DEFENDING AGAINST SPEAR PHISHING: MOTIVATING USERS THROUGH FEAR APPEAL MANIPULATIONS
|
|
- Giles Parsons
- 6 years ago
- Views:
Transcription
1 Association for Information Systems AIS Electronic Library (AISeL) PACIS 2016 Proceedings Pacific Asia Conference on Information Systems (PACIS) Summer DEFENDING AGAINST SPEAR PHISHING: MOTIVATING USERS THROUGH FEAR APPEAL MANIPULATIONS Sebastian Walter Schuetz City University of Hong Kong, Paul Benjamin Lowry City University of Hong Kong, Jason Bennett Thatcher Clemson University, Follow this and additional works at: Recommended Citation Schuetz, Sebastian Walter; Lowry, Paul Benjamin; and Thatcher, Jason Bennett, "DEFENDING AGAINST SPEAR PHISHING: MOTIVATING USERS THROUGH FEAR APPEAL MANIPULATIONS" (2016). PACIS 2016 Proceedings This material is brought to you by the Pacific Asia Conference on Information Systems (PACIS) at AIS Electronic Library (AISeL). It has been accepted for inclusion in PACIS 2016 Proceedings by an authorized administrator of AIS Electronic Library (AISeL). For more information, please contact
2 DEFENDING AGAINST SPEAR PHISHING: MOTIVATING USERS THROUGH FEAR APPEAL MANIPULATIONS Sebastian Walter Schuetz, Department of Information Systems, City University of Hong Kong, Hong Kong, Paul Benjamin Lowry, Department of Information Systems, City University of Hong Kong, Hong Kong, Jason Bennett Thatcher, Social Analytics Institute, Department of Management, Clemson University, Clemson, South Carolina, USA, Abstract Phishing is a pervasive form of online fraud that causes billions in losses annually. Spear phishing is a highly targeted and successful type of phishing that uses socially engineered s to defraud most of its recipients. Unfortunately, anti-phishing training campaigns struggle with effectively fighting this threat partially because users see security as a secondary priority, and partially because users are rarely motivated to undergo lengthy training. An effective training approach thus needs to be non-disruptive and brief as to avoid being onerous, and yet, needs to inspire dramatic behavioral change. This is a tremendous, unsolved challenge that we believe can be solved through a novel application of theory: Using fear appeals and protection-motivation theory (PMT), we outline how brief training can educate users and evoke protection motivation. We further invoke construal-level theory (CLT) to explain how fear appeals can stimulate threat perceptions more quickly and more powerfully. This research-in-progress study further proposes a field experiment to verify the effectiveness of our proposed training approach in an ecologically valid environment. Overall, we (1) improve training based on PMT and CLT, (2) expand PMT for guiding fear appeal design; and (3) demonstrate a full application of CLT. Keywords: Security, Spear phishing, Training, Fear Appeals, Protection Motivation Theory, Construal Level Theory
3 1 INTRODUCTION Phishing is a serious threat that caused more than US$5.9 billion in damages in 2013 (RSA 2014); and that number promises to rise: The recent Cyber Threat Report of cyber intelligence provider CYREN reports a steep 51% increase alone in the first three months of Indeed, the amount of phishing attacks has been rapidly growing, exceeding 7.5 trillion attacks in 2014, which is double the number from 2012 (McAfee Labs 2014). In every quarter of 2014, more than 197,252 new, unique attacks were executed (APWG 2014), and this number rises continuously. Across these rapidly growing and numerous attacks, one technique spear phishing stands out. Spear phishing is a highly targeted, context-specific attack that is directed at specific groups of individuals or organizations and aims to appear genuine to their members and employees (Wang et al. 2012). Compared to phishing, spear phishing is more sophisticated (Hong 2012), and inherently more dangerous by magnitudes (Jagatic et al. 2007); more effective (its return rates are up to 40 times greater than those of ordinary phishing); and increasingly more frequent (FireEye 2012). Some particularly popular spearphishing attacks impersonate banks, which often lead to worrisome rates of success (APWG 2014). This persistent increase in the number of successful attacks suggests spear-phishing is far from being under control. Existing approaches aim to prevent victimization with the use of enhanced automated detection mechanisms and behavioral training (Hong 2012). However, automated solutions struggle to reliably detect customized and fast-moving spear-phishing attacks rendering users vulnerable when they solely rely upon automated solutions (Abbasi et al. 2012). Moreover, even when these tools correctly raise the alarm, users often disregard such warning messages and continue with their imprudent behavior, leaving themselves vulnerable to spear-phishing attacks (Abbasi et al. 2015). In light of the deficiencies of automated solutions and users deviant behavior in using them, we turn to educational approaches to further learn how to increase organizational defenses against spear-phishing victimization. Although evidence suggests that anti-phishing training generally improves detection rates (Kumaraguru et al. 2010), the results do not evoke confidence in such training s efficacy. Particularly for spear phishing, more than 70 percent of participants consistently fell victim to these highly tailored and targeted attacks sometimes even despite previous training (see Dodge et al. 2007; Ferguson 2005; Jagatic et al. 2007). Unfortunately, the existing approaches to behavioral training which often focus solely on educating users about phishing are deficient. Some researchers argue that one of the key challenges in delivering security education is motivating users to engage in protective behavior (Kumaraguru et al. 2010; Puhakainen and Siponen 2010). If so, then effective anti-phishing training needs not only to inform users, but also needs to arouse a sense of fear that will elicit protection motivations, resulting in meaningful behavioral change (i.e., not fall victim to the phishing attack). Consequently, the current conundrum in research and practice is how anti-phishing training be conducted effectively without being onerous and disruptive of end-users time. This enigma forms the guiding research question of our research. To identify the attributes of effective anti-phishing training that hold potential to inform users and elicit protective motivations, we turn to protection-motivation theory (PMT). PMT explains the effect of fear appeals by identifying the cognitive processes that engender protective intentions. Fear appeals are persuasive messages designed to scare people by describing the terrible things that will happen to them if they do not do what the message recommends (Witte 1992, p. 329). Because fear appeals are brief, fearinducing communications, they hold potential to overcome the tedious nature of traditional training approaches to effectively raise protection motivation and subsequent behaviors. Recent IS research has adapted PMT from its traditional healthcare context and has argued it is well-suited for privacy (Milne et al. 2009) and security contexts (Boss et al. 2015). Likewise, IS research on security education, training and awareness (SETA) programs has recently explored the tenets of PMT to foster protective intentions (Posey et al. 2015). Whereas PMT has been widely applied across various areas, a theoretical account guiding the
4 design of fear appeals for effective, brief training of end users is still missing. To address this gap, we further draw from construal-level theory (CLT) to understand the mental representations that underlie the threat and coping response appraisal processes. These mental representations (i.e., construals) form the interpretive basis on which PMT s cognitive processes engender protection motivation. Our purpose in invoking CLT is thus to explore whether and how the manipulation of these construals can aid evoking protection motivation, and thereby inform the design of anti-phishing training materials. Within the realm of phishing and PMT, our study offers three contributions. First, we address the necessity for brief and effective anti-phishing training by building upon PMT to understand how to deliver fear appeals that both inform and motivate. Second, we extend PMT by examining the design of fear appeals, using CLT as our theoretical lens to explain how the design of a fear appeal guides the mental representation that informs protective intention. This allows us to offer a unique theoretical account for how to design effective fear appeals that can be used in spear-phishing training. Third, we demonstrate a full utilization of CLT in an applied area, whereas applications of CLT are still rare outside of psychology, and whereas existing publications in IS examine only parts of CLT. These contributions are unique not only to the field of IS but also to all other disciplines that leverage fear appeals, PMT, and CLT. 2 LITERATURE REVIEW 2.1 Phishing and Spear Phishing Phishing is a method of social engineering that aims to induce recipients to expose personal information, such as contact details, user/network credentials, or credit card details. Typically, phishing targets a mass audience (Wright and Marett 2010) and succeeds in deceiving only a small percentage of the audience (Wright et al. 2014). For phishing to be effective, successful messages must be both believable and persuasive (Hong 2012). Believability is often achieved by mimicking communications from reputable persons or organizations (Wright and Marett 2010). A variety of techniques exist to boost persuasiveness (cf. Wright et al. 2014). However, spear phishing is dramatically more successful than traditional phishing, as it targets a specific group of recipients and leverages information that is specific to that group so as to increase its believability (Hong 2012). Spear-phishing attacks often appear to be genuine (Wang et al. 2012). Hence, detecting spear phishing requires that users pay close attention not only to obvious visual cues, but especially to the plausibility of the message. For example, Jagatic et al. (2007) mined social media to impersonate real friends of targets, and achieved a deception success rate over 70 percent. Similarly, Dodge et al. (2007) phished students exploiting their sensitivity to grade-related matters, and succeeded with eight out of ten students. Although the effort of tailoring phishing attacks to a specific audience makes this type of attack more costly, such attacks are far more successful and dangerous (FireEye 2012). Users often underestimate the ease of spoofing s, and thus overrate the security and privacy of mail communications (Jagatic et al. 2007). 2.2 Defense against Phishing Approaches to counter phishing attacks can be categorized into two broad classes: technical and educational. Technical approaches, such as anti-phishing tools, attempt to automatically identify fraudulent messages and either discard them immediately or warn the users of their potentially harmful nature. Research on technical solutions has led to improvements in detection accuracy (e.g., Abbasi et al. 2015), which have been found to be along with speed and cost of error crucial factors driving user s reliance on such tools (Zahedi et al. 2015). However, technical approaches suffer from severe weaknesses. First, the fast-moving nature of phishing attacks stall detection rates at about 90 percent accuracy (Hong 2012); however, this is a woefully inadequate rate given the sheer volume of phishing attacks. Furthermore, automated warnings are
5 often overlooked or purposely ignored (Egelman et al. 2008; Wu et al. 2006). Consequently, technical means are incapable of offering sufficient protection against phishing attacks (Abbasi et al. 2012). In particular, spear phishing has proven apt at defeating existing security mechanisms (FireEye 2012). Thus, educational anti-phishing approaches are necessary to complement their technical counterparts, especially training that enables users to draw the appropriate conclusions from automated warnings (Lai et al. 2012). Educational approaches can significantly reduce the likelihood of falling for phishing attacks (Kumaraguru et al. 2010). Training enhances user s self-efficacy, security knowledge, and suspicion all factors that have been found significant in reducing deception success (Wright and Marett 2010). However, making antiphishing training salient among users has proven to be a difficult task (e.g., Ferguson 2005 who successfully phished 90 percent users who received a four hour trainign session on the very same day), because many users regard security as a secondary activity that is bothering at best and interfering at worst (Puhakainen and Siponen 2010). As a training technique, researchers have used feigned phishing attacks to probe users as a means to increase user s motivation to protect themselves (Kumaraguru et al. 2010). However, feigned phishing attacks also often cause negative pushbacks among users, evident in their expression of anger and denial (Jagatic et al. 2007), and are thus despite being effective in arousing awareness ethically controversial (Jakobsson et al. 2008). Ideally, an educational approach could overcome motivational issues without evoking negative emotions in users. The motivation to actively engage in protective behaviors becomes especially salient for spear phishing, as this type of attack is well disguised and hard to detect based solely upon visual cues. Ferguson (2005) underlines the important role of motivation by reporting a startling 90 percent success rate when phishing freshmen shortly after preparing them with a four-hour long training session. Although the freshmen reported to be suspicious, the subject matter of the phishing attack (in this study: a problem with your last grade ) easily overruled the arguably insufficient motivation to be cautious and engage in protective action. These results confirm the essential role of motivation as a salient trigger to an effortful protective process that aims to distinguish phishing messages from innocuous messages. 2.3 Protection-Motivation Theory PMT is a theoretical model that explains and predicts the processes that elicit protection motivation in recipients of fear appeal communications. PMT s core assumption is that fear appeals sequentially trigger cognitive appraisal processes, which jointly inform protection intentions. A successful fear appeal thereby raises protection motivation, which captures one s intent to engage in protective behaviors in an effort to avoid the depicted dangers (Floyd et al. 2000). According to Rogers (1975), fear appeals must contain three essential stimulus variables: (a) the magnitude of noxiousness of a depicted event; (b) the conditional probability that the event will occur provided that no adaptive behavior is performed [ ] and (c) the availability and effectiveness of a coping response that might reduce or eliminate the noxious stimulus (p. 97). A fear appeals thus stimulates protection motivation by firstly communicating a threat, and then subsequently outlining an adequate coping response. The initial threat appraisal process balances perceived threat severity, referring to one s belief that a threat is serious and potentially serve (Rohm and Milne 2004), and perceived threat susceptibility, as one s expectation of being susceptible to that particular threat (Rohm and Milne 2004), against the maladaptive rewards one gains from not engaging in protective action that would alleviate that threat (Floyd et al. 2000). When faced with a comprehensible and personally relevant threat, recipients further experience fear (Leventhal 1970). Fear has been conceptualized as a core mediator of protection motivation (Boss et al. 2015). In contrast, the succeeding coping appraisal process evaluates the recommended coping strategy by comparing response efficacy, which refers to one s belief in the efficacy of the protective action (Floyd et al. 2000), in conjunction with self-efficacy, relating to one s perceived ability to actually perform the protective action (Floyd et al. 2000; Maddux and Rogers 1983), versus the response cost, which refers to
6 all costs that arise from carrying out the protective response (Floyd et al. 2000). Accordingly, PMT proposes that if the noxiousness of the threat outweighs the associated maladaptive rewards and if the recommended coping response is perceived to be an executable, efficient and affordable resort only then will a recipient be motivated to engage in the recommended protective response (Boss et al. 2015; Floyd et al. 2000; Maddux and Rogers 1983). For the design of effective fear appeals, PMT requires threat and coping appraisal perceptions (Milne et al. 2000). Furthermore, Boss et al. (2015) show that threats must be personally relevant in order to engender fear and engender protective motivation. Beyond this basic guidance on how to design effective fear appeal manipulations, it is surprising how few studies have investigated the actual effects of specific manipulations. Instead of focusing on which information needs to be conveyed to effectively stimulate appraisal processes, existing studies have restrained to confirm that comics and pictures are superior to textual fear appeals (Dijkstra and Bos 2015; Kumaraguru et al. 2010); pleasure-evoking colors (blue) are more effective than less pleasure-evoking colors (yellow) (Wauters et al. 2008); or that positive consequences are more persuasive than negative consequences (Anderson and Agarwal 2010), which already deviates from the core purpose of a fear appeal; Thus, across the literature, general account or explanation of how to conduct effective fear-appeal design is missing. However, designing effective fear-appeals is elementary to the study of fear appraisal, and hence presents a unique opportunity to inform and contribute to PMT literature. 2.4 Construal-Level Theory Construal-level theory holds potential to explain how fear appeals are represented mentally, and can thus inform our understanding of how fear-appeal design shapes cognitive appraisal. CLT proposes that people, to generate predictions about the future, form abstract mental construals of distal objects (Trope & Liberman, 2010, p. 440, emphasize added). The construal thereby serves a goal, and manifests itself as either a concrete or abstract mental representation, the latter thereby being more schematic, prototypical and hence simpler and less ambiguous (Fiske and Taylor 1991; Smith 1998). CLT coins concrete construals as being on the low-level end of the abstraction continuum, whereas abstract construals are on the high-level end of the continuum. The notion of CLT is strictly hierarchical: whereas abstract construals represent the conceptual idea of an object, concrete construals represent a more specific instantiation. Concrete and abstract construals are thus concrete and abstract mental representations of the same object, respectively, and are connected through hierarchical meaning: the high-level (abstract) construal determines the meaning of the low-level (concrete) construal more than the low-level construal the meaning of the high-level construal (Trope and Liberman 2010). As illustration, an abstract spear-phishing construal would be perceived to be dangerous, whereas the same concrete construal would describe the dangers more specifically, such as steals your credit card information. When the high-level attribute dangerous changes to safe, the hierarchically connected low-level attribute steals credit card information vanishes, because it is inconsistent with the superordinate attribute of being safe. The superordinate attribute is hence more central to the meaning of the construal Psychological distance Because construals serve as the basis of judgement and prediction, CLT proposes that construals mediate the consequences of psychological distance, which refers to the perception of something being either close or far away from the self (Trope and Liberman 2010). According to CLT, psychological distance is directly associated to construal level (Bar-Anan et al. 2006), and therefore describes the perceived distance between the present self and the construal. Feelings of distance can be evoked by moving the construal along a temporal (now vs. in the far future), spatial (here vs. far away), social (me vs. others) or hypothetical (realistic vs. hypothetical) dimension. Accordingly, one perceives a construal to be psychologically
7 proximate if it is construed to be present in the here and now, involving oneself, realistically. By contrast, a construal is perceived to be distant if it is located in the future, somewhere else, and involves others, and takes place hypothetically Purpose and Features CLT proposes that with increasing psychological distance, the gestalt of the construal changes. According to Liberman and Förster (2009) and Steidle et al. (2011), there is a bilateral association between psychological distance and construal level, such that a greater psychological distance is accompanied by a higher construal level (i.e., thinking that is more abstract), whereas a more proximate distance is accompanied by a lower construal level (i.e., thinking that is more concrete) (Bar-Anan et al. 2006). Trope and Liberman (2010) propose that this is due to a shift in purpose: Because proximate (i.e., imminent) threats demand an immediate response, an understanding of how am I threatened is needed. To answer such demand, concrete construals are formed that entail viable details of the specific threat, and thus serve the purpose of explaining its feasibility how it exactly works. By contrast, distant threats do not require such immediate response, but demand a judgement of whether I will be threatened. As a result, abstract construals are formed that focus on the general desirability of the threat (in abstract terms, not one particular instance), and thus serve the purpose to evaluate its desirability does it need to be avoided? Following the purpose, CLT proposes that abstract construals exhibit central features that relate to desirability and omit peripheral features that relate to feasibility (Trope and Liberman 2010). For example, if the purpose is to understand how to detect a spear-phishing attack, a low-level construal might feature specific attributes of the message, such as whether it will carry a personal greeting, impersonate a specific institution, or requests credit card details, as such information is crucial for detecting the attack. However, when moving to a higher construal, for which the purpose is to understand the consequences of falling victim to a spear-phishing attack, these features become irrelevant. Instead, features relating to the concept of spear phishing are salient characteristics of such an abstract construal. The application of CLT in research is still rather limited. In IS, two studies published in premier outlets apply CLT to recommendation systems (cf. Köhler et al. 2011) and systems adoption (cf. Ho et al. 2014). Despite the pioneering role of these CLT-based studies, these studies did not yet have the opportunity to fully leverage the full notion of CLT, nor explore construal features and psychological distance manipulations to stimulate construal formation. However, CLT yields a unique opportunity to understand the interpretative basis of cognitive processes, and we explore its notion to guide the design of more persuasive fear appeals by modelling the attributes of low- and high-level construals. 3 RESEARCH MODEL Based on CLT s understanding of how concrete and abstract construals emphasize different purposes and features, and ultimately form the basis for prediction and judgement, we combine CLT and PMT s appraisal processes to form our research model (Figure 1). Particularly, we argue that threat and coping appraisal
8 process each draws upon a construal to enable its cognitive judgement. Thus, we model that a spear-phishing threat construal and an anti-phishing coping response construal informs each respective appraisal process. Threat appraisal process Perceived threat severity Sanctioning rhetoric Fear Appeal Spear-phishing threat Concrete Abstract Anti-phishing response Concrete Abstract H1c H1a H1b Perceived threat vulnerability Maladaptive rewards H2c H2a Fear Coping appraisal process Response efficacy Phishing protection motivation Protective behavior H2b Self-efficacy Now; Here; Self; Realistic ` Low-level features Focus on feasibility In the future; Far away; Others; Hypothetical High-level features Focus on desirability Response costs Figure 1. Research model 3.1 Psychological Distance and Self-Perceptions The first difference between concrete and abstract construals is their relative position to the self (psychological distance). Thus, PMT constructs that evaluate self-perceptions are likely stimulated by traversing construal s relative position to the self (psychological distance). Such constructs are threat vulnerability, maladaptive rewards, self-efficacy, and response cost. The remaining constructs of PMT s appraisal processes are independent of the self and relate to the construal s gestalt; and thus remain unaffected by changes in psychological distance. Intuitively, the construal of a spear-phishing attack that takes place proximately provokes a more immediate perception of risk than does an attack that takes place distally. Similarly, maladaptive rewards that are construed to be attainable proximately receive higher appraisal than rewards that are attainable distally. Indeed, research on risk taking suggests this temporal connection between reward appraisal (Smithson 2008). As a farther psychological distance is associated with a higher-level construal, we argue: H1a: A high-level spear-phishing threat construal leads to lower threat vulnerability perceptions. H1b: A high-level spear-phishing threat construal leads to lower maladaptive rewards perceptions. Similarly, when evaluating one s efficacy in executing the coping response, psychological distance dictates the perception of whether the coping response is in need to be executed proximately, that is soon, realistically, by oneself; or distally, that is in the far future, by someone else, hypothetically. Accordingly, a more abstract coping response is likely to elicit lower levels of self-efficacy. Furthermore, because concrete construals convey more specific procedural details of what needs to be done, this argument is further supported by Arachchilage and Love (2014) who find that users require procedural (concrete) and
9 conceptual (abstract) knowledge to build up self-efficacy perceptions, while in contrast, conceptual knowledge alone is insufficient. Thus, we argue: H2a: A high-level response construal leads to lower self-efficacy perceptions. Finally, likewise to maladaptive rewards, response costs are similarly discounted if they are distal. Hence, costs that are construed to incur proximately receive higher appraisal than costs that are construed to occur distally. H2b: A high-level response threat construal leads to lower response cost perceptions. 3.2 Features of Threat and Coping Response Differences in psychological distance command differences in construal level: Abstract construals carry high-level features that relate to desirability, whereas concrete construals exhibit low-level features that relate to feasibility. These differences affect two PMT variables that are concerned with evaluating the nature of threat and coping response: For the first, threat severity, CLT argues that a concrete construal of a spear-phishing attack with low-level features (e.g., sender address, firm logo, link to website) enables an understanding of what constitutes an attack; whereas an abstract construal with high-level features (e.g., deceptive, dangerous) enables an understanding of the impact of an attack which we predict to evoke higher threat perceptions. Indeed, previous research has shown that the abstract handling of information systems (i.e., the way managers do in contrast to technical staff) increases security risk perceptions (Goodhue and Straub 1991). Thus, we propose that an abstract spear-phishing attack construal s focus on the (un)desirability of victimization increases the threat severity perceptions. H1c: A high-level spear-phishing threat construal leads to higher threat severity perceptions. Similarly, when evaluating the efficacy of the coping response, the question becomes whether it works. Addressing this question requires conceptual knowledge knowledge about the outcome of the coping response, rather than knowledge about its workings (McCormick 1997). Again, because abstract construals emphasize features that relate to desirability, we predict that such construals increase response efficacy perceptions rather than concrete construals that focus on feasibility; on how it works. H2c: A high-level response construal leads to higher response efficacy perceptions. 4 RESEARCH PLAN We plan to conduct a field experiment in which we will train a large body of individuals about the ins and outs of spear phishing through fear appeal messages; and then will probe the effectiveness of the trainings through a feigned spear-phishing attack targeting the participants, for which we follow the guidelines for ethical fraud experiments outlined by Jakobsson et al. (2008). Because we objectively observe subject s behavior (i.e., whether they fall for the feigned spear-phishing attack) within the context of their day-to-day lives, we ecologically validate the applicability of our theory, and avoid the problematic discrepancy between self-reported intentions and behaviors which is often found in security contexts (Workman 2008). Our research design aims at treating subjects with concrete or abstract construals of the two core fear appeal elements: threat and response. For the other PMT-related measures, we mainly rely upon validated instruments of Boss et al. (2015). We expect to conduct the experiment later this year. References Abbasi, A., Zahedi, F., and Chen, Y. (2012). Impact of anti-phishing tool performance on attack success
10 rates. In International Conference on Intelligence and Securiy Informatics (ISI 2012), Abbasi, A., Zahedi, F. Mariam, Zeng, D., Chen, Y., Chen, H., and Nunamaker, J.F. (2015). Enhancing predictive analytics for anti-phishing by exploiting website genre information. Journal of Management Information Systems, 31 (4), Anderson, C.L., and Agarwal, R. (2010). Practicing safe computing: A multimethod empirical examination of home computer user security behavioral intentions. MIS Quarterly, 34 (3), 613 A15. APWG. (2014). Phishing activity trends report 1 Quarter. Phishing Acritvity Trends Report,. Arachchilage, N.A.G., and Love, S. (2014). Security awareness of computer users: A phishing threat avoidance perspective. Computers in Human Behavior, 38, Elsevier Ltd, Bar-Anan, Y., Liberman, N., and Trope, Y. (2006). The association between psychological distance and construal level: Evidence from an implicit association test. Journal of Experimental Psychology, 135 (4), Boss, S.R., Galletta, D.F., Lowry, P.B., Moody, G.D., and Polak, P. (2015). What do systems users have to fear? Using fear appeals to engender threats and fear that motivate protective security behaviors. MIS Quarterly, 39 (4), Dijkstra, A., and Bos, C. (2015). The effects of repeated exposure to graphic fear appeals on cigarette packages: A field experiment. Psychology of Addictive Behaviors, 29 (1), Dodge, R.C., Carver, C., and Ferguson, A.J. (2007). Phishing for user security awareness. Computers and Security, 26 (1), Egelman, S., Cranor, L.F., and Hong, J. (2008). You ve been warned: An empirical study of the effectiveness of web browser phishing warnings. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, ACM, Ferguson, B.A.J. (2005). Fostering security awareness: The west point carronade. EDUCASE Quarterly, 1, FireEye. (2012). Spear phishing attacks Why they are successful and how to stop. Fiske, S.T., and Taylor, S.E. (1991). Social cognition. McGraw-Hill Series in Social Psychology, (2, revised.), McGraw-Hill. Floyd, D.L., Prentice-Dunn, S., and Rogers, R.W. (2000). A meta-analysis of research on protection motivation theory. Journal of Applied Social Psychology, 30 (2), Goodhue, D.L., and Straub, D.W. (1991). Security concerns of system users. Information & Management, 20, Ho, C.K.Y., Ke, W., and Liu, H. (2014). Choice decision of e-learning system: Implications from construal level theory. Information Management, 52 (2), Elsevier B.V., Hong, J. (2012). The Current State of Phishing Attacks. Communications of the ACM, 55 (1), Jagatic, T.N., Johnson, N. a., Jakobsson, M., and Menczer, F. (2007). Social phishing. Communications of the ACM, 50 (10), Jakobsson, M., Finn, P., and Johnson, N. (2008). Why and how to perform fraud experiments. IEEE Security and Privacy, 6 (2), Johnston, A.C., and Warkentin, M. (2015). An enhanced fear appeal rethorical framework: Leveraging threats to the human asset trough sanctioning rethoric. MIS Quarterly, 39 (1), Köhler, C.F., Breugelmans, E., and Dellaert, B.G.C. (2011). Consumer acceptance of recommendations by interactive decision aids: The joint role of temporal distance and concrete versus abstract communications. Journal of Management Information Systems, 27 (4), Kumaraguru, P., Sheng, S., Acquisti, A., Cranor, L.F., and Hong, J. (2010). Teaching Johnny not to fall for phishing. ACM Transactions on Internet Technology, 10 (2), Lai, F., Li, D., and Hsieh, C.T. (2012). Fighting identity theft: The coping perspective. Decision Support Systems, 52 (2), Leventhal, H. (1970). Findings and theory in the study of fear communications. Advances in Experimental
11 Social Psychology, 5, Liberman, N., and Förster, J. (2009). Distancing from experienced self: how global-versus-local perception affects estimation of psychological distance. Journal of Personality and Social Psychology, 97 (2), Maddux, J.E., and Rogers, R.W. (1983). Protection motivation and self-efficacy: A revised theory of fear appeals and attitude change. Journal of Experimental Social Psychology, 19 (5), McAfee Labs. (2014). McAfee Labs Threats Report. McAfee Lab,. McCormick, R. (1997). Conceptual and procedural knowledge. International Journal of Technology and Design Education, 7 (1-2), Milne, G.R., Labrecque, L.I., and Cromer, C. (2009). Toward an understanding of the online consumer s risky behavior and protection practices. Journal of Consumer Affairs, 43 (3), Milne, S., Sheeran, P., and Orbell, S. (2000). Prediction and intervention in health-related behavior: A metaanalytic review of protection motivation theory. Journal of Applied Social Psychology, 30 (1), Posey, C., Roberts, T.L., and Lowry, P.B. (2015). The impact of organizational commitment on insiders motivation to protect organizational information assets. Journal of Management Information Systems, 32 (4), Puhakainen, P., and Siponen, M. (2010). Improving employees compliance through information systems security training: An action research study. MIS Quarterly, 34 (4), Rogers, R.W. (1975). A protection motivation theory of fear appeals and attitude change. The Journal of Psychology, 91 (1), Rohm, A.J., and Milne, G.R. (2004). Just what the doctor ordered. The role of information sensitivity and trust in reducing medical information privacy concern. Journal of Business Research, 57 (9), RSA. (2014) A year in review. RSA Online Fraud Report,. Smith, E.R. (1998). Mental representation and memory. In Handbook of social psychology, (Vol. 1), Smithson, M. (2008). Psychology s ambivalent view of uncertainty. In Uncertainty and Risk: Multidisciplinary Perspectives, Steidle, A., Werth, L., and Hanke, E.V. (2011). You can t see much in the dark darkness affects construal level and psychological distance. Social Psychology, 42 (3), Trope, Y., and Liberman, N. (2010). Construal-level theory of psychological distance. Psychological Review, 117 (2), Wang, J., Herath, T., Chen, R., Vishwanath, A., and Rao, H.R. (2012). Phishing susceptibility: An investigation into the processing of a targeted spear phishing . IEEE Transactions on Professional Communication, 55 (4), Wauters, B., Brengman, M., and Mahama, F. (2008). The impact of pleasure-evoking colors on the effectiveness of threat (fear) appeals. Psychology & Marketing, 31 (12), Workman, M. (2008). Wisecrackers: A theory-grounded investigation of phishing and pretext social engineering threats to information security. Journal of the American Society for Information Science and Technology, 59 (4), Wright, R.T., Jensen, M.L., Thatcher, J.B., Dinger, M., and Marett, K. (2014). Research note - Influence techniques in phishing attacks: An examination of vulnerability and resistance. Information Systems Research, 25 (2), Wright, R.T., and Marett, K. (2010). The influence of experiential and dispositional factors in phishing: An empirical investigation of the deceived. Journal of Management Information Systems, Wu, M., Miller, R.C., and Garfinkel, S.L. (2006). Do security toolbars actually prevent phishing attacks? In CHI 2006 Proceedings, Montréal, Québec, Canada, Zahedi, F.M., Abbasi, A., and Chen, Y. (2015). Fake-website detection tools: Identifying elements that
12 promote individuals use and enhance their performance. Journal of the Association for Information Systems, 16 (6),
Who Subscribe to Identity Theft Protection Service
DECISION SCIENCES INSTITUTE? An Exploration of Antecedent Factors Yuan Li University of Illinois at Springfield Email: yli295@uis.edu Jingguo Wang University of Texas at Arlington Email: jwang@uta.edu
More informationPersuading End Users to Act Cautiously Online: Initial Findings of a Fear Appeals Study on Phishing
Persuading End Users to Act Cautiously Online: Initial Findings of a Fear Appeals Study on Phishing Abstract J. Jansen 1,2 and P. van Schaik 3 1 Faculty of Humanities and Law, Open University of the Netherlands
More informationFactors Influencing the Use of Privacy Settings in Location-Based Social Networks
Factors Influencing the Use of Privacy Settings in Location-Based Social Networks H. Oladimeji and J. Ophoff Dept. of Information Systems, University of Cape Town, Cape Town, South Africa e-mail: OLDHEN003@myuct.ac.za;
More informationWhy We Don t Block 3rd Party Trackers: An Attributional Theory Perspective
Association for Information Systems AIS Electronic Library (AISeL) WISP 2015 Proceedings Pre-ICIS Workshop on Information Security and Privacy (SIGSEC) Winter 12-13-2015 Why We Don t Block 3rd Party Trackers:
More informationPutting the Motivation in Protection Motivation Theory: An Examination of Persuasive Communication via Extrinsic and Intrinsic Means
Putting the Motivation in Protection Motivation Theory Abstract Putting the Motivation in Protection Motivation Theory: An Examination of Persuasive Communication via Extrinsic and Intrinsic Means Research-in-Progress
More informationWhat Do Systems Users Have to Fear? Using Fear Appeals to Engender Threats and Fear that Motivate Protective Security Behaviors
What Do Systems Users Have to Fear? Using Fear Appeals to Engender Threats and Fear that Motivate Protective Security Behaviors By Scott R. Boss Bentley University Dennis F. Galletta University of Pittsburgh
More informationHow Self-Efficacy and Gender Issues Affect Software Adoption and Use
How Self-Efficacy and Gender Issues Affect Software Adoption and Use Kathleen Hartzel Today s computer software packages have potential to change how business is conducted, but only if organizations recognize
More informationChapter 3-Attitude Change - Objectives. Chapter 3 Outline -Attitude Change
Chapter 3-Attitude Change - Objectives 1) An understanding of how both internal mental processes and external influences lead to attitude change 2) An understanding of when and how behavior which is inconsistent
More informationA Model of Unethical Usage of Information Technology
Association for Information Systems AIS Electronic Library (AISeL) AMCIS 2005 Proceedings Americas Conference on Information Systems (AMCIS) 2005 A Model of Unethical Usage of Information Technology Sutirtha
More informationMoral Beliefs and Organizational Information Security Policy Compliance: The Role of Gender
Association for Information Systems AIS Electronic Library (AISeL) MWAIS 2016 Proceedings Midwest (MWAIS) Spring 5-19-2016 Moral Beliefs and Organizational Information Security Policy Compliance: The Role
More informationJansen, J. (Jurjen); van Schaik, P. (Paul)
TeesRep - Teesside's Research Repository Persuading end users to act cautiously online: A fear appeals study on phishing Item type Authors Citation Eprint Version DOI Publisher Journal Rights Article Jansen,
More informationResistance to Change 7/17/2010. Paper exercise. Essence of Resistance. Grief Cycle death of the past. Phases of Change Acceptance
Paper exercise Resistance to Change Ross A. Wirth, Ph.D. Change Leadership Symposium June 8, 2010 Jot down change initiatives where you observed resistance Symptoms of the resistance Reasons behind the
More informationFramework for Comparative Research on Relational Information Displays
Framework for Comparative Research on Relational Information Displays Sung Park and Richard Catrambone 2 School of Psychology & Graphics, Visualization, and Usability Center (GVU) Georgia Institute of
More informationAbstract. 1 Introduction. Highly-preliminary Working paper. Cristian Bravo-Lillo Carnegie Mellon University. Stuart Schechter Microsoft Research
Using Ethical-Response Surveys to Identify Sources of Disapproval and Concern with Facebook s Emotional Contagion Experiment and Other Controversial Studies Highly-preliminary Working paper (expect frequent
More informationEMOTIONAL INTELLIGENCE QUESTIONNAIRE
EMOTIONAL INTELLIGENCE QUESTIONNAIRE Personal Report JOHN SMITH 2017 MySkillsProfile. All rights reserved. Introduction The EIQ16 measures aspects of your emotional intelligence by asking you questions
More informationINTERPERSONAL RELATIONSHIPS (IR)
Discussion Questions The concept of IR INTERPERSONAL RELATIONSHIPS (IR) 1. Define interpersonal relationship. 2. List types of interpersonal relationship. 3. What are the advantages and disadvantages of
More informationExploring the Impact of Instant Messaging (IM) on User Performance and Perceived Workload
Association for Information Systems AIS Electronic Library (AISeL) MWAIS 2008 Proceedings Midwest (MWAIS) 5-1-2008 Exploring the Impact of Instant Messaging (IM) on User Performance and Perceived Workload
More informationTransactions on Human-Computer Interaction THCI
AIS Transactions on Human-Computer Interaction Transactions on Human-Computer Interaction THCI Original Research Social Networking Websites and Posting Personal Information: An Evaluation of Protection
More informationAlternative Explanations for Changes in Similarity Judgments and MDS Structure
Cornell University School of Hotel Administration The Scholarly Commons Articles and Chapters School of Hotel Administration Collection 8-1990 Alternative Explanations for Changes in Similarity Judgments
More informationAN INVESTIGATION OF DECISION- MAKING AND THE TRADEOFFS INVOLVING COMPUTER SECURITY RISK
Association for Information Systems AIS Electronic Library (AISeL) AMCIS 2009 Proceedings Americas Conference on Information Systems (AMCIS) 2009 AN INVESTIGATION OF DECISION- MAKING AND THE TRADEOFFS
More informationAsking and answering research questions. What s it about?
2 Asking and answering research questions What s it about? (Social Psychology pp. 24 54) Social psychologists strive to reach general conclusions by developing scientific theories about why people behave
More informationRadon: A Behavioural as well as a Technical & Health Challenge.
Radon: A Behavioural as well as a Technical & Health Challenge. Prof. David Hevey, Director of the Research Centre for Psychological Health, School of Psychology, Trinity College Dublin Consequences of
More informationReview of public information programmes to enhance home radon screening uptake and home remediation
Review of public information programmes to enhance home radon screening uptake and home remediation Prof. David Hevey, Director of the Research Centre for Psychological Health, School of Psychology, Trinity
More informationPersonal Talent Skills Inventory
Personal Talent Skills Inventory Sales Version Inside Sales Sample Co. 5-30-2013 Introduction Research suggests that the most effective people are those who understand themselves, both their strengths
More informationLearning Objectives. Learning Objectives 17/03/2016. Chapter 4 Perspectives on Consumer Behavior
Chapter 4 Perspectives on Consumer Behavior Copyright 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of McGraw-Hill Education. Learning
More informationIssues in Information Systems Volume 17, Issue II, pp , 2016
CONSUMER ADOPTION AND USE OF MOBILE APPLICATIONS: DO PRIVACY AND SECURITY CONCERNS MATTER? Gary Garrison, Belmont University, gary.garrison@belmont.edu Sang Hyun Kim, Kyungpook National University, ksh@knu.ac.kr
More informationSpotting Liars and Deception Detection skills - people reading skills in the risk context. Alan Hudson
Spotting Liars and Deception Detection skills - people reading skills in the risk context Alan Hudson < AH Business Psychology 2016> This presentation has been prepared for the Actuaries Institute 2016
More informationSELF-EFFICACY AND THE MODERATE (OR LESS) DRINKER: A SURVIVOR S GUIDE FOR COPING WITH HEAVY DRINKING ON (OR NEAR) COLLEGE CAMPUSES
SELF-EFFICACY AND THE MODERATE (OR LESS) DRINKER: A SURVIVOR S GUIDE FOR COPING WITH HEAVY DRINKING ON (OR NEAR) COLLEGE CAMPUSES Ronald B. Anderson, Stan Richards School of Advertising & Public Relations,
More informationVIRGINIA LAW REVIEW IN BRIEF
VIRGINIA LAW REVIEW IN BRIEF VOLUME 96 JUNE 15, 2010 PAGES 35 39 REPLY GOOD INTENTIONS MATTER Katharine T. Bartlett * W HILE writing the article to which Professors Mitchell and Bielby have published responses,
More informationTHE "SPIRAL MODEL" vs. THE "DETERRENCE MODEL'"
1 THE "SPIRAL MODEL" vs. THE "DETERRENCE MODEL'" 1 When are threats of punishment ("sticks") the best way to gain other states' compliance, and when do positive inducements (promise of rewards, appeasement,
More informationRole of Health Education and Communication Part 3
Role of Health Education and Communication Part 3 Content Part 1 1. Introduction 2. Health 3. Health Education introduction 4. Health Promotion 5. Perception Part 2 6. Health Behaviour 7. Learning 8. Attribution
More informationI. Logical Argument (argument) appeals to reason and intellect.
Page 1 of 5 Argument strategies for manipulating others to agree with your opinion, premise or idea; i.e. to convince others. Argumentative writing has a different motivation from expository writing, in
More informationSearching for Angels: Identifying Effective Characteristics of Successful Crowdfunding Campaigns
Association for Information Systems AIS Electronic Library (AISeL) PACIS 2017 Proceedings Pacific Asia Conference on Information Systems (PACIS) Summer 2017 Searching for Angels: Identifying Effective
More informationSense-making Approach in Determining Health Situation, Information Seeking and Usage
DOI: 10.7763/IPEDR. 2013. V62. 16 Sense-making Approach in Determining Health Situation, Information Seeking and Usage Ismail Sualman 1 and Rosni Jaafar 1 Faculty of Communication and Media Studies, Universiti
More informationTHE HEALTH BELIEF MODEL. Health Behavior CHAPTER 6
THE HEALTH BELIEF MODEL 1 DESCRIPTION This chapter will discuss The Health Belief Model, Protection Motivation Theory and how to use the model in the behavior case analysis 2 OBJECTIVES General The student
More informationDiscussion. Re C (An Adult) 1994
Autonomy is an important ethical and legal principle. Respect for autonomy is especially important in a hospital setting. A patient is in an inherently vulnerable position; he or she is part of a big and
More informationRisk Interpretation and Action
Risk Interpretation and Action J. Richard Eiser 1, Ann Bostrom 2, Ian Burton 3, David Johnston 4, John McClure 5, Douglas Paton 6, Joop van der Pligt 7, Mathew White 8. 1 University of Sheffield, UK; 2
More informationA Bayesian Network Model of Knowledge-Based Authentication
Association for Information Systems AIS Electronic Library (AISeL) AMCIS 2007 Proceedings Americas Conference on Information Systems (AMCIS) December 2007 A Bayesian Network Model of Knowledge-Based Authentication
More informationRevision notes 7.5. Section 7.5 Health promotion
Revision notes 7.5 Section 7.5 Health promotion Learning outcomes Examine models and theories of health promotion. Discuss the effectiveness of health promotion strategies. For behaviour to change in any
More informationTrust in E-Commerce Vendors: A Two-Stage Model
Association for Information Systems AIS Electronic Library (AISeL) ICIS 2000 Proceedings International Conference on Information Systems (ICIS) December 2000 Trust in E-Commerce Vendors: A Two-Stage Model
More informationConceptual Replication ISSN Malware Avoidance Motivations and Behaviors: A Technology Threat Avoidance Replication.
Transactions on R eplication R esearch Conceptual Replication ISSN 2473-3458 Malware Avoidance Motivations and Behaviors: A Technology Threat Avoidance Replication Diana Young Finance and Decision Sciences
More informationBASIC VOLUME. Elements of Drug Dependence Treatment
BASIC VOLUME Elements of Drug Dependence Treatment Module 2 Motivating clients for treatment and addressing resistance Basic counselling skills for drug dependence treatment Special considerations when
More informationIs entrepreneur s photo a crucial element in a crowdfunding webpage?
Second International Conference on Economic and Business Management (FEBM 2017) Is entrepreneur s photo a crucial element in a crowdfunding webpage? Xin Wang, Huaxin Wang *, Yu Zhao Department of Business
More informationTTI Personal Talent Skills Inventory Coaching Report
TTI Personal Talent Skills Inventory Coaching Report "He who knows others is learned. He who knows himself is wise." Lao Tse Mason Roberts District Manager YMCA 8-1-2008 Copyright 2003-2008. Performance
More informationHuman Aspects of Information Security: An Empirical Study of Intentional versus Actual Behavior
64 Human Aspects of Information Security: An Empirical Study of Intentional versus Actual Behavior A. Komatsu 1, D. Takagi 2 and T. Takemura 1,3 1 Security Economics Laboratory, Information-Technology
More informationBehavioral EQ MULTI-RATER PROFILE. Prepared for: By: Session: 22 Jul Madeline Bertrand. Sample Organization
Behavioral EQ MULTI-RATER PROFILE Prepared for: Madeline Bertrand By: Sample Organization Session: Improving Interpersonal Effectiveness 22 Jul 2014 Behavioral EQ, Putting Emotional Intelligence to Work,
More informationPsychological Experience of Attitudinal Ambivalence as a Function of Manipulated Source of Conflict and Individual Difference in Self-Construal
Seoul Journal of Business Volume 11, Number 1 (June 2005) Psychological Experience of Attitudinal Ambivalence as a Function of Manipulated Source of Conflict and Individual Difference in Self-Construal
More informationDevelopment. summary. Sam Sample. Emotional Intelligence Profile. Wednesday 5 April 2017 General Working Population (sample size 1634) Sam Sample
Development summary Wednesday 5 April 2017 General Working Population (sample size 1634) Emotional Intelligence Profile 1 Contents 04 About this report 05 Introduction to Emotional Intelligence 06 Your
More informationThe Effect of Background Color and Level of Threat on Evoked Fear and Smoking Cessation Intentions
Pal. Jour. V.6, I., No. 27, 86-92 Copyright 27 by Palma Journal, All Rights Reserved Available online at: http://palmajournal.org/ The Effect of Background Color and Level of Threat on Evoked Fear and
More informationTHEORIES OF PERSONALITY II Psychodynamic Assessment 1/1/2014 SESSION 6 PSYCHODYNAMIC ASSESSMENT
THEORIES OF PERSONALITY II Psychodynamic Assessment 1/1/2014 SESSION 6 PSYCHODYNAMIC ASSESSMENT THEORIES OF PERSONALITY II SESSION 6: Psychodynamic Assessment Psychodynamic Assessment Assessing the specific
More informationUnderstanding Social Norms, Enjoyment, and the Moderating Effect of Gender on E-Commerce Adoption
Association for Information Systems AIS Electronic Library (AISeL) SAIS 2010 Proceedings Southern (SAIS) 3-1-2010 Understanding Social Norms, Enjoyment, and the Moderating Effect of Gender on E-Commerce
More informationWhy Human-Centered Design Matters
Reading Review: Article Why Human-Centered Design Matters -Dave Thomsen, Wanderful Media HUMAN CENTERED DESIGN a human-centered approach fuels the creation of products that resonate more deeply with an
More informationEvolution of Trust in Distributed Software Development Teams: A Punctuated Equilibrium Model
Association for Information Systems AIS Electronic Library (AISeL) AMCIS 2006 Proceedings Americas Conference on Information Systems (AMCIS) 12-31-2006 Evolution of Trust in Distributed Software Development
More informationBehavior Change Theories
Behavior Change Theories Abdul-Monaf Al-Jadiry, MD, FRCPsych Professor of Psychiatry Behavioral change theories These theories explain the reasons behind alterations in individuals' behavioral patterns.
More informationTTI Personal Talent Skills Inventory Emotional Intelligence Version
TTI Personal Talent Skills Inventory Emotional Intelligence Version "He who knows others is learned. He who knows himself is wise." Lao Tse Henry Stein 7-31-2008 Copyright 2004-2008. Target Training International,
More informationTHE ROLE OF COLOR IN INFLUENCING TRUST THE ROLE OF COLOR IN INFLUENCING TRUST IN E-COMMERCE WEB SITES
Association for Information Systems AIS Electronic Library (AISeL) MWAIS 2007 Proceedings Midwest (MWAIS) December 2007 THE ROLE OF COLOR IN INFLUENCING TRUST THE ROLE OF COLOR IN INFLUENCING TRUST IN
More informationChanging People s Behavior. Larry Wissow Professor Health, Behavior and Society Johns Hopkins School of Public Health
This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike License. Your use of this material constitutes acceptance of that license and the conditions of use of materials on this
More informationUser characteristics that influence judgment of social engineering attacks in social networks
https://doi.org/10.1186/s13673-018-0128-7 RESEARCH Open Access User characteristics that influence judgment of social engineering attacks in social networks Samar Muslah Albladi * and George R. S. Weir
More informationBEHAVIOR CHANGE THEORY
BEHAVIOR CHANGE THEORY An introduction to a behavior change theory framework by the LIVE INCITE team This document is not a formal part of the LIVE INCITE Request for Tender and PCP. It may thus be used
More informationPhysicians' Acceptance of Web-Based Medical Assessment Systems: Findings from a National Survey
Association for Information Systems AIS Electronic Library (AISeL) AMCIS 2003 Proceedings Americas Conference on Information Systems (AMCIS) 12-31-2003 Physicians' Acceptance of Web-Based Medical Assessment
More informationAssignment 4: True or Quasi-Experiment
Assignment 4: True or Quasi-Experiment Objectives: After completing this assignment, you will be able to Evaluate when you must use an experiment to answer a research question Develop statistical hypotheses
More informationPsychological Approaches to Counseling. Mr. Lema, Isaac Clinical Psychologist (MSc.) 25 th November 2015
Psychological Approaches to Counseling Mr. Lema, Isaac Clinical Psychologist (MSc.) 25 th November 2015 Learning Objectives Explore different psychological approaches to counseling Adopt psychological
More information!!!!!!! !!!!!!!!!!!!
Running head: VISUAL ADVERTISING ON SELF-REFERENCING AND EMPATHY 1 Effects of Visual Advertising on Self-Referencing and Empathy Towards Health Conditions Christine Cao and Jennifer Ball University of
More informationNEUROIS: CHALLENGES AND SOLUTIONS
Association for Information Systems AIS Electronic Library (AISeL) ICIS 2010 Proceedings International Conference on Information Systems (ICIS) 2010 NEUROIS: CHALLENGES AND SOLUTIONS Angelika Dimoka Temple
More informationPYSC 333 Psychology of Personality
PYSC 333 Psychology of Personality Session 5 Humanistic Theory of Personality- Part 1 Lecturer:, Dept. of Psychology Contact Information: mamankwah-poku@ug.edu.gh College of Education School of Continuing
More informationFaces of Wellness. Kent State University Bateman Gold Team. Latisha Ellison Daniel Henderson Taylor Pierce Lauryn Rosinski Rachel Stevenson
Faces of Wellness Kent State University Bateman Gold Team Latisha Ellison Daniel Henderson Taylor Pierce Lauryn Rosinski Rachel Stevenson Timothy Roberts, Faculty Advisor Lyndsey Fortunato, Professional
More informationHow to stop Someone who is ADDICTED ENABLING
stop ENABLING Table of Contents 2 Are You an Enabler? What if the steps you were taking to help a friend or family member through a problem or crisis were actually the very things hurting them most? And,
More informationChanging manager behaviour
Changing manager behaviour August 2010. Occasional Paper Vol. 3 No. 7 Derek Mowbray Why is behaviour so important? The role of the manager is to get the job done. Normally, this involves asking someone
More informationA systematic review to critically assess the positive and negative consequences of fear appeal in anti-smoking campaigns.
A systematic review to critically assess the positive and negative consequences of fear appeal in anti-smoking campaigns Cihan Kayikci OUTLINE FEAR APPEAL THEORY: 1953 to the PRESENT OBJECTIVES PURPOSE
More informationReference Range Number Line Format Preferred by African American Adults for Display of Asthma Control Status
Reference Range Number Line Format Preferred by African American Adults for Display of Asthma Control Status Adriana Arcia, PhD, RN, Assistant Professor of Nursing at CUIMC Maureen George, PhD, RN, AE-C,
More informationLeadership Personal Power & Influence. WHY, Would anyone want to follow You?
Leadership Personal Power & Influence WHY, Would anyone want to follow You? Power, Influence, and Politics: Defined Power: Having or wielding force, authority, or influence; achieving or bringing about
More informationCreating a Positive Professional Image
Creating a Positive Professional Image Q&A with: Laura Morgan Roberts Published: June 20, 2005 Author: Mallory Stark As HBS professor Laura Morgan Roberts sees it, if you aren't managing your own professional
More informationEmotions and Moods. Robbins & Judge Organizational Behavior 13th Edition. Bob Stretch Southwestern College
Robbins & Judge Organizational Behavior 13th Edition Emotions and Moods Bob Stretch Southwestern College 2009 Prentice-Hall Inc. All rights reserved. 8-0 Chapter Learning Objectives After studying this
More informationWhat is analytical sociology? And is it the future of sociology?
What is analytical sociology? And is it the future of sociology? Twan Huijsmans Sociology Abstract During the last few decades a new approach in sociology has been developed, analytical sociology (AS).
More information10 Norms and behavior. What s it about?
10 Norms and behavior What s it about? (Social Psychology pp. 351 395) Norms are effective guides for social behavior. Norms must be activated before they can guide behavior. When individuals are in a
More informationEffective Intentions: The Power of Conscious Will
Book Review Effective Intentions: The Power of Conscious Will Alfred R. Mele Oxford University Press, Oxford, 2009 Marco Fenici* fenici@unisi.it Mele s book is a concise analysis of much research in neurophysiology
More informationWHAT IS SELF? MODULE-IV OBJECTIVES 16.1 CONCEPT OF SELF. What is Self? Self and Personality. Notes
What is Self? MODULE-IV 16 WHAT IS SELF? Self is focus of our everyday behaviour and all of us do have a set of perceptions and beliefs about ourselves. This kind of self concept plays important role in
More information"Preparedness and Personal Awareness" - Albert Timen
For The Everyday Civilian The reality of Terrorism and Terror threats around us is not new, neither a surprising actuality, yet still the wave of events ranging from "Lone wolf" Active Shooter to a combined
More informationVisualizing Success: Investigating the Relationship between Ability and Self-Efficacy in the Domain of Visual Processing
Visualizing Success: Investigating the Relationship between Ability and Self-Efficacy in the Domain of Visual Processing Jason Power, Jeffrey Buckley and Niall Seery Department of Design and Manufacturing
More informationSummary. Summary: Identification of risk factors and protective factors, and vulnerability and risk factors are important to
Summary Summary: 20.3. Identification of risk factors and protective factors, and vulnerability and risk factors are important to select target populations to select target variables to induce change (How)
More informationThreat Assessment in Schools (2002). Washington, D.C.: U.S. Secret Service & U.S. Dept. of Education.
Six Principles of the Threat Assessment Process Threat assessment is a central component in preventing targeted school violence. The threat assessment process involves identifying, assessing, and managing
More informationWhat People Know about the Role of Construal Level in Self-Control. Kentaro Fujita Department of Psychology The Ohio State University
What People Know about the Role of Construal Level in Self-Control Kentaro Fujita Department of Psychology The Ohio State University What is Self-Control? Historically defined behaviorally Self-control
More informationMcGraw-Hill/Irwin Copyright 2013 by The McGraw-Hill Companies, Inc. All rights reserved.
Workplace Emotions, Attitudes, and Stress McGraw-Hill/Irwin Copyright 2013 by The McGraw-Hill Companies, Inc. All rights reserved. Emotions and Stress at JetBlue Former JetBlue employee Steven Slater (shown
More informationDifficult Conversations
Difficult Conversations Corban Sanchez Academic Advisor NACADA Conference 2011 Douglas Stone, Bruce Patton, and Sheila Heen of the Harvard Negotiation Project Moving Toward a Learning Conversation Normal
More informationThinkers on Education -Carl Ransom Rogers ( )
Thinkers on Education -Carl Ransom Rogers (1902-1987) Best known for his contribution to client-centered therapy and his role in the development of counseling, Rogers also had much to say about education
More informationTERRORIST WATCHER: AN INTERACTIVE WEB- BASED VISUAL ANALYTICAL TOOL OF TERRORIST S PERSONAL CHARACTERISTICS
TERRORIST WATCHER: AN INTERACTIVE WEB- BASED VISUAL ANALYTICAL TOOL OF TERRORIST S PERSONAL CHARACTERISTICS Samah Mansoour School of Computing and Information Systems, Grand Valley State University, Michigan,
More informationScience Directorate. November 6, 2000
November 6, 2000 Science Directorate Regulatory Analysis and Development Program Planning and Development Animal and Plant Health Inspection Service (APHIS) U. S. Department of Agriculture (USDA) Suite
More informationBest Practice: Anger Management. Buck Black. Indiana University
Anger Management 1 Running head: Anger Management Best Practice: Anger Management Buck Black Indiana University Anger Management 2 Best Practice: Anger Management Anger is a normal and healthy emotion
More informationMini symposium on pain and suffering
Mini symposium on pain and suffering in the honor of Prof. Dr. Geert Crombez (UGent) Francqui Chair* 2010 2011 Leuven, May 13 th 2011 10:00 10:30 Welcome and short introduction 10:30 11:00 Presentation
More informationSlacking and the Internet in the Classroom: A Preliminary Investigation
Association for Information Systems AIS Electronic Library (AISeL) SIGHCI 2006 Proceedings Special Interest Group on Human-Computer Interaction 2006 Slacking and the Internet in the Classroom: A Preliminary
More informationWHY DO WE NEED TO ENGAGE WITH OUR COMMUNITIES?
WHY DO WE NEED TO ENGAGE WITH OUR COMMUNITIES? Our communities have a central role to play in influencing and shaping what happens in Barnsley. In our corporate plan we recognise that our role as a local
More informationEffects Of Information Seeking Modes On Users Online Social Engineering Vulnerabilities
Association for Information Systems AIS Electronic Library (AISeL) PACIS 2012 Proceedings Pacific Asia Conference on Information Systems (PACIS) 7-15-2012 Effects Of Information Seeking Modes On Users
More informationMapping A Pathway For Embedding A Strengths-Based Approach In Public Health. By Resiliency Initiatives and Ontario Public Health
+ Mapping A Pathway For Embedding A Strengths-Based Approach In Public Health By Resiliency Initiatives and Ontario Public Health + Presentation Outline Introduction The Need for a Paradigm Shift Literature
More informationInsider Threat WRITEN BY: BRIAN DAVID JOHNSON CREATIVE DIRECTION: SANDY WINKELMAN ART: PACO DIAZ LUQUE COLORING: MONICA KUBINA
Army Cyber Institute at West Point PRESENTS: Insider Threat WRITEN BY: BRIAN DAVID JOHNSON CREATIVE DIRECTION: SANDY WINKELMAN ART: PACO DIAZ LUQUE COLORING: MONICA KUBINA BUILDING A BETTER, STRONGER AND
More informationOur common experience: The big idea that can help end homelessness. Summary Report
Our common experience: The big idea that can help end homelessness Summary Report May 2018 2 Executive summary Our common experience: the big idea that can help end homelessness To end homelessness for
More informationIntroduction to Social Psychology p. 1 Introduction p. 2 What Is Social Psychology? p. 3 A Formal Definition p. 3 Core Concerns of Social Psychology
Preface p. xv Introduction to Social Psychology p. 1 Introduction p. 2 What Is Social Psychology? p. 3 A Formal Definition p. 3 Core Concerns of Social Psychology p. 3 Sociology, Psychology, or Both? p.
More information7 KEYS TO COACHING SUCCESS
7 KEYS TO COACHING SUCCESS 2005 L. Michael Hall, Ph.D. Are there any Secrets for Coaching Success? What are the prerequisites of knowledge and skill that secures a coach s success? What are the 7 keys
More informationCALL FOR PAPERS: EMBEDDING THE CONCEPT OF SUSPICION IN RESEARCH ON BUSINESS AND APPLIED PSYCHOLOGY. Guest Co-Editors
CALL FOR PAPERS: EMBEDDING THE CONCEPT OF SUSPICION IN RESEARCH ON BUSINESS AND APPLIED PSYCHOLOGY Guest Co-Editors Philip Bobko Gettysburg College pbobko@gettysburg.edu Alex J. Barelka Illinois State
More informationMotivational Affordances: Fundamental Reasons for ICT Design and Use
ACM, forthcoming. This is the author s version of the work. It is posted here by permission of ACM for your personal use. Not for redistribution. The definitive version will be published soon. Citation:
More informationLesson 12. Understanding and Managing Individual Behavior
Lesson 12 Understanding and Managing Individual Behavior Learning Objectives 1. Identify the focus and goals of individual behavior within organizations. 2. Explain the role that attitudes play in job
More information