메뉴 건너뛰기




Volumn 20, Issue 5, 2015, Pages 570-584

Examining the Distinct Antecedents of E-Mail Habits and its Influence on the Outcomes of a Phishing Attack

Author keywords

Big 5 personality; Cognitive processing; E mail Habit; Heuristic processing; Information adequacy; Media habits; Phishing susceptibility; Systematic processing

Indexed keywords

COMPUTER CRIME; CRIME; SOCIAL NETWORKING (ONLINE);

EID: 84942292680     PISSN: None     EISSN: 10836101     Source Type: Journal    
DOI: 10.1111/jcc4.12126     Document Type: Article
Times cited : (66)

References (45)
  • 1
    • 34248490848 scopus 로고
    • Psychological status of the script concept
    • Abelson, R. P. (1981). Psychological status of the script concept. American Psychologist, 36, 715.
    • (1981) American Psychologist , vol.36 , pp. 715
    • Abelson, R.P.1
  • 2
    • 0036248592 scopus 로고    scopus 로고
    • Residual effects of past on later behavior: Habituation and reasoned action perspectives
    • Ajzen, I. (2002). Residual effects of past on later behavior: Habituation and reasoned action perspectives. Personality and Social Psychology Review, 6, 107-122.
    • (2002) Personality and Social Psychology Review , vol.6 , pp. 107-122
    • Ajzen, I.1
  • 3
    • 0034227818 scopus 로고    scopus 로고
    • The relationship between extraversion and neuroticism and the different uses of the Internet
    • Amichai-Hamburger, Y., & Ben-Artzi, E. (2000). The relationship between extraversion and neuroticism and the different uses of the Internet. Computers in Human Behavior, 16, 441-449.
    • (2000) Computers in Human Behavior , vol.16 , pp. 441-449
    • Amichai-Hamburger, Y.1    Ben-Artzi, E.2
  • 5
  • 8
    • 84865625825 scopus 로고    scopus 로고
    • Texting while driving on automatic: Considering the frequency-independent side of habit
    • Bayer, J. B., & Campbell, S. W. (2012). Texting while driving on automatic: Considering the frequency-independent side of habit. Computers in Human Behavior, 28(6), 2083-2090.
    • (2012) Computers in Human Behavior , vol.28 , Issue.6 , pp. 2083-2090
    • Bayer, J.B.1    Campbell, S.W.2
  • 9
    • 0036662789 scopus 로고    scopus 로고
    • Medial temporal lobe amnesia: gradual acquisition of factual information by nondeclarative memory
    • Bayley, P. J., & Squire, L. R. (2002). Medial temporal lobe amnesia: gradual acquisition of factual information by nondeclarative memory. The Journal of Neuroscience, 22, 5741-5748.
    • (2002) The Journal of Neuroscience , vol.22 , pp. 5741-5748
    • Bayley, P.J.1    Squire, L.R.2
  • 10
    • 84876737813 scopus 로고    scopus 로고
    • The quest for take the best: Insights and outlooks from experimental research
    • Bröder, A. (2012). The quest for take the best: Insights and outlooks from experimental research. Ecological rationality: Intelligence in the world, 216-240.
    • (2012) Ecological rationality: Intelligence in the world , pp. 216-240
    • Bröder, A.1
  • 11
    • 0030201356 scopus 로고    scopus 로고
    • Interpersonal deception theory
    • Buller, D. B., & Burgoon, J. K. (1996). Interpersonal deception theory. Communication Theory, 6(3), 203-242.
    • (1996) Communication Theory , vol.6 , Issue.3 , pp. 203-242
    • Buller, D.B.1    Burgoon, J.K.2
  • 12
    • 0002016719 scopus 로고
    • Heuristic and systematic information processing within and beyond the persuasion context
    • In J.S. Uleman & J.A. Bargh (Eds.), New York: Guilford Press
    • Chaiken, S., & Eagly, A. H. (1989). Heuristic and systematic information processing within and beyond the persuasion context. In J.S. Uleman & J.A. Bargh (Eds.), Unintended thought (pp. 212-252). New York: Guilford Press
    • (1989) Unintended thought , pp. 212-252
    • Chaiken, S.1    Eagly, A.H.2
  • 15
    • 0042709232 scopus 로고    scopus 로고
    • Assessing causality in the Cognitive Mediation Model: A panel study of motivations, information processing, and learning during campaign 2000
    • Eveland, W. P., Shah, D. V., & Kwak, N. (2003). Assessing causality in the Cognitive Mediation Model: A panel study of motivations, information processing, and learning during campaign 2000. Communication Research, 30(4), 359-386.
    • (2003) Communication Research , vol.30 , Issue.4 , pp. 359-386
    • Eveland, W.P.1    Shah, D.V.2    Kwak, N.3
  • 16
    • 35348822468 scopus 로고    scopus 로고
    • Fostering e-mail security awareness: The West Point carronade
    • Ferguson, A. J. (2005). Fostering e-mail security awareness: The West Point carronade. EDUCASE Quarterly, 28(1), 54-57.
    • (2005) EDUCASE Quarterly , vol.28 , Issue.1 , pp. 54-57
    • Ferguson, A.J.1
  • 17
    • 48249091260 scopus 로고    scopus 로고
    • Habits, rituals, and the evaluative brain
    • Graybiel, A. M. (2008). Habits, rituals, and the evaluative brain. Annual Review of Neuroscience, 31, 359-387.
    • (2008) Annual Review of Neuroscience , vol.31 , pp. 359-387
    • Graybiel, A.M.1
  • 18
    • 0025557319 scopus 로고
    • An alternative" description of personality": The big-five factor structure
    • Goldberg, L. R. (1990). An alternative" description of personality": The big-five factor structure. Journal of personality and social psychology, 59(6), 1216-1229.
    • (1990) Journal of personality and social psychology , vol.59 , Issue.6 , pp. 1216-1229
    • Goldberg, L.R.1
  • 20
    • 3843130753 scopus 로고    scopus 로고
    • Where did they go wrong? An analysis of the failure of knowledgeable internet consumers to detect deception over the Internet
    • Grazioli, S. (2004). Where did they go wrong? An analysis of the failure of knowledgeable internet consumers to detect deception over the Internet. Group Decision and Negotiation, 13(2), 149-172.
    • (2004) Group Decision and Negotiation , vol.13 , Issue.2 , pp. 149-172
    • Grazioli, S.1
  • 21
    • 0037646762 scopus 로고    scopus 로고
    • Linking the heuristic-systematic model and depth of processing
    • Griffin, R. J., Neuwirth, K., Giese, J., & Dunwoody, S. (2002). Linking the heuristic-systematic model and depth of processing. Communication Research, 29(6), 705-732.
    • (2002) Communication Research , vol.29 , Issue.6 , pp. 705-732
    • Griffin, R.J.1    Neuwirth, K.2    Giese, J.3    Dunwoody, S.4
  • 22
    • 45549085095 scopus 로고    scopus 로고
    • Who blogs? Personality predictors of blogging
    • Guadagno, R. E., Okdie, B. M., & Eno, C. A. (2008). Who blogs? Personality predictors of blogging. Computers in Human Behavior, 24(5), 1993-2004.
    • (2008) Computers in Human Behavior , vol.24 , Issue.5 , pp. 1993-2004
    • Guadagno, R.E.1    Okdie, B.M.2    Eno, C.A.3
  • 23
    • 84855563831 scopus 로고    scopus 로고
    • A tale of two sites: Twitter vs. Facebook and the personality predictors of social media usage
    • Hughes, D. J., Rowe, M., Batey, M., & Lee, A. (2012). A tale of two sites: Twitter vs. Facebook and the personality predictors of social media usage. Computers in Human Behavior, 28(2), 561-569.
    • (2012) Computers in Human Behavior , vol.28 , Issue.2 , pp. 561-569
    • Hughes, D.J.1    Rowe, M.2    Batey, M.3    Lee, A.4
  • 25
    • 0035740371 scopus 로고    scopus 로고
    • Detecting deception: Adversarial problem solving in a low base-rate world
    • Johnson, P. E., Grazioli, S., Jamal, K., & Glen Berryman, R. (2001). Detecting deception: Adversarial problem solving in a low base-rate world. Cognitive Science, 25(3), 355-392.
    • (2001) Cognitive Science , vol.25 , Issue.3 , pp. 355-392
    • Johnson, P.E.1    Grazioli, S.2    Jamal, K.3    Glen Berryman, R.4
  • 26
    • 33750461293 scopus 로고    scopus 로고
    • Seeking and processing information about impersonal risk
    • Kahlor, L., Dunwoody, S., Griffin, R. J., & Neuwirth, K. (2006). Seeking and processing information about impersonal risk. Science Communication, 28(2), 163-194.
    • (2006) Science Communication , vol.28 , Issue.2 , pp. 163-194
    • Kahlor, L.1    Dunwoody, S.2    Griffin, R.J.3    Neuwirth, K.4
  • 27
    • 77953142299 scopus 로고    scopus 로고
    • The problem of media habits
    • LaRose, R. (2010). The problem of media habits. Communication Theory, 20(2), 194-222.
    • (2010) Communication Theory , vol.20 , Issue.2 , pp. 194-222
    • LaRose, R.1
  • 28
    • 0035539105 scopus 로고    scopus 로고
    • Understanding Internet usage a social-cognitive approach to uses and gratifications
    • LaRose, R., Mastro, D., & Eastin, M. S. (2001). Understanding Internet usage a social-cognitive approach to uses and gratifications. Social Science Computer Review, 19(4), 395-413.
    • (2001) Social Science Computer Review , vol.19 , Issue.4 , pp. 395-413
    • LaRose, R.1    Mastro, D.2    Eastin, M.S.3
  • 29
    • 77955334314 scopus 로고    scopus 로고
    • The automatic component of habit in health behavior: Habit as cue-contingent automaticity
    • Orbell, S., & Verplanken, B. (2010). The automatic component of habit in health behavior: Habit as cue-contingent automaticity. Health Psychology, 29, 374.
    • (2010) Health Psychology , vol.29 , pp. 374
    • Orbell, S.1    Verplanken, B.2
  • 30
    • 0036885518 scopus 로고    scopus 로고
    • Richness, power cues and e-mail text
    • Panteli, N. (2002). Richness, power cues and e-mail text. Information & Management, 40, 75-86.
    • (2002) Information & Management , vol.40 , pp. 75-86
    • Panteli, N.1
  • 31
    • 84985143886 scopus 로고
    • Ritualized and instrumental television viewing
    • Rubin, A. M. (1984). Ritualized and instrumental television viewing. Journal of Communication, 34, 67-77.
    • (1984) Journal of Communication , vol.34 , pp. 67-77
    • Rubin, A.M.1
  • 32
    • 77954007030 scopus 로고    scopus 로고
    • Who falls for phish?: A demographic analysis of phishing susceptibility and effectiveness of interventions
    • (April). In ACM.
    • Sheng, S., Holbrook, M., Kumaraguru, P., Cranor, L. F., & Downs, J. (2010, April). Who falls for phish?: A demographic analysis of phishing susceptibility and effectiveness of interventions. In Proceedings of the SIGCHI Conference (pp. 373-382). ACM.
    • (2010) Proceedings of the SIGCHI Conference , pp. 373-382
    • Sheng, S.1    Holbrook, M.2    Kumaraguru, P.3    Cranor, L.F.4    Downs, J.5
  • 33
    • 84942300161 scopus 로고    scopus 로고
    • Common college scams
    • August
    • Stephen, V. (2012, August). Common college scams. Nerd Wallet: http://www.nerdwallet.com/blogeducation/common-college-scams
    • (2012) Nerd Wallet
    • Stephen, V.1
  • 34
    • 49849086604 scopus 로고    scopus 로고
    • The MAIN model: A heuristic approach to understanding technology effects on credibility
    • Sundar, S. S. (2008). The MAIN model: A heuristic approach to understanding technology effects on credibility. Digital media, youth, and credibility, 73-100.
    • (2008) Digital media, youth, and credibility , pp. 73-100
    • Sundar, S.S.1
  • 36
    • 84942300163 scopus 로고    scopus 로고
    • Habitual Facebook use and its impact on getting deceived on social media
    • Vishwanath, A. (2014). Habitual Facebook use and its impact on getting deceived on social media. Journal of Computer-Mediated Communication.
    • (2014) Journal of Computer-Mediated Communication
    • Vishwanath, A.1
  • 37
    • 79955890012 scopus 로고    scopus 로고
    • Why do people get phished? Testing individual differences in phishing vulnerability within an integrated, information processing model
    • Vishwanath, A., Herath, T., Chen, R., Wang, J., & Rao, H. R. (2011). Why do people get phished? Testing individual differences in phishing vulnerability within an integrated, information processing model. Decision Support Systems, 51(3), 576-586.
    • (2011) Decision Support Systems , vol.51 , Issue.3 , pp. 576-586
    • Vishwanath, A.1    Herath, T.2    Chen, R.3    Wang, J.4    Rao, H.R.5
  • 38
    • 33750550081 scopus 로고    scopus 로고
    • Beyond frequency: Habit as mental construct
    • Verplanken, B. (2006). Beyond frequency: Habit as mental construct. British Journal of Social Psychology, 45(3), 639-656.
    • (2006) British Journal of Social Psychology , vol.45 , Issue.3 , pp. 639-656
    • Verplanken, B.1
  • 39
    • 0141981362 scopus 로고    scopus 로고
    • Reflections on past behavior: A self-report index of habit strength
    • Verplanken, B., & Orbell, S. (2003). Reflections on past behavior: A self-report index of habit strength. Journal of Applied Social Psychology, 33(6), 1313-1330.
    • (2003) Journal of Applied Social Psychology , vol.33 , Issue.6 , pp. 1313-1330
    • Verplanken, B.1    Orbell, S.2
  • 42
    • 36048997847 scopus 로고    scopus 로고
    • A new look at habits and the habit-goal interface
    • Wood, W., & Neal, D. T. (2007). A new look at habits and the habit-goal interface. Psychological Review, 114(4), 843.
    • (2007) Psychological Review , vol.114 , Issue.4 , pp. 843
    • Wood, W.1    Neal, D.T.2
  • 44
    • 39749142244 scopus 로고    scopus 로고
    • Wisecrackers: A theory-grounded investigation of phishing and pretext social engineering threats to information security
    • Workman, M. (2008). Wisecrackers: A theory-grounded investigation of phishing and pretext social engineering threats to information security. Journal of the American Society for Information Science and Technology, 59, 662-674.
    • (2008) Journal of the American Society for Information Science and Technology , vol.59 , pp. 662-674
    • Workman, M.1
  • 45
    • 33745760564 scopus 로고    scopus 로고
    • The role of the basal ganglia in habit formation
    • Yin, H. H., & Knowlton, B. J. (2006). The role of the basal ganglia in habit formation. Nature Reviews Neuroscience, 7, 464-476.
    • (2006) Nature Reviews Neuroscience , vol.7 , pp. 464-476
    • Yin, H.H.1    Knowlton, B.J.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.