DEFENDING AGAINST SPEAR PHISHING: MOTIVATING USERS THROUGH FEAR APPEAL MANIPULATIONS

Size: px
Start display at page:

Download "DEFENDING AGAINST SPEAR PHISHING: MOTIVATING USERS THROUGH FEAR APPEAL MANIPULATIONS"

Transcription

1 Association for Information Systems AIS Electronic Library (AISeL) PACIS 2016 Proceedings Pacific Asia Conference on Information Systems (PACIS) Summer DEFENDING AGAINST SPEAR PHISHING: MOTIVATING USERS THROUGH FEAR APPEAL MANIPULATIONS Sebastian Walter Schuetz City University of Hong Kong, Paul Benjamin Lowry City University of Hong Kong, Jason Bennett Thatcher Clemson University, Follow this and additional works at: Recommended Citation Schuetz, Sebastian Walter; Lowry, Paul Benjamin; and Thatcher, Jason Bennett, "DEFENDING AGAINST SPEAR PHISHING: MOTIVATING USERS THROUGH FEAR APPEAL MANIPULATIONS" (2016). PACIS 2016 Proceedings This material is brought to you by the Pacific Asia Conference on Information Systems (PACIS) at AIS Electronic Library (AISeL). It has been accepted for inclusion in PACIS 2016 Proceedings by an authorized administrator of AIS Electronic Library (AISeL). For more information, please contact

2 DEFENDING AGAINST SPEAR PHISHING: MOTIVATING USERS THROUGH FEAR APPEAL MANIPULATIONS Sebastian Walter Schuetz, Department of Information Systems, City University of Hong Kong, Hong Kong, Paul Benjamin Lowry, Department of Information Systems, City University of Hong Kong, Hong Kong, Jason Bennett Thatcher, Social Analytics Institute, Department of Management, Clemson University, Clemson, South Carolina, USA, Abstract Phishing is a pervasive form of online fraud that causes billions in losses annually. Spear phishing is a highly targeted and successful type of phishing that uses socially engineered s to defraud most of its recipients. Unfortunately, anti-phishing training campaigns struggle with effectively fighting this threat partially because users see security as a secondary priority, and partially because users are rarely motivated to undergo lengthy training. An effective training approach thus needs to be non-disruptive and brief as to avoid being onerous, and yet, needs to inspire dramatic behavioral change. This is a tremendous, unsolved challenge that we believe can be solved through a novel application of theory: Using fear appeals and protection-motivation theory (PMT), we outline how brief training can educate users and evoke protection motivation. We further invoke construal-level theory (CLT) to explain how fear appeals can stimulate threat perceptions more quickly and more powerfully. This research-in-progress study further proposes a field experiment to verify the effectiveness of our proposed training approach in an ecologically valid environment. Overall, we (1) improve training based on PMT and CLT, (2) expand PMT for guiding fear appeal design; and (3) demonstrate a full application of CLT. Keywords: Security, Spear phishing, Training, Fear Appeals, Protection Motivation Theory, Construal Level Theory

3 1 INTRODUCTION Phishing is a serious threat that caused more than US$5.9 billion in damages in 2013 (RSA 2014); and that number promises to rise: The recent Cyber Threat Report of cyber intelligence provider CYREN reports a steep 51% increase alone in the first three months of Indeed, the amount of phishing attacks has been rapidly growing, exceeding 7.5 trillion attacks in 2014, which is double the number from 2012 (McAfee Labs 2014). In every quarter of 2014, more than 197,252 new, unique attacks were executed (APWG 2014), and this number rises continuously. Across these rapidly growing and numerous attacks, one technique spear phishing stands out. Spear phishing is a highly targeted, context-specific attack that is directed at specific groups of individuals or organizations and aims to appear genuine to their members and employees (Wang et al. 2012). Compared to phishing, spear phishing is more sophisticated (Hong 2012), and inherently more dangerous by magnitudes (Jagatic et al. 2007); more effective (its return rates are up to 40 times greater than those of ordinary phishing); and increasingly more frequent (FireEye 2012). Some particularly popular spearphishing attacks impersonate banks, which often lead to worrisome rates of success (APWG 2014). This persistent increase in the number of successful attacks suggests spear-phishing is far from being under control. Existing approaches aim to prevent victimization with the use of enhanced automated detection mechanisms and behavioral training (Hong 2012). However, automated solutions struggle to reliably detect customized and fast-moving spear-phishing attacks rendering users vulnerable when they solely rely upon automated solutions (Abbasi et al. 2012). Moreover, even when these tools correctly raise the alarm, users often disregard such warning messages and continue with their imprudent behavior, leaving themselves vulnerable to spear-phishing attacks (Abbasi et al. 2015). In light of the deficiencies of automated solutions and users deviant behavior in using them, we turn to educational approaches to further learn how to increase organizational defenses against spear-phishing victimization. Although evidence suggests that anti-phishing training generally improves detection rates (Kumaraguru et al. 2010), the results do not evoke confidence in such training s efficacy. Particularly for spear phishing, more than 70 percent of participants consistently fell victim to these highly tailored and targeted attacks sometimes even despite previous training (see Dodge et al. 2007; Ferguson 2005; Jagatic et al. 2007). Unfortunately, the existing approaches to behavioral training which often focus solely on educating users about phishing are deficient. Some researchers argue that one of the key challenges in delivering security education is motivating users to engage in protective behavior (Kumaraguru et al. 2010; Puhakainen and Siponen 2010). If so, then effective anti-phishing training needs not only to inform users, but also needs to arouse a sense of fear that will elicit protection motivations, resulting in meaningful behavioral change (i.e., not fall victim to the phishing attack). Consequently, the current conundrum in research and practice is how anti-phishing training be conducted effectively without being onerous and disruptive of end-users time. This enigma forms the guiding research question of our research. To identify the attributes of effective anti-phishing training that hold potential to inform users and elicit protective motivations, we turn to protection-motivation theory (PMT). PMT explains the effect of fear appeals by identifying the cognitive processes that engender protective intentions. Fear appeals are persuasive messages designed to scare people by describing the terrible things that will happen to them if they do not do what the message recommends (Witte 1992, p. 329). Because fear appeals are brief, fearinducing communications, they hold potential to overcome the tedious nature of traditional training approaches to effectively raise protection motivation and subsequent behaviors. Recent IS research has adapted PMT from its traditional healthcare context and has argued it is well-suited for privacy (Milne et al. 2009) and security contexts (Boss et al. 2015). Likewise, IS research on security education, training and awareness (SETA) programs has recently explored the tenets of PMT to foster protective intentions (Posey et al. 2015). Whereas PMT has been widely applied across various areas, a theoretical account guiding the

4 design of fear appeals for effective, brief training of end users is still missing. To address this gap, we further draw from construal-level theory (CLT) to understand the mental representations that underlie the threat and coping response appraisal processes. These mental representations (i.e., construals) form the interpretive basis on which PMT s cognitive processes engender protection motivation. Our purpose in invoking CLT is thus to explore whether and how the manipulation of these construals can aid evoking protection motivation, and thereby inform the design of anti-phishing training materials. Within the realm of phishing and PMT, our study offers three contributions. First, we address the necessity for brief and effective anti-phishing training by building upon PMT to understand how to deliver fear appeals that both inform and motivate. Second, we extend PMT by examining the design of fear appeals, using CLT as our theoretical lens to explain how the design of a fear appeal guides the mental representation that informs protective intention. This allows us to offer a unique theoretical account for how to design effective fear appeals that can be used in spear-phishing training. Third, we demonstrate a full utilization of CLT in an applied area, whereas applications of CLT are still rare outside of psychology, and whereas existing publications in IS examine only parts of CLT. These contributions are unique not only to the field of IS but also to all other disciplines that leverage fear appeals, PMT, and CLT. 2 LITERATURE REVIEW 2.1 Phishing and Spear Phishing Phishing is a method of social engineering that aims to induce recipients to expose personal information, such as contact details, user/network credentials, or credit card details. Typically, phishing targets a mass audience (Wright and Marett 2010) and succeeds in deceiving only a small percentage of the audience (Wright et al. 2014). For phishing to be effective, successful messages must be both believable and persuasive (Hong 2012). Believability is often achieved by mimicking communications from reputable persons or organizations (Wright and Marett 2010). A variety of techniques exist to boost persuasiveness (cf. Wright et al. 2014). However, spear phishing is dramatically more successful than traditional phishing, as it targets a specific group of recipients and leverages information that is specific to that group so as to increase its believability (Hong 2012). Spear-phishing attacks often appear to be genuine (Wang et al. 2012). Hence, detecting spear phishing requires that users pay close attention not only to obvious visual cues, but especially to the plausibility of the message. For example, Jagatic et al. (2007) mined social media to impersonate real friends of targets, and achieved a deception success rate over 70 percent. Similarly, Dodge et al. (2007) phished students exploiting their sensitivity to grade-related matters, and succeeded with eight out of ten students. Although the effort of tailoring phishing attacks to a specific audience makes this type of attack more costly, such attacks are far more successful and dangerous (FireEye 2012). Users often underestimate the ease of spoofing s, and thus overrate the security and privacy of mail communications (Jagatic et al. 2007). 2.2 Defense against Phishing Approaches to counter phishing attacks can be categorized into two broad classes: technical and educational. Technical approaches, such as anti-phishing tools, attempt to automatically identify fraudulent messages and either discard them immediately or warn the users of their potentially harmful nature. Research on technical solutions has led to improvements in detection accuracy (e.g., Abbasi et al. 2015), which have been found to be along with speed and cost of error crucial factors driving user s reliance on such tools (Zahedi et al. 2015). However, technical approaches suffer from severe weaknesses. First, the fast-moving nature of phishing attacks stall detection rates at about 90 percent accuracy (Hong 2012); however, this is a woefully inadequate rate given the sheer volume of phishing attacks. Furthermore, automated warnings are

5 often overlooked or purposely ignored (Egelman et al. 2008; Wu et al. 2006). Consequently, technical means are incapable of offering sufficient protection against phishing attacks (Abbasi et al. 2012). In particular, spear phishing has proven apt at defeating existing security mechanisms (FireEye 2012). Thus, educational anti-phishing approaches are necessary to complement their technical counterparts, especially training that enables users to draw the appropriate conclusions from automated warnings (Lai et al. 2012). Educational approaches can significantly reduce the likelihood of falling for phishing attacks (Kumaraguru et al. 2010). Training enhances user s self-efficacy, security knowledge, and suspicion all factors that have been found significant in reducing deception success (Wright and Marett 2010). However, making antiphishing training salient among users has proven to be a difficult task (e.g., Ferguson 2005 who successfully phished 90 percent users who received a four hour trainign session on the very same day), because many users regard security as a secondary activity that is bothering at best and interfering at worst (Puhakainen and Siponen 2010). As a training technique, researchers have used feigned phishing attacks to probe users as a means to increase user s motivation to protect themselves (Kumaraguru et al. 2010). However, feigned phishing attacks also often cause negative pushbacks among users, evident in their expression of anger and denial (Jagatic et al. 2007), and are thus despite being effective in arousing awareness ethically controversial (Jakobsson et al. 2008). Ideally, an educational approach could overcome motivational issues without evoking negative emotions in users. The motivation to actively engage in protective behaviors becomes especially salient for spear phishing, as this type of attack is well disguised and hard to detect based solely upon visual cues. Ferguson (2005) underlines the important role of motivation by reporting a startling 90 percent success rate when phishing freshmen shortly after preparing them with a four-hour long training session. Although the freshmen reported to be suspicious, the subject matter of the phishing attack (in this study: a problem with your last grade ) easily overruled the arguably insufficient motivation to be cautious and engage in protective action. These results confirm the essential role of motivation as a salient trigger to an effortful protective process that aims to distinguish phishing messages from innocuous messages. 2.3 Protection-Motivation Theory PMT is a theoretical model that explains and predicts the processes that elicit protection motivation in recipients of fear appeal communications. PMT s core assumption is that fear appeals sequentially trigger cognitive appraisal processes, which jointly inform protection intentions. A successful fear appeal thereby raises protection motivation, which captures one s intent to engage in protective behaviors in an effort to avoid the depicted dangers (Floyd et al. 2000). According to Rogers (1975), fear appeals must contain three essential stimulus variables: (a) the magnitude of noxiousness of a depicted event; (b) the conditional probability that the event will occur provided that no adaptive behavior is performed [ ] and (c) the availability and effectiveness of a coping response that might reduce or eliminate the noxious stimulus (p. 97). A fear appeals thus stimulates protection motivation by firstly communicating a threat, and then subsequently outlining an adequate coping response. The initial threat appraisal process balances perceived threat severity, referring to one s belief that a threat is serious and potentially serve (Rohm and Milne 2004), and perceived threat susceptibility, as one s expectation of being susceptible to that particular threat (Rohm and Milne 2004), against the maladaptive rewards one gains from not engaging in protective action that would alleviate that threat (Floyd et al. 2000). When faced with a comprehensible and personally relevant threat, recipients further experience fear (Leventhal 1970). Fear has been conceptualized as a core mediator of protection motivation (Boss et al. 2015). In contrast, the succeeding coping appraisal process evaluates the recommended coping strategy by comparing response efficacy, which refers to one s belief in the efficacy of the protective action (Floyd et al. 2000), in conjunction with self-efficacy, relating to one s perceived ability to actually perform the protective action (Floyd et al. 2000; Maddux and Rogers 1983), versus the response cost, which refers to

6 all costs that arise from carrying out the protective response (Floyd et al. 2000). Accordingly, PMT proposes that if the noxiousness of the threat outweighs the associated maladaptive rewards and if the recommended coping response is perceived to be an executable, efficient and affordable resort only then will a recipient be motivated to engage in the recommended protective response (Boss et al. 2015; Floyd et al. 2000; Maddux and Rogers 1983). For the design of effective fear appeals, PMT requires threat and coping appraisal perceptions (Milne et al. 2000). Furthermore, Boss et al. (2015) show that threats must be personally relevant in order to engender fear and engender protective motivation. Beyond this basic guidance on how to design effective fear appeal manipulations, it is surprising how few studies have investigated the actual effects of specific manipulations. Instead of focusing on which information needs to be conveyed to effectively stimulate appraisal processes, existing studies have restrained to confirm that comics and pictures are superior to textual fear appeals (Dijkstra and Bos 2015; Kumaraguru et al. 2010); pleasure-evoking colors (blue) are more effective than less pleasure-evoking colors (yellow) (Wauters et al. 2008); or that positive consequences are more persuasive than negative consequences (Anderson and Agarwal 2010), which already deviates from the core purpose of a fear appeal; Thus, across the literature, general account or explanation of how to conduct effective fear-appeal design is missing. However, designing effective fear-appeals is elementary to the study of fear appraisal, and hence presents a unique opportunity to inform and contribute to PMT literature. 2.4 Construal-Level Theory Construal-level theory holds potential to explain how fear appeals are represented mentally, and can thus inform our understanding of how fear-appeal design shapes cognitive appraisal. CLT proposes that people, to generate predictions about the future, form abstract mental construals of distal objects (Trope & Liberman, 2010, p. 440, emphasize added). The construal thereby serves a goal, and manifests itself as either a concrete or abstract mental representation, the latter thereby being more schematic, prototypical and hence simpler and less ambiguous (Fiske and Taylor 1991; Smith 1998). CLT coins concrete construals as being on the low-level end of the abstraction continuum, whereas abstract construals are on the high-level end of the continuum. The notion of CLT is strictly hierarchical: whereas abstract construals represent the conceptual idea of an object, concrete construals represent a more specific instantiation. Concrete and abstract construals are thus concrete and abstract mental representations of the same object, respectively, and are connected through hierarchical meaning: the high-level (abstract) construal determines the meaning of the low-level (concrete) construal more than the low-level construal the meaning of the high-level construal (Trope and Liberman 2010). As illustration, an abstract spear-phishing construal would be perceived to be dangerous, whereas the same concrete construal would describe the dangers more specifically, such as steals your credit card information. When the high-level attribute dangerous changes to safe, the hierarchically connected low-level attribute steals credit card information vanishes, because it is inconsistent with the superordinate attribute of being safe. The superordinate attribute is hence more central to the meaning of the construal Psychological distance Because construals serve as the basis of judgement and prediction, CLT proposes that construals mediate the consequences of psychological distance, which refers to the perception of something being either close or far away from the self (Trope and Liberman 2010). According to CLT, psychological distance is directly associated to construal level (Bar-Anan et al. 2006), and therefore describes the perceived distance between the present self and the construal. Feelings of distance can be evoked by moving the construal along a temporal (now vs. in the far future), spatial (here vs. far away), social (me vs. others) or hypothetical (realistic vs. hypothetical) dimension. Accordingly, one perceives a construal to be psychologically

7 proximate if it is construed to be present in the here and now, involving oneself, realistically. By contrast, a construal is perceived to be distant if it is located in the future, somewhere else, and involves others, and takes place hypothetically Purpose and Features CLT proposes that with increasing psychological distance, the gestalt of the construal changes. According to Liberman and Förster (2009) and Steidle et al. (2011), there is a bilateral association between psychological distance and construal level, such that a greater psychological distance is accompanied by a higher construal level (i.e., thinking that is more abstract), whereas a more proximate distance is accompanied by a lower construal level (i.e., thinking that is more concrete) (Bar-Anan et al. 2006). Trope and Liberman (2010) propose that this is due to a shift in purpose: Because proximate (i.e., imminent) threats demand an immediate response, an understanding of how am I threatened is needed. To answer such demand, concrete construals are formed that entail viable details of the specific threat, and thus serve the purpose of explaining its feasibility how it exactly works. By contrast, distant threats do not require such immediate response, but demand a judgement of whether I will be threatened. As a result, abstract construals are formed that focus on the general desirability of the threat (in abstract terms, not one particular instance), and thus serve the purpose to evaluate its desirability does it need to be avoided? Following the purpose, CLT proposes that abstract construals exhibit central features that relate to desirability and omit peripheral features that relate to feasibility (Trope and Liberman 2010). For example, if the purpose is to understand how to detect a spear-phishing attack, a low-level construal might feature specific attributes of the message, such as whether it will carry a personal greeting, impersonate a specific institution, or requests credit card details, as such information is crucial for detecting the attack. However, when moving to a higher construal, for which the purpose is to understand the consequences of falling victim to a spear-phishing attack, these features become irrelevant. Instead, features relating to the concept of spear phishing are salient characteristics of such an abstract construal. The application of CLT in research is still rather limited. In IS, two studies published in premier outlets apply CLT to recommendation systems (cf. Köhler et al. 2011) and systems adoption (cf. Ho et al. 2014). Despite the pioneering role of these CLT-based studies, these studies did not yet have the opportunity to fully leverage the full notion of CLT, nor explore construal features and psychological distance manipulations to stimulate construal formation. However, CLT yields a unique opportunity to understand the interpretative basis of cognitive processes, and we explore its notion to guide the design of more persuasive fear appeals by modelling the attributes of low- and high-level construals. 3 RESEARCH MODEL Based on CLT s understanding of how concrete and abstract construals emphasize different purposes and features, and ultimately form the basis for prediction and judgement, we combine CLT and PMT s appraisal processes to form our research model (Figure 1). Particularly, we argue that threat and coping appraisal

8 process each draws upon a construal to enable its cognitive judgement. Thus, we model that a spear-phishing threat construal and an anti-phishing coping response construal informs each respective appraisal process. Threat appraisal process Perceived threat severity Sanctioning rhetoric Fear Appeal Spear-phishing threat Concrete Abstract Anti-phishing response Concrete Abstract H1c H1a H1b Perceived threat vulnerability Maladaptive rewards H2c H2a Fear Coping appraisal process Response efficacy Phishing protection motivation Protective behavior H2b Self-efficacy Now; Here; Self; Realistic ` Low-level features Focus on feasibility In the future; Far away; Others; Hypothetical High-level features Focus on desirability Response costs Figure 1. Research model 3.1 Psychological Distance and Self-Perceptions The first difference between concrete and abstract construals is their relative position to the self (psychological distance). Thus, PMT constructs that evaluate self-perceptions are likely stimulated by traversing construal s relative position to the self (psychological distance). Such constructs are threat vulnerability, maladaptive rewards, self-efficacy, and response cost. The remaining constructs of PMT s appraisal processes are independent of the self and relate to the construal s gestalt; and thus remain unaffected by changes in psychological distance. Intuitively, the construal of a spear-phishing attack that takes place proximately provokes a more immediate perception of risk than does an attack that takes place distally. Similarly, maladaptive rewards that are construed to be attainable proximately receive higher appraisal than rewards that are attainable distally. Indeed, research on risk taking suggests this temporal connection between reward appraisal (Smithson 2008). As a farther psychological distance is associated with a higher-level construal, we argue: H1a: A high-level spear-phishing threat construal leads to lower threat vulnerability perceptions. H1b: A high-level spear-phishing threat construal leads to lower maladaptive rewards perceptions. Similarly, when evaluating one s efficacy in executing the coping response, psychological distance dictates the perception of whether the coping response is in need to be executed proximately, that is soon, realistically, by oneself; or distally, that is in the far future, by someone else, hypothetically. Accordingly, a more abstract coping response is likely to elicit lower levels of self-efficacy. Furthermore, because concrete construals convey more specific procedural details of what needs to be done, this argument is further supported by Arachchilage and Love (2014) who find that users require procedural (concrete) and

9 conceptual (abstract) knowledge to build up self-efficacy perceptions, while in contrast, conceptual knowledge alone is insufficient. Thus, we argue: H2a: A high-level response construal leads to lower self-efficacy perceptions. Finally, likewise to maladaptive rewards, response costs are similarly discounted if they are distal. Hence, costs that are construed to incur proximately receive higher appraisal than costs that are construed to occur distally. H2b: A high-level response threat construal leads to lower response cost perceptions. 3.2 Features of Threat and Coping Response Differences in psychological distance command differences in construal level: Abstract construals carry high-level features that relate to desirability, whereas concrete construals exhibit low-level features that relate to feasibility. These differences affect two PMT variables that are concerned with evaluating the nature of threat and coping response: For the first, threat severity, CLT argues that a concrete construal of a spear-phishing attack with low-level features (e.g., sender address, firm logo, link to website) enables an understanding of what constitutes an attack; whereas an abstract construal with high-level features (e.g., deceptive, dangerous) enables an understanding of the impact of an attack which we predict to evoke higher threat perceptions. Indeed, previous research has shown that the abstract handling of information systems (i.e., the way managers do in contrast to technical staff) increases security risk perceptions (Goodhue and Straub 1991). Thus, we propose that an abstract spear-phishing attack construal s focus on the (un)desirability of victimization increases the threat severity perceptions. H1c: A high-level spear-phishing threat construal leads to higher threat severity perceptions. Similarly, when evaluating the efficacy of the coping response, the question becomes whether it works. Addressing this question requires conceptual knowledge knowledge about the outcome of the coping response, rather than knowledge about its workings (McCormick 1997). Again, because abstract construals emphasize features that relate to desirability, we predict that such construals increase response efficacy perceptions rather than concrete construals that focus on feasibility; on how it works. H2c: A high-level response construal leads to higher response efficacy perceptions. 4 RESEARCH PLAN We plan to conduct a field experiment in which we will train a large body of individuals about the ins and outs of spear phishing through fear appeal messages; and then will probe the effectiveness of the trainings through a feigned spear-phishing attack targeting the participants, for which we follow the guidelines for ethical fraud experiments outlined by Jakobsson et al. (2008). Because we objectively observe subject s behavior (i.e., whether they fall for the feigned spear-phishing attack) within the context of their day-to-day lives, we ecologically validate the applicability of our theory, and avoid the problematic discrepancy between self-reported intentions and behaviors which is often found in security contexts (Workman 2008). Our research design aims at treating subjects with concrete or abstract construals of the two core fear appeal elements: threat and response. For the other PMT-related measures, we mainly rely upon validated instruments of Boss et al. (2015). We expect to conduct the experiment later this year. References Abbasi, A., Zahedi, F., and Chen, Y. (2012). Impact of anti-phishing tool performance on attack success

10 rates. In International Conference on Intelligence and Securiy Informatics (ISI 2012), Abbasi, A., Zahedi, F. Mariam, Zeng, D., Chen, Y., Chen, H., and Nunamaker, J.F. (2015). Enhancing predictive analytics for anti-phishing by exploiting website genre information. Journal of Management Information Systems, 31 (4), Anderson, C.L., and Agarwal, R. (2010). Practicing safe computing: A multimethod empirical examination of home computer user security behavioral intentions. MIS Quarterly, 34 (3), 613 A15. APWG. (2014). Phishing activity trends report 1 Quarter. Phishing Acritvity Trends Report,. Arachchilage, N.A.G., and Love, S. (2014). Security awareness of computer users: A phishing threat avoidance perspective. Computers in Human Behavior, 38, Elsevier Ltd, Bar-Anan, Y., Liberman, N., and Trope, Y. (2006). The association between psychological distance and construal level: Evidence from an implicit association test. Journal of Experimental Psychology, 135 (4), Boss, S.R., Galletta, D.F., Lowry, P.B., Moody, G.D., and Polak, P. (2015). What do systems users have to fear? Using fear appeals to engender threats and fear that motivate protective security behaviors. MIS Quarterly, 39 (4), Dijkstra, A., and Bos, C. (2015). The effects of repeated exposure to graphic fear appeals on cigarette packages: A field experiment. Psychology of Addictive Behaviors, 29 (1), Dodge, R.C., Carver, C., and Ferguson, A.J. (2007). Phishing for user security awareness. Computers and Security, 26 (1), Egelman, S., Cranor, L.F., and Hong, J. (2008). You ve been warned: An empirical study of the effectiveness of web browser phishing warnings. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, ACM, Ferguson, B.A.J. (2005). Fostering security awareness: The west point carronade. EDUCASE Quarterly, 1, FireEye. (2012). Spear phishing attacks Why they are successful and how to stop. Fiske, S.T., and Taylor, S.E. (1991). Social cognition. McGraw-Hill Series in Social Psychology, (2, revised.), McGraw-Hill. Floyd, D.L., Prentice-Dunn, S., and Rogers, R.W. (2000). A meta-analysis of research on protection motivation theory. Journal of Applied Social Psychology, 30 (2), Goodhue, D.L., and Straub, D.W. (1991). Security concerns of system users. Information & Management, 20, Ho, C.K.Y., Ke, W., and Liu, H. (2014). Choice decision of e-learning system: Implications from construal level theory. Information Management, 52 (2), Elsevier B.V., Hong, J. (2012). The Current State of Phishing Attacks. Communications of the ACM, 55 (1), Jagatic, T.N., Johnson, N. a., Jakobsson, M., and Menczer, F. (2007). Social phishing. Communications of the ACM, 50 (10), Jakobsson, M., Finn, P., and Johnson, N. (2008). Why and how to perform fraud experiments. IEEE Security and Privacy, 6 (2), Johnston, A.C., and Warkentin, M. (2015). An enhanced fear appeal rethorical framework: Leveraging threats to the human asset trough sanctioning rethoric. MIS Quarterly, 39 (1), Köhler, C.F., Breugelmans, E., and Dellaert, B.G.C. (2011). Consumer acceptance of recommendations by interactive decision aids: The joint role of temporal distance and concrete versus abstract communications. Journal of Management Information Systems, 27 (4), Kumaraguru, P., Sheng, S., Acquisti, A., Cranor, L.F., and Hong, J. (2010). Teaching Johnny not to fall for phishing. ACM Transactions on Internet Technology, 10 (2), Lai, F., Li, D., and Hsieh, C.T. (2012). Fighting identity theft: The coping perspective. Decision Support Systems, 52 (2), Leventhal, H. (1970). Findings and theory in the study of fear communications. Advances in Experimental

11 Social Psychology, 5, Liberman, N., and Förster, J. (2009). Distancing from experienced self: how global-versus-local perception affects estimation of psychological distance. Journal of Personality and Social Psychology, 97 (2), Maddux, J.E., and Rogers, R.W. (1983). Protection motivation and self-efficacy: A revised theory of fear appeals and attitude change. Journal of Experimental Social Psychology, 19 (5), McAfee Labs. (2014). McAfee Labs Threats Report. McAfee Lab,. McCormick, R. (1997). Conceptual and procedural knowledge. International Journal of Technology and Design Education, 7 (1-2), Milne, G.R., Labrecque, L.I., and Cromer, C. (2009). Toward an understanding of the online consumer s risky behavior and protection practices. Journal of Consumer Affairs, 43 (3), Milne, S., Sheeran, P., and Orbell, S. (2000). Prediction and intervention in health-related behavior: A metaanalytic review of protection motivation theory. Journal of Applied Social Psychology, 30 (1), Posey, C., Roberts, T.L., and Lowry, P.B. (2015). The impact of organizational commitment on insiders motivation to protect organizational information assets. Journal of Management Information Systems, 32 (4), Puhakainen, P., and Siponen, M. (2010). Improving employees compliance through information systems security training: An action research study. MIS Quarterly, 34 (4), Rogers, R.W. (1975). A protection motivation theory of fear appeals and attitude change. The Journal of Psychology, 91 (1), Rohm, A.J., and Milne, G.R. (2004). Just what the doctor ordered. The role of information sensitivity and trust in reducing medical information privacy concern. Journal of Business Research, 57 (9), RSA. (2014) A year in review. RSA Online Fraud Report,. Smith, E.R. (1998). Mental representation and memory. In Handbook of social psychology, (Vol. 1), Smithson, M. (2008). Psychology s ambivalent view of uncertainty. In Uncertainty and Risk: Multidisciplinary Perspectives, Steidle, A., Werth, L., and Hanke, E.V. (2011). You can t see much in the dark darkness affects construal level and psychological distance. Social Psychology, 42 (3), Trope, Y., and Liberman, N. (2010). Construal-level theory of psychological distance. Psychological Review, 117 (2), Wang, J., Herath, T., Chen, R., Vishwanath, A., and Rao, H.R. (2012). Phishing susceptibility: An investigation into the processing of a targeted spear phishing . IEEE Transactions on Professional Communication, 55 (4), Wauters, B., Brengman, M., and Mahama, F. (2008). The impact of pleasure-evoking colors on the effectiveness of threat (fear) appeals. Psychology & Marketing, 31 (12), Workman, M. (2008). Wisecrackers: A theory-grounded investigation of phishing and pretext social engineering threats to information security. Journal of the American Society for Information Science and Technology, 59 (4), Wright, R.T., Jensen, M.L., Thatcher, J.B., Dinger, M., and Marett, K. (2014). Research note - Influence techniques in phishing attacks: An examination of vulnerability and resistance. Information Systems Research, 25 (2), Wright, R.T., and Marett, K. (2010). The influence of experiential and dispositional factors in phishing: An empirical investigation of the deceived. Journal of Management Information Systems, Wu, M., Miller, R.C., and Garfinkel, S.L. (2006). Do security toolbars actually prevent phishing attacks? In CHI 2006 Proceedings, Montréal, Québec, Canada, Zahedi, F.M., Abbasi, A., and Chen, Y. (2015). Fake-website detection tools: Identifying elements that

12 promote individuals use and enhance their performance. Journal of the Association for Information Systems, 16 (6),

Who Subscribe to Identity Theft Protection Service

Who Subscribe to Identity Theft Protection Service DECISION SCIENCES INSTITUTE? An Exploration of Antecedent Factors Yuan Li University of Illinois at Springfield Email: yli295@uis.edu Jingguo Wang University of Texas at Arlington Email: jwang@uta.edu

More information

Persuading End Users to Act Cautiously Online: Initial Findings of a Fear Appeals Study on Phishing

Persuading End Users to Act Cautiously Online: Initial Findings of a Fear Appeals Study on Phishing Persuading End Users to Act Cautiously Online: Initial Findings of a Fear Appeals Study on Phishing Abstract J. Jansen 1,2 and P. van Schaik 3 1 Faculty of Humanities and Law, Open University of the Netherlands

More information

Factors Influencing the Use of Privacy Settings in Location-Based Social Networks

Factors Influencing the Use of Privacy Settings in Location-Based Social Networks Factors Influencing the Use of Privacy Settings in Location-Based Social Networks H. Oladimeji and J. Ophoff Dept. of Information Systems, University of Cape Town, Cape Town, South Africa e-mail: OLDHEN003@myuct.ac.za;

More information

Why We Don t Block 3rd Party Trackers: An Attributional Theory Perspective

Why We Don t Block 3rd Party Trackers: An Attributional Theory Perspective Association for Information Systems AIS Electronic Library (AISeL) WISP 2015 Proceedings Pre-ICIS Workshop on Information Security and Privacy (SIGSEC) Winter 12-13-2015 Why We Don t Block 3rd Party Trackers:

More information

Putting the Motivation in Protection Motivation Theory: An Examination of Persuasive Communication via Extrinsic and Intrinsic Means

Putting the Motivation in Protection Motivation Theory: An Examination of Persuasive Communication via Extrinsic and Intrinsic Means Putting the Motivation in Protection Motivation Theory Abstract Putting the Motivation in Protection Motivation Theory: An Examination of Persuasive Communication via Extrinsic and Intrinsic Means Research-in-Progress

More information

What Do Systems Users Have to Fear? Using Fear Appeals to Engender Threats and Fear that Motivate Protective Security Behaviors

What Do Systems Users Have to Fear? Using Fear Appeals to Engender Threats and Fear that Motivate Protective Security Behaviors What Do Systems Users Have to Fear? Using Fear Appeals to Engender Threats and Fear that Motivate Protective Security Behaviors By Scott R. Boss Bentley University Dennis F. Galletta University of Pittsburgh

More information

How Self-Efficacy and Gender Issues Affect Software Adoption and Use

How Self-Efficacy and Gender Issues Affect Software Adoption and Use How Self-Efficacy and Gender Issues Affect Software Adoption and Use Kathleen Hartzel Today s computer software packages have potential to change how business is conducted, but only if organizations recognize

More information

Chapter 3-Attitude Change - Objectives. Chapter 3 Outline -Attitude Change

Chapter 3-Attitude Change - Objectives. Chapter 3 Outline -Attitude Change Chapter 3-Attitude Change - Objectives 1) An understanding of how both internal mental processes and external influences lead to attitude change 2) An understanding of when and how behavior which is inconsistent

More information

A Model of Unethical Usage of Information Technology

A Model of Unethical Usage of Information Technology Association for Information Systems AIS Electronic Library (AISeL) AMCIS 2005 Proceedings Americas Conference on Information Systems (AMCIS) 2005 A Model of Unethical Usage of Information Technology Sutirtha

More information

Moral Beliefs and Organizational Information Security Policy Compliance: The Role of Gender

Moral Beliefs and Organizational Information Security Policy Compliance: The Role of Gender Association for Information Systems AIS Electronic Library (AISeL) MWAIS 2016 Proceedings Midwest (MWAIS) Spring 5-19-2016 Moral Beliefs and Organizational Information Security Policy Compliance: The Role

More information

Jansen, J. (Jurjen); van Schaik, P. (Paul)

Jansen, J. (Jurjen); van Schaik, P. (Paul) TeesRep - Teesside's Research Repository Persuading end users to act cautiously online: A fear appeals study on phishing Item type Authors Citation Eprint Version DOI Publisher Journal Rights Article Jansen,

More information

Resistance to Change 7/17/2010. Paper exercise. Essence of Resistance. Grief Cycle death of the past. Phases of Change Acceptance

Resistance to Change 7/17/2010. Paper exercise. Essence of Resistance. Grief Cycle death of the past. Phases of Change Acceptance Paper exercise Resistance to Change Ross A. Wirth, Ph.D. Change Leadership Symposium June 8, 2010 Jot down change initiatives where you observed resistance Symptoms of the resistance Reasons behind the

More information

Framework for Comparative Research on Relational Information Displays

Framework for Comparative Research on Relational Information Displays Framework for Comparative Research on Relational Information Displays Sung Park and Richard Catrambone 2 School of Psychology & Graphics, Visualization, and Usability Center (GVU) Georgia Institute of

More information

Abstract. 1 Introduction. Highly-preliminary Working paper. Cristian Bravo-Lillo Carnegie Mellon University. Stuart Schechter Microsoft Research

Abstract. 1 Introduction. Highly-preliminary Working paper. Cristian Bravo-Lillo Carnegie Mellon University. Stuart Schechter Microsoft Research Using Ethical-Response Surveys to Identify Sources of Disapproval and Concern with Facebook s Emotional Contagion Experiment and Other Controversial Studies Highly-preliminary Working paper (expect frequent

More information

EMOTIONAL INTELLIGENCE QUESTIONNAIRE

EMOTIONAL INTELLIGENCE QUESTIONNAIRE EMOTIONAL INTELLIGENCE QUESTIONNAIRE Personal Report JOHN SMITH 2017 MySkillsProfile. All rights reserved. Introduction The EIQ16 measures aspects of your emotional intelligence by asking you questions

More information

INTERPERSONAL RELATIONSHIPS (IR)

INTERPERSONAL RELATIONSHIPS (IR) Discussion Questions The concept of IR INTERPERSONAL RELATIONSHIPS (IR) 1. Define interpersonal relationship. 2. List types of interpersonal relationship. 3. What are the advantages and disadvantages of

More information

Exploring the Impact of Instant Messaging (IM) on User Performance and Perceived Workload

Exploring the Impact of Instant Messaging (IM) on User Performance and Perceived Workload Association for Information Systems AIS Electronic Library (AISeL) MWAIS 2008 Proceedings Midwest (MWAIS) 5-1-2008 Exploring the Impact of Instant Messaging (IM) on User Performance and Perceived Workload

More information

Transactions on Human-Computer Interaction THCI

Transactions on Human-Computer Interaction THCI AIS Transactions on Human-Computer Interaction Transactions on Human-Computer Interaction THCI Original Research Social Networking Websites and Posting Personal Information: An Evaluation of Protection

More information

Alternative Explanations for Changes in Similarity Judgments and MDS Structure

Alternative Explanations for Changes in Similarity Judgments and MDS Structure Cornell University School of Hotel Administration The Scholarly Commons Articles and Chapters School of Hotel Administration Collection 8-1990 Alternative Explanations for Changes in Similarity Judgments

More information

AN INVESTIGATION OF DECISION- MAKING AND THE TRADEOFFS INVOLVING COMPUTER SECURITY RISK

AN INVESTIGATION OF DECISION- MAKING AND THE TRADEOFFS INVOLVING COMPUTER SECURITY RISK Association for Information Systems AIS Electronic Library (AISeL) AMCIS 2009 Proceedings Americas Conference on Information Systems (AMCIS) 2009 AN INVESTIGATION OF DECISION- MAKING AND THE TRADEOFFS

More information

Asking and answering research questions. What s it about?

Asking and answering research questions. What s it about? 2 Asking and answering research questions What s it about? (Social Psychology pp. 24 54) Social psychologists strive to reach general conclusions by developing scientific theories about why people behave

More information

Radon: A Behavioural as well as a Technical & Health Challenge.

Radon: A Behavioural as well as a Technical & Health Challenge. Radon: A Behavioural as well as a Technical & Health Challenge. Prof. David Hevey, Director of the Research Centre for Psychological Health, School of Psychology, Trinity College Dublin Consequences of

More information

Review of public information programmes to enhance home radon screening uptake and home remediation

Review of public information programmes to enhance home radon screening uptake and home remediation Review of public information programmes to enhance home radon screening uptake and home remediation Prof. David Hevey, Director of the Research Centre for Psychological Health, School of Psychology, Trinity

More information

Personal Talent Skills Inventory

Personal Talent Skills Inventory Personal Talent Skills Inventory Sales Version Inside Sales Sample Co. 5-30-2013 Introduction Research suggests that the most effective people are those who understand themselves, both their strengths

More information

Learning Objectives. Learning Objectives 17/03/2016. Chapter 4 Perspectives on Consumer Behavior

Learning Objectives. Learning Objectives 17/03/2016. Chapter 4 Perspectives on Consumer Behavior Chapter 4 Perspectives on Consumer Behavior Copyright 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of McGraw-Hill Education. Learning

More information

Issues in Information Systems Volume 17, Issue II, pp , 2016

Issues in Information Systems Volume 17, Issue II, pp , 2016 CONSUMER ADOPTION AND USE OF MOBILE APPLICATIONS: DO PRIVACY AND SECURITY CONCERNS MATTER? Gary Garrison, Belmont University, gary.garrison@belmont.edu Sang Hyun Kim, Kyungpook National University, ksh@knu.ac.kr

More information

Spotting Liars and Deception Detection skills - people reading skills in the risk context. Alan Hudson

Spotting Liars and Deception Detection skills - people reading skills in the risk context. Alan Hudson Spotting Liars and Deception Detection skills - people reading skills in the risk context Alan Hudson < AH Business Psychology 2016> This presentation has been prepared for the Actuaries Institute 2016

More information

SELF-EFFICACY AND THE MODERATE (OR LESS) DRINKER: A SURVIVOR S GUIDE FOR COPING WITH HEAVY DRINKING ON (OR NEAR) COLLEGE CAMPUSES

SELF-EFFICACY AND THE MODERATE (OR LESS) DRINKER: A SURVIVOR S GUIDE FOR COPING WITH HEAVY DRINKING ON (OR NEAR) COLLEGE CAMPUSES SELF-EFFICACY AND THE MODERATE (OR LESS) DRINKER: A SURVIVOR S GUIDE FOR COPING WITH HEAVY DRINKING ON (OR NEAR) COLLEGE CAMPUSES Ronald B. Anderson, Stan Richards School of Advertising & Public Relations,

More information

VIRGINIA LAW REVIEW IN BRIEF

VIRGINIA LAW REVIEW IN BRIEF VIRGINIA LAW REVIEW IN BRIEF VOLUME 96 JUNE 15, 2010 PAGES 35 39 REPLY GOOD INTENTIONS MATTER Katharine T. Bartlett * W HILE writing the article to which Professors Mitchell and Bielby have published responses,

More information

THE "SPIRAL MODEL" vs. THE "DETERRENCE MODEL'"

THE SPIRAL MODEL vs. THE DETERRENCE MODEL' 1 THE "SPIRAL MODEL" vs. THE "DETERRENCE MODEL'" 1 When are threats of punishment ("sticks") the best way to gain other states' compliance, and when do positive inducements (promise of rewards, appeasement,

More information

Role of Health Education and Communication Part 3

Role of Health Education and Communication Part 3 Role of Health Education and Communication Part 3 Content Part 1 1. Introduction 2. Health 3. Health Education introduction 4. Health Promotion 5. Perception Part 2 6. Health Behaviour 7. Learning 8. Attribution

More information

I. Logical Argument (argument) appeals to reason and intellect.

I. Logical Argument (argument) appeals to reason and intellect. Page 1 of 5 Argument strategies for manipulating others to agree with your opinion, premise or idea; i.e. to convince others. Argumentative writing has a different motivation from expository writing, in

More information

Searching for Angels: Identifying Effective Characteristics of Successful Crowdfunding Campaigns

Searching for Angels: Identifying Effective Characteristics of Successful Crowdfunding Campaigns Association for Information Systems AIS Electronic Library (AISeL) PACIS 2017 Proceedings Pacific Asia Conference on Information Systems (PACIS) Summer 2017 Searching for Angels: Identifying Effective

More information

Sense-making Approach in Determining Health Situation, Information Seeking and Usage

Sense-making Approach in Determining Health Situation, Information Seeking and Usage DOI: 10.7763/IPEDR. 2013. V62. 16 Sense-making Approach in Determining Health Situation, Information Seeking and Usage Ismail Sualman 1 and Rosni Jaafar 1 Faculty of Communication and Media Studies, Universiti

More information

THE HEALTH BELIEF MODEL. Health Behavior CHAPTER 6

THE HEALTH BELIEF MODEL. Health Behavior CHAPTER 6 THE HEALTH BELIEF MODEL 1 DESCRIPTION This chapter will discuss The Health Belief Model, Protection Motivation Theory and how to use the model in the behavior case analysis 2 OBJECTIVES General The student

More information

Discussion. Re C (An Adult) 1994

Discussion. Re C (An Adult) 1994 Autonomy is an important ethical and legal principle. Respect for autonomy is especially important in a hospital setting. A patient is in an inherently vulnerable position; he or she is part of a big and

More information

Risk Interpretation and Action

Risk Interpretation and Action Risk Interpretation and Action J. Richard Eiser 1, Ann Bostrom 2, Ian Burton 3, David Johnston 4, John McClure 5, Douglas Paton 6, Joop van der Pligt 7, Mathew White 8. 1 University of Sheffield, UK; 2

More information

A Bayesian Network Model of Knowledge-Based Authentication

A Bayesian Network Model of Knowledge-Based Authentication Association for Information Systems AIS Electronic Library (AISeL) AMCIS 2007 Proceedings Americas Conference on Information Systems (AMCIS) December 2007 A Bayesian Network Model of Knowledge-Based Authentication

More information

Revision notes 7.5. Section 7.5 Health promotion

Revision notes 7.5. Section 7.5 Health promotion Revision notes 7.5 Section 7.5 Health promotion Learning outcomes Examine models and theories of health promotion. Discuss the effectiveness of health promotion strategies. For behaviour to change in any

More information

Trust in E-Commerce Vendors: A Two-Stage Model

Trust in E-Commerce Vendors: A Two-Stage Model Association for Information Systems AIS Electronic Library (AISeL) ICIS 2000 Proceedings International Conference on Information Systems (ICIS) December 2000 Trust in E-Commerce Vendors: A Two-Stage Model

More information

Conceptual Replication ISSN Malware Avoidance Motivations and Behaviors: A Technology Threat Avoidance Replication.

Conceptual Replication ISSN Malware Avoidance Motivations and Behaviors: A Technology Threat Avoidance Replication. Transactions on R eplication R esearch Conceptual Replication ISSN 2473-3458 Malware Avoidance Motivations and Behaviors: A Technology Threat Avoidance Replication Diana Young Finance and Decision Sciences

More information

BASIC VOLUME. Elements of Drug Dependence Treatment

BASIC VOLUME. Elements of Drug Dependence Treatment BASIC VOLUME Elements of Drug Dependence Treatment Module 2 Motivating clients for treatment and addressing resistance Basic counselling skills for drug dependence treatment Special considerations when

More information

Is entrepreneur s photo a crucial element in a crowdfunding webpage?

Is entrepreneur s photo a crucial element in a crowdfunding webpage? Second International Conference on Economic and Business Management (FEBM 2017) Is entrepreneur s photo a crucial element in a crowdfunding webpage? Xin Wang, Huaxin Wang *, Yu Zhao Department of Business

More information

TTI Personal Talent Skills Inventory Coaching Report

TTI Personal Talent Skills Inventory Coaching Report TTI Personal Talent Skills Inventory Coaching Report "He who knows others is learned. He who knows himself is wise." Lao Tse Mason Roberts District Manager YMCA 8-1-2008 Copyright 2003-2008. Performance

More information

Human Aspects of Information Security: An Empirical Study of Intentional versus Actual Behavior

Human Aspects of Information Security: An Empirical Study of Intentional versus Actual Behavior 64 Human Aspects of Information Security: An Empirical Study of Intentional versus Actual Behavior A. Komatsu 1, D. Takagi 2 and T. Takemura 1,3 1 Security Economics Laboratory, Information-Technology

More information

Behavioral EQ MULTI-RATER PROFILE. Prepared for: By: Session: 22 Jul Madeline Bertrand. Sample Organization

Behavioral EQ MULTI-RATER PROFILE. Prepared for: By: Session: 22 Jul Madeline Bertrand. Sample Organization Behavioral EQ MULTI-RATER PROFILE Prepared for: Madeline Bertrand By: Sample Organization Session: Improving Interpersonal Effectiveness 22 Jul 2014 Behavioral EQ, Putting Emotional Intelligence to Work,

More information

Psychological Experience of Attitudinal Ambivalence as a Function of Manipulated Source of Conflict and Individual Difference in Self-Construal

Psychological Experience of Attitudinal Ambivalence as a Function of Manipulated Source of Conflict and Individual Difference in Self-Construal Seoul Journal of Business Volume 11, Number 1 (June 2005) Psychological Experience of Attitudinal Ambivalence as a Function of Manipulated Source of Conflict and Individual Difference in Self-Construal

More information

Development. summary. Sam Sample. Emotional Intelligence Profile. Wednesday 5 April 2017 General Working Population (sample size 1634) Sam Sample

Development. summary. Sam Sample. Emotional Intelligence Profile. Wednesday 5 April 2017 General Working Population (sample size 1634) Sam Sample Development summary Wednesday 5 April 2017 General Working Population (sample size 1634) Emotional Intelligence Profile 1 Contents 04 About this report 05 Introduction to Emotional Intelligence 06 Your

More information

The Effect of Background Color and Level of Threat on Evoked Fear and Smoking Cessation Intentions

The Effect of Background Color and Level of Threat on Evoked Fear and Smoking Cessation Intentions Pal. Jour. V.6, I., No. 27, 86-92 Copyright 27 by Palma Journal, All Rights Reserved Available online at: http://palmajournal.org/ The Effect of Background Color and Level of Threat on Evoked Fear and

More information

THEORIES OF PERSONALITY II Psychodynamic Assessment 1/1/2014 SESSION 6 PSYCHODYNAMIC ASSESSMENT

THEORIES OF PERSONALITY II Psychodynamic Assessment 1/1/2014 SESSION 6 PSYCHODYNAMIC ASSESSMENT THEORIES OF PERSONALITY II Psychodynamic Assessment 1/1/2014 SESSION 6 PSYCHODYNAMIC ASSESSMENT THEORIES OF PERSONALITY II SESSION 6: Psychodynamic Assessment Psychodynamic Assessment Assessing the specific

More information

Understanding Social Norms, Enjoyment, and the Moderating Effect of Gender on E-Commerce Adoption

Understanding Social Norms, Enjoyment, and the Moderating Effect of Gender on E-Commerce Adoption Association for Information Systems AIS Electronic Library (AISeL) SAIS 2010 Proceedings Southern (SAIS) 3-1-2010 Understanding Social Norms, Enjoyment, and the Moderating Effect of Gender on E-Commerce

More information

Why Human-Centered Design Matters

Why Human-Centered Design Matters Reading Review: Article Why Human-Centered Design Matters -Dave Thomsen, Wanderful Media HUMAN CENTERED DESIGN a human-centered approach fuels the creation of products that resonate more deeply with an

More information

Evolution of Trust in Distributed Software Development Teams: A Punctuated Equilibrium Model

Evolution of Trust in Distributed Software Development Teams: A Punctuated Equilibrium Model Association for Information Systems AIS Electronic Library (AISeL) AMCIS 2006 Proceedings Americas Conference on Information Systems (AMCIS) 12-31-2006 Evolution of Trust in Distributed Software Development

More information

Behavior Change Theories

Behavior Change Theories Behavior Change Theories Abdul-Monaf Al-Jadiry, MD, FRCPsych Professor of Psychiatry Behavioral change theories These theories explain the reasons behind alterations in individuals' behavioral patterns.

More information

TTI Personal Talent Skills Inventory Emotional Intelligence Version

TTI Personal Talent Skills Inventory Emotional Intelligence Version TTI Personal Talent Skills Inventory Emotional Intelligence Version "He who knows others is learned. He who knows himself is wise." Lao Tse Henry Stein 7-31-2008 Copyright 2004-2008. Target Training International,

More information

THE ROLE OF COLOR IN INFLUENCING TRUST THE ROLE OF COLOR IN INFLUENCING TRUST IN E-COMMERCE WEB SITES

THE ROLE OF COLOR IN INFLUENCING TRUST THE ROLE OF COLOR IN INFLUENCING TRUST IN E-COMMERCE WEB SITES Association for Information Systems AIS Electronic Library (AISeL) MWAIS 2007 Proceedings Midwest (MWAIS) December 2007 THE ROLE OF COLOR IN INFLUENCING TRUST THE ROLE OF COLOR IN INFLUENCING TRUST IN

More information

Changing People s Behavior. Larry Wissow Professor Health, Behavior and Society Johns Hopkins School of Public Health

Changing People s Behavior. Larry Wissow Professor Health, Behavior and Society Johns Hopkins School of Public Health This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike License. Your use of this material constitutes acceptance of that license and the conditions of use of materials on this

More information

User characteristics that influence judgment of social engineering attacks in social networks

User characteristics that influence judgment of social engineering attacks in social networks https://doi.org/10.1186/s13673-018-0128-7 RESEARCH Open Access User characteristics that influence judgment of social engineering attacks in social networks Samar Muslah Albladi * and George R. S. Weir

More information

BEHAVIOR CHANGE THEORY

BEHAVIOR CHANGE THEORY BEHAVIOR CHANGE THEORY An introduction to a behavior change theory framework by the LIVE INCITE team This document is not a formal part of the LIVE INCITE Request for Tender and PCP. It may thus be used

More information

Physicians' Acceptance of Web-Based Medical Assessment Systems: Findings from a National Survey

Physicians' Acceptance of Web-Based Medical Assessment Systems: Findings from a National Survey Association for Information Systems AIS Electronic Library (AISeL) AMCIS 2003 Proceedings Americas Conference on Information Systems (AMCIS) 12-31-2003 Physicians' Acceptance of Web-Based Medical Assessment

More information

Assignment 4: True or Quasi-Experiment

Assignment 4: True or Quasi-Experiment Assignment 4: True or Quasi-Experiment Objectives: After completing this assignment, you will be able to Evaluate when you must use an experiment to answer a research question Develop statistical hypotheses

More information

Psychological Approaches to Counseling. Mr. Lema, Isaac Clinical Psychologist (MSc.) 25 th November 2015

Psychological Approaches to Counseling. Mr. Lema, Isaac Clinical Psychologist (MSc.) 25 th November 2015 Psychological Approaches to Counseling Mr. Lema, Isaac Clinical Psychologist (MSc.) 25 th November 2015 Learning Objectives Explore different psychological approaches to counseling Adopt psychological

More information

!!!!!!! !!!!!!!!!!!!

!!!!!!! !!!!!!!!!!!! Running head: VISUAL ADVERTISING ON SELF-REFERENCING AND EMPATHY 1 Effects of Visual Advertising on Self-Referencing and Empathy Towards Health Conditions Christine Cao and Jennifer Ball University of

More information

NEUROIS: CHALLENGES AND SOLUTIONS

NEUROIS: CHALLENGES AND SOLUTIONS Association for Information Systems AIS Electronic Library (AISeL) ICIS 2010 Proceedings International Conference on Information Systems (ICIS) 2010 NEUROIS: CHALLENGES AND SOLUTIONS Angelika Dimoka Temple

More information

PYSC 333 Psychology of Personality

PYSC 333 Psychology of Personality PYSC 333 Psychology of Personality Session 5 Humanistic Theory of Personality- Part 1 Lecturer:, Dept. of Psychology Contact Information: mamankwah-poku@ug.edu.gh College of Education School of Continuing

More information

Faces of Wellness. Kent State University Bateman Gold Team. Latisha Ellison Daniel Henderson Taylor Pierce Lauryn Rosinski Rachel Stevenson

Faces of Wellness. Kent State University Bateman Gold Team. Latisha Ellison Daniel Henderson Taylor Pierce Lauryn Rosinski Rachel Stevenson Faces of Wellness Kent State University Bateman Gold Team Latisha Ellison Daniel Henderson Taylor Pierce Lauryn Rosinski Rachel Stevenson Timothy Roberts, Faculty Advisor Lyndsey Fortunato, Professional

More information

How to stop Someone who is ADDICTED ENABLING

How to stop Someone who is ADDICTED ENABLING stop ENABLING Table of Contents 2 Are You an Enabler? What if the steps you were taking to help a friend or family member through a problem or crisis were actually the very things hurting them most? And,

More information

Changing manager behaviour

Changing manager behaviour Changing manager behaviour August 2010. Occasional Paper Vol. 3 No. 7 Derek Mowbray Why is behaviour so important? The role of the manager is to get the job done. Normally, this involves asking someone

More information

A systematic review to critically assess the positive and negative consequences of fear appeal in anti-smoking campaigns.

A systematic review to critically assess the positive and negative consequences of fear appeal in anti-smoking campaigns. A systematic review to critically assess the positive and negative consequences of fear appeal in anti-smoking campaigns Cihan Kayikci OUTLINE FEAR APPEAL THEORY: 1953 to the PRESENT OBJECTIVES PURPOSE

More information

Reference Range Number Line Format Preferred by African American Adults for Display of Asthma Control Status

Reference Range Number Line Format Preferred by African American Adults for Display of Asthma Control Status Reference Range Number Line Format Preferred by African American Adults for Display of Asthma Control Status Adriana Arcia, PhD, RN, Assistant Professor of Nursing at CUIMC Maureen George, PhD, RN, AE-C,

More information

Leadership Personal Power & Influence. WHY, Would anyone want to follow You?

Leadership Personal Power & Influence. WHY, Would anyone want to follow You? Leadership Personal Power & Influence WHY, Would anyone want to follow You? Power, Influence, and Politics: Defined Power: Having or wielding force, authority, or influence; achieving or bringing about

More information

Creating a Positive Professional Image

Creating a Positive Professional Image Creating a Positive Professional Image Q&A with: Laura Morgan Roberts Published: June 20, 2005 Author: Mallory Stark As HBS professor Laura Morgan Roberts sees it, if you aren't managing your own professional

More information

Emotions and Moods. Robbins & Judge Organizational Behavior 13th Edition. Bob Stretch Southwestern College

Emotions and Moods. Robbins & Judge Organizational Behavior 13th Edition. Bob Stretch Southwestern College Robbins & Judge Organizational Behavior 13th Edition Emotions and Moods Bob Stretch Southwestern College 2009 Prentice-Hall Inc. All rights reserved. 8-0 Chapter Learning Objectives After studying this

More information

What is analytical sociology? And is it the future of sociology?

What is analytical sociology? And is it the future of sociology? What is analytical sociology? And is it the future of sociology? Twan Huijsmans Sociology Abstract During the last few decades a new approach in sociology has been developed, analytical sociology (AS).

More information

10 Norms and behavior. What s it about?

10 Norms and behavior. What s it about? 10 Norms and behavior What s it about? (Social Psychology pp. 351 395) Norms are effective guides for social behavior. Norms must be activated before they can guide behavior. When individuals are in a

More information

Effective Intentions: The Power of Conscious Will

Effective Intentions: The Power of Conscious Will Book Review Effective Intentions: The Power of Conscious Will Alfred R. Mele Oxford University Press, Oxford, 2009 Marco Fenici* fenici@unisi.it Mele s book is a concise analysis of much research in neurophysiology

More information

WHAT IS SELF? MODULE-IV OBJECTIVES 16.1 CONCEPT OF SELF. What is Self? Self and Personality. Notes

WHAT IS SELF? MODULE-IV OBJECTIVES 16.1 CONCEPT OF SELF. What is Self? Self and Personality. Notes What is Self? MODULE-IV 16 WHAT IS SELF? Self is focus of our everyday behaviour and all of us do have a set of perceptions and beliefs about ourselves. This kind of self concept plays important role in

More information

"Preparedness and Personal Awareness" - Albert Timen

Preparedness and Personal Awareness - Albert Timen For The Everyday Civilian The reality of Terrorism and Terror threats around us is not new, neither a surprising actuality, yet still the wave of events ranging from "Lone wolf" Active Shooter to a combined

More information

Visualizing Success: Investigating the Relationship between Ability and Self-Efficacy in the Domain of Visual Processing

Visualizing Success: Investigating the Relationship between Ability and Self-Efficacy in the Domain of Visual Processing Visualizing Success: Investigating the Relationship between Ability and Self-Efficacy in the Domain of Visual Processing Jason Power, Jeffrey Buckley and Niall Seery Department of Design and Manufacturing

More information

Summary. Summary: Identification of risk factors and protective factors, and vulnerability and risk factors are important to

Summary. Summary: Identification of risk factors and protective factors, and vulnerability and risk factors are important to Summary Summary: 20.3. Identification of risk factors and protective factors, and vulnerability and risk factors are important to select target populations to select target variables to induce change (How)

More information

Threat Assessment in Schools (2002). Washington, D.C.: U.S. Secret Service & U.S. Dept. of Education.

Threat Assessment in Schools (2002). Washington, D.C.: U.S. Secret Service & U.S. Dept. of Education. Six Principles of the Threat Assessment Process Threat assessment is a central component in preventing targeted school violence. The threat assessment process involves identifying, assessing, and managing

More information

What People Know about the Role of Construal Level in Self-Control. Kentaro Fujita Department of Psychology The Ohio State University

What People Know about the Role of Construal Level in Self-Control. Kentaro Fujita Department of Psychology The Ohio State University What People Know about the Role of Construal Level in Self-Control Kentaro Fujita Department of Psychology The Ohio State University What is Self-Control? Historically defined behaviorally Self-control

More information

McGraw-Hill/Irwin Copyright 2013 by The McGraw-Hill Companies, Inc. All rights reserved.

McGraw-Hill/Irwin Copyright 2013 by The McGraw-Hill Companies, Inc. All rights reserved. Workplace Emotions, Attitudes, and Stress McGraw-Hill/Irwin Copyright 2013 by The McGraw-Hill Companies, Inc. All rights reserved. Emotions and Stress at JetBlue Former JetBlue employee Steven Slater (shown

More information

Difficult Conversations

Difficult Conversations Difficult Conversations Corban Sanchez Academic Advisor NACADA Conference 2011 Douglas Stone, Bruce Patton, and Sheila Heen of the Harvard Negotiation Project Moving Toward a Learning Conversation Normal

More information

Thinkers on Education -Carl Ransom Rogers ( )

Thinkers on Education -Carl Ransom Rogers ( ) Thinkers on Education -Carl Ransom Rogers (1902-1987) Best known for his contribution to client-centered therapy and his role in the development of counseling, Rogers also had much to say about education

More information

TERRORIST WATCHER: AN INTERACTIVE WEB- BASED VISUAL ANALYTICAL TOOL OF TERRORIST S PERSONAL CHARACTERISTICS

TERRORIST WATCHER: AN INTERACTIVE WEB- BASED VISUAL ANALYTICAL TOOL OF TERRORIST S PERSONAL CHARACTERISTICS TERRORIST WATCHER: AN INTERACTIVE WEB- BASED VISUAL ANALYTICAL TOOL OF TERRORIST S PERSONAL CHARACTERISTICS Samah Mansoour School of Computing and Information Systems, Grand Valley State University, Michigan,

More information

Science Directorate. November 6, 2000

Science Directorate. November 6, 2000 November 6, 2000 Science Directorate Regulatory Analysis and Development Program Planning and Development Animal and Plant Health Inspection Service (APHIS) U. S. Department of Agriculture (USDA) Suite

More information

Best Practice: Anger Management. Buck Black. Indiana University

Best Practice: Anger Management. Buck Black. Indiana University Anger Management 1 Running head: Anger Management Best Practice: Anger Management Buck Black Indiana University Anger Management 2 Best Practice: Anger Management Anger is a normal and healthy emotion

More information

Mini symposium on pain and suffering

Mini symposium on pain and suffering Mini symposium on pain and suffering in the honor of Prof. Dr. Geert Crombez (UGent) Francqui Chair* 2010 2011 Leuven, May 13 th 2011 10:00 10:30 Welcome and short introduction 10:30 11:00 Presentation

More information

Slacking and the Internet in the Classroom: A Preliminary Investigation

Slacking and the Internet in the Classroom: A Preliminary Investigation Association for Information Systems AIS Electronic Library (AISeL) SIGHCI 2006 Proceedings Special Interest Group on Human-Computer Interaction 2006 Slacking and the Internet in the Classroom: A Preliminary

More information

WHY DO WE NEED TO ENGAGE WITH OUR COMMUNITIES?

WHY DO WE NEED TO ENGAGE WITH OUR COMMUNITIES? WHY DO WE NEED TO ENGAGE WITH OUR COMMUNITIES? Our communities have a central role to play in influencing and shaping what happens in Barnsley. In our corporate plan we recognise that our role as a local

More information

Effects Of Information Seeking Modes On Users Online Social Engineering Vulnerabilities

Effects Of Information Seeking Modes On Users Online Social Engineering Vulnerabilities Association for Information Systems AIS Electronic Library (AISeL) PACIS 2012 Proceedings Pacific Asia Conference on Information Systems (PACIS) 7-15-2012 Effects Of Information Seeking Modes On Users

More information

Mapping A Pathway For Embedding A Strengths-Based Approach In Public Health. By Resiliency Initiatives and Ontario Public Health

Mapping A Pathway For Embedding A Strengths-Based Approach In Public Health. By Resiliency Initiatives and Ontario Public Health + Mapping A Pathway For Embedding A Strengths-Based Approach In Public Health By Resiliency Initiatives and Ontario Public Health + Presentation Outline Introduction The Need for a Paradigm Shift Literature

More information

Insider Threat WRITEN BY: BRIAN DAVID JOHNSON CREATIVE DIRECTION: SANDY WINKELMAN ART: PACO DIAZ LUQUE COLORING: MONICA KUBINA

Insider Threat WRITEN BY: BRIAN DAVID JOHNSON CREATIVE DIRECTION: SANDY WINKELMAN ART: PACO DIAZ LUQUE COLORING: MONICA KUBINA Army Cyber Institute at West Point PRESENTS: Insider Threat WRITEN BY: BRIAN DAVID JOHNSON CREATIVE DIRECTION: SANDY WINKELMAN ART: PACO DIAZ LUQUE COLORING: MONICA KUBINA BUILDING A BETTER, STRONGER AND

More information

Our common experience: The big idea that can help end homelessness. Summary Report

Our common experience: The big idea that can help end homelessness. Summary Report Our common experience: The big idea that can help end homelessness Summary Report May 2018 2 Executive summary Our common experience: the big idea that can help end homelessness To end homelessness for

More information

Introduction to Social Psychology p. 1 Introduction p. 2 What Is Social Psychology? p. 3 A Formal Definition p. 3 Core Concerns of Social Psychology

Introduction to Social Psychology p. 1 Introduction p. 2 What Is Social Psychology? p. 3 A Formal Definition p. 3 Core Concerns of Social Psychology Preface p. xv Introduction to Social Psychology p. 1 Introduction p. 2 What Is Social Psychology? p. 3 A Formal Definition p. 3 Core Concerns of Social Psychology p. 3 Sociology, Psychology, or Both? p.

More information

7 KEYS TO COACHING SUCCESS

7 KEYS TO COACHING SUCCESS 7 KEYS TO COACHING SUCCESS 2005 L. Michael Hall, Ph.D. Are there any Secrets for Coaching Success? What are the prerequisites of knowledge and skill that secures a coach s success? What are the 7 keys

More information

CALL FOR PAPERS: EMBEDDING THE CONCEPT OF SUSPICION IN RESEARCH ON BUSINESS AND APPLIED PSYCHOLOGY. Guest Co-Editors

CALL FOR PAPERS: EMBEDDING THE CONCEPT OF SUSPICION IN RESEARCH ON BUSINESS AND APPLIED PSYCHOLOGY. Guest Co-Editors CALL FOR PAPERS: EMBEDDING THE CONCEPT OF SUSPICION IN RESEARCH ON BUSINESS AND APPLIED PSYCHOLOGY Guest Co-Editors Philip Bobko Gettysburg College pbobko@gettysburg.edu Alex J. Barelka Illinois State

More information

Motivational Affordances: Fundamental Reasons for ICT Design and Use

Motivational Affordances: Fundamental Reasons for ICT Design and Use ACM, forthcoming. This is the author s version of the work. It is posted here by permission of ACM for your personal use. Not for redistribution. The definitive version will be published soon. Citation:

More information

Lesson 12. Understanding and Managing Individual Behavior

Lesson 12. Understanding and Managing Individual Behavior Lesson 12 Understanding and Managing Individual Behavior Learning Objectives 1. Identify the focus and goals of individual behavior within organizations. 2. Explain the role that attitudes play in job

More information