Cited time in webofscience Cited time in scopus

Full metadata record

DC Field Value Language
dc.contributor.author Kim, Daejoong -
dc.contributor.author Kim, Jang Hyun -
dc.date.available 2017-07-05T08:58:12Z -
dc.date.created 2017-04-10 -
dc.date.issued 2013-01 -
dc.identifier.issn 1468-4527 -
dc.identifier.uri http://hdl.handle.net/20.500.11750/2450 -
dc.description.abstract The purpose of this paper is to provide an in-depth content analysis of phishing messages and to enhance understanding of them from a persuasive communication perspective. This study analysed phishing message content in a persuasion mechanism framework including message presentation and content (rational appeal, emotional appeal, reasoning type). It also used semantic network analysis to identify meaning structure. The results indicate that phishing messages used logical appeals, reasoning from cause, motivational appeals, appealing to safety needs, and emotional appeals to gain compliance. Semantic network analysis showed that two word clusters represent security and privacy. This study applied modern persuasion and deceptive communication theories to interpret phishing e-mails. The findings enhance relevant theories by including phishing e-mail cases. The results of this study can be utilised for developing phishing prevention techniques and phishing detection software. Past phishing detection studies only used a technological approach, whereas the current study provides a more comprehensive content-oriented and persuasion theory-based understanding of phishing messages. © 2013, Emerald Group Publishing Limited -
dc.language English -
dc.publisher Emerald Group Publishing -
dc.title Understanding persuasive elements in phishing e-mails A categorical content and semantic network analysis -
dc.type Article -
dc.identifier.doi 10.1108/OIR-03-2012-0037 -
dc.identifier.wosid 000327803300002 -
dc.identifier.scopusid 2-s2.0-84887493574 -
dc.identifier.bibliographicCitation Online Information Review, v.37, no.6, pp.835 - 850 -
dc.description.isOpenAccess FALSE -
dc.subject.keywordAuthor Content analysis -
dc.subject.keywordAuthor Credibility -
dc.subject.keywordAuthor Network analysis -
dc.subject.keywordAuthor Persuasion -
dc.subject.keywordAuthor Phishing -
dc.citation.endPage 850 -
dc.citation.number 6 -
dc.citation.startPage 835 -
dc.citation.title Online Information Review -
dc.citation.volume 37 -
dc.description.journalRegisteredClass scie -
dc.description.journalRegisteredClass ssci -
dc.description.journalRegisteredClass scopus -
dc.relation.journalResearchArea Computer Science; Information Science & Library Science -
dc.relation.journalWebOfScienceCategory Computer Science, Information Systems; Information Science & Library Science -
dc.type.docType Article -
Files in This Item:

There are no files associated with this item.

Appears in Collections:
School of Undergraduate Studies 1. Journal Articles

qrcode

  • twitter
  • facebook
  • mendeley

Items in Repository are protected by copyright, with all rights reserved, unless otherwise indicated.

BROWSE