Language:
English
繁體中文
Help
回圖書館首頁
手機版館藏查詢
Login
Back
Switch To:
Labeled
|
MARC Mode
|
ISBD
Something Looks Phishy Here: Applica...
~
Martin, Jaclyn.
Linked to FindBook
Google Book
Amazon
博客來
Something Looks Phishy Here: Applications of Signal Detection Theory to Cyber-Security Behaviors in the Workplace.
Record Type:
Electronic resources : Monograph/item
Title/Author:
Something Looks Phishy Here: Applications of Signal Detection Theory to Cyber-Security Behaviors in the Workplace./
Author:
Martin, Jaclyn.
Published:
Ann Arbor : ProQuest Dissertations & Theses, : 2017,
Description:
70 p.
Notes:
Source: Masters Abstracts International, Volume: 56-05.
Contained By:
Masters Abstracts International56-05(E).
Subject:
Occupational psychology. -
Online resource:
http://pqdd.sinica.edu.tw/twdaoapp/servlet/advanced?query=10261123
ISBN:
9781369764222
Something Looks Phishy Here: Applications of Signal Detection Theory to Cyber-Security Behaviors in the Workplace.
Martin, Jaclyn.
Something Looks Phishy Here: Applications of Signal Detection Theory to Cyber-Security Behaviors in the Workplace.
- Ann Arbor : ProQuest Dissertations & Theses, 2017 - 70 p.
Source: Masters Abstracts International, Volume: 56-05.
Thesis (M.A.)--University of South Florida, 2017.
Cyber-security is an ever-increasing problem in the 21 st century. Though the majority of cyber-security breaches are a direct result of human error (Hu, Dinev, Hart, & Cooke, 2012), there is a dearth of research in psychology on the application of human decision-making for cyber-security compliance. Through an online inbox simulation, the present research examined the utility of a robust psychological model for decision-making, signal detection theory (SDT) for modeling decision-making in the context of receiving and responding to phishing and spear-phishing email scams. The influence of individual differences, specifically conscientiousness, on phishing email detection was also examined. The results indicate that SDT is useful for modeling and measuring cyber-compliance behavior in terms of responding to phishing emails. This finding supports the feasibility of using SDT to monitor training effectiveness for individuals' resistance to social engineering in phishing email detection. There were no significant relationships between participants' scores on conscientiousness and their phishing and spear-phishing email detection ability. Future research should explore predictors of cyber-compliance with regards to individuals' phishing and spear-phishing susceptibility.
ISBN: 9781369764222Subjects--Topical Terms:
2122852
Occupational psychology.
Something Looks Phishy Here: Applications of Signal Detection Theory to Cyber-Security Behaviors in the Workplace.
LDR
:02247nmm a2200301 4500
001
2157999
005
20180608112132.5
008
190424s2017 ||||||||||||||||| ||eng d
020
$a
9781369764222
035
$a
(MiAaPQ)AAI10261123
035
$a
(MiAaPQ)usf:13955
035
$a
AAI10261123
040
$a
MiAaPQ
$c
MiAaPQ
100
1
$a
Martin, Jaclyn.
$3
3345819
245
1 0
$a
Something Looks Phishy Here: Applications of Signal Detection Theory to Cyber-Security Behaviors in the Workplace.
260
1
$a
Ann Arbor :
$b
ProQuest Dissertations & Theses,
$c
2017
300
$a
70 p.
500
$a
Source: Masters Abstracts International, Volume: 56-05.
500
$a
Adviser: Michael D. Coovert.
502
$a
Thesis (M.A.)--University of South Florida, 2017.
520
$a
Cyber-security is an ever-increasing problem in the 21 st century. Though the majority of cyber-security breaches are a direct result of human error (Hu, Dinev, Hart, & Cooke, 2012), there is a dearth of research in psychology on the application of human decision-making for cyber-security compliance. Through an online inbox simulation, the present research examined the utility of a robust psychological model for decision-making, signal detection theory (SDT) for modeling decision-making in the context of receiving and responding to phishing and spear-phishing email scams. The influence of individual differences, specifically conscientiousness, on phishing email detection was also examined. The results indicate that SDT is useful for modeling and measuring cyber-compliance behavior in terms of responding to phishing emails. This finding supports the feasibility of using SDT to monitor training effectiveness for individuals' resistance to social engineering in phishing email detection. There were no significant relationships between participants' scores on conscientiousness and their phishing and spear-phishing email detection ability. Future research should explore predictors of cyber-compliance with regards to individuals' phishing and spear-phishing susceptibility.
590
$a
School code: 0206.
650
4
$a
Occupational psychology.
$3
2122852
650
4
$a
Information technology.
$3
532993
690
$a
0624
690
$a
0489
710
2
$a
University of South Florida.
$b
Psychology.
$3
1680247
773
0
$t
Masters Abstracts International
$g
56-05(E).
790
$a
0206
791
$a
M.A.
792
$a
2017
793
$a
English
856
4 0
$u
http://pqdd.sinica.edu.tw/twdaoapp/servlet/advanced?query=10261123
based on 0 review(s)
Location:
ALL
電子資源
Year:
Volume Number:
Items
1 records • Pages 1 •
1
Inventory Number
Location Name
Item Class
Material type
Call number
Usage Class
Loan Status
No. of reservations
Opac note
Attachments
W9357546
電子資源
11.線上閱覽_V
電子書
EB
一般使用(Normal)
On shelf
0
1 records • Pages 1 •
1
Multimedia
Reviews
Add a review
and share your thoughts with other readers
Export
pickup library
Processing
...
Change password
Login