Response to a phishing attack: persuasion and protection motivation in an organizational context

PurposeThis study aims to examine the effect of cybersecurity threat and efficacy upon click-through, response to a phishing attack: persuasion and protection motivation in an organizational context.Design/methodology/approachIn a simulated field trial conducted in a financial institute, via PhishMe...

Full description

Saved in:
Bibliographic Details
Published inInformation and computer security Vol. 30; no. 1; pp. 63 - 78
Main Authors Bayl-Smith, Piers, Taib, Ronnie, Yu, Kun, Wiggins, Mark
Format Journal Article
LanguageEnglish
Published Bingley Emerald Group Publishing Limited 31.01.2022
Subjects
Online AccessGet full text
ISSN2056-4961
2056-497X
DOI10.1108/ICS-02-2021-0021

Cover

Abstract PurposeThis study aims to examine the effect of cybersecurity threat and efficacy upon click-through, response to a phishing attack: persuasion and protection motivation in an organizational context.Design/methodology/approachIn a simulated field trial conducted in a financial institute, via PhishMe, employees were randomly sent one of five possible emails using a set persuasion strategy. Participants were then invited to complete an online survey to identify possible protective factors associated with clicking and reporting behavior (N = 2,918). The items of interest included perceived threat severity, threat susceptibility, response efficacy and personal efficacy.FindingsThe results indicate that response behaviors vary significantly across different persuasion strategies. Perceptions of threat susceptibility increased the likelihood of reporting behavior beyond clicking behavior. Threat susceptibility and organizational response efficacy were also associated with increased odds of not responding to the simulated phishing email attack.Practical implicationsThis study again highlights human susceptibility to phishing attacks in the presence of social engineering strategies. The results suggest heightened awareness of phishing threats and responsibility to personal cybersecurity are key to ensuring secure business environments.Originality/valueThe authors extend existing phishing literature by investigating not only click-through behavior, but also no-response and reporting behaviors. Furthermore, the authors observed the relative effectiveness of persuasion strategies used in phishing emails as they compete to manipulate unsafe email behavior.
AbstractList PurposeThis study aims to examine the effect of cybersecurity threat and efficacy upon click-through, response to a phishing attack: persuasion and protection motivation in an organizational context.Design/methodology/approachIn a simulated field trial conducted in a financial institute, via PhishMe, employees were randomly sent one of five possible emails using a set persuasion strategy. Participants were then invited to complete an online survey to identify possible protective factors associated with clicking and reporting behavior (N = 2,918). The items of interest included perceived threat severity, threat susceptibility, response efficacy and personal efficacy.FindingsThe results indicate that response behaviors vary significantly across different persuasion strategies. Perceptions of threat susceptibility increased the likelihood of reporting behavior beyond clicking behavior. Threat susceptibility and organizational response efficacy were also associated with increased odds of not responding to the simulated phishing email attack.Practical implicationsThis study again highlights human susceptibility to phishing attacks in the presence of social engineering strategies. The results suggest heightened awareness of phishing threats and responsibility to personal cybersecurity are key to ensuring secure business environments.Originality/valueThe authors extend existing phishing literature by investigating not only click-through behavior, but also no-response and reporting behaviors. Furthermore, the authors observed the relative effectiveness of persuasion strategies used in phishing emails as they compete to manipulate unsafe email behavior.
Author Bayl-Smith, Piers
Yu, Kun
Wiggins, Mark
Taib, Ronnie
Author_xml – sequence: 1
  givenname: Piers
  surname: Bayl-Smith
  fullname: Bayl-Smith, Piers
– sequence: 2
  givenname: Ronnie
  surname: Taib
  fullname: Taib, Ronnie
– sequence: 3
  givenname: Kun
  surname: Yu
  fullname: Yu, Kun
– sequence: 4
  givenname: Mark
  surname: Wiggins
  fullname: Wiggins, Mark
BookMark eNp1UE1LAzEQDVLBWnv3GPC8OsnuZhNvUvwoFAQ_wFuM2Wyb2iZrkor6691txYPgZebNzHvD4x2igfPOIHRM4JQQ4GfTyX0GNKNASQZd2UNDCiXLClE9DX4xIwdoHOMSAIggLGdkiJ7vTGy9iwYnjxVuFzYurJtjlZLSr-e4NSFuVLTeYeVq3AafjE79uPbJvqsttP0R-zBXzn5tV2qFtXfJfKQjtN-oVTTjnz5Cj1eXD5ObbHZ7PZ1czDKdE5IyUgkuhOZaNQWrRFOBIFXO64YXDKDMa0NMVdcvOheKlZpXZaE1zQteMsGLuslH6GT3t7P4tjExyaXfhM5IlJRRKkBQkncstmPp4GMMppHapq3jFJRdSQKyD1R2gUqgsg9U9oF2QvgjbINdq_D5v-QbN3N6TQ
CitedBy_id crossref_primary_10_1016_j_cose_2023_103487
crossref_primary_10_1016_j_cose_2024_104129
crossref_primary_10_1007_s42979_025_03853_1
crossref_primary_10_1016_j_compeleceng_2025_110097
crossref_primary_10_3390_ijerph20043514
crossref_primary_10_1016_j_tele_2021_101766
crossref_primary_10_1016_j_im_2025_104110
crossref_primary_10_1108_ICS_12_2022_0195
crossref_primary_10_1155_2022_2975033
Cites_doi 10.1016/j.ijhcs.2018.06.004
10.1037/1082-989X.4.3.272
10.1007/s10796-015-9608-8
10.1057/s41303-017-0058-x
10.1002/asi.23851
10.1080/00223980.1975.9915803
10.1016/S1361-3723(21)00082-8
10.1108/ICS-03-2017-0009
10.1109/TPC.2012.2208392
10.1016/j.cose.2011.10.007
10.1016/j.cose.2016.02.009
10.1287/isre.2014.0522
10.1108/ICS-03-2018-0038
10.1111/jcc4.12126
10.1002/asi.20779
10.1177/0093650215627483
10.1080/03637759209376276
10.1080/108107396127988
10.1016/j.dss.2011.03.002
10.1016/j.dss.2008.11.010
10.1016/j.joep.2011.10.009
10.1108/OIR-04-2015-0106
10.1057/ejis.2009.11
10.1016/j.chb.2016.02.065
10.1016/j.dss.2009.02.005
10.1037/0022-3514.39.5.752
10.1007/978-1-4612-4964-1_1
10.1093/cybsec/tyaa001
10.17705/1jais.00447
ContentType Journal Article
Copyright Emerald Publishing Limited 2021
Copyright_xml – notice: Emerald Publishing Limited 2021
DBID AAYXX
CITATION
0-V
0U~
1-H
7SC
7WY
7WZ
7XB
8AO
8FD
8FE
8FG
8FI
ABUWG
AFKRA
ALSLI
ARAPS
AZQEC
BENPR
BEZIV
BGLVJ
BGRYB
CCPQU
CNYFK
DWQXO
E3H
F2A
FYUFA
F~G
GNUQQ
HCIFZ
JQ2
K6~
K7-
L.-
L.0
L7M
L~C
L~D
M0C
M0N
M0O
M0T
M1O
P5Z
P62
PHGZM
PHGZT
PJZUB
PKEHL
PPXIY
PQBIZ
PQEST
PQGLB
PQQKQ
PQUKI
PRQQA
PYYUZ
Q9U
DOI 10.1108/ICS-02-2021-0021
DatabaseName CrossRef
ProQuest Social Sciences Premium Collection
Global News & ABI/Inform Professional
Trade PRO
Computer and Information Systems Abstracts
ABI/INFORM Collection
ABI/INFORM Global (PDF only)
ProQuest Central (purchase pre-March 2016)
ProQuest Pharma Collection
Technology Research Database
ProQuest SciTech Collection
ProQuest Technology Collection
Hospital Premium Collection
ProQuest Central (Alumni)
ProQuest Central UK/Ireland
Social Science Premium Collection
Advanced Technologies & Aerospace Collection
ProQuest Central Essentials
ProQuest Central
Business Premium Collection
ProQuest Technology Collection
Criminology Collection
ProQuest One Community College
Library & Information Science Collection
ProQuest Central Korea
Library & Information Sciences Abstracts (LISA)
Library & Information Science Abstracts (LISA)
Health Research Premium Collection
ABI/INFORM Global (Corporate)
ProQuest Central Student
SciTech Premium Collection
ProQuest Computer Science Collection
ProQuest Business Collection
Computer Science Database
ABI/INFORM Professional Advanced
ABI/INFORM Professional Standard
Advanced Technologies Database with Aerospace
Computer and Information Systems Abstracts – Academic
Computer and Information Systems Abstracts Professional
ABI/INFORM Global
Computing Database
Criminal Justice Database
Healthcare Administration Database
Library Science Database
Advanced Technologies & Aerospace Database
ProQuest Advanced Technologies & Aerospace Collection
ProQuest Central Premium
ProQuest One Academic (New)
ProQuest Health & Medical Research Collection
ProQuest One Academic Middle East (New)
ProQuest One Health & Nursing
ProQuest One Business
ProQuest One Academic Eastern Edition (DO NOT USE)
ProQuest One Applied & Life Sciences
ProQuest One Academic
ProQuest One Academic UKI Edition
ProQuest One Social Sciences
ABI/INFORM Collection China
ProQuest Central Basic
DatabaseTitle CrossRef
Computer Science Database
ProQuest Central Student
Library and Information Science Abstracts (LISA)
ProQuest Advanced Technologies & Aerospace Collection
ProQuest Central Essentials
ProQuest Computer Science Collection
Computer and Information Systems Abstracts
SciTech Premium Collection
Trade PRO
ABI/INFORM Complete
Global News & ABI/Inform Professional
ProQuest One Applied & Life Sciences
Health Research Premium Collection
Health & Medical Research Collection
Library & Information Science Collection
ProQuest Central (New)
Advanced Technologies & Aerospace Collection
Business Premium Collection
Social Science Premium Collection
ABI/INFORM Global
ProQuest One Academic Eastern Edition
ProQuest Hospital Collection
ProQuest Technology Collection
ProQuest Business Collection
Criminology Collection
ProQuest Social Sciences Premium Collection
ProQuest One Academic UKI Edition
ProQuest One Academic
ProQuest One Academic (New)
ABI/INFORM Global (Corporate)
ProQuest One Business
Technology Collection
Technology Research Database
Computer and Information Systems Abstracts – Academic
ProQuest One Academic Middle East (New)
ProQuest Central (Alumni Edition)
ProQuest One Community College
ProQuest One Health & Nursing
ProQuest Pharma Collection
ProQuest Central
ABI/INFORM Professional Advanced
ProQuest Library Science
ProQuest Health & Medical Research Collection
ProQuest Criminal Justice
ABI/INFORM Professional Standard
ProQuest Central Korea
Advanced Technologies Database with Aerospace
ProQuest Computing
ProQuest One Social Sciences
ProQuest Central Basic
ProQuest Health Management
ABI/INFORM China
ProQuest SciTech Collection
Computer and Information Systems Abstracts Professional
Advanced Technologies & Aerospace Database
DatabaseTitleList Computer Science Database
Database_xml – sequence: 1
  dbid: 8FG
  name: ProQuest Technology Collection
  url: https://search.proquest.com/technologycollection1
  sourceTypes: Aggregation Database
DeliveryMethod fulltext_linktorsrc
Discipline Computer Science
Engineering
Library & Information Science
Business
EISSN 2056-497X
EndPage 78
ExternalDocumentID 10_1108_ICS_02_2021_0021
GeographicLocations Australia
United States--US
GeographicLocations_xml – name: United States--US
– name: Australia
GroupedDBID .WU
0-V
3FY
5VS
7WY
8AO
8FE
8FG
8FI
8FW
9F-
AAGBP
AAKOT
AAMCF
AAUDR
AAVEV
AAXBI
AAYXX
ABIJV
ABJNI
ABSDC
ABUWG
ABXQL
ABYQI
ACGFS
ACTSA
ACZKX
ADBBV
ADOMW
ADQHX
ADWNT
AFKRA
AFNTC
AGTVX
AHMHQ
AILOG
AJEBP
ALMA_UNASSIGNED_HOLDINGS
ALSLI
AODMV
AQUVI
ARALO
ARAPS
AUCOK
AZQEC
BENPR
BEZIV
BGLVJ
BGRYB
BPHCQ
BVXVI
CCPQU
CITATION
CNYFK
DWQXO
EBS
ECCUG
FNNZZ
FYUFA
GEA
GEI
GMX
GNUQQ
GQ.
H13
HCIFZ
K6V
K6~
K7-
KBGRL
M0C
M0O
M0T
M1O
M42
P62
PHGZM
PHGZT
PJZUB
PPXIY
PQBIZ
PQGLB
PQQKQ
PROAC
PRQQA
PUEGO
SCAQC
SDURG
SLOBJ
TEM
TGG
TMF
TMI
TMT
UKHRP
Z11
Z12
Z21
ZYZAG
.DC
0U~
1-H
29I
4.4
5GY
70U
77K
7SC
7XB
8FD
8R4
8R5
9E0
AAPSD
ABEAN
ACGFO
AEBZA
AEDOK
AEMMR
AETHF
AFNZV
AIAFM
AJFKA
APPLU
ATGMP
CS3
DU5
E3H
F2A
GEB
GEC
GMM
GMN
J1Y
JI-
JL0
JQ2
L.-
L.0
L7M
L~C
L~D
M0N
P2P
PKEHL
PQEST
PQUKI
Q2X
Q3A
Q9U
RWL
TAE
TDQ
TET
TMD
TMK
TMX
Z22
ID FETCH-LOGICAL-c311t-179899c8caf4679f7091738df8460053de1e7ddbc39a65c8754cc234856984df3
IEDL.DBID 8FG
ISSN 2056-4961
IngestDate Mon Jun 30 11:21:46 EDT 2025
Wed Sep 10 04:54:15 EDT 2025
Thu Apr 24 22:50:28 EDT 2025
IsPeerReviewed true
IsScholarly true
Issue 1
Language English
License https://www.emerald.com/insight/site-policies
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c311t-179899c8caf4679f7091738df8460053de1e7ddbc39a65c8754cc234856984df3
Notes ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 14
PQID 2622909213
PQPubID 31135
PageCount 16
ParticipantIDs proquest_journals_2622909213
crossref_citationtrail_10_1108_ICS_02_2021_0021
crossref_primary_10_1108_ICS_02_2021_0021
PublicationCentury 2000
PublicationDate 2022-01-31
PublicationDateYYYYMMDD 2022-01-31
PublicationDate_xml – month: 01
  year: 2022
  text: 2022-01-31
  day: 31
PublicationDecade 2020
PublicationPlace Bingley
PublicationPlace_xml – name: Bingley
PublicationTitle Information and computer security
PublicationYear 2022
Publisher Emerald Group Publishing Limited
Publisher_xml – name: Emerald Group Publishing Limited
References (key2022012710484126400_ref016) 2009; 18
(key2022012710484126400_ref039) 2020; 6
(key2022012710484126400_ref028) 1986
(key2022012710484126400_ref006) 1980; 39
(key2022012710484126400_ref043) 2014; 25
(key2022012710484126400_ref005) 2015
(key2022012710484126400_ref029) 1975; 91
(key2022012710484126400_ref042) 2007; 16
(key2022012710484126400_ref026) 2005
key2022012710484126400_ref002
key2022012710484126400_ref008
(key2022012710484126400_ref011) 1999; 4
(key2022012710484126400_ref001) 2016; 60
(key2022012710484126400_ref035) 2016; 45
(key2022012710484126400_ref037) 2012; 55
key2022012710484126400_ref027
(key2022012710484126400_ref023) 2011; 3
(key2022012710484126400_ref040) 1992; 59
key2022012710484126400_ref009
(key2022012710484126400_ref031) 2017; 68
(key2022012710484126400_ref036) 2011; 51
(key2022012710484126400_ref022) 2009; 11
(key2022012710484126400_ref032) 2019
(key2022012710484126400_ref004) 2017; 19
(key2022012710484126400_ref003) 2017; 25
(key2022012710484126400_ref014) 2015
(key2022012710484126400_ref041) 1996; 1
(key2022012710484126400_ref034) 2015; 20
(key2022012710484126400_ref010) 2012; 33
(key2022012710484126400_ref025) 2009; 46
(key2022012710484126400_ref013) 2017; 18
(key2022012710484126400_ref030) 1983
key2022012710484126400_ref012
(key2022012710484126400_ref044) 2002
key2022012710484126400_ref018
key2022012710484126400_ref017
(key2022012710484126400_ref020) 2018; 26
(key2022012710484126400_ref007) 1999
(key2022012710484126400_ref024) 2017; 26
(key2022012710484126400_ref015) 2016; 40
(key2022012710484126400_ref038) 2018; 120
(key2022012710484126400_ref019) 2012; 31
(key2022012710484126400_ref021) 2009; 18
(key2022012710484126400_ref033) 2016; 59
References_xml – volume: 120
  start-page: 1
  year: 2018
  ident: key2022012710484126400_ref038
  article-title: Exploring susceptibility to phishing in the workplace
  publication-title: International Journal of Human-Computer Studies
  doi: 10.1016/j.ijhcs.2018.06.004
– volume: 3
  start-page: 97
  issue: 1
  year: 2011
  ident: key2022012710484126400_ref023
  article-title: How to factor-analyze your data right: Do’s, don’ts, and how-to’s
  publication-title: International Journal of Psychological Research
– volume: 4
  start-page: 272
  issue: 3
  year: 1999
  ident: key2022012710484126400_ref011
  article-title: Evaluating the use of exploratory factor analysis in psychological research
  publication-title: Psychological Methods
  doi: 10.1037/1082-989X.4.3.272
– volume: 19
  start-page: 509
  issue: 3
  year: 2017
  ident: key2022012710484126400_ref004
  article-title: Organizational information security as a complex adaptive system: insights from three agent-based models”, information systems frontiers
  publication-title: Information Systems Frontiers
  doi: 10.1007/s10796-015-9608-8
– volume: 26
  start-page: 564
  issue: 6
  year: 2017
  ident: key2022012710484126400_ref024
  article-title: Which phish get caught? An exploratory study of individuals’ susceptibility to phishing
  publication-title: European Journal of Information Systems
  doi: 10.1057/s41303-017-0058-x
– volume: 68
  start-page: 2237
  issue: 9
  year: 2017
  ident: key2022012710484126400_ref031
  article-title: Securing the human: employee security vulnerability risk in organizational settings
  publication-title: Journal of the Association for Information Science and Technology
  doi: 10.1002/asi.23851
– volume-title: Australasian Conference on Information Systems, Adelaide, 30 November - 4 December
  year: 2015
  ident: key2022012710484126400_ref005
  article-title: Breaching the human firewall: social engineering in phishing and spear-phishing emails
– volume: 91
  start-page: 93
  issue: 1
  year: 1975
  ident: key2022012710484126400_ref029
  article-title: A protection motivation theory of fear appeals and attitude change
  publication-title: The Journal of Psychology
  doi: 10.1080/00223980.1975.9915803
– ident: key2022012710484126400_ref018
– ident: key2022012710484126400_ref017
  doi: 10.1016/S1361-3723(21)00082-8
– volume: 25
  start-page: 593
  issue: 5
  year: 2017
  ident: key2022012710484126400_ref003
  article-title: Spear phishing in organisations explained
  publication-title: Information and Computer Security
  doi: 10.1108/ICS-03-2017-0009
– volume: 55
  start-page: 345
  issue: 4
  year: 2012
  ident: key2022012710484126400_ref037
  article-title: Research article phishing susceptibility: an investigation into the processing of a targeted spear phishing email
  publication-title: IEEE Transactions on Professional Communication
  doi: 10.1109/TPC.2012.2208392
– volume: 31
  start-page: 83
  issue: 1
  year: 2012
  ident: key2022012710484126400_ref019
  article-title: Understanding information systems security policy compliance: an integration of the theory of planned behavior and the protection motivation theory
  publication-title: Computers and Security
  doi: 10.1016/j.cose.2011.10.007
– volume: 59
  start-page: 138
  year: 2016
  ident: key2022012710484126400_ref033
  article-title: Understanding online safety behaviors: a protection motivation theory perspective
  publication-title: Computers and Security
  doi: 10.1016/j.cose.2016.02.009
– volume: 25
  start-page: 385
  issue: 2
  year: 2014
  ident: key2022012710484126400_ref043
  article-title: Research note – influence techniques in phishing attacks: an examination of vulnerability and resistance
  publication-title: Information Systems Research
  doi: 10.1287/isre.2014.0522
– volume: 26
  start-page: 264
  issue: 3
  year: 2018
  ident: key2022012710484126400_ref020
  article-title: Persuading end users to act cautiously online: a fear appeals study on phishing
  publication-title: Information and Computer Security
  doi: 10.1108/ICS-03-2018-0038
– volume: 20
  start-page: 570
  issue: 5
  year: 2015
  ident: key2022012710484126400_ref034
  article-title: Examining the distinct antecedents of e-mail habits and its influence on the outcomes of a phishing attack
  publication-title: Journal of Computer-Mediated Communication
  doi: 10.1111/jcc4.12126
– ident: key2022012710484126400_ref008
– volume: 16
  start-page: 315
  issue: 6
  year: 2007
  ident: key2022012710484126400_ref042
  article-title: Gaining access with social engineering: an empirical study of the threat
  publication-title: Information Systems Security
  doi: 10.1002/asi.20779
– year: 2002
  ident: key2022012710484126400_ref044
  publication-title: The Art of Deception: Controlling the Human Element of Security
– volume-title: Phishing Dark Waters: The Offensive and Defensive Sides of Malicious e-Mails
  year: 2015
  ident: key2022012710484126400_ref014
– volume: 45
  start-page: 1
  issue: 8
  year: 2016
  ident: key2022012710484126400_ref035
  article-title: Suspicion, cognition, and automaticity model of phishing susceptibility
  publication-title: Communication Research
  doi: 10.1177/0093650215627483
– volume: 59
  start-page: 329
  issue: 4
  year: 1992
  ident: key2022012710484126400_ref040
  article-title: Putting the fear back into fear appeals: the extended parallel process model
  publication-title: Communication Monographs
  doi: 10.1080/03637759209376276
– volume: 11
  start-page: 394
  issue: 07
  year: 2009
  ident: key2022012710484126400_ref022
  article-title: Understanding security behaviors in personal computer usage: a threat avoidance perspective
  publication-title: Journal of the Association for Information Systems
– start-page: 564
  volume-title: Human-Computer Interaction – INTERACT 2019, Lecture Notes in Computer Science
  year: 2019
  ident: key2022012710484126400_ref032
  article-title: Social engineering and organisational dependencies in phishing attacks
– ident: key2022012710484126400_ref002
– start-page: 81
  volume-title: Prediction Health Behaviour: Research and Practice with Social Cognition Models
  year: 2005
  ident: key2022012710484126400_ref026
  article-title: Protection motivation theory
– ident: key2022012710484126400_ref027
– volume: 1
  start-page: 317
  issue: 4
  year: 1996
  ident: key2022012710484126400_ref041
  article-title: Predicting risk behaviors: development and validation of a diagnostic scale
  publication-title: Journal of Health Communication
  doi: 10.1080/108107396127988
– volume: 51
  start-page: 576
  issue: 3
  year: 2011
  ident: key2022012710484126400_ref036
  article-title: Why do people get phished? Testing individual differences in phishing vulnerability within an integrated, information processing model
  publication-title: Decision Support Systems
  doi: 10.1016/j.dss.2011.03.002
– volume: 46
  start-page: 815
  issue: 4
  year: 2009
  ident: key2022012710484126400_ref025
  article-title: Studying users’ computer security behavior: a health belief perspective
  publication-title: Decision Support Systems
  doi: 10.1016/j.dss.2008.11.010
– start-page: 73
  volume-title: Dual-Process Theories in Social Psycholohy
  year: 1999
  ident: key2022012710484126400_ref007
  article-title: The heuristic-systematic model in its broader context
– volume: 33
  start-page: 264
  issue: 1
  year: 2012
  ident: key2022012710484126400_ref010
  article-title: Influencing behaviour: the mindspace way
  publication-title: Journal of Economic Psychology
  doi: 10.1016/j.joep.2011.10.009
– volume: 40
  start-page: 265
  issue: 2
  year: 2016
  ident: key2022012710484126400_ref015
  article-title: Individual processing of phishing emails
  publication-title: Online Information Review
  doi: 10.1108/OIR-04-2015-0106
– start-page: 153
  volume-title: Social Psychophysiology
  year: 1983
  ident: key2022012710484126400_ref030
  article-title: Cognitive and physiological processes in fear appeals andattitude change: a revised theory of protection motivation
– ident: key2022012710484126400_ref012
– volume: 18
  start-page: 177
  issue: 2
  year: 2009
  ident: key2022012710484126400_ref021
  article-title: Threat or coping appraisal: determinants of SMB executives’ decision to adopt anti-malware software
  publication-title: European Journal of Information Systems
  doi: 10.1057/ejis.2009.11
– volume: 60
  start-page: 185
  year: 2016
  ident: key2022012710484126400_ref001
  article-title: Phishing threat avoidance behaviour: an empirical investigation
  publication-title: Computers in Human Behavior
  doi: 10.1016/j.chb.2016.02.065
– volume: 18
  start-page: 106
  issue: 2
  year: 2009
  ident: key2022012710484126400_ref016
  article-title: Protection motivation and deterrence: a framework for security policy compliance in organisations
  publication-title: European Journal of Information Systems
  doi: 10.1016/j.dss.2009.02.005
– ident: key2022012710484126400_ref009
– volume: 39
  start-page: 752
  issue: 5
  year: 1980
  ident: key2022012710484126400_ref006
  article-title: Heuristic versus systematic information processing and the use of source versus message cues in persuasion
  publication-title: Journal of Personality and Social Psychology
  doi: 10.1037/0022-3514.39.5.752
– start-page: 1
  volume-title: Communication and Persuasion. Springer Series in Social Psychology
  year: 1986
  ident: key2022012710484126400_ref028
  article-title: The elaboration likelihood model of persuasion
  doi: 10.1007/978-1-4612-4964-1_1
– volume: 6
  start-page: 1
  issue: 1
  year: 2020
  ident: key2022012710484126400_ref039
  article-title: Developing a measure of information seeking about phishing
  publication-title: Journal of Cybersecurity
  doi: 10.1093/cybsec/tyaa001
– volume: 18
  start-page: 22
  issue: 1
  year: 2017
  ident: key2022012710484126400_ref013
  article-title: Got phished: internet security and human vulnerability
  publication-title: Journal of the Association for Information Systems
  doi: 10.17705/1jais.00447
SSID ssj0001916361
ssj0004345
Score 2.362756
Snippet PurposeThis study aims to examine the effect of cybersecurity threat and efficacy upon click-through, response to a phishing attack: persuasion and protection...
SourceID proquest
crossref
SourceType Aggregation Database
Enrichment Source
Index Database
StartPage 63
SubjectTerms Behavior
Cognition & reasoning
Compliance
Context
Cybercrime
Cybersecurity
Electronic mail
Electronic mail systems
Employees
Engineering
Heuristic
Motivation
Organizational aspects
Perceptions
Persuasion
Phishing
Self-efficacy
Threats
User behavior
SummonAdditionalLinks – databaseName: Emerald A-Z Current Journals
  dbid: GEI
  link: http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwrV1LS8NAEF5qT16sT6xW2YMXD2mSzSbZeJNiqYI9qIXeYrK7oaVtUuwWxF_vziYpVkQQPIYkm33OfDOZ-QahK0dDfjArLDdk1KJCUIsl4ICnXAMMSSQ1VUseh8FgRB_G_riBhnUujAmrLN0xRk5P8xUYqTYEbmspvCEcgOo1971nk1wMUQagq2zwWNsTtZjv6J3uB3Xqb-1x0UjIMwSqRGt9i0aBW_-3_KGxbT21LaaN7um3UFH3ugw5mXXXKu3yj2-Ejv83rH20V8FUfFvuqwPUkPkhatUlIHAlEY7Q61MZYyuxKnCCl5PSpYUTpRI-u8FLjS7XCXjkcJILXLFCwOViU1gNT-EmLr5khepPmz6_q2M06t-99AZWVbTB4p7rKqA71SYcZzzJtAyOslADktBjItNAB068kK4MhUi5FyWBz7W5RDknHmV-EDEqMu8ENfMil6cIp4KHoR9IMJkoIVHqCsayNOWOpKmQrI3seoliXjGaQ2GNeWwsG4fFeipjh8QwlTFMZRtdb95YlmwevzzbqVc9rs71KiYB8ONHxPXO_tDUOdolkDXhuFrldVBTva3lhcYyKr00W_QTF5LtCw
  priority: 102
  providerName: Emerald
Title Response to a phishing attack: persuasion and protection motivation in an organizational context
URI https://www.proquest.com/docview/2622909213
Volume 30
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwfV1LS8NAEB58gOhBtCrWR9mDCB5Cs8k22XiRWlofYBUfoL3EZHeDorZV0__vTLpp66WXQLIJhJ3dmW9mZ-YDOHIR8pNb4fBQCkdoLRyZUABeKAQYxjOiYC256QaXT-L6ufFsA26_Nq2y1ImFotYDRTHyuhdQZ_LI4_7Z8Nsh1ig6XbUUGouwzNHS0DqXnYtpXaRfkBR7aOQdEQW8PKZ0Zf2q9VAUJlOGAtm5_2bpv1YuTE1nA9YtRmTNsVA3YcH0K7BSpqhXYG2miWAFDm3pATtmtraI5prZTbsFr_fjNFjD8gFL2PBtHHViSZ4n6uOUDREAjhIKmrGkr5lt3EC3XxPuM_ZOg2wwU7iJP0hp7qjbt-Gp035sXTqWV8FRPuc5dSRFL0tJlWSoJqMsRMwQ-lJniEVoU2rDTah1qvwoCRoKPRqhlOcL2QgiKXTm78BSf9A3u8BSrcKwERjyagQKKOVayixNlWtEqo2sQr2c1ljZpuPEffEZF86HK2MUROx6MQkiJkFU4WTyxXDccGPOuwelpGK79X7j6ULZmz-8D6se1TK4HA3RASzlPyNziAgjT2vFMqrB8nm7e3dfKyrI8XrDb_FZ76XXvPgD8D_SCA
linkProvider ProQuest
linkToHtml http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwtV1NT9tAEB1BkKAcKgggoFD2AEgcrNjrjb2uVCEKRAkJEeJD4rbYu2sV0SZpMar6p_obO2OvIVy4cbTWtqyd8byZ2XkzALs-uvwUVnhBLIUnjBGeTCkBLzQ6GJZbUU4tOR9G3Rtxdtu-nYF_NReGyiprm1gaajPWlCNv8Yg6kyc8CA8nvzyaGkWnq_UIjUot-vbvHwzZHr_2TlC-e5x3Tq-Pu56bKuDpMAgK6seJMYaWOs3RSCR5jIgZh9LkiMSkksYGNjYm02GSRm2N_rzQmodCtqNECpOH-N5ZmBPEaG3A3LfT4cXlCxMzLMcic3QrPJFEQX0w6stW7_iqpEJTTQQh62sgfI0DJbh1luCj80rZUaVGyzBjR02Yr4vim7A41bawCduO7MD2mWMzkXSZMxMrcHdZFd5aVoxZyibfqzwXS4si1Q9f2ARdzqeU0nQsHRnmWkXQ5c_naWvsnhbZeIoqih9IhfWIJqtw8y57vgaN0Xhk14FlRsdxO7IURwlUiSwwUuZZpn0rMmPlBrTqbVXatTmnaRs_VBnu-FKhIJTPFQlCkSA24OD5iUnV4uONe7dqSSn3sz-qF9XcfHt5Bxa61-cDNegN-5_gAycmhR8gDG5Bo_j9ZLfRvymyz06pGNy9tx7_B-1vCd4
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Response+to+a+phishing+attack%3A+persuasion+and+protection+motivation+in+an+organizational+context&rft.jtitle=Information+management+%26+computer+security&rft.au=Bayl-Smith%2C+Piers&rft.au=Taib%2C+Ronnie&rft.au=Yu%2C+Kun&rft.au=Wiggins%2C+Mark&rft.date=2022-01-31&rft.pub=Emerald+Group+Publishing+Limited&rft.issn=2056-4961&rft.eissn=2056-497X&rft.volume=30&rft.issue=1&rft.spage=63&rft.epage=78&rft_id=info:doi/10.1108%2FICS-02-2021-0021
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=2056-4961&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=2056-4961&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=2056-4961&client=summon