[go: up one dir, main page]

Cox et al., 2020 - Google Patents

Stuck on a phishing lure: differential use of base rates in self and social judgments of susceptibility to cyber risk

Cox et al., 2020

View PDF
Document ID
6093733659987710140
Author
Cox E
Zhu Q
Balcetis E
Publication year
Publication venue
Comprehensive Results in Social Psychology

External Links

Snippet

How do people assess the likelihood of personal risk in online activity? In three pilot experiments and one preregistered experiment, we tested the motivational and cognitive mechanisms that shape self and social judgments of cyber security. In Pilot Studies 1–3, we …
Continue reading at par.nsf.gov (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/554Detecting local intrusion or implementing counter-measures involving event detection and direct action
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/552Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/316User authentication by observing the pattern of computer usage, e.g. typical user behaviour
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • G06F21/6263Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/82Protecting input, output or interconnection devices
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
    • G06F21/577Assessing vulnerabilities and evaluating computer system security

Similar Documents

Publication Publication Date Title
Jaeger et al. Eyes wide open: The role of situational information security awareness for security‐related behaviour
Zwilling et al. Cyber security awareness, knowledge and behavior: A comparative study
Fukuda‐Parr et al. Emerging consensus on ‘ethical AI’: Human rights critique of stakeholder guidelines
Vishwanath et al. Suspicion, cognition, and automaticity model of phishing susceptibility
Tu et al. Learning to cope with information security risks regarding mobile device loss or theft: An empirical examination
Boss et al. What do systems users have to fear? Using fear appeals to engender threats and fear that motivate protective security behaviors
Gavett et al. Phishing suspiciousness in older and younger adults: The role of executive functioning
Tsai et al. Understanding online safety behaviors: A protection motivation theory perspective
McAlaney et al. Understanding phishing email processing and perceived trustworthiness through eye tracking
Moore et al. Resilience to bullying: Towards an alternative to the anti-bullying approach
Austin et al. The relationships of information efficacy and media literacy skills to knowledge and self-efficacy for health-related decision making
Fisher et al. Beyond googling: the ethics of using patients' electronic footprints in psychiatric practice
Xiong et al. Is domain highlighting actually helpful in identifying phishing web pages?
Zhuo et al. SoK: Human-centered phishing susceptibility
Cox et al. Stuck on a phishing lure: differential use of base rates in self and social judgments of susceptibility to cyber risk
Arslan Understanding wellbeing and death obsession of young adults in the context of Coronavirus experiences: Mitigating the effect of mindful awareness
Russell et al. Self-reported secure and insecure cyber behaviour: factor structure and associations with personality factors
Metzger et al. Comparative optimism in online credibility evaluation among parents and children
Heller Risk, hope and recovery: Converging paradigms for mental health approaches with suicidal clients
Glazebrook et al. Do coping strategies mediate the relationship between parental attachment and self-harm in young people?
Vale et al. Cyber‐harassment victimization of Portuguese adolescents: A lifestyle‐routine activities theory approach
Edmonds et al. Absolute and comparative risk assessments: evidence for the utility of incorporating internal comparisons into models of risk perception
Li et al. The impact of behavioral topic on psychological reactance: Arousal and freedom restoration
Kyytsönen et al. The self-assessed information security skills of the Finnish population: A regression analysis
Walsh et al. Perceptions of police-juvenile contact predicts self-reported offending in adolescent males