Investigating phishing victimization with the Heuristic-Systematic Model: A theoretical framework and an exploration

نویسندگان

  • Xin Luo
  • Wei Zhang
  • Stephen D. Burd
  • Alessandro F. Seazzu
چکیده

To the extent that phishing has become a serious threat to information security, there has been rather limited theory-grounded research on this burgeoning phenomenon. In this paper, we develop a theoretical model of victimization by phishing based on the Heuristic eSystematic Model of information processing. We argue that the HeuristiceSystematic Model offers an ideal theoretical framework for investigating the psychological mechanism underlying the effectiveness of phishing attacks. An exploratory experiment is presented to validate the research model based on the theory. a 2012 Elsevier Ltd. All rights reserved.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Victimized by Phishing: A Heuristic-Systematic Perspective

Phishing has become an ever-present, ever-increasing threat to information security, yet theory-based, systematic research on the behavioral aspect of this phenomenon is rather limited. In this paper, we propose the Heuristic-Systematic Model (HSM) as an overarching theory to solidify the theory base for this line of research. We note the theoretical synergy between HSM and other theories used ...

متن کامل

Pathology of Human Resource Staffing System in Higher Education: Codification and Validation of a Model

Higher education system is considered to be one of the most important factors in development and progress of a society. The present research aims to conduct a pathological study of staffing system in higher education and, thereby, proceed to codify and validate a model for it. The methodology was practical and developmental. A combined sequential exploratory (heuristic) method of the modelling ...

متن کامل

The Metaphor of Vision and the Construction of Sexist-Norms in Western Metaphysics

Current feminisms have emphasized the systematic nature of women’s oppression. Feminist scholars like Luce Irigaray insist that woman’s difference and otherness is a matter of male-dominated institutional definition: because the woman is theoretically subordinated to the concept of masculinity, she is seen and objectified by the man as his opposite, described as an absence, a lack, and, most no...

متن کامل

OPTIMIZATION OF AN OFFSHORE JACKET-TYPE STRUCTURE USING META-HEURISTIC ALGORITHMS

Offshore jacket-type towers are steel structures designed and constructed in marine environments for various purposes such as oil exploration and exploitation units, oceanographic research, and undersea testing. In this paper a newly developed meta-heuristic algorithm, namely Cyclical Parthenogenesis Algorithm (CPA), is utilized for sizing optimization of a jacket-type offshore structure. The a...

متن کامل

A Study on Resolution Skills in Phishing Detection

This study examines resolution skills in phishing email detection, defined as the abilities of individuals to discern correct judgments from incorrect judgments in probabilistic decisionmaking. An illustration of the resolution skills is provided. A number of antecedents to resolution skills in phishing email detection, including familiarity with the sender, familiarity with the email, online t...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • Computers & Security

دوره 38  شماره 

صفحات  -

تاریخ انتشار 2013