\
 

Start Date

16-8-2018 12:00 AM

Description

As phishing emails represent continuous attack vectors, users’ continuance in anti-phishing behavior is highly significant. This paper extends the previous literature on phishing and information security. We develop a hierarchical inter-looped cybernetic model that integrates protection motivation theory, expanded prominence interpretation theory, and risk analysis. Our model explores the (1) continuous interdependence of avoidance and adoption cognitive systems in anti-phishing behavior, and (2) continuous interdependence of education, awareness and training. The conceptual foundation, derived propositions and contributions are discussed.

Share

COinS
 
Aug 16th, 12:00 AM

Iterating the Cybernetic Loops in Anti-Phishing Behavior: A Theoretical Integration

As phishing emails represent continuous attack vectors, users’ continuance in anti-phishing behavior is highly significant. This paper extends the previous literature on phishing and information security. We develop a hierarchical inter-looped cybernetic model that integrates protection motivation theory, expanded prominence interpretation theory, and risk analysis. Our model explores the (1) continuous interdependence of avoidance and adoption cognitive systems in anti-phishing behavior, and (2) continuous interdependence of education, awareness and training. The conceptual foundation, derived propositions and contributions are discussed.