Response to a phishing attack: persuasion and protection motivation in an organizational context
PurposeThis study aims to examine the effect of cybersecurity threat and efficacy upon click-through, response to a phishing attack: persuasion and protection motivation in an organizational context.Design/methodology/approachIn a simulated field trial conducted in a financial institute, via PhishMe...
Saved in:
Published in | Information and computer security Vol. 30; no. 1; pp. 63 - 78 |
---|---|
Main Authors | , , , |
Format | Journal Article |
Language | English |
Published |
Bingley
Emerald Group Publishing Limited
31.01.2022
|
Subjects | |
Online Access | Get full text |
ISSN | 2056-4961 2056-497X |
DOI | 10.1108/ICS-02-2021-0021 |
Cover
Abstract | PurposeThis study aims to examine the effect of cybersecurity threat and efficacy upon click-through, response to a phishing attack: persuasion and protection motivation in an organizational context.Design/methodology/approachIn a simulated field trial conducted in a financial institute, via PhishMe, employees were randomly sent one of five possible emails using a set persuasion strategy. Participants were then invited to complete an online survey to identify possible protective factors associated with clicking and reporting behavior (N = 2,918). The items of interest included perceived threat severity, threat susceptibility, response efficacy and personal efficacy.FindingsThe results indicate that response behaviors vary significantly across different persuasion strategies. Perceptions of threat susceptibility increased the likelihood of reporting behavior beyond clicking behavior. Threat susceptibility and organizational response efficacy were also associated with increased odds of not responding to the simulated phishing email attack.Practical implicationsThis study again highlights human susceptibility to phishing attacks in the presence of social engineering strategies. The results suggest heightened awareness of phishing threats and responsibility to personal cybersecurity are key to ensuring secure business environments.Originality/valueThe authors extend existing phishing literature by investigating not only click-through behavior, but also no-response and reporting behaviors. Furthermore, the authors observed the relative effectiveness of persuasion strategies used in phishing emails as they compete to manipulate unsafe email behavior. |
---|---|
AbstractList | PurposeThis study aims to examine the effect of cybersecurity threat and efficacy upon click-through, response to a phishing attack: persuasion and protection motivation in an organizational context.Design/methodology/approachIn a simulated field trial conducted in a financial institute, via PhishMe, employees were randomly sent one of five possible emails using a set persuasion strategy. Participants were then invited to complete an online survey to identify possible protective factors associated with clicking and reporting behavior (N = 2,918). The items of interest included perceived threat severity, threat susceptibility, response efficacy and personal efficacy.FindingsThe results indicate that response behaviors vary significantly across different persuasion strategies. Perceptions of threat susceptibility increased the likelihood of reporting behavior beyond clicking behavior. Threat susceptibility and organizational response efficacy were also associated with increased odds of not responding to the simulated phishing email attack.Practical implicationsThis study again highlights human susceptibility to phishing attacks in the presence of social engineering strategies. The results suggest heightened awareness of phishing threats and responsibility to personal cybersecurity are key to ensuring secure business environments.Originality/valueThe authors extend existing phishing literature by investigating not only click-through behavior, but also no-response and reporting behaviors. Furthermore, the authors observed the relative effectiveness of persuasion strategies used in phishing emails as they compete to manipulate unsafe email behavior. |
Author | Bayl-Smith, Piers Yu, Kun Wiggins, Mark Taib, Ronnie |
Author_xml | – sequence: 1 givenname: Piers surname: Bayl-Smith fullname: Bayl-Smith, Piers – sequence: 2 givenname: Ronnie surname: Taib fullname: Taib, Ronnie – sequence: 3 givenname: Kun surname: Yu fullname: Yu, Kun – sequence: 4 givenname: Mark surname: Wiggins fullname: Wiggins, Mark |
BookMark | eNp1UE1LAzEQDVLBWnv3GPC8OsnuZhNvUvwoFAQ_wFuM2Wyb2iZrkor6691txYPgZebNzHvD4x2igfPOIHRM4JQQ4GfTyX0GNKNASQZd2UNDCiXLClE9DX4xIwdoHOMSAIggLGdkiJ7vTGy9iwYnjxVuFzYurJtjlZLSr-e4NSFuVLTeYeVq3AafjE79uPbJvqsttP0R-zBXzn5tV2qFtXfJfKQjtN-oVTTjnz5Cj1eXD5ObbHZ7PZ1czDKdE5IyUgkuhOZaNQWrRFOBIFXO64YXDKDMa0NMVdcvOheKlZpXZaE1zQteMsGLuslH6GT3t7P4tjExyaXfhM5IlJRRKkBQkncstmPp4GMMppHapq3jFJRdSQKyD1R2gUqgsg9U9oF2QvgjbINdq_D5v-QbN3N6TQ |
CitedBy_id | crossref_primary_10_1016_j_cose_2023_103487 crossref_primary_10_1016_j_cose_2024_104129 crossref_primary_10_1007_s42979_025_03853_1 crossref_primary_10_1016_j_compeleceng_2025_110097 crossref_primary_10_3390_ijerph20043514 crossref_primary_10_1016_j_tele_2021_101766 crossref_primary_10_1016_j_im_2025_104110 crossref_primary_10_1108_ICS_12_2022_0195 crossref_primary_10_1155_2022_2975033 |
Cites_doi | 10.1016/j.ijhcs.2018.06.004 10.1037/1082-989X.4.3.272 10.1007/s10796-015-9608-8 10.1057/s41303-017-0058-x 10.1002/asi.23851 10.1080/00223980.1975.9915803 10.1016/S1361-3723(21)00082-8 10.1108/ICS-03-2017-0009 10.1109/TPC.2012.2208392 10.1016/j.cose.2011.10.007 10.1016/j.cose.2016.02.009 10.1287/isre.2014.0522 10.1108/ICS-03-2018-0038 10.1111/jcc4.12126 10.1002/asi.20779 10.1177/0093650215627483 10.1080/03637759209376276 10.1080/108107396127988 10.1016/j.dss.2011.03.002 10.1016/j.dss.2008.11.010 10.1016/j.joep.2011.10.009 10.1108/OIR-04-2015-0106 10.1057/ejis.2009.11 10.1016/j.chb.2016.02.065 10.1016/j.dss.2009.02.005 10.1037/0022-3514.39.5.752 10.1007/978-1-4612-4964-1_1 10.1093/cybsec/tyaa001 10.17705/1jais.00447 |
ContentType | Journal Article |
Copyright | Emerald Publishing Limited 2021 |
Copyright_xml | – notice: Emerald Publishing Limited 2021 |
DBID | AAYXX CITATION 0-V 0U~ 1-H 7SC 7WY 7WZ 7XB 8AO 8FD 8FE 8FG 8FI ABUWG AFKRA ALSLI ARAPS AZQEC BENPR BEZIV BGLVJ BGRYB CCPQU CNYFK DWQXO E3H F2A FYUFA F~G GNUQQ HCIFZ JQ2 K6~ K7- L.- L.0 L7M L~C L~D M0C M0N M0O M0T M1O P5Z P62 PHGZM PHGZT PJZUB PKEHL PPXIY PQBIZ PQEST PQGLB PQQKQ PQUKI PRQQA PYYUZ Q9U |
DOI | 10.1108/ICS-02-2021-0021 |
DatabaseName | CrossRef ProQuest Social Sciences Premium Collection Global News & ABI/Inform Professional Trade PRO Computer and Information Systems Abstracts ABI/INFORM Collection ABI/INFORM Global (PDF only) ProQuest Central (purchase pre-March 2016) ProQuest Pharma Collection Technology Research Database ProQuest SciTech Collection ProQuest Technology Collection Hospital Premium Collection ProQuest Central (Alumni) ProQuest Central UK/Ireland Social Science Premium Collection Advanced Technologies & Aerospace Collection ProQuest Central Essentials ProQuest Central Business Premium Collection ProQuest Technology Collection Criminology Collection ProQuest One Community College Library & Information Science Collection ProQuest Central Korea Library & Information Sciences Abstracts (LISA) Library & Information Science Abstracts (LISA) Health Research Premium Collection ABI/INFORM Global (Corporate) ProQuest Central Student SciTech Premium Collection ProQuest Computer Science Collection ProQuest Business Collection Computer Science Database ABI/INFORM Professional Advanced ABI/INFORM Professional Standard Advanced Technologies Database with Aerospace Computer and Information Systems Abstracts Academic Computer and Information Systems Abstracts Professional ABI/INFORM Global Computing Database Criminal Justice Database Healthcare Administration Database Library Science Database Advanced Technologies & Aerospace Database ProQuest Advanced Technologies & Aerospace Collection ProQuest Central Premium ProQuest One Academic (New) ProQuest Health & Medical Research Collection ProQuest One Academic Middle East (New) ProQuest One Health & Nursing ProQuest One Business ProQuest One Academic Eastern Edition (DO NOT USE) ProQuest One Applied & Life Sciences ProQuest One Academic ProQuest One Academic UKI Edition ProQuest One Social Sciences ABI/INFORM Collection China ProQuest Central Basic |
DatabaseTitle | CrossRef Computer Science Database ProQuest Central Student Library and Information Science Abstracts (LISA) ProQuest Advanced Technologies & Aerospace Collection ProQuest Central Essentials ProQuest Computer Science Collection Computer and Information Systems Abstracts SciTech Premium Collection Trade PRO ABI/INFORM Complete Global News & ABI/Inform Professional ProQuest One Applied & Life Sciences Health Research Premium Collection Health & Medical Research Collection Library & Information Science Collection ProQuest Central (New) Advanced Technologies & Aerospace Collection Business Premium Collection Social Science Premium Collection ABI/INFORM Global ProQuest One Academic Eastern Edition ProQuest Hospital Collection ProQuest Technology Collection ProQuest Business Collection Criminology Collection ProQuest Social Sciences Premium Collection ProQuest One Academic UKI Edition ProQuest One Academic ProQuest One Academic (New) ABI/INFORM Global (Corporate) ProQuest One Business Technology Collection Technology Research Database Computer and Information Systems Abstracts – Academic ProQuest One Academic Middle East (New) ProQuest Central (Alumni Edition) ProQuest One Community College ProQuest One Health & Nursing ProQuest Pharma Collection ProQuest Central ABI/INFORM Professional Advanced ProQuest Library Science ProQuest Health & Medical Research Collection ProQuest Criminal Justice ABI/INFORM Professional Standard ProQuest Central Korea Advanced Technologies Database with Aerospace ProQuest Computing ProQuest One Social Sciences ProQuest Central Basic ProQuest Health Management ABI/INFORM China ProQuest SciTech Collection Computer and Information Systems Abstracts Professional Advanced Technologies & Aerospace Database |
DatabaseTitleList | Computer Science Database |
Database_xml | – sequence: 1 dbid: 8FG name: ProQuest Technology Collection url: https://search.proquest.com/technologycollection1 sourceTypes: Aggregation Database |
DeliveryMethod | fulltext_linktorsrc |
Discipline | Computer Science Engineering Library & Information Science Business |
EISSN | 2056-497X |
EndPage | 78 |
ExternalDocumentID | 10_1108_ICS_02_2021_0021 |
GeographicLocations | Australia United States--US |
GeographicLocations_xml | – name: United States--US – name: Australia |
GroupedDBID | .WU 0-V 3FY 5VS 7WY 8AO 8FE 8FG 8FI 8FW 9F- AAGBP AAKOT AAMCF AAUDR AAVEV AAXBI AAYXX ABIJV ABJNI ABSDC ABUWG ABXQL ABYQI ACGFS ACTSA ACZKX ADBBV ADOMW ADQHX ADWNT AFKRA AFNTC AGTVX AHMHQ AILOG AJEBP ALMA_UNASSIGNED_HOLDINGS ALSLI AODMV AQUVI ARALO ARAPS AUCOK AZQEC BENPR BEZIV BGLVJ BGRYB BPHCQ BVXVI CCPQU CITATION CNYFK DWQXO EBS ECCUG FNNZZ FYUFA GEA GEI GMX GNUQQ GQ. H13 HCIFZ K6V K6~ K7- KBGRL M0C M0O M0T M1O M42 P62 PHGZM PHGZT PJZUB PPXIY PQBIZ PQGLB PQQKQ PROAC PRQQA PUEGO SCAQC SDURG SLOBJ TEM TGG TMF TMI TMT UKHRP Z11 Z12 Z21 ZYZAG .DC 0U~ 1-H 29I 4.4 5GY 70U 77K 7SC 7XB 8FD 8R4 8R5 9E0 AAPSD ABEAN ACGFO AEBZA AEDOK AEMMR AETHF AFNZV AIAFM AJFKA APPLU ATGMP CS3 DU5 E3H F2A GEB GEC GMM GMN J1Y JI- JL0 JQ2 L.- L.0 L7M L~C L~D M0N P2P PKEHL PQEST PQUKI Q2X Q3A Q9U RWL TAE TDQ TET TMD TMK TMX Z22 |
ID | FETCH-LOGICAL-c311t-179899c8caf4679f7091738df8460053de1e7ddbc39a65c8754cc234856984df3 |
IEDL.DBID | 8FG |
ISSN | 2056-4961 |
IngestDate | Mon Jun 30 11:21:46 EDT 2025 Wed Sep 10 04:54:15 EDT 2025 Thu Apr 24 22:50:28 EDT 2025 |
IsPeerReviewed | true |
IsScholarly | true |
Issue | 1 |
Language | English |
License | https://www.emerald.com/insight/site-policies |
LinkModel | DirectLink |
MergedId | FETCHMERGED-LOGICAL-c311t-179899c8caf4679f7091738df8460053de1e7ddbc39a65c8754cc234856984df3 |
Notes | ObjectType-Article-1 SourceType-Scholarly Journals-1 ObjectType-Feature-2 content type line 14 |
PQID | 2622909213 |
PQPubID | 31135 |
PageCount | 16 |
ParticipantIDs | proquest_journals_2622909213 crossref_citationtrail_10_1108_ICS_02_2021_0021 crossref_primary_10_1108_ICS_02_2021_0021 |
PublicationCentury | 2000 |
PublicationDate | 2022-01-31 |
PublicationDateYYYYMMDD | 2022-01-31 |
PublicationDate_xml | – month: 01 year: 2022 text: 2022-01-31 day: 31 |
PublicationDecade | 2020 |
PublicationPlace | Bingley |
PublicationPlace_xml | – name: Bingley |
PublicationTitle | Information and computer security |
PublicationYear | 2022 |
Publisher | Emerald Group Publishing Limited |
Publisher_xml | – name: Emerald Group Publishing Limited |
References | (key2022012710484126400_ref016) 2009; 18 (key2022012710484126400_ref039) 2020; 6 (key2022012710484126400_ref028) 1986 (key2022012710484126400_ref006) 1980; 39 (key2022012710484126400_ref043) 2014; 25 (key2022012710484126400_ref005) 2015 (key2022012710484126400_ref029) 1975; 91 (key2022012710484126400_ref042) 2007; 16 (key2022012710484126400_ref026) 2005 key2022012710484126400_ref002 key2022012710484126400_ref008 (key2022012710484126400_ref011) 1999; 4 (key2022012710484126400_ref001) 2016; 60 (key2022012710484126400_ref035) 2016; 45 (key2022012710484126400_ref037) 2012; 55 key2022012710484126400_ref027 (key2022012710484126400_ref023) 2011; 3 (key2022012710484126400_ref040) 1992; 59 key2022012710484126400_ref009 (key2022012710484126400_ref031) 2017; 68 (key2022012710484126400_ref036) 2011; 51 (key2022012710484126400_ref022) 2009; 11 (key2022012710484126400_ref032) 2019 (key2022012710484126400_ref004) 2017; 19 (key2022012710484126400_ref003) 2017; 25 (key2022012710484126400_ref014) 2015 (key2022012710484126400_ref041) 1996; 1 (key2022012710484126400_ref034) 2015; 20 (key2022012710484126400_ref010) 2012; 33 (key2022012710484126400_ref025) 2009; 46 (key2022012710484126400_ref013) 2017; 18 (key2022012710484126400_ref030) 1983 key2022012710484126400_ref012 (key2022012710484126400_ref044) 2002 key2022012710484126400_ref018 key2022012710484126400_ref017 (key2022012710484126400_ref020) 2018; 26 (key2022012710484126400_ref007) 1999 (key2022012710484126400_ref024) 2017; 26 (key2022012710484126400_ref015) 2016; 40 (key2022012710484126400_ref038) 2018; 120 (key2022012710484126400_ref019) 2012; 31 (key2022012710484126400_ref021) 2009; 18 (key2022012710484126400_ref033) 2016; 59 |
References_xml | – volume: 120 start-page: 1 year: 2018 ident: key2022012710484126400_ref038 article-title: Exploring susceptibility to phishing in the workplace publication-title: International Journal of Human-Computer Studies doi: 10.1016/j.ijhcs.2018.06.004 – volume: 3 start-page: 97 issue: 1 year: 2011 ident: key2022012710484126400_ref023 article-title: How to factor-analyze your data right: Do’s, don’ts, and how-to’s publication-title: International Journal of Psychological Research – volume: 4 start-page: 272 issue: 3 year: 1999 ident: key2022012710484126400_ref011 article-title: Evaluating the use of exploratory factor analysis in psychological research publication-title: Psychological Methods doi: 10.1037/1082-989X.4.3.272 – volume: 19 start-page: 509 issue: 3 year: 2017 ident: key2022012710484126400_ref004 article-title: Organizational information security as a complex adaptive system: insights from three agent-based models”, information systems frontiers publication-title: Information Systems Frontiers doi: 10.1007/s10796-015-9608-8 – volume: 26 start-page: 564 issue: 6 year: 2017 ident: key2022012710484126400_ref024 article-title: Which phish get caught? An exploratory study of individuals’ susceptibility to phishing publication-title: European Journal of Information Systems doi: 10.1057/s41303-017-0058-x – volume: 68 start-page: 2237 issue: 9 year: 2017 ident: key2022012710484126400_ref031 article-title: Securing the human: employee security vulnerability risk in organizational settings publication-title: Journal of the Association for Information Science and Technology doi: 10.1002/asi.23851 – volume-title: Australasian Conference on Information Systems, Adelaide, 30 November - 4 December year: 2015 ident: key2022012710484126400_ref005 article-title: Breaching the human firewall: social engineering in phishing and spear-phishing emails – volume: 91 start-page: 93 issue: 1 year: 1975 ident: key2022012710484126400_ref029 article-title: A protection motivation theory of fear appeals and attitude change publication-title: The Journal of Psychology doi: 10.1080/00223980.1975.9915803 – ident: key2022012710484126400_ref018 – ident: key2022012710484126400_ref017 doi: 10.1016/S1361-3723(21)00082-8 – volume: 25 start-page: 593 issue: 5 year: 2017 ident: key2022012710484126400_ref003 article-title: Spear phishing in organisations explained publication-title: Information and Computer Security doi: 10.1108/ICS-03-2017-0009 – volume: 55 start-page: 345 issue: 4 year: 2012 ident: key2022012710484126400_ref037 article-title: Research article phishing susceptibility: an investigation into the processing of a targeted spear phishing email publication-title: IEEE Transactions on Professional Communication doi: 10.1109/TPC.2012.2208392 – volume: 31 start-page: 83 issue: 1 year: 2012 ident: key2022012710484126400_ref019 article-title: Understanding information systems security policy compliance: an integration of the theory of planned behavior and the protection motivation theory publication-title: Computers and Security doi: 10.1016/j.cose.2011.10.007 – volume: 59 start-page: 138 year: 2016 ident: key2022012710484126400_ref033 article-title: Understanding online safety behaviors: a protection motivation theory perspective publication-title: Computers and Security doi: 10.1016/j.cose.2016.02.009 – volume: 25 start-page: 385 issue: 2 year: 2014 ident: key2022012710484126400_ref043 article-title: Research note – influence techniques in phishing attacks: an examination of vulnerability and resistance publication-title: Information Systems Research doi: 10.1287/isre.2014.0522 – volume: 26 start-page: 264 issue: 3 year: 2018 ident: key2022012710484126400_ref020 article-title: Persuading end users to act cautiously online: a fear appeals study on phishing publication-title: Information and Computer Security doi: 10.1108/ICS-03-2018-0038 – volume: 20 start-page: 570 issue: 5 year: 2015 ident: key2022012710484126400_ref034 article-title: Examining the distinct antecedents of e-mail habits and its influence on the outcomes of a phishing attack publication-title: Journal of Computer-Mediated Communication doi: 10.1111/jcc4.12126 – ident: key2022012710484126400_ref008 – volume: 16 start-page: 315 issue: 6 year: 2007 ident: key2022012710484126400_ref042 article-title: Gaining access with social engineering: an empirical study of the threat publication-title: Information Systems Security doi: 10.1002/asi.20779 – year: 2002 ident: key2022012710484126400_ref044 publication-title: The Art of Deception: Controlling the Human Element of Security – volume-title: Phishing Dark Waters: The Offensive and Defensive Sides of Malicious e-Mails year: 2015 ident: key2022012710484126400_ref014 – volume: 45 start-page: 1 issue: 8 year: 2016 ident: key2022012710484126400_ref035 article-title: Suspicion, cognition, and automaticity model of phishing susceptibility publication-title: Communication Research doi: 10.1177/0093650215627483 – volume: 59 start-page: 329 issue: 4 year: 1992 ident: key2022012710484126400_ref040 article-title: Putting the fear back into fear appeals: the extended parallel process model publication-title: Communication Monographs doi: 10.1080/03637759209376276 – volume: 11 start-page: 394 issue: 07 year: 2009 ident: key2022012710484126400_ref022 article-title: Understanding security behaviors in personal computer usage: a threat avoidance perspective publication-title: Journal of the Association for Information Systems – start-page: 564 volume-title: Human-Computer Interaction – INTERACT 2019, Lecture Notes in Computer Science year: 2019 ident: key2022012710484126400_ref032 article-title: Social engineering and organisational dependencies in phishing attacks – ident: key2022012710484126400_ref002 – start-page: 81 volume-title: Prediction Health Behaviour: Research and Practice with Social Cognition Models year: 2005 ident: key2022012710484126400_ref026 article-title: Protection motivation theory – ident: key2022012710484126400_ref027 – volume: 1 start-page: 317 issue: 4 year: 1996 ident: key2022012710484126400_ref041 article-title: Predicting risk behaviors: development and validation of a diagnostic scale publication-title: Journal of Health Communication doi: 10.1080/108107396127988 – volume: 51 start-page: 576 issue: 3 year: 2011 ident: key2022012710484126400_ref036 article-title: Why do people get phished? Testing individual differences in phishing vulnerability within an integrated, information processing model publication-title: Decision Support Systems doi: 10.1016/j.dss.2011.03.002 – volume: 46 start-page: 815 issue: 4 year: 2009 ident: key2022012710484126400_ref025 article-title: Studying users’ computer security behavior: a health belief perspective publication-title: Decision Support Systems doi: 10.1016/j.dss.2008.11.010 – start-page: 73 volume-title: Dual-Process Theories in Social Psycholohy year: 1999 ident: key2022012710484126400_ref007 article-title: The heuristic-systematic model in its broader context – volume: 33 start-page: 264 issue: 1 year: 2012 ident: key2022012710484126400_ref010 article-title: Influencing behaviour: the mindspace way publication-title: Journal of Economic Psychology doi: 10.1016/j.joep.2011.10.009 – volume: 40 start-page: 265 issue: 2 year: 2016 ident: key2022012710484126400_ref015 article-title: Individual processing of phishing emails publication-title: Online Information Review doi: 10.1108/OIR-04-2015-0106 – start-page: 153 volume-title: Social Psychophysiology year: 1983 ident: key2022012710484126400_ref030 article-title: Cognitive and physiological processes in fear appeals andattitude change: a revised theory of protection motivation – ident: key2022012710484126400_ref012 – volume: 18 start-page: 177 issue: 2 year: 2009 ident: key2022012710484126400_ref021 article-title: Threat or coping appraisal: determinants of SMB executives’ decision to adopt anti-malware software publication-title: European Journal of Information Systems doi: 10.1057/ejis.2009.11 – volume: 60 start-page: 185 year: 2016 ident: key2022012710484126400_ref001 article-title: Phishing threat avoidance behaviour: an empirical investigation publication-title: Computers in Human Behavior doi: 10.1016/j.chb.2016.02.065 – volume: 18 start-page: 106 issue: 2 year: 2009 ident: key2022012710484126400_ref016 article-title: Protection motivation and deterrence: a framework for security policy compliance in organisations publication-title: European Journal of Information Systems doi: 10.1016/j.dss.2009.02.005 – ident: key2022012710484126400_ref009 – volume: 39 start-page: 752 issue: 5 year: 1980 ident: key2022012710484126400_ref006 article-title: Heuristic versus systematic information processing and the use of source versus message cues in persuasion publication-title: Journal of Personality and Social Psychology doi: 10.1037/0022-3514.39.5.752 – start-page: 1 volume-title: Communication and Persuasion. Springer Series in Social Psychology year: 1986 ident: key2022012710484126400_ref028 article-title: The elaboration likelihood model of persuasion doi: 10.1007/978-1-4612-4964-1_1 – volume: 6 start-page: 1 issue: 1 year: 2020 ident: key2022012710484126400_ref039 article-title: Developing a measure of information seeking about phishing publication-title: Journal of Cybersecurity doi: 10.1093/cybsec/tyaa001 – volume: 18 start-page: 22 issue: 1 year: 2017 ident: key2022012710484126400_ref013 article-title: Got phished: internet security and human vulnerability publication-title: Journal of the Association for Information Systems doi: 10.17705/1jais.00447 |
SSID | ssj0001916361 ssj0004345 |
Score | 2.362756 |
Snippet | PurposeThis study aims to examine the effect of cybersecurity threat and efficacy upon click-through, response to a phishing attack: persuasion and protection... |
SourceID | proquest crossref |
SourceType | Aggregation Database Enrichment Source Index Database |
StartPage | 63 |
SubjectTerms | Behavior Cognition & reasoning Compliance Context Cybercrime Cybersecurity Electronic mail Electronic mail systems Employees Engineering Heuristic Motivation Organizational aspects Perceptions Persuasion Phishing Self-efficacy Threats User behavior |
SummonAdditionalLinks | – databaseName: Emerald A-Z Current Journals dbid: GEI link: http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwrV1LS8NAEF5qT16sT6xW2YMXD2mSzSbZeJNiqYI9qIXeYrK7oaVtUuwWxF_vziYpVkQQPIYkm33OfDOZ-QahK0dDfjArLDdk1KJCUIsl4ICnXAMMSSQ1VUseh8FgRB_G_riBhnUujAmrLN0xRk5P8xUYqTYEbmspvCEcgOo1971nk1wMUQagq2zwWNsTtZjv6J3uB3Xqb-1x0UjIMwSqRGt9i0aBW_-3_KGxbT21LaaN7um3UFH3ugw5mXXXKu3yj2-Ejv83rH20V8FUfFvuqwPUkPkhatUlIHAlEY7Q61MZYyuxKnCCl5PSpYUTpRI-u8FLjS7XCXjkcJILXLFCwOViU1gNT-EmLr5khepPmz6_q2M06t-99AZWVbTB4p7rKqA71SYcZzzJtAyOslADktBjItNAB068kK4MhUi5FyWBz7W5RDknHmV-EDEqMu8ENfMil6cIp4KHoR9IMJkoIVHqCsayNOWOpKmQrI3seoliXjGaQ2GNeWwsG4fFeipjh8QwlTFMZRtdb95YlmwevzzbqVc9rs71KiYB8ONHxPXO_tDUOdolkDXhuFrldVBTva3lhcYyKr00W_QTF5LtCw priority: 102 providerName: Emerald |
Title | Response to a phishing attack: persuasion and protection motivation in an organizational context |
URI | https://www.proquest.com/docview/2622909213 |
Volume | 30 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwfV1LS8NAEB58gOhBtCrWR9mDCB5Cs8k22XiRWlofYBUfoL3EZHeDorZV0__vTLpp66WXQLIJhJ3dmW9mZ-YDOHIR8pNb4fBQCkdoLRyZUABeKAQYxjOiYC256QaXT-L6ufFsA26_Nq2y1ImFotYDRTHyuhdQZ_LI4_7Z8Nsh1ig6XbUUGouwzNHS0DqXnYtpXaRfkBR7aOQdEQW8PKZ0Zf2q9VAUJlOGAtm5_2bpv1YuTE1nA9YtRmTNsVA3YcH0K7BSpqhXYG2miWAFDm3pATtmtraI5prZTbsFr_fjNFjD8gFL2PBtHHViSZ4n6uOUDREAjhIKmrGkr5lt3EC3XxPuM_ZOg2wwU7iJP0hp7qjbt-Gp035sXTqWV8FRPuc5dSRFL0tJlWSoJqMsRMwQ-lJniEVoU2rDTah1qvwoCRoKPRqhlOcL2QgiKXTm78BSf9A3u8BSrcKwERjyagQKKOVayixNlWtEqo2sQr2c1ljZpuPEffEZF86HK2MUROx6MQkiJkFU4WTyxXDccGPOuwelpGK79X7j6ULZmz-8D6se1TK4HA3RASzlPyNziAgjT2vFMqrB8nm7e3dfKyrI8XrDb_FZ76XXvPgD8D_SCA |
linkProvider | ProQuest |
linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwtV1NT9tAEB1BkKAcKgggoFD2AEgcrNjrjb2uVCEKRAkJEeJD4rbYu2sV0SZpMar6p_obO2OvIVy4cbTWtqyd8byZ2XkzALs-uvwUVnhBLIUnjBGeTCkBLzQ6GJZbUU4tOR9G3Rtxdtu-nYF_NReGyiprm1gaajPWlCNv8Yg6kyc8CA8nvzyaGkWnq_UIjUot-vbvHwzZHr_2TlC-e5x3Tq-Pu56bKuDpMAgK6seJMYaWOs3RSCR5jIgZh9LkiMSkksYGNjYm02GSRm2N_rzQmodCtqNECpOH-N5ZmBPEaG3A3LfT4cXlCxMzLMcic3QrPJFEQX0w6stW7_iqpEJTTQQh62sgfI0DJbh1luCj80rZUaVGyzBjR02Yr4vim7A41bawCduO7MD2mWMzkXSZMxMrcHdZFd5aVoxZyibfqzwXS4si1Q9f2ARdzqeU0nQsHRnmWkXQ5c_naWvsnhbZeIoqih9IhfWIJqtw8y57vgaN0Xhk14FlRsdxO7IURwlUiSwwUuZZpn0rMmPlBrTqbVXatTmnaRs_VBnu-FKhIJTPFQlCkSA24OD5iUnV4uONe7dqSSn3sz-qF9XcfHt5Bxa61-cDNegN-5_gAycmhR8gDG5Bo_j9ZLfRvymyz06pGNy9tx7_B-1vCd4 |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Response+to+a+phishing+attack%3A+persuasion+and+protection+motivation+in+an+organizational+context&rft.jtitle=Information+management+%26+computer+security&rft.au=Bayl-Smith%2C+Piers&rft.au=Taib%2C+Ronnie&rft.au=Yu%2C+Kun&rft.au=Wiggins%2C+Mark&rft.date=2022-01-31&rft.pub=Emerald+Group+Publishing+Limited&rft.issn=2056-4961&rft.eissn=2056-497X&rft.volume=30&rft.issue=1&rft.spage=63&rft.epage=78&rft_id=info:doi/10.1108%2FICS-02-2021-0021 |
thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=2056-4961&client=summon |
thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=2056-4961&client=summon |
thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=2056-4961&client=summon |