Influence techniques in phishing attacks : an examination of vulnerability and resistance
| Year of publication: |
2014
|
|---|---|
| Authors: | Wright, Ryan T. ; Jensen, Matthew L. ; Thatcher, Jason Bennett ; Dinger, Michael ; Marett, Kent |
| Published in: |
Information systems research : ISR. - Catonsville, MD : INFORMS, ISSN 1047-7047, ZDB-ID 1081934-4. - Vol. 25.2014, 2, p. 385-400
|
| Subject: | phishing | persuasion theory | influence techniques | motivation theory | self-determination | perceived locus of causality | social engineering | online deception | mediated deception | deception | field experiments | Experiment | Konsumentenverhalten | Consumer behaviour | Verhalten | Behaviour | Soziales Verhalten | Social behaviour |
-
Conscience accounting : emotional dynamics and social behavior
Genîzî, Ûrî, (2012)
-
A consumer wisdom-informed conceptualization for understanding prosocial behaviors
Nguyen, Quynh N. X., (2025)
-
Are social norms an obstacle to honest behavior? : theory and experimental evidence
Higashida, Keisaku, (2025)
- More ...
-
Training to mitigate phishing attacks using mindfulness techniques
Jensen, Matthew L., (2017)
-
Dinger, Michael, (2010)
-
Using expectation disconfirmation theory and polynomial modeling to understand trust in technology
Lankton, Nancy K., (2016)
- More ...