Skip to main content

What Instills Trust? A Qualitative Study of Phishing

  • Conference paper
Financial Cryptography and Data Security (FC 2007)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 4886))

Included in the following conference series:


This paper reports the highlights of a user study which gauges reactions to a variety of common “trust indicators” – such as logos, third party endorsements, and padlock icons – over a selection of authentic and phishing stimuli. In the course of the think-aloud protocol, participants revealed different sensitivities to email messages and web pages. Our principal result is the analysis of what makes phishing emails and web pages appear authentic. This is not only of interest from a pure scientific point of view, but can also guide the design of legitimate material to avoid unnecessary risks. A second result of ours are observations of what makes legitimate content appear dubious to consumers. This is a result with obvious applications to online advertising.

The original version of this chapter was revised: The copyright line was incorrect. This has been corrected. The Erratum to this chapter is available at DOI: 10.1007/978-3-540-77366-5_37

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. Camtasia Studio Screen Recorder for Demos, Presentations and Training, Camtasia Studio 4, TechSmith Corportation (2006),

  2. Dhamija, R., Tygar, J.D., Hearst, M.: Why phishing works. In: CHI 2006. Proceedings of the SIGCHI conference on Human Factors in computing systems, pp. 581–590. ACM Press, New York (2006)

    Google Scholar 

  3. Downs, J.S., Holbrook, M.B., Cranor, L.F.: Decision strategies and susceptibility to phishing. In: SOUPS 2006. Proceedings of the second symposium on Usable privacy and security, pp. 79–90. ACM Press, New York (2006)

    Google Scholar 

  4. Friedman, B., Hurley, D., Howe, D.C., Felten, E., Nissenbaum, H.: Users’ conceptions of web security: A comparative study. In: CHI 2002. extended abstracts on Human factors in computing systems, pp. 746–747. ACM Press, New York (2002)

    Google Scholar 

  5. Griffith, V., Jakobsson, M.: Messin’ with Texas, Deriving Mother’s Maiden Names Using Public Records. In: Ioannidis, J., Keromytis, A.D., Yung, M. (eds.) ACNS 2005. LNCS, vol. 3531, Springer, Heidelberg (2005)

    Google Scholar 

  6. Jakobsson, M., Ratkiewicz, J.: Designing Ethical Phishing Experiments: A Study of (ROT13) rOnl Query Features. In: WWW 2006 (2006)

    Google Scholar 

  7. Whalen, T., Inkpen, K.M.: Gathering evidence: Use of visual security cues in web browsers. In: Graphics Interface 2005. ACM International Conference Proceeding Series, vol. 112. pp. 137–144. Canadian Human-Computer Communications Society, Waterloo (2005)

    Google Scholar 

  8. Likert, Rensis.: A technique for the measurement of attitudes. Archives of Psychology 140 (June 1932)

    Google Scholar 

Download references

Author information

Authors and Affiliations


Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2007 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Jakobsson, M., Tsow, A., Shah, A., Blevis, E., Lim, YK. (2007). What Instills Trust? A Qualitative Study of Phishing. In: Dietrich, S., Dhamija, R. (eds) Financial Cryptography and Data Security. FC 2007. Lecture Notes in Computer Science, vol 4886. Springer, Berlin, Heidelberg.

Download citation

  • DOI:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-77365-8

  • Online ISBN: 978-3-540-77366-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics