語系:
繁體中文
English
說明(常見問題)
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Something Looks Phishy Here : = Appl...
~
ProQuest Information and Learning Co.
Something Looks Phishy Here : = Applications of Signal Detection Theory to Cyber-Security Behaviors in the Workplace.
紀錄類型:
書目-語言資料,手稿 : Monograph/item
正題名/作者:
Something Looks Phishy Here :/
其他題名:
Applications of Signal Detection Theory to Cyber-Security Behaviors in the Workplace.
作者:
Martin, Jaclyn.
面頁冊數:
1 online resource (70 pages)
附註:
Source: Masters Abstracts International, Volume: 56-05.
標題:
Occupational psychology. -
電子資源:
click for full text (PQDT)
ISBN:
9781369764222
Something Looks Phishy Here : = Applications of Signal Detection Theory to Cyber-Security Behaviors in the Workplace.
Martin, Jaclyn.
Something Looks Phishy Here :
Applications of Signal Detection Theory to Cyber-Security Behaviors in the Workplace. - 1 online resource (70 pages)
Source: Masters Abstracts International, Volume: 56-05.
Thesis (M.A.)--University of South Florida, 2017.
Includes bibliographical references
Cyber-security is an ever-increasing problem in the 21 st century. Though the majority of cyber-security breaches are a direct result of human error (Hu, Dinev, Hart, & Cooke, 2012), there is a dearth of research in psychology on the application of human decision-making for cyber-security compliance. Through an online inbox simulation, the present research examined the utility of a robust psychological model for decision-making, signal detection theory (SDT) for modeling decision-making in the context of receiving and responding to phishing and spear-phishing email scams. The influence of individual differences, specifically conscientiousness, on phishing email detection was also examined. The results indicate that SDT is useful for modeling and measuring cyber-compliance behavior in terms of responding to phishing emails. This finding supports the feasibility of using SDT to monitor training effectiveness for individuals' resistance to social engineering in phishing email detection. There were no significant relationships between participants' scores on conscientiousness and their phishing and spear-phishing email detection ability. Future research should explore predictors of cyber-compliance with regards to individuals' phishing and spear-phishing susceptibility.
Electronic reproduction.
Ann Arbor, Mich. :
ProQuest,
2018
Mode of access: World Wide Web
ISBN: 9781369764222Subjects--Topical Terms:
1179639
Occupational psychology.
Index Terms--Genre/Form:
554714
Electronic books.
Something Looks Phishy Here : = Applications of Signal Detection Theory to Cyber-Security Behaviors in the Workplace.
LDR
:02469ntm a2200325K 4500
001
912516
005
20180608112132.5
006
m o u
007
cr mn||||a|a||
008
190606s2017 xx obm 000 0 eng d
020
$a
9781369764222
035
$a
(MiAaPQ)AAI10261123
035
$a
(MiAaPQ)usf:13955
035
$a
AAI10261123
040
$a
MiAaPQ
$b
eng
$c
MiAaPQ
100
1
$a
Martin, Jaclyn.
$3
1184915
245
1 0
$a
Something Looks Phishy Here :
$b
Applications of Signal Detection Theory to Cyber-Security Behaviors in the Workplace.
264
0
$c
2017
300
$a
1 online resource (70 pages)
336
$a
text
$b
txt
$2
rdacontent
337
$a
computer
$b
c
$2
rdamedia
338
$a
online resource
$b
cr
$2
rdacarrier
500
$a
Source: Masters Abstracts International, Volume: 56-05.
500
$a
Adviser: Michael D. Coovert.
502
$a
Thesis (M.A.)--University of South Florida, 2017.
504
$a
Includes bibliographical references
520
$a
Cyber-security is an ever-increasing problem in the 21 st century. Though the majority of cyber-security breaches are a direct result of human error (Hu, Dinev, Hart, & Cooke, 2012), there is a dearth of research in psychology on the application of human decision-making for cyber-security compliance. Through an online inbox simulation, the present research examined the utility of a robust psychological model for decision-making, signal detection theory (SDT) for modeling decision-making in the context of receiving and responding to phishing and spear-phishing email scams. The influence of individual differences, specifically conscientiousness, on phishing email detection was also examined. The results indicate that SDT is useful for modeling and measuring cyber-compliance behavior in terms of responding to phishing emails. This finding supports the feasibility of using SDT to monitor training effectiveness for individuals' resistance to social engineering in phishing email detection. There were no significant relationships between participants' scores on conscientiousness and their phishing and spear-phishing email detection ability. Future research should explore predictors of cyber-compliance with regards to individuals' phishing and spear-phishing susceptibility.
533
$a
Electronic reproduction.
$b
Ann Arbor, Mich. :
$c
ProQuest,
$d
2018
538
$a
Mode of access: World Wide Web
650
4
$a
Occupational psychology.
$3
1179639
650
4
$a
Information technology.
$3
559429
655
7
$a
Electronic books.
$2
local
$3
554714
690
$a
0624
690
$a
0489
710
2
$a
ProQuest Information and Learning Co.
$3
1178819
710
2
$a
University of South Florida.
$b
Psychology.
$3
1184916
856
4 0
$u
http://pqdd.sinica.edu.tw/twdaoapp/servlet/advanced?query=10261123
$z
click for full text (PQDT)
筆 0 讀者評論
多媒體
評論
新增評論
分享你的心得
Export
取書館別
處理中
...
變更密碼[密碼必須為2種組合(英文和數字)及長度為10碼以上]
登入