Author
Listed:
- Maria Smeou
(Department of Economics, University of Macedonia, Thessaloniki, Greece)
- Maria Perifanou
(��SMILE Lab, University of Macedonia, Thessaloniki, Greece)
- Anastasios A. Economides
(��Department of Economics and SMILE lab, University of Macedonia, Thessaloniki, Greece)
Abstract
Phishers target Internet users and send them phishing emails or create phishing websites to deceive victims and extract financial gains. This study investigated the factors that affect Internet users in phishing detection. The responses of 252 participants to an online survey were collected and analysed. Participants were mostly careful when a website requested urgent action, its content had errors, or an email message asked recipients to give personal information or click a suspicious link. They believed that education about phishing, email filtering software, and connecting directly to the official website, and not through a link, were the best practices. They also stated that they could learn how to easily detect phishing attempts and evaluate whether an email was spam, advertising, phishing, or a scam. It was also found that the creation of blacklists and whitelists did not provide sufficient protection against phishing, active warnings were more effective than passive warnings, and users were receiving phishing emails that escaped email filtering and antivirus software. Further statistical analysis of their responses revealed that there was a moderate positive correlation between each of the variables Self-Efficacy in Phishing Detection, Information Evaluation Skills, E-Banking Phishing Detection Skills with Phishing Detection Effectiveness. Finally, it was found that the Facilitating Conditions for Phishing Detection, E-Banking Phishing Detection Skills, and E-Mail Phishing Detection Skills influenced Phishing Detection Effectiveness.
Suggested Citation
Maria Smeou & Maria Perifanou & Anastasios A. Economides, 2025.
"Factors Affecting Internet Users’ Effectiveness to Detect Phishing,"
Journal of Information & Knowledge Management (JIKM), World Scientific Publishing Co. Pte. Ltd., vol. 24(04), pages 1-37, August.
Handle:
RePEc:wsi:jikmxx:v:24:y:2025:i:04:n:s0219649225500297
DOI: 10.1142/S0219649225500297
Download full text from publisher
As the access to this document is restricted, you may want to
for a different version of it.
Corrections
All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:wsi:jikmxx:v:24:y:2025:i:04:n:s0219649225500297. See general information about how to correct material in RePEc.
If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.
We have no bibliographic references for this item. You can help adding them by using this form .
If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.
For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Tai Tone Lim (email available below). General contact details of provider: http://www.worldscinet.com/jikm/jikm.shtml .
Please note that corrections may take a couple of weeks to filter through
the various RePEc services.