Informing, simulating experience, or both: A field experiment on phishing risks
Author
Abstract
Suggested Citation
DOI: 10.1371/journal.pone.0224216
Download full text from publisher
References listed on IDEAS
- B. B. Gupta & Nalin A. G. Arachchilage & Kostas E. Psannis, 2018. "Defending against phishing attacks: taxonomy of methods, current issues and future directions," Telecommunication Systems: Modelling, Analysis, Design and Management, Springer, vol. 67(2), pages 247-267, February.
- Cai, Jing & Song, Changcheng, 2017. "Do disaster experience and knowledge affect insurance take-up decisions?," Journal of Development Economics, Elsevier, vol. 124(C), pages 83-94.
- Sam Ransbotham & Sabyasachi Mitra, 2009. "Choice and Chance: A Conceptual Model of Paths to Information Security Compromise," Information Systems Research, INFORMS, vol. 20(1), pages 121-139, March.
Citations
Citations are extracted by the CitEc Project, subscribe to its RSS feed for this item.
Cited by:
- Ahu Ergen & Ahmet Naci Ünal & Mehmet Sıtkı Saygili, 2021. "Is It Possible to Change the Cyber Security Behaviours of Employees? Barriers and Promoters," Academic Journal of Interdisciplinary Studies, Richtmann Publishing Ltd, vol. 10, July.
Most related items
These are the items that most often cite the same works as this one and are cited by the same works as this one.- Joakim Kävrestad & Allex Hagberg & Marcus Nohlberg & Jana Rambusch & Robert Roos & Steven Furnell, 2022. "Evaluation of Contextual and Game-Based Training for Phishing Detection," Future Internet, MDPI, vol. 14(4), pages 1-16, March.
- Sanghyun Kim & Bora Kim & Minsoo Seo, 2020. "Impacts of Sustainable Information Technology Capabilities on Information Security Assimilation: The Moderating Effects of Policy—Technology Balance," Sustainability, MDPI, vol. 12(15), pages 1-24, July.
- Kjell Hausken, 2017. "Security Investment, Hacking, and Information Sharing between Firms and between Hackers," Games, MDPI, vol. 8(2), pages 1-23, May.
- Bocoum, Fadima & Grimm, Michael & Hartwig, Renate & Zongo, Nathalie, 2017. "Nudging Households to Take Up Health Insurance: Evidence from a Randomized Experiment in Burkina Faso," IZA Discussion Papers 10744, Institute of Labor Economics (IZA).
- Yonghua Ji & Subodha Kumar & Vijay Mookerjee, 2016. "When Being Hot Is Not Cool: Monitoring Hot Lists for Information Security," Information Systems Research, INFORMS, vol. 27(4), pages 897-918, December.
- Kjell Hausken, 2018. "Proactivity and Retroactivity of Firms and Information Sharing of Hackers," International Game Theory Review (IGTR), World Scientific Publishing Co. Pte. Ltd., vol. 20(01), pages 1-30, March.
- Luca Allodi & Fabio Massacci, 2017. "Security Events and Vulnerability Data for Cybersecurity Risk Estimation," Risk Analysis, John Wiley & Sons, vol. 37(8), pages 1606-1627, August.
- Sahar Zavareh Hofmann, 2022. "Build Back Better and Long-Term Housing Recovery: Assessing Community Housing Resilience and the Role of Insurance Post Disaster," Sustainability, MDPI, vol. 14(9), pages 1-23, May.
- Xing Gao & Weijun Zhong & Shue Mei, 2014. "A game-theoretic analysis of information sharing and security investment for complementary firms," Journal of the Operational Research Society, Palgrave Macmillan;The OR Society, vol. 65(11), pages 1682-1691, November.
- Debabrata Dey & Abhijeet Ghoshal & Atanu Lahiri, 2022. "Circumventing Circumvention: An Economic Analysis of the Role of Education and Enforcement," Management Science, INFORMS, vol. 68(4), pages 2914-2931, April.
- Jing Cai & Alain de Janvry & Elisabeth Sadoulet, 2020.
"Subsidy Policies and Insurance Demand,"
American Economic Review, American Economic Association, vol. 110(8), pages 2422-2453, August.
- Jing Cai & Alain de Janvry & Elisabeth Sadoulet, 2016. "Subsidy Policies and Insurance Demand," NBER Working Papers 22702, National Bureau of Economic Research, Inc.
- Cai, Jing & de Janvry, Alain & Sadoulet, Elisabeth, 2020. "Subsidy Policies and Insurance Demand," Department of Agricultural & Resource Economics, UC Berkeley, Working Paper Series qt5cc1b1fk, Department of Agricultural & Resource Economics, UC Berkeley.
- Habib Ntwoku & Solomon Negash & Peter Meso, 2017. "ICT adoption in Cameroon SME: application of Bass diffusion model," Information Technology for Development, Taylor & Francis Journals, vol. 23(2), pages 296-317, April.
- Carol Hsu & Jae-Nam Lee & Detmar W. Straub, 2012. "Institutional Influences on Information Systems Security Innovations," Information Systems Research, INFORMS, vol. 23(3-part-2), pages 918-939, September.
- Alhassan Abdul-Wakeel Karakara & Evans S. Osabuohien, 2022.
"Threshold effects of ICT access and usage in Burkinabe and Ghanaian households,"
Information Technology for Development, Taylor & Francis Journals, vol. 28(3), pages 511-531, July.
- Alhassan A-W Karakara & Evans S. Osabuohien, 2021. "Threshold Effects of ICT Access and Usage in Burkinabe and Ghanaian Households," Research Africa Network Working Papers 21/055, Research Africa Network (RAN).
- Alhassan A-W Karakara & Evans S. Osabuohien, 2021. "Threshold Effects of ICT Access and Usage in Burkinabe and Ghanaian Households," Working Papers 21/055, European Xtramile Centre of African Studies (EXCAS).
- Alhassan A. Karakara & Evans S. Osabuohien, 2021. "Threshold Effects of ICT Access and Usage in Burkinabe and Ghanaian Households," Working Papers of the African Governance and Development Institute. 21/055, African Governance and Development Institute..
- Ahmed Abbasi & David Dobolyi & Anthony Vance & Fatemeh Mariam Zahedi, 2021. "The Phishing Funnel Model: A Design Artifact to Predict User Susceptibility to Phishing Websites," Information Systems Research, INFORMS, vol. 32(2), pages 410-436, June.
- Robert Karamagi, 2022. "A Review of Factors Affecting the Effectiveness of Phishing," Computer and Information Science, Canadian Center of Science and Education, vol. 15(1), pages 1-20, February.
- Abdul Basit & Maham Zafar & Xuan Liu & Abdul Rehman Javed & Zunera Jalil & Kashif Kifayat, 2021. "A comprehensive survey of AI-enabled phishing attacks detection techniques," Telecommunication Systems: Modelling, Analysis, Design and Management, Springer, vol. 76(1), pages 139-154, January.
- Paul, Jomon A. & Zhang, Minjiao, 2021. "Decision support model for cybersecurity risk planning: A two-stage stochastic programming framework featuring firms, government, and attacker," European Journal of Operational Research, Elsevier, vol. 291(1), pages 349-364.
- Yingmei Tang & Huifang Cai & Rongmao Liu, 2022. "Will marketing strategies affect farmers’ preferences and willingness to pay for catastrophe insurance? Evidence from a choice experiment in China," Environment, Development and Sustainability: A Multidisciplinary Approach to the Theory and Practice of Sustainable Development, Springer, vol. 24(1), pages 1376-1389, January.
- Erwin Bulte & Rein Haagsma, 2021. "The Welfare Effects of Index-Based Livestock Insurance: Livestock Herding on Communal Lands," Environmental & Resource Economics, Springer;European Association of Environmental and Resource Economists, vol. 78(4), pages 587-613, April.
Corrections
All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:plo:pone00:0224216. See general information about how to correct material in RePEc.
If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.
If CitEc recognized a bibliographic reference but did not link an item in RePEc to it, you can help with this form .
If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.
For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: plosone (email available below). General contact details of provider: https://journals.plos.org/plosone/ .
Please note that corrections may take a couple of weeks to filter through the various RePEc services.