Cox et al., 2020 - Google Patents
Stuck on a phishing lure: differential use of base rates in self and social judgments of susceptibility to cyber riskCox et al., 2020
View PDF- Document ID
- 6093733659987710140
- Author
- Cox E
- Zhu Q
- Balcetis E
- Publication year
- Publication venue
- Comprehensive Results in Social Psychology
External Links
Snippet
How do people assess the likelihood of personal risk in online activity? In three pilot experiments and one preregistered experiment, we tested the motivational and cognitive mechanisms that shape self and social judgments of cyber security. In Pilot Studies 1–3, we …
- 230000000694 effects 0 abstract description 67
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/554—Detecting local intrusion or implementing counter-measures involving event detection and direct action
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/552—Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/316—User authentication by observing the pattern of computer usage, e.g. typical user behaviour
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
- G06F21/6263—Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/82—Protecting input, output or interconnection devices
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/57—Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
- G06F21/577—Assessing vulnerabilities and evaluating computer system security
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Jaeger et al. | Eyes wide open: The role of situational information security awareness for security‐related behaviour | |
Zwilling et al. | Cyber security awareness, knowledge and behavior: A comparative study | |
Fukuda‐Parr et al. | Emerging consensus on ‘ethical AI’: Human rights critique of stakeholder guidelines | |
Vishwanath et al. | Suspicion, cognition, and automaticity model of phishing susceptibility | |
Tu et al. | Learning to cope with information security risks regarding mobile device loss or theft: An empirical examination | |
Boss et al. | What do systems users have to fear? Using fear appeals to engender threats and fear that motivate protective security behaviors | |
Gavett et al. | Phishing suspiciousness in older and younger adults: The role of executive functioning | |
Tsai et al. | Understanding online safety behaviors: A protection motivation theory perspective | |
McAlaney et al. | Understanding phishing email processing and perceived trustworthiness through eye tracking | |
Moore et al. | Resilience to bullying: Towards an alternative to the anti-bullying approach | |
Austin et al. | The relationships of information efficacy and media literacy skills to knowledge and self-efficacy for health-related decision making | |
Fisher et al. | Beyond googling: the ethics of using patients' electronic footprints in psychiatric practice | |
Xiong et al. | Is domain highlighting actually helpful in identifying phishing web pages? | |
Zhuo et al. | SoK: Human-centered phishing susceptibility | |
Cox et al. | Stuck on a phishing lure: differential use of base rates in self and social judgments of susceptibility to cyber risk | |
Arslan | Understanding wellbeing and death obsession of young adults in the context of Coronavirus experiences: Mitigating the effect of mindful awareness | |
Russell et al. | Self-reported secure and insecure cyber behaviour: factor structure and associations with personality factors | |
Metzger et al. | Comparative optimism in online credibility evaluation among parents and children | |
Heller | Risk, hope and recovery: Converging paradigms for mental health approaches with suicidal clients | |
Glazebrook et al. | Do coping strategies mediate the relationship between parental attachment and self-harm in young people? | |
Vale et al. | Cyber‐harassment victimization of Portuguese adolescents: A lifestyle‐routine activities theory approach | |
Edmonds et al. | Absolute and comparative risk assessments: evidence for the utility of incorporating internal comparisons into models of risk perception | |
Li et al. | The impact of behavioral topic on psychological reactance: Arousal and freedom restoration | |
Kyytsönen et al. | The self-assessed information security skills of the Finnish population: A regression analysis | |
Walsh et al. | Perceptions of police-juvenile contact predicts self-reported offending in adolescent males |