-heredity","12":"tag-phish","13":"tag-phishing-attacks","14":"entry"},"jetpack_featured_media_url":"https:\/\/community.mis.temple.edu\/seminars\/files\/2019\/09\/dennis-pic.jpg","_links":{"self":[{"href":"https:\/\/community.mis.temple.edu\/seminars\/wp-json\/wp\/v2\/posts\/1233","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/community.mis.temple.edu\/seminars\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/community.mis.temple.edu\/seminars\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/community.mis.temple.edu\/seminars\/wp-json\/wp\/v2\/users\/17227"}],"replies":[{"embeddable":true,"href":"https:\/\/community.mis.temple.edu\/seminars\/wp-json\/wp\/v2\/comments?post=1233"}],"version-history":[{"count":4,"href":"https:\/\/community.mis.temple.edu\/seminars\/wp-json\/wp\/v2\/posts\/1233\/revisions"}],"predecessor-version":[{"id":1243,"href":"https:\/\/community.mis.temple.edu\/seminars\/wp-json\/wp\/v2\/posts\/1233\/revisions\/1243"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/community.mis.temple.edu\/seminars\/wp-json\/wp\/v2\/media\/1234"}],"wp:attachment":[{"href":"https:\/\/community.mis.temple.edu\/seminars\/wp-json\/wp\/v2\/media?parent=1233"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/community.mis.temple.edu\/seminars\/wp-json\/wp\/v2\/categories?post=1233"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/community.mis.temple.edu\/seminars\/wp-json\/wp\/v2\/tags?post=1233"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}