How the big five psychological factors affect phishing: A literature review
Phishing is a social engineering attack which intends to steal information from an intended victim by masquerading as a reputable source. It is a ubiquitous problem in modern day society and organizations, which is not likely to slow down. The Big Five psychological factors model is one which is wid...
        Saved in:
      
    
          | Published in | International Journal of Human Resource Development Practice Policy & Research Vol. 8; no. 2; pp. 100 - 113 | 
|---|---|
| Main Authors | , | 
| Format | Journal Article | 
| Language | English | 
| Published | 
            Sciendo
    
        01.12.2024
     | 
| Subjects | |
| Online Access | Get full text | 
| ISSN | 2397-4583 2397-4575 2397-4583  | 
| DOI | 10.2478/ijhrd-2024-0007 | 
Cover
| Abstract | Phishing is a social engineering attack which intends to steal information from an intended victim by masquerading as a reputable source. It is a ubiquitous problem in modern day society and organizations, which is not likely to slow down.
The Big Five psychological factors model is one which is widely used and has been shown to largely explain how someone behaves.
Yet the results of the Big Five factors’ interface with phishing response is not clear as of yet. The purpose of this study was to elucidate the interactions between phishing and the Big Five factors.
This study used an integrative literature review method to examine the relationship between the Big Five psychological factors and the phishing response. This theoretical model developed from the research can then be used to suggest human resource development (HRD) interventions within organizations. Such interventions can aid both the organizations and their employees to avoid the negative outcomes from phishing. | 
    
|---|---|
| AbstractList | Phishing is a social engineering attack which intends to steal information from an intended victim by masquerading as a reputable source. It is a ubiquitous problem in modern day society and organizations, which is not likely to slow down.
The Big Five psychological factors model is one which is widely used and has been shown to largely explain how someone behaves.
Yet the results of the Big Five factors’ interface with phishing response is not clear as of yet. The purpose of this study was to elucidate the interactions between phishing and the Big Five factors.
This study used an integrative literature review method to examine the relationship between the Big Five psychological factors and the phishing response. This theoretical model developed from the research can then be used to suggest human resource development (HRD) interventions within organizations. Such interventions can aid both the organizations and their employees to avoid the negative outcomes from phishing. | 
    
| Author | Russ-Eft, Darlene Gordon, Alex  | 
    
| Author_xml | – sequence: 1 givenname: Alex surname: Gordon fullname: Gordon, Alex email: gordo186@purdue.edu organization: Purdue University – sequence: 2 givenname: Darlene surname: Russ-Eft fullname: Russ-Eft, Darlene organization: Purdue University  | 
    
| BookMark | eNqNkL1OwzAYRS1UJErpzOoXCPVvnCCWqgKKqMQCc-Q4nxNXIYnspFXenpQysCAx3bucK91zjWZN2wBCt5TcMaGSldtXvogYYSIihKgLNGc8VZGQCZ_96ldoGYLLieRMcBnTOXrdtkfcV4BzV2LrDoC7MJqqrdvSGV1jq03f-oC1tWB63FUuVK4p7_Ea164Hr_vBA_ZwcHC8QZdW1wGWP7lAH0-P75tttHt7ftmsd5GhXJCIqjyGBGSiU6a4VBArqUyektxIY42IYya5ZTQtdJILwgWPlSnAJLHhlkjKF4icd4em0-NR13XWefep_ZhRkp18ZN8-spOP7ORjQlZnxPg2BA_2H8TDmZj2p58FlH4Yp5Lt28E3072_yIRRQvgXdOJ5kQ | 
    
| Cites_doi | 10.1109/QICAR61538.2024.10496606 10.1111/j.1744-6570.1991.tb00688.x 10.1111/jopy.12663 10.1016/j.ijhcs.2015.05.005 10.1109/eCrime47957.2019.9037502 10.1145/3320269.3384753 10.1007/978-981-33-4062-6_3 10.7182/prtr.15.1.0n13660r26g725kj 10.1111/jcc4.12126 10.2139/ssrn.2544742 10.1002/acp.4075 10.1177/1534484316671606 10.1007/978-3-319-96077-7_42 10.1109/COGSIMA.2016.7497779 10.19107/IJISC.2021.02.07 10.1109/eCrime57793.2022.10142078 10.1073/pnas.1908430116 10.1037//0022-3514.59.6.1216 10.1016/j.apergo.2020.103084 10.1109/ACCESS.2022.3190009 10.1016/S1361-3723(21)00038-5 10.1016/j.apergo.2021.103526 10.1002/9781118970843.ch186 10.1080/13803391003689770 10.1007/978-3-319-07674-4_89 10.3389/feduc.2021.807277  | 
    
| ContentType | Journal Article | 
    
| DBID | AAYXX CITATION ADTOC UNPAY  | 
    
| DOI | 10.2478/ijhrd-2024-0007 | 
    
| DatabaseName | CrossRef Unpaywall for CDI: Periodical Content Unpaywall  | 
    
| DatabaseTitle | CrossRef | 
    
| DatabaseTitleList | CrossRef  | 
    
| Database_xml | – sequence: 1 dbid: UNPAY name: Unpaywall url: https://proxy.k.utb.cz/login?url=https://unpaywall.org/ sourceTypes: Open Access Repository  | 
    
| DeliveryMethod | fulltext_linktorsrc | 
    
| EISSN | 2397-4583 | 
    
| EndPage | 113 | 
    
| ExternalDocumentID | 10.2478/ijhrd-2024-0007 10_2478_ijhrd_2024_0007 10_2478_ijhrd_2024_000782100  | 
    
| GroupedDBID | 9WM AATOW ABFKT AHGSO ALMA_UNASSIGNED_HOLDINGS QD8 SLJYH AAYXX CITATION ADTOC AKVCP UNPAY  | 
    
| ID | FETCH-LOGICAL-c1340-17b6e8e58a927357e6757cb90bc5cfc466253f219da8b4034367cdec86c3f0513 | 
    
| IEDL.DBID | UNPAY | 
    
| ISSN | 2397-4583 2397-4575  | 
    
| IngestDate | Sun Sep 07 11:21:57 EDT 2025 Wed Oct 01 06:31:42 EDT 2025 Thu Jul 10 10:28:49 EDT 2025  | 
    
| IsDoiOpenAccess | true | 
    
| IsOpenAccess | true | 
    
| IsPeerReviewed | true | 
    
| IsScholarly | true | 
    
| Issue | 2 | 
    
| Language | English | 
    
| License | This work is licensed under the Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License. http://creativecommons.org/licenses/by-nc-nd/4.0  | 
    
| LinkModel | DirectLink | 
    
| MergedId | FETCHMERGED-LOGICAL-c1340-17b6e8e58a927357e6757cb90bc5cfc466253f219da8b4034367cdec86c3f0513 | 
    
| OpenAccessLink | https://proxy.k.utb.cz/login?url=https://doi.org/10.2478/ijhrd-2024-0007 | 
    
| PageCount | 14 | 
    
| ParticipantIDs | unpaywall_primary_10_2478_ijhrd_2024_0007 crossref_primary_10_2478_ijhrd_2024_0007 walterdegruyter_journals_10_2478_ijhrd_2024_000782100  | 
    
| ProviderPackageCode | CITATION AAYXX  | 
    
| PublicationCentury | 2000 | 
    
| PublicationDate | 2024-12-01 | 
    
| PublicationDateYYYYMMDD | 2024-12-01 | 
    
| PublicationDate_xml | – month: 12 year: 2024 text: 2024-12-01 day: 01  | 
    
| PublicationDecade | 2020 | 
    
| PublicationTitle | International Journal of Human Resource Development Practice Policy & Research | 
    
| PublicationYear | 2024 | 
    
| Publisher | Sciendo | 
    
| Publisher_xml | – name: Sciendo | 
    
| References | 2025042315173397021_j_ijhrd-2024-0007_ref_041 2025042315173397021_j_ijhrd-2024-0007_ref_040 2025042315173397021_j_ijhrd-2024-0007_ref_005 2025042315173397021_j_ijhrd-2024-0007_ref_027 2025042315173397021_j_ijhrd-2024-0007_ref_004 2025042315173397021_j_ijhrd-2024-0007_ref_026 2025042315173397021_j_ijhrd-2024-0007_ref_003 2025042315173397021_j_ijhrd-2024-0007_ref_025 2025042315173397021_j_ijhrd-2024-0007_ref_002 2025042315173397021_j_ijhrd-2024-0007_ref_024 2025042315173397021_j_ijhrd-2024-0007_ref_001 2025042315173397021_j_ijhrd-2024-0007_ref_023 2025042315173397021_j_ijhrd-2024-0007_ref_022 2025042315173397021_j_ijhrd-2024-0007_ref_021 2025042315173397021_j_ijhrd-2024-0007_ref_020 2025042315173397021_j_ijhrd-2024-0007_ref_042 2025042315173397021_j_ijhrd-2024-0007_ref_009 2025042315173397021_j_ijhrd-2024-0007_ref_008 2025042315173397021_j_ijhrd-2024-0007_ref_007 2025042315173397021_j_ijhrd-2024-0007_ref_029 2025042315173397021_j_ijhrd-2024-0007_ref_006 2025042315173397021_j_ijhrd-2024-0007_ref_028 2025042315173397021_j_ijhrd-2024-0007_ref_030 2025042315173397021_j_ijhrd-2024-0007_ref_016 2025042315173397021_j_ijhrd-2024-0007_ref_038 2025042315173397021_j_ijhrd-2024-0007_ref_015 2025042315173397021_j_ijhrd-2024-0007_ref_037 2025042315173397021_j_ijhrd-2024-0007_ref_014 2025042315173397021_j_ijhrd-2024-0007_ref_036 2025042315173397021_j_ijhrd-2024-0007_ref_013 2025042315173397021_j_ijhrd-2024-0007_ref_035 2025042315173397021_j_ijhrd-2024-0007_ref_012 2025042315173397021_j_ijhrd-2024-0007_ref_034 2025042315173397021_j_ijhrd-2024-0007_ref_011 2025042315173397021_j_ijhrd-2024-0007_ref_033 2025042315173397021_j_ijhrd-2024-0007_ref_010 2025042315173397021_j_ijhrd-2024-0007_ref_032 2025042315173397021_j_ijhrd-2024-0007_ref_031 2025042315173397021_j_ijhrd-2024-0007_ref_019 2025042315173397021_j_ijhrd-2024-0007_ref_018 2025042315173397021_j_ijhrd-2024-0007_ref_017 2025042315173397021_j_ijhrd-2024-0007_ref_039  | 
    
| References_xml | – ident: 2025042315173397021_j_ijhrd-2024-0007_ref_037 doi: 10.1109/QICAR61538.2024.10496606 – ident: 2025042315173397021_j_ijhrd-2024-0007_ref_007 doi: 10.1111/j.1744-6570.1991.tb00688.x – ident: 2025042315173397021_j_ijhrd-2024-0007_ref_027 doi: 10.1111/jopy.12663 – ident: 2025042315173397021_j_ijhrd-2024-0007_ref_015 – ident: 2025042315173397021_j_ijhrd-2024-0007_ref_003 doi: 10.1016/j.ijhcs.2015.05.005 – ident: 2025042315173397021_j_ijhrd-2024-0007_ref_042 – ident: 2025042315173397021_j_ijhrd-2024-0007_ref_038 doi: 10.1109/eCrime47957.2019.9037502 – ident: 2025042315173397021_j_ijhrd-2024-0007_ref_006 doi: 10.1145/3320269.3384753 – ident: 2025042315173397021_j_ijhrd-2024-0007_ref_004 doi: 10.1007/978-981-33-4062-6_3 – ident: 2025042315173397021_j_ijhrd-2024-0007_ref_034 doi: 10.7182/prtr.15.1.0n13660r26g725kj – ident: 2025042315173397021_j_ijhrd-2024-0007_ref_040 doi: 10.1111/jcc4.12126 – ident: 2025042315173397021_j_ijhrd-2024-0007_ref_031 – ident: 2025042315173397021_j_ijhrd-2024-0007_ref_021 doi: 10.2139/ssrn.2544742 – ident: 2025042315173397021_j_ijhrd-2024-0007_ref_028 – ident: 2025042315173397021_j_ijhrd-2024-0007_ref_035 doi: 10.1002/acp.4075 – ident: 2025042315173397021_j_ijhrd-2024-0007_ref_033 – ident: 2025042315173397021_j_ijhrd-2024-0007_ref_009 – ident: 2025042315173397021_j_ijhrd-2024-0007_ref_039 doi: 10.1177/1534484316671606 – ident: 2025042315173397021_j_ijhrd-2024-0007_ref_012 – ident: 2025042315173397021_j_ijhrd-2024-0007_ref_023 doi: 10.1007/978-3-319-96077-7_42 – ident: 2025042315173397021_j_ijhrd-2024-0007_ref_010 doi: 10.1109/COGSIMA.2016.7497779 – ident: 2025042315173397021_j_ijhrd-2024-0007_ref_025 doi: 10.19107/IJISC.2021.02.07 – ident: 2025042315173397021_j_ijhrd-2024-0007_ref_020 – ident: 2025042315173397021_j_ijhrd-2024-0007_ref_026 doi: 10.1109/eCrime57793.2022.10142078 – ident: 2025042315173397021_j_ijhrd-2024-0007_ref_041 doi: 10.1073/pnas.1908430116 – ident: 2025042315173397021_j_ijhrd-2024-0007_ref_016 – ident: 2025042315173397021_j_ijhrd-2024-0007_ref_022 – ident: 2025042315173397021_j_ijhrd-2024-0007_ref_018 – ident: 2025042315173397021_j_ijhrd-2024-0007_ref_019 doi: 10.1037//0022-3514.59.6.1216 – ident: 2025042315173397021_j_ijhrd-2024-0007_ref_024 doi: 10.1016/j.apergo.2020.103084 – ident: 2025042315173397021_j_ijhrd-2024-0007_ref_001 – ident: 2025042315173397021_j_ijhrd-2024-0007_ref_013 doi: 10.1109/ACCESS.2022.3190009 – ident: 2025042315173397021_j_ijhrd-2024-0007_ref_014 doi: 10.1016/S1361-3723(21)00038-5 – ident: 2025042315173397021_j_ijhrd-2024-0007_ref_017 doi: 10.1016/j.apergo.2021.103526 – ident: 2025042315173397021_j_ijhrd-2024-0007_ref_032 – ident: 2025042315173397021_j_ijhrd-2024-0007_ref_005 doi: 10.1002/9781118970843.ch186 – ident: 2025042315173397021_j_ijhrd-2024-0007_ref_029 – ident: 2025042315173397021_j_ijhrd-2024-0007_ref_030 – ident: 2025042315173397021_j_ijhrd-2024-0007_ref_036 doi: 10.1080/13803391003689770 – ident: 2025042315173397021_j_ijhrd-2024-0007_ref_011 – ident: 2025042315173397021_j_ijhrd-2024-0007_ref_002 doi: 10.1007/978-3-319-07674-4_89 – ident: 2025042315173397021_j_ijhrd-2024-0007_ref_008 doi: 10.3389/feduc.2021.807277  | 
    
| SSID | ssib053243561 | 
    
| Score | 2.2781482 | 
    
| Snippet | Phishing is a social engineering attack which intends to steal information from an intended victim by masquerading as a reputable source. It is a ubiquitous... | 
    
| SourceID | unpaywall crossref walterdegruyter  | 
    
| SourceType | Open Access Repository Index Database Publisher  | 
    
| StartPage | 100 | 
    
| SubjectTerms | Big Five personality factors email phishing phishing  | 
    
| Title | How the big five psychological factors affect phishing: A literature review | 
    
| URI | https://www.degruyter.com/doi/10.2478/ijhrd-2024-0007 https://doi.org/10.2478/ijhrd-2024-0007  | 
    
| UnpaywallVersion | publishedVersion | 
    
| Volume | 8 | 
    
| hasFullText | 1 | 
    
| inHoldings | 1 | 
    
| isFullTextHit | |
| isPrint | |
| journalDatabaseRights | – providerCode: PRVJWN databaseName: Sciendo customDbUrl: eissn: 2397-4583 dateEnd: 99991231 omitProxy: true ssIdentifier: ssib053243561 issn: 2397-4583 databaseCode: 9WM dateStart: 20231220 isFulltext: true titleUrlDefault: https://content.sciendo.com/ providerName: Sciendo – providerCode: PRVAZK databaseName: De Gruyter Brill Open Access Journals customDbUrl: eissn: 2397-4583 dateEnd: 99991231 omitProxy: true ssIdentifier: ssib053243561 issn: 2397-4583 databaseCode: AHGSO dateStart: 20231220 isFulltext: true titleUrlDefault: https://www.degruyterbrill.com providerName: Walter de Gruyter  | 
    
| link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV3NT8IwFG8UDsYDatSIUdKDBz2AG_2cN2LERSOaKAmelrXrACWDIITgX-_rNgwSjZpdethX32vf-72-9vcQOqFKeBG1C1WGQIDisriq6oxUY6ldEWkFHt0u6N-1uN-mNx3WyUmS7FmYpfx9nQp53n_pjSNQZZ3a889iHRU5A9BdQMV266HxnJaO8yxzd0qpm7clyUh8vnvDF_-zMU1G4XwWDgabqDRL89OR6Y6n88kiH5q6meYW8hc_mO0uea1NJ6qm31e4G__Qg21UyqEmbmRjYwetmWQX3frDGQbQh1W_i2MwdXi0bAJxXn8Hh-k-DzzqZWtUF7iBB58MzDg78LKH2s2rp0u_mhdUqGqX2ByuUNxIw2ToAWphwkC0ILTyHKWZjjXlEAyRGGxYFEpFHUIJFzoyWnJNYpi9ZB8VkmFiDhBmUoQi9uDiDjXGDQE2Emgoiye58srodCHmYJTxZgQQb1iJBKlEAisRm_oWZXT2qYbf72UragryOff20yMSglrn8B_fOEKFyXhqjgFsTFQFFRv-9eN9JR9wH3le0dU | 
    
| linkProvider | Unpaywall | 
    
| linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV3NT8IwFG8UDuiBaNSInz140MPCZtt180aMOOXDg5BwW9auAwwZC0II_72v3SBqNCZmlx32kuXX9r3f-yxCV1RwP6Y6UKUIOCgOSyxxy4iVeNLhsRRg0XVAv9N1gz59HrBB0cete2GM3o9NtrJeYGfKlSn36uO30SyGZb2luheab6OyHsZOS6jcCB5fX9bbiAFHIEAL8kE-P0l-sUGVRZpFq2U0meyi6tLkqGM1nC1W83VO1Jia5h6qFhwRN_If20dbKj1ArWC6xMDWsBgPcQI6CmefdRcuLs7BkSnQwNkoDy7d4QaebEYn47xT5RD1mw-9-8AqbkKwpEN08pULV3mKeZEPdINxBTSfS-HbQjKZSOqCF0MSUD5x5AlqE0pcLmMlPVeSBI4dOUKldJqqY4SZxyOe-PC4NlXKiYDvEXgRmgi6wq-h6zU2YZYPvAjBUdAwhgbGUMOoc9a8hm422P39LfuGbVgclvffRDzwRu2Tf8pdokrQ67TD9lO3dYp2zNKbIpQzVJrPFuocqMRcXBRb5wPY2MW0 | 
    
| linkToPdf | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1LTwIxEJ4gJj4ORKNGfPbgQQ-ER9vtrjeiIoqiiZJw22y7XcAQ2CCE8O-ddneJGo2J2UsPO5dv2plvZjpTgDMmhRcyk6jSFAOUKo9KssZpKXJVVYRKokc3Cf3HttPssPsu7-agnPXCWLsf2mplOQ4je1WZCbc8eOtPQlRpjZk-aLECq2YQO8_Dar15-_KUbSGO_IAiJUiG-Pwk-cX_rM9GcbCYB8PhJhTmtj4d6t5ktphm9VDrZhpbUEj5IaknCt2GnB7tQKs5nhNkakQOeiRC-0Tiz3aLpI_mkMBeziBxP0ksXZI6GS7HJpOkS2UXOo2b16tmKX0FoaSq1BRehXS0q7kbeEg1uNBI8YWSXkUqriLFHIxgaISGJwxcySqUUUeoUCvXUTTCI0f3ID8aj_Q-EO6KQEQefk6FaV0NkOtRXEhDAh3pFeE8w8aPk2EXPgYJBkbfwugbGE29WhThYond3__yb9j66UF5_03ExUi0cvBPuVNYe75u-A937dYhbFjN2_snR5CfTmb6GFnEVJ6kO-cDtvLDqw | 
    
| linkToUnpaywall | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV3PS8MwFA66HcTDVFScqOTgQQ-d7ZI0qbchjqI4PDiYp9Kk6aaOrsyWMf96X9puzKGo9JJDf-W95L3v5SXfQ-icSu5F1CxUaQIBisNiS7YZsWKhHB4pCR7dLOg_9Fy_T-8GbFCRJJmzMCv5-zbl4urldTSNQJVtas4_801UdxmA7hqq93uPneeidJxnmLsLSt2qLUhJ4vPdG774n608ScP5LByPt1FjVuSnIz2c5vNskQ8t3Ex3B_mLHyx3l7y18ky21Mcad-MferCLGhXUxJ1ybOyhDZ3so3t_MsMA-rB8GeIYTB1OV00grurv4LDY54HTUblGdY07eLxkYMblgZcD1O_ePt34VlVQwVIOMTlcLl0tNBOhB6iFcQ3RAlfSs6ViKlbUhWCIxGDDolBIahNKXK4irYSrSAyzlxyiWjJJ9BHCTPCQxx5crk21dkKAjQQa0uBJV3pNdLEQc5CWvBkBxBtGIkEhkcBIxKS-eRNdLtXw-71sTU1BNefef3pEQFBrH__jGyeolk1zfQpgI5Nn1UD7BPKQ0EA | 
    
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=How+the+big+five+psychological+factors+affect+phishing%3A+A+literature+review&rft.jtitle=International+Journal+of+Human+Resource+Development%3A+Practice%2C+Policy+and+Research&rft.au=Gordon%2C+Alex&rft.au=Russ-Eft%2C+Darlene&rft.date=2024-12-01&rft.pub=Sciendo&rft.eissn=2397-4583&rft.volume=8&rft.issue=2&rft.spage=100&rft.epage=113&rft_id=info:doi/10.2478%2Fijhrd-2024-0007&rft.externalDBID=n%2Fa&rft.externalDocID=10_2478_ijhrd_2024_000782100 | 
    
| thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=2397-4583&client=summon | 
    
| thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=2397-4583&client=summon | 
    
| thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=2397-4583&client=summon |