Phishing: message appraisal and the exploration of fear and self-confidence
Published 2019 View Full Article
- Home
- Publications
- Publication Search
- Publication Details
Title
Phishing: message appraisal and the exploration of fear and self-confidence
Authors
Keywords
-
Journal
BEHAVIOUR & INFORMATION TECHNOLOGY
Volume -, Issue -, Pages 1-21
Publisher
Informa UK Limited
Online
2019-09-23
DOI
10.1080/0144929x.2019.1657180
References
Ask authors/readers for more resources
Related references
Note: Only part of the references are listed.- An empirical study on the susceptibility to social engineering in social networking sites: the case of Facebook
- (2017) Abdullah Algarni et al. EUROPEAN JOURNAL OF INFORMATION SYSTEMS
- Practicing Safe Computing: A Multimethod Empirical Examination of Home Computer User Security Behavioral Intentions
- (2017) Anderson et al. MIS QUARTERLY
- Fear Appeals and Information Security Behaviors: An Empirical Study
- (2017) Johnston et al. MIS QUARTERLY
- Neural Correlates of Protection Motivation for Secure IT Behaviors: An fMRI Examination
- (2016) Merrill Warkentin et al. Journal of the Association for Information Systems
- An Enhanced Fear Appeal Rhetorical Framework: Leveraging Threats to the Human Asset Through Sanctioning Rhetoric
- (2015) Allen C. Johnston et al. MIS QUARTERLY
- What Do Systems Users Have to Fear? Using Fear Appeals to Engender Threats and Fear that Motivate Protective Security Behaviors
- (2015) Scott R. Boss et al. MIS QUARTERLY
- The Influence of Social Aversion and Institution-Based Trust on Computer Self-Efficacy, Computer Anxiety and Antecedents to IT Use
- (2014) Elizabeth White Baker et al. Journal of Organizational and End User Computing
- Phishing Detection: A Literature Survey
- (2013) Mahmoud Khonji et al. IEEE Communications Surveys and Tutorials
- Going Spear Phishing: Exploring Embedded Training and Awareness
- (2013) Deanna D. Caputo et al. IEEE SECURITY & PRIVACY
- Understanding persuasive elements in phishing e-mails
- (2013) Daejoong Kim et al. ONLINE INFORMATION REVIEW
- Future directions for behavioral information security research
- (2012) Robert E. Crossler et al. COMPUTERS & SECURITY
- Motivating IS security compliance: Insights from Habit and Protection Motivation Theory
- (2012) Anthony Vance et al. INFORMATION & MANAGEMENT
- Why do people get phished? Testing individual differences in phishing vulnerability within an integrated, information processing model
- (2011) Arun Vishwanath et al. DECISION SUPPORT SYSTEMS
- Understanding Nonmalicious Security Violations in the Workplace: A Composite Behavior Model
- (2011) Ken H. Guo et al. JOURNAL OF MANAGEMENT INFORMATION SYSTEMS
- Teaching Johnny not to fall for phish
- (2010) Ponnurangam Kumaraguru et al. ACM Transactions on Internet Technology
- The Influence of Experiential and Dispositional Factors in Phishing: An Empirical Investigation of the Deceived
- (2010) Ryan T. Wright et al. JOURNAL OF MANAGEMENT INFORMATION SYSTEMS
- Spamalytics
- (2009) Chris Kanich et al. COMMUNICATIONS OF THE ACM
- Telling the story of older people e-mailing: An ethnographical study
- (2009) Sergio Sayago et al. INTERNATIONAL JOURNAL OF HUMAN-COMPUTER STUDIES
- Promoting personal responsibility for internet safety
- (2008) Robert LaRose et al. COMMUNICATIONS OF THE ACM
Add your recorded webinar
Do you already have a recorded webinar? Grow your audience and get more views by easily listing your recording on Peeref.
Upload NowAsk a Question. Answer a Question.
Quickly pose questions to the entire community. Debate answers and get clarity on the most important issues facing researchers.
Get Started