Cited 5 time in
Cited 5 time in
Understanding persuasive elements in phishing e-mails A categorical content and semantic network analysis
- Understanding persuasive elements in phishing e-mails A categorical content and semantic network analysis
- Kim, D[Kim, Daejoong]; Kim, JH[Kim, Jang Hyun]
- DGIST Authors
- Kim, JH[Kim, Jang Hyun]
- Issue Date
- Online Information Review, 37(6), 835-850
- Article Type
- Communication; Computer Crime; Content Analysis; Credibility; Deceptive Communication; Design/Methodology/Approach; Electric Network Analysis; Electronic Mail; Network Analysis; Persuasion; Phishing; Prevention Techniques; Semantic Network Analysis
- The purpose of this paper is to provide an in-depth content analysis of phishing messages and to enhance understanding of them from a persuasive communication perspective. This study analysed phishing message content in a persuasion mechanism framework including message presentation and content (rational appeal, emotional appeal, reasoning type). It also used semantic network analysis to identify meaning structure. The results indicate that phishing messages used logical appeals, reasoning from cause, motivational appeals, appealing to safety needs, and emotional appeals to gain compliance. Semantic network analysis showed that two word clusters represent security and privacy. This study applied modern persuasion and deceptive communication theories to interpret phishing e-mails. The findings enhance relevant theories by including phishing e-mail cases. The results of this study can be utilised for developing phishing prevention techniques and phishing detection software. Past phishing detection studies only used a technological approach, whereas the current study provides a more comprehensive content-oriented and persuasion theory-based understanding of phishing messages. © 2013, Emerald Group Publishing Limited
- Emerald Group Publishing
There are no files associated with this item.
- School of Undergraduate Studies1. Journal Articles
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.