Citation

Enabling Protection Motivation in Heuristic-Systematic Defense Against Email Phishing

Abstract | Word Stems | Keywords | Association | Citation | Similar Titles



Abstract:

Email phishing poses a grave security threat to national governments, business operations and average Internet users. The current study aims to explain what motivat Internet users to enact protection against email phishing, and how their protection enactment is related to the way they cognitively process phishing emails. Specifically, this study proposes an integrated theoretical framework to link Protection Motivation Theory to Heuristic-Systematic Processing in email phishing attacks. Findings show that protection enactment against email phishing is predicted by a high degree of perceived severity and vulnerability towards cybersecurity risks, self-efficacy in protecting Internet security and response efficacy in Internet security tools. The perceived severity, along with the elevated level of protection enactment, predicts systematic processing of phishing emails. Theoretical and practical implications of the findings are discussed.
Most Common Document Word Stems:

0 (1),
Convention
Need a solution for abstract management? All Academic can help! Contact us today to find out how our system can help your annual meeting.
Submission - Custom fields, multiple submission types, tracks, audio visual, multiple upload formats, automatic conversion to pdf.Review - Peer Review, Bulk reviewer assignment, bulk emails, ranking, z-score statistics, and multiple worksheets!
Reports - Many standard and custom reports generated while you wait. Print programs with participant indexes, event grids, and more!Scheduling - Flexible and convenient grid scheduling within rooms and buildings. Conflict checking and advanced filtering.
Communication - Bulk email tools to help your administrators send reminders and responses. Use form letters, a message center, and much more!Management - Search tools, duplicate people management, editing tools, submission transfers, many tools to manage a variety of conference management headaches!
Click here for more information.

Association:
Name: International Communication Association 65th Annual Conference
URL:
http://www.icahdq.org


Citation:
URL: http://citation.allacademic.com/meta/p984449_index.html
Direct Link:
HTML Code:

MLA Citation:

Xu, Weiai., Ngoh, Zed. and Vishwanath, Arun. "Enabling Protection Motivation in Heuristic-Systematic Defense Against Email Phishing" Paper presented at the annual meeting of the International Communication Association 65th Annual Conference, Caribe Hilton, San Juan, Puerto Rico, May 21, 2015 <Not Available>. 2015-12-02 <http://citation.allacademic.com/meta/p984449_index.html>

APA Citation:

Xu, W. , Ngoh, Z. and Vishwanath, A. , 2015-05-21 "Enabling Protection Motivation in Heuristic-Systematic Defense Against Email Phishing" Paper presented at the annual meeting of the International Communication Association 65th Annual Conference, Caribe Hilton, San Juan, Puerto Rico Online <APPLICATION/PDF>. 2015-12-02 from http://citation.allacademic.com/meta/p984449_index.html

Publication Type: Conference Paper/Unpublished Manuscript
Review Method: Peer Reviewed
Abstract: Email phishing poses a grave security threat to national governments, business operations and average Internet users. The current study aims to explain what motivat Internet users to enact protection against email phishing, and how their protection enactment is related to the way they cognitively process phishing emails. Specifically, this study proposes an integrated theoretical framework to link Protection Motivation Theory to Heuristic-Systematic Processing in email phishing attacks. Findings show that protection enactment against email phishing is predicted by a high degree of perceived severity and vulnerability towards cybersecurity risks, self-efficacy in protecting Internet security and response efficacy in Internet security tools. The perceived severity, along with the elevated level of protection enactment, predicts systematic processing of phishing emails. Theoretical and practical implications of the findings are discussed.


Similar Titles:
How Deeply Do We Process Online Recommendations? Heuristic vs. Systematic Processing of Authority and Bandwagon Cues

How People Process Divisive Media Messages: Testing the Multiple-Motive Heuristic-Systematic Model

Systematic Assessment of Neutralization Processes in Terrorist Ideology and Motivation

Abuse of Privilege: Ulterior Motives, Retaliation, and Turning Reporters into 'Fall Guys' when they Protect Confidential Sources


 
All Academic, Inc. is your premier source for research and conference management. Visit our website, www.allacademic.com, to see how we can help you today.