Why do people get phished? Testing individual differences in phishing vulnerability within an integrated, information processing model
نویسندگان
چکیده
a Department of Communication, Management Science and Systems, 333 Lord Christopher Baldy Hall, State University of New York at Buffalo, Buffalo, NY 14260, United States b Department of Finance, Operations and Information Systems, Brock University, Canada c Department of Information Systems and Operations Management, Ball State University, United States d Department of Information Systems and Operations Management, University of Texas at Arlington, United States e Management Science and Systems, State University of New York at Buffalo, United States
منابع مشابه
Phishing, Personality Traits and Facebook
Phishing attacks have become an increasing threat to online users. Recent research has begun to focus on the factors that cause people to respond to them. Our study examines the correlation between the Big Five personality traits and email phishing response. We also examine how these factors affect users behavior on Facebook, including posting personal information and choosing Facebook privacy ...
متن کاملPress accept to update now: Individual differences in susceptibility to malevolent interruptions
Article history: Received 5 May 2016 Received in revised form 12 January 2017 Accepted 24 February 2017 Available online 27 February 2017 Increasingly, connected communication technologies have resulted in people being exposed to fraudulent communications by scammers and hackers attempting to gain access to computer systems for malicious purposes. Common influence techniques, such as mimicking ...
متن کاملBlunting the Phisher’s Spear: A risk-based approach for defining user training and awarding administrative privileges
People today are the weakest links in cybersecurity. Solving the “people problem” of cyber security requires us to understand why people fall victim to spear phishing. Unfortunately, the only proactive solution against spear phishing is to train and educate people. But, judging from the number of continued breaches, training appears to be limited in its effectiveness. Today’s leading cybersecur...
متن کاملWhat’s Preventing Us to Get More Attraction: The Fear of Aesthetic Surgery
BACKGROUND Nowadays, with the help of cosmetic surgery almost every woman and man can achieve a highly attractive appearance. The question is, why so many people do not take advantage of these opportunities? This pilot-study investigates individual attitudes of people towards aesthetic plastic surgery. METHODS A questionnaire was developed which combined self-developed items for a meas...
متن کاملCERT strategy to deal with phishing attacks
Every day, internet thieves employ new ways to obtain personal identity people and get access to their personal information. Phishing is a somehow complex method that has recently been considered by internet thieves. First, the present study aims to explain phishing, and why an organization should deal with it and its challenges of providing. In addition, different kinds of this attack and clas...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- Decision Support Systems
دوره 51 شماره
صفحات -
تاریخ انتشار 2011