메뉴 건너뛰기




Volumn 40, Issue 2, 2016, Pages 265-281

Individual processing of phishing emails: How attention and elaboration protect against phishing

Author keywords

Experimental study; Online cognitive processing; Online deception; Phishing

Indexed keywords

CRIME; DECISION MAKING; ELECTRONIC MAIL;

EID: 84962381638     PISSN: 14684527     EISSN: None     Source Type: Journal    
DOI: 10.1108/OIR-04-2015-0106     Document Type: Article
Times cited : (86)

References (39)
  • 1
    • 84860433458 scopus 로고    scopus 로고
    • Cognitive-affective styles associated with position on war
    • Abe, J.A.A. (2012), "Cognitive-affective styles associated with position on war", Journal of Language and Social Psychology, Vol. 31 No. 2, pp. 212-222.
    • (2012) Journal of Language and Social Psychology , vol.31 , Issue.2 , pp. 212-222
    • Abe, J.A.A.1
  • 3
    • 34548344520 scopus 로고    scopus 로고
    • 2nd Quarter, APWG, San Francisco, CA, (accessed January 2015)
    • Anti Phishing Work Group (2014), "Phishing activity trends report", 2nd Quarter, APWG, San Francisco, CA, available at: www.apwg.org (accessed January 2015).
    • (2014) Phishing Activity Trends Report
  • 4
    • 0030201356 scopus 로고    scopus 로고
    • Interpersonal deception theory
    • Buller, D.B. and Burgoon, J.K. (1996), "Interpersonal deception theory", Communication Theory, Vol. 6 No. 3, pp. 203-242.
    • (1996) Communication Theory , vol.6 , Issue.3 , pp. 203-242
    • Buller, D.B.1    Burgoon, J.K.2
  • 5
    • 0038407565 scopus 로고    scopus 로고
    • Fear appeal motivate acceptance of action recommendation: Evidence for a positive bias in the processing of persuasive messages
    • Das, E.H.H.J., de Wit, J.B.F. and Stroebe, W. (2003), "Fear appeal motivate acceptance of action recommendation: evidence for a positive bias in the processing of persuasive messages", Personality and Social Psychology Bulletin, Vol. 29 No. 5, pp. 650-664.
    • (2003) Personality and Social Psychology Bulletin , vol.29 , Issue.5 , pp. 650-664
    • Das, E.H.H.J.1    De Wit, J.B.F.2    Stroebe, W.3
  • 7
    • 33144474642 scopus 로고    scopus 로고
    • On making the right choice: The deliberation-without-attention effect
    • Dijksterhuis, A., Bos, M.W., Nordgren, L.F. and van Baaren, R.B. (2006), "On making the right choice: the deliberation-without-attention effect", Science, Vol. 311 No. 5763, pp. 1005-1007.
    • (2006) Science , vol.311 , Issue.5763 , pp. 1005-1007
    • Dijksterhuis, A.1    Bos, M.W.2    Nordgren, L.F.3    Van Baaren, R.B.4
  • 9
    • 84962461768 scopus 로고    scopus 로고
    • One language, two grammars? Differences between British and American English
    • Dreschler, G. (2012), "One language, two grammars? Differences between British and American English", English Studies, Vol. 93 No. 2, pp. 244-246.
    • (2012) English Studies , vol.93 , Issue.2 , pp. 244-246
    • Dreschler, G.1
  • 11
    • 84947389309 scopus 로고
    • Nonverbal leakage and cues to deception
    • Ekman, P. and Friesen, W.V. (1969), "Nonverbal leakage and cues to deception", Psychiatry, Vol. 32 No. 1, pp. 88-105.
    • (1969) Psychiatry , vol.32 , Issue.1 , pp. 88-105
    • Ekman, P.1    Friesen, W.V.2
  • 12
    • 41549146748 scopus 로고    scopus 로고
    • Dual-processing accounts of reasoning, judgement and social cognition
    • Evans, J.S.B. (2008), "Dual-processing accounts of reasoning, judgement and social cognition", Annual Review of Psychology, Vol. 59, pp. 255-278.
    • (2008) Annual Review of Psychology , vol.59 , pp. 255-278
    • Evans, J.S.B.1
  • 14
    • 75649086141 scopus 로고    scopus 로고
    • Language style matching as a predictor of social dynamics in small groups
    • Gonzales, A.L., Hancock, J.T. and Pennebaker, J.W. (2010), "Language style matching as a predictor of social dynamics in small groups", Communication Research, Vol. 37 No. 1, pp. 3-19.
    • (2010) Communication Research , vol.37 , Issue.1 , pp. 3-19
    • Gonzales, A.L.1    Hancock, J.T.2    Pennebaker, J.W.3
  • 16
    • 67949119113 scopus 로고    scopus 로고
    • Computational procedures for probing interactions in OLS and logistic regression: SPSS and SAS implementations
    • Hayes, A.F. and Matthes, J. (2009), "Computational procedures for probing interactions in OLS and logistic regression: SPSS and SAS implementations", Behavior Research Methods, Vol. 41 No. 3, pp. 924-936.
    • (2009) Behavior Research Methods , vol.41 , Issue.3 , pp. 924-936
    • Hayes, A.F.1    Matthes, J.2
  • 17
    • 38549121705 scopus 로고    scopus 로고
    • An evaluation of extended validation and picture-in-picture phishing attacks
    • Ditrich, S. and Dhamija, R.R. (Eds), Springer Berlin Heidelberg, New York, NY
    • Jackson, C., Simon, D.R., Tan, D.S. and Barth, A. (2007), "An evaluation of extended validation and picture-in-picture phishing attacks", in Ditrich, S. and Dhamija, R.R. (Eds), Financial Cryptography and Data Security, Springer Berlin Heidelberg, New York, NY, pp. 281-293.
    • (2007) Financial Cryptography and Data Security , pp. 281-293
    • Jackson, C.1    Simon, D.R.2    Tan, D.S.3    Barth, A.4
  • 19
    • 38549134858 scopus 로고    scopus 로고
    • What instills trust? A qualitative study of phishing
    • Ditrich, S. and Dhamija, R.R. (Eds), Springer Berlin Heidelberg, New York, NY
    • Jakobsson, M., Tsow, A., Shah, A., Blevis, E. and Lim, Y. (2007), "What instills trust? A qualitative study of phishing", in Ditrich, S. and Dhamija, R.R. (Eds), Financial Cryptography and Data Security: Lecture Notes in Computer Science, Volume 4886, Springer Berlin Heidelberg, New York, NY, pp. 356-361.
    • (2007) Financial Cryptography and Data Security: Lecture Notes in Computer Science , vol.4886 , pp. 356-361
    • Jakobsson, M.1    Tsow, A.2    Shah, A.3    Blevis, E.4    Lim, Y.5
  • 22
    • 77953970829 scopus 로고
    • The elaboration likelihood model of persuasion
    • Berkowitz, L. (Ed.), Academic Press, New York, NY
    • Petty, R.E. and Cacioppo, J.T. (1986), "The elaboration likelihood model of persuasion", in Berkowitz, L. (Ed.), Advances in Experimental Social Psychology, Vol 19, Academic Press, New York, NY, pp. 123-205.
    • (1986) Advances in Experimental Social Psychology , vol.19 , pp. 123-205
    • Petty, R.E.1    Cacioppo, J.T.2
  • 23
    • 2142789297 scopus 로고    scopus 로고
    • How people make decisions that involve risk: A dual-processes approach
    • Reyna, V.F. (2004), "How people make decisions that involve risk: a dual-processes approach", Current Directions in Psychological Science, Vol. 13 No. 2, pp. 60-66.
    • (2004) Current Directions in Psychological Science , vol.13 , Issue.2 , pp. 60-66
    • Reyna, V.F.1
  • 24
  • 25
    • 0002247369 scopus 로고
    • Cognitive and physiological processes in fear appeals and attitude change: A revised theory of protection motivation
    • Cacioppo, J. and Petty, R. (Eds), Guilford, New York, NY
    • Rogers, R.W. (1983), "Cognitive and physiological processes in fear appeals and attitude change: a revised theory of protection motivation", in Cacioppo, J. and Petty, R. (Eds), Social Psychophysiology, Guilford, New York, NY, pp. 153-176.
    • (1983) Social Psychophysiology , pp. 153-176
    • Rogers, R.W.1
  • 26
    • 0033622231 scopus 로고    scopus 로고
    • The influence of negative advertising frames on political cynicism and politician accountability
    • Schenck-Hamlin, W.J., Procter, D.E. and Rumsey, D.J. (2000), "The influence of negative advertising frames on political cynicism and politician accountability", Human Communication Research, Vol. 26 No. 1, pp. 53-74.
    • (2000) Human Communication Research , vol.26 , Issue.1 , pp. 53-74
    • Schenck-Hamlin, W.J.1    Procter, D.E.2    Rumsey, D.J.3
  • 29
    • 77649253939 scopus 로고    scopus 로고
    • The psychological meaning of words: LIWC and computerized text analysis methods
    • Tausczik, Y.R. and Pennebaker, J.W. (2010), "The psychological meaning of words: LIWC and computerized text analysis methods", Journal of Language and Social Psychology, Vol. 29 No. 1, pp. 24-54.
    • (2010) Journal of Language and Social Psychology , vol.29 , Issue.1 , pp. 24-54
    • Tausczik, Y.R.1    Pennebaker, J.W.2
  • 30
    • 84887501378 scopus 로고    scopus 로고
    • accessed June 25, 2014
    • Team, Verizon RISK (2013), "Verizon 2013 data breach investigations report", available at: www.verizonenterprise.com/resources/reports/rp-data-breach-investigations-report-2013-en-xg.pdf (accessed June 25, 2014).
    • (2013) Verizon 2013 Data Breach Investigations Report
  • 31
    • 84856523527 scopus 로고    scopus 로고
    • What lies beneath: The linguistic traces of deception in online dating profiles
    • Toma, C.L. and Hancock, J.T. (2012), "What lies beneath: the linguistic traces of deception in online dating profiles", Journal of Communication, Vol. 62 No. 1, pp. 78-97.
    • (2012) Journal of Communication , vol.62 , Issue.1 , pp. 78-97
    • Toma, C.L.1    Hancock, J.T.2
  • 34
    • 79955890012 scopus 로고    scopus 로고
    • Why do people get phished? Testing individual differences in phishing vulnerability within an integrated information processing model
    • Vishwanath, A., Herath, T., Chen, R., Wang, J. and Rao, H.R. (2011), "Why do people get phished? Testing individual differences in phishing vulnerability within an integrated information processing model", Decision Support Systems, Vol. 51 No. 3, pp. 576-586.
    • (2011) Decision Support Systems , vol.51 , Issue.3 , pp. 576-586
    • Vishwanath, A.1    Herath, T.2    Chen, R.3    Wang, J.4    Rao, H.R.5
  • 35
    • 60049086497 scopus 로고    scopus 로고
    • A test of intervention for security threats from social engineering
    • Workman, M. (2008), "A test of intervention for security threats from social engineering", Information Management & Computer Security, Vol. 16 No. 5, pp. 463-483.
    • (2008) Information Management & Computer Security , vol.16 , Issue.5 , pp. 463-483
    • Workman, M.1
  • 36
    • 77955042436 scopus 로고    scopus 로고
    • The influence of experiential and dispositional factors in phishing: An empirical investigation of the deceived
    • Wright, R. and Marett, K. (2010), "The influence of experiential and dispositional factors in phishing: an empirical investigation of the deceived", Journal of Management Information Systems, Vol. 27 No. 1, pp. 273-303.
    • (2010) Journal of Management Information Systems , vol.27 , Issue.1 , pp. 273-303
    • Wright, R.1    Marett, K.2
  • 37
    • 3843099453 scopus 로고    scopus 로고
    • Automating linguistics-based cues for detecting deception in asynchronous computer-mediated communications
    • Zhou, L., Burgoon, J.K., Nunamaker, J.F. and Twitchell, D. (2004), "Automating linguistics-based cues for detecting deception in asynchronous computer-mediated communications", Group Decision and Negotiation, Vol. 13 No. 1, pp. 81-106.
    • (2004) Group Decision and Negotiation , vol.13 , Issue.1 , pp. 81-106
    • Zhou, L.1    Burgoon, J.K.2    Nunamaker, J.F.3    Twitchell, D.4
  • 38
    • 84970382124 scopus 로고
    • Cognitive processing of fear-arousing message content
    • Hale, J.L., Lemieux, R. and Mongeau, P.A. (1995), "Cognitive processing of fear-arousing message content", Communication Research, Vol. 22 No. 4, pp. 459-474.
    • (1995) Communication Research , vol.22 , Issue.4 , pp. 459-474
    • Hale, J.L.1    Lemieux, R.2    Mongeau, P.A.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.