Date post: | 06-Aug-2015 |
Category: |
Technology |
Upload: | weiai-wayne-xu |
View: | 53 times |
Download: | 1 times |
Enabling Protection Motivation in Heuristic-Systematic Defense against Email Phishing
• Weiai Wayne Xu, PhD Candidate, Department of Communication, SUNY- Buffalo• Arun Vishwanath, PhD, Associate Professor, Department of Communication, SUNY-Buffalo• Zhi Yang (Zed) Ngoh, Department of Communication, SUNY-Buffalo
What we know so far…
Based on heuristic-systematic processing model (HSM) (Chen & Chaiken, 1999)
Heuristic processing: bypass in-depth thinking and instead rely on heuristics, rules of thumbs, past experience, and instincts (for efficiency)
Systematic processing: scrutinize all elements and aspects of information presented (for accuracy)
Based on protection motivation theory (PMT) (Rogers,1975)
Severity
Vulnerability
Response efficacy
Self-efficacy
Protection enactment
What we know so far…
• 288 students• A simulated phishing email disguised to originate
from the university’s student ID card office. • The phishing email requested the participants to
provide personal information to update their credit card information
The experiment