Research Article Phishing Susceptibility: An Investigation Into the Processing of a Targeted Spear Phishing Email
Tóm tắt
Từ khóa
Tài liệu tham khảo
carte, 2003, In pursuit of moderation: Nine common errors and their solutions, MIS Quart, 27, 479, 10.2307/30036541
pavlou, 2007, Understanding and mitigating uncertainty in online exchange relationships: A principle-agent perspective, MIS Quart, 31, 105, 10.2307/25148783
chen, 1999, Dual-Process Theories in Social Psychology
martin, 0, Phishing for answers: Factors influencing a participant's ability to categorize email, Comput Changing World Portland OR
jakobsson (2012 aug 17), 2007, The human factor in phishing Privacy & Security of Consumer Information '07 Indiana Univ Bloomington IN
frauenstein, 0, Phishing: How an organization can protect itself, Inf Security for South Africa Conf Johannesburg South Africa
0, How to recognize phishing e-mails or links
0, Consumer advice How to avoid phishing scams
0, Phishing A New Form of Identity Theft
chin, 1998, Issues and opinion on structural equation modeling, MIS Quart, 22, vii
bagozzi, 1994, Advanced topics in structural equation models, Advanced Methods of Marketing Research, 1
ringle, 0, SmartPLS 2 0 (M3) Beta
petter, 2007, Specifying formative constructs in information systems research, MIS Quart, 31, 623, 10.2307/25148814
nunally, 1978, Psychometric Theory
gefen, 2005, A practical guide to factorial validity using PLS-graph: Tutorial and annotated example, Commun Assoc Inf Syst, 16, 91
wang, 2009, Annals of Emerging Research in Information Assurance Security and Privacy Services
wright, 1974, The harassed decision maker: Time pressure, distraction and the use of evidence, J Appl Psychol, 59, 555, 10.1037/h0037186
johnson, 1993, Time Pressure and Stress in Human Judgment and Decision Making
chin, 1998, Issues and opinion on structure equation modeling, MIS Quart, 22, vii
2009, The psychology of scams Provoking and committing errors of judgement Prepared by the University of Exeter School of Psychology for Office of Fair Trading
kahneman, 1973, Attention and Effort
chaiken, 1989, Unintended Thought, 212
moore, 2010, From phishing to advanced persistent threats: The application of cybercrime risk to the enterprise risk management model, Rev Bus Inf Syst, 14, 27
liu, 2006, An antiphishing strategy based on visual similarity assessment, IEEE Internet Comput, 10, 58, 10.1109/MIC.2006.23
lewis, 2003, Sources of influence on beliefs about information technology use: An empirical study of knowledge workers, MIS Quart, 27, 657, 10.2307/30036552
brunswik, 1955, Representative design and probabilistic theory in functional psychology, Psychol Rev, 62, 193, 10.1037/h0047470
buller, 1994, Strategic Interpersonal Communication, 191