Unraveling the behavioral influence of social media on phishing susceptibility: A Personality-Habit-Information Processing model
Published 2023 View Full Article
- Home
- Publications
- Publication Search
- Publication Details
Title
Unraveling the behavioral influence of social media on phishing susceptibility: A Personality-Habit-Information Processing model
Authors
Keywords
-
Journal
INFORMATION & MANAGEMENT
Volume 60, Issue 7, Pages 103858
Publisher
Elsevier BV
Online
2023-09-10
DOI
10.1016/j.im.2023.103858
References
Ask authors/readers for more resources
Related references
Note: Only part of the references are listed.- Mindless Response or Mindful Interpretation: Examining the Effect of Message Influence on Phishing Susceptibility
- (2021) Frank Kun-Yueh Chou et al. Sustainability
- You are what you repeatedly do: Links between personality and habit
- (2021) Kiran McCloskey et al. PERSONALITY AND INDIVIDUAL DIFFERENCES
- Email phishing and signal detection: How persuasion principles and personality influence response patterns and accuracy
- (2020) Patrick Lawson et al. APPLIED ERGONOMICS
- Susceptibility to phishing on social network sites: A personality information processing model
- (2020) Edwin Donald Frauenstein et al. COMPUTERS & SECURITY
- Spear phishing in a barrel: Insights from a targeted phishing campaign
- (2019) A. J. Burns et al. JOURNAL OF ORGANIZATIONAL COMPUTING AND ELECTRONIC COMMERCE
- Phishing in an academic community: A study of user susceptibility and behavior
- (2019) Alejandra Diaz et al. CRYPTOLOGIA
- Predicting susceptibility to social influence in phishing emails
- (2019) Kathryn Parsons et al. INTERNATIONAL JOURNAL OF HUMAN-COMPUTER STUDIES
- Exploring susceptibility to phishing in the workplace
- (2018) Emma J. Williams et al. INTERNATIONAL JOURNAL OF HUMAN-COMPUTER STUDIES
- Which phish get caught? An exploratory study of individuals′ susceptibility to phishing
- (2017) Gregory D. Moody et al. EUROPEAN JOURNAL OF INFORMATION SYSTEMS
- Exposing others’ information on online social networks (OSNs): Perceived shared risk, its determinants, and its influence on OSN privacy control use
- (2017) Tabitha L. James et al. INFORMATION & MANAGEMENT
- Training to Mitigate Phishing Attacks Using Mindfulness Techniques
- (2017) Matthew L. Jensen et al. JOURNAL OF MANAGEMENT INFORMATION SYSTEMS
- The Effect of Belongingness on Obsessive-Compulsive Disorder in the Use of Online Social Networks
- (2017) Tabitha L. James et al. JOURNAL OF MANAGEMENT INFORMATION SYSTEMS
- Social Networking Sites and Addiction: Ten Lessons Learned
- (2017) Daria Kuss et al. International Journal of Environmental Research and Public Health
- Information Security Policy Compliance: An Empirical Study of Rationality-Based Beliefs and Information Security Awareness
- (2017) Bulgurcu et al. MIS QUARTERLY
- Psychology of Habit
- (2016) Wendy Wood et al. Annual Review of Psychology
- Dispositional and situational factors: influences on information security policy violations
- (2016) Allen C Johnston et al. EUROPEAN JOURNAL OF INFORMATION SYSTEMS
- Stop Trying to Fix the User
- (2016) Bruce Schneier IEEE SECURITY & PRIVACY
- p < 0.05,
- (2016) Weimo Zhu Journal of Sport and Health Science
- Personality, attitudes, and intentions: Predicting initial adoption of information security behavior
- (2015) Jordan Shropshire et al. COMPUTERS & SECURITY
- Information security conscious care behaviour formation in organizations
- (2015) Nader Sohrabi Safa et al. COMPUTERS & SECURITY
- An exploratory investigation of message-person congruence in information security awareness campaigns
- (2014) Mitchell Kajzer et al. COMPUTERS & SECURITY
- Online Social Networks: Threats and Solutions
- (2014) Michael Fire et al. IEEE Communications Surveys and Tutorials
- The relationships between behavioral addictions and the five-factor model of personality
- (2013) Cecilie Schou Andreassen et al. Journal of Behavioral Addictions
- Investigating phishing victimization with the Heuristic–Systematic Model: A theoretical framework and an exploration
- (2012) Xin (Robert) Luo et al. COMPUTERS & SECURITY
- The benefits and dangers of enjoyment with social networking websites
- (2012) Ofir Turel et al. EUROPEAN JOURNAL OF INFORMATION SYSTEMS
- Motivating IS security compliance: Insights from Habit and Protection Motivation Theory
- (2012) Anthony Vance et al. INFORMATION & MANAGEMENT
- A heuristic–systematic model of end-user information processing when encountering IS exceptions
- (2012) Joshua M. Davis et al. INFORMATION & MANAGEMENT
- The optimism bias
- (2011) Tali Sharot CURRENT BIOLOGY
- Why do people get phished? Testing individual differences in phishing vulnerability within an integrated, information processing model
- (2011) Arun Vishwanath et al. DECISION SUPPORT SYSTEMS
- Security Education against Phishing: A Modest Proposal for a Major Rethink
- (2011) Iacovos Kirlappos et al. IEEE SECURITY & PRIVACY
- Online Social Networking and Addiction—A Review of the Psychological Literature
- (2011) Daria J. Kuss et al. International Journal of Environmental Research and Public Health
- The Influence of Experiential and Dispositional Factors in Phishing: An Empirical Investigation of the Deceived
- (2010) Ryan T. Wright et al. JOURNAL OF MANAGEMENT INFORMATION SYSTEMS
- The psychology of security
- (2008) Ryan West COMMUNICATIONS OF THE ACM
- Wisecrackers: A theory-grounded investigation of phishing and pretext social engineering threats to information security
- (2007) Michael Workman JOURNAL OF THE AMERICAN SOCIETY FOR INFORMATION SCIENCE AND TECHNOLOGY
Find Funding. Review Successful Grants.
Explore over 25,000 new funding opportunities and over 6,000,000 successful grants.
ExploreAdd your recorded webinar
Do you already have a recorded webinar? Grow your audience and get more views by easily listing your recording on Peeref.
Upload Now