Search results for "vaiheteoriat"

showing 3 items of 3 documents

Using stage theorizing to make anti-phishing recommendations more effective

2018

Purpose This paper aims to review the behavioral phishing literature to understand why anti-phishing recommendations are not very effective and to propose ways of making the recommendations more effective. The paper also examines how the concept of stages from health communication and psychology can be used to make recommendations against phishing more effective. Design/methodology/approach This literature review study focused on the behavioral phishing literature that has relied on human subjects. Studies were excluded for reasons that included lacking practical recommendations and human subjects. Findings The study finds that phishing research does not consider where victims are residing…

Information Systems and ManagementInterviewComputer Networks and CommunicationsComputer sciencemedia_common.quotation_subjectInternet privacystage theories02 engineering and technologyvaiheteoriatuhritManagement Information SystemsOriginality020204 information systemsManagement of Technology and Innovation0502 economics and business0202 electrical engineering electronic engineering information engineeringEmpirical evidenceverkkourkintaHealth communicationmedia_commonbusiness.industry05 social sciencesPhishingStage theoryHealth psychologykohdeviestintäCategorizationbusiness050203 business & managementSoftwareInformation Systems
researchProduct

Explaining two forms of Internet crime from two perspectives : toward stage theories for phishing and Internet scamming

2017

The two studies in this dissertation examine two pervasive and common forms of Internet crimes from two different perspectives: (1) phishing from the victims’ perspective and (2) Internet scamming from the offenders’ perspective. For the former, previous phishing research is based on models that assume that fixed or static factors explain or predict people’s reasons for complying with phishing emails. These models assume that the reasons for complying with phishing emails are the same across individuals and across time. However, we argue that, whereas the act of clicking on a phishing email is the same across time for phishing victims, the reasons for complying are not the same. We address …

scammingtietoverkkorikoksetsituational crime theorieskriminologiahuijaritphishingvaiheteoriatuhritdispositional crime theorieshuijausstage theorizingInternet crimesinterpretive researchverkkourkintarikolliset
researchProduct

Toward a stage theory of adaptive social media use : explaining change in facebook use

2018

Existing research on information technology (IT) use has shown that post- adoptive technology use is not a stable but a dynamic phenomenon in which users apply various adaptation behaviors. Users reshape the technology (IT adaptation), adjust their work routines (task adaptation), and change their own behavior (user adaptation) according to the changes induced by IT. Today, people use increasingly social media and other IT for personal purposes. Facebook (FB) is a good example of personal IT that people voluntarily use for years and has become an integral part of people’s everyday lives. Despite extensive research on IT use and IT/user adaptation, we know little about the dynamics of post-a…

self-regulationuser adapatationIT useFacebookkäyttäjätstage theorytottumuksetuser adaptationsosiaalinen mediavaiheteoriatelinkaarimuutositsesäätelykäyttöpost-adoptionkäyttäjätutkimus
researchProduct