Why do people get phished? Testing individual differences in phishing vulnerability within an integrated, information processing model
Top Cited Papers
- 1 June 2011
- journal article
- research article
- Published by Elsevier BV in Decision Support Systems
- Vol. 51 (3), 576-586
- https://doi.org/10.1016/j.dss.2011.03.002
Abstract
No abstract availableKeywords
This publication has 30 references indexed in Scilit:
- Technical opinionWhat drives the adoption of antiphishing measures by Hong Kong banks?Communications of the ACM, 2009
- Wisecrackers: A theory‐grounded investigation of phishing and pretext social engineering threats to information securityJournal of the American Society for Information Science and Technology, 2007
- A framework for e‐government: privacy implicationsBusiness Process Management Journal, 2006
- The Interplay of News Frames on Cognitive ComplexityHuman Communication Research, 2004
- Structural Equation Modeling in the Communication Sciences, 1995-2000Human Communication Research, 2002
- Computer Self-Efficacy: Development of a Measure and Initial TestMIS Quarterly, 1995
- Success and failure in expert reasoningOrganizational Behavior and Human Decision Processes, 1992
- Audience Selectivity and Involvement in the Newer Media EnvironmentCommunication Research, 1990
- Handbook of Social Psychology, Volumes I and II (third edition). Edited by G. Lindzey and E. Aronson. (Pp. 816, 1120; illustrated; £65.00, £75.00.) Random House: New York. 1985.Psychological Medicine, 1986
- Central and Peripheral Routes to Advertising Effectiveness: The Moderating Role of InvolvementJournal of Consumer Research, 1983