Investigating phishing victimization with the Heuristic-Systematic Model: A theoretical framework and an exploration
نویسندگان
چکیده
To the extent that phishing has become a serious threat to information security, there has been rather limited theory-grounded research on this burgeoning phenomenon. In this paper, we develop a theoretical model of victimization by phishing based on the Heuristic eSystematic Model of information processing. We argue that the HeuristiceSystematic Model offers an ideal theoretical framework for investigating the psychological mechanism underlying the effectiveness of phishing attacks. An exploratory experiment is presented to validate the research model based on the theory. a 2012 Elsevier Ltd. All rights reserved.
منابع مشابه
Victimized by Phishing: A Heuristic-Systematic Perspective
Phishing has become an ever-present, ever-increasing threat to information security, yet theory-based, systematic research on the behavioral aspect of this phenomenon is rather limited. In this paper, we propose the Heuristic-Systematic Model (HSM) as an overarching theory to solidify the theory base for this line of research. We note the theoretical synergy between HSM and other theories used ...
متن کاملPathology of Human Resource Staffing System in Higher Education: Codification and Validation of a Model
Higher education system is considered to be one of the most important factors in development and progress of a society. The present research aims to conduct a pathological study of staffing system in higher education and, thereby, proceed to codify and validate a model for it. The methodology was practical and developmental. A combined sequential exploratory (heuristic) method of the modelling ...
متن کاملThe Metaphor of Vision and the Construction of Sexist-Norms in Western Metaphysics
Current feminisms have emphasized the systematic nature of women’s oppression. Feminist scholars like Luce Irigaray insist that woman’s difference and otherness is a matter of male-dominated institutional definition: because the woman is theoretically subordinated to the concept of masculinity, she is seen and objectified by the man as his opposite, described as an absence, a lack, and, most no...
متن کاملOPTIMIZATION OF AN OFFSHORE JACKET-TYPE STRUCTURE USING META-HEURISTIC ALGORITHMS
Offshore jacket-type towers are steel structures designed and constructed in marine environments for various purposes such as oil exploration and exploitation units, oceanographic research, and undersea testing. In this paper a newly developed meta-heuristic algorithm, namely Cyclical Parthenogenesis Algorithm (CPA), is utilized for sizing optimization of a jacket-type offshore structure. The a...
متن کاملA Study on Resolution Skills in Phishing Detection
This study examines resolution skills in phishing email detection, defined as the abilities of individuals to discern correct judgments from incorrect judgments in probabilistic decisionmaking. An illustration of the resolution skills is provided. A number of antecedents to resolution skills in phishing email detection, including familiarity with the sender, familiarity with the email, online t...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- Computers & Security
دوره 38 شماره
صفحات -
تاریخ انتشار 2013