Search results for "vaiheteoriat"
showing 3 items of 3 documents
Using stage theorizing to make anti-phishing recommendations more effective
2018
Purpose This paper aims to review the behavioral phishing literature to understand why anti-phishing recommendations are not very effective and to propose ways of making the recommendations more effective. The paper also examines how the concept of stages from health communication and psychology can be used to make recommendations against phishing more effective. Design/methodology/approach This literature review study focused on the behavioral phishing literature that has relied on human subjects. Studies were excluded for reasons that included lacking practical recommendations and human subjects. Findings The study finds that phishing research does not consider where victims are residing…
Explaining two forms of Internet crime from two perspectives : toward stage theories for phishing and Internet scamming
2017
The two studies in this dissertation examine two pervasive and common forms of Internet crimes from two different perspectives: (1) phishing from the victims’ perspective and (2) Internet scamming from the offenders’ perspective. For the former, previous phishing research is based on models that assume that fixed or static factors explain or predict people’s reasons for complying with phishing emails. These models assume that the reasons for complying with phishing emails are the same across individuals and across time. However, we argue that, whereas the act of clicking on a phishing email is the same across time for phishing victims, the reasons for complying are not the same. We address …
Toward a stage theory of adaptive social media use : explaining change in facebook use
2018
Existing research on information technology (IT) use has shown that post- adoptive technology use is not a stable but a dynamic phenomenon in which users apply various adaptation behaviors. Users reshape the technology (IT adaptation), adjust their work routines (task adaptation), and change their own behavior (user adaptation) according to the changes induced by IT. Today, people use increasingly social media and other IT for personal purposes. Facebook (FB) is a good example of personal IT that people voluntarily use for years and has become an integral part of people’s everyday lives. Despite extensive research on IT use and IT/user adaptation, we know little about the dynamics of post-a…