What Instills Trust? A Qualitative Study of Phishing

  • Markus Jakobsson
  • Alex Tsow
  • Ankur Shah
  • Eli Blevis
  • Youn-Kyung Lim
Conference paper

DOI: 10.1007/978-3-540-77366-5_32

Part of the Lecture Notes in Computer Science book series (LNCS, volume 4886)
Cite this paper as:
Jakobsson M., Tsow A., Shah A., Blevis E., Lim YK. (2007) What Instills Trust? A Qualitative Study of Phishing. In: Dietrich S., Dhamija R. (eds) Financial Cryptography and Data Security. FC 2007. Lecture Notes in Computer Science, vol 4886. Springer, Berlin, Heidelberg

Abstract

This paper reports the highlights of a user study which gauges reactions to a variety of common “trust indicators” – such as logos, third party endorsements, and padlock icons – over a selection of authentic and phishing stimuli. In the course of the think-aloud protocol, participants revealed different sensitivities to email messages and web pages. Our principal result is the analysis of what makes phishing emails and web pages appear authentic. This is not only of interest from a pure scientific point of view, but can also guide the design of legitimate material to avoid unnecessary risks. A second result of ours are observations of what makes legitimate content appear dubious to consumers. This is a result with obvious applications to online advertising.

Keywords

authenticity design email experiment phishing psychology stimuli think-aloud user interface design web pages 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Copyright information

© Springer-Verlag Berlin Heidelberg 2007

Authors and Affiliations

  • Markus Jakobsson
    • 1
  • Alex Tsow
    • 2
  • Ankur Shah
    • 2
  • Eli Blevis
    • 2
  • Youn-Kyung Lim
    • 2
  1. 1.Bloomington and RavenWhite Inc.Indiana University 
  2. 2.Indiana UniversityBloomington 

Personalised recommendations