Filters








968 Hits in 7.9 sec

Social Engineering in Cybersecurity: Effect Mechanisms, Human Vulnerabilities and Attack Methods

Zuoguang Wang, Hongsong Zhu, Limin Sun
2021 IEEE Access  
Besides, this paper offers lots of materials for security awareness training and future empirical research, and the model is also helpful to develop a domain ontology of social engineering in cybersecurity  ...  This paper proposes a conceptual model which provides an integrative and structural perspective to describe how social engineering attacks work.  ...  the elaboration likelihood, and thus the routes to persuasion.  ... 
doi:10.1109/access.2021.3051633 fatcat:qchmn4vhefgpzoytsmfvlfup5a

Social influence on predictions of simulated stock prices

Maria Andersson, Ted Martin Hedesström, Tommy Gärling
2009 Journal of Behavioral Decision Making  
This thesis aims to understand herding by applying theories of social influence. In a series of studies employing a multi-trial experimental approach, undergraduates made predictions of stock prices.  ...  On each trial they received information about the current price and the predictions made by other fictitious participants, forming a majority or a minority herd.  ...  Although the work was motivating, it has not been an uncomplicated and straightforward journey and I have relied on the expertise, support and understanding of those around me.  ... 
doi:10.1002/bdm.625 fatcat:g6zjap4cxfem3ce3bzc4hpg334

Review and insight on the behavioral aspects of cybersecurity

Rachid Ait Maalem Lahcen, Bruce Caulkins, Ram Mohapatra, Manish Kumar
2020 Cybersecurity  
This paper is an effort to provide a review of relevant theories and principles, and gives insights including an interdisciplinary framework that combines behavioral cybersecurity, human factors, and modeling  ...  His research interests include behavioral aspects of cybersecurity; threat modeling; cyber workforce development; anomaly detection; cyber security and analysis; cyber education and training methodologies  ...  Acknowledgements The authors would like to thank the journal for the opportunity to publish an open access paper, and many thanks to the outstanding reviewers for their hard work and feedback.  ... 
doi:10.1186/s42400-020-00050-w fatcat:cbwcvlgzffblthck7nnwcl4nqi

The role of social trust in reward crowdfunding campaigns' design and success

Rotem Shneor, Urszula Mrzygłód, Joanna Adamska-Mieruszewska, Anna Fornalska-Skurczyńska
2021 Electronic Markets  
Building on the Elaboration Likelihood Model, we show that central route cues to persuasion are more prevalent in campaigns from LTS vs.  ...  We find that sharing campaign information via social media is positively associated with campaign success in both contexts.  ...  One such popular theory is Petty and Cacioppo's (1986) Elaboration Likelihood Model ('ELM').  ... 
doi:10.1007/s12525-021-00456-5 fatcat:7bhj6bh5mbd5veseggps5pns34

Thought and Behavior Contagion in Capital Markets [chapter]

David Hirshleifer, Siew Hong Teoh
2009 Handbook of Financial Markets: Dynamics and Evolution  
Prevailing models of capital markets capture a limited form of social influence and information transmission, in which the beliefs and behavior of an investor affect others only through market price, information  ...  Social influence is central to how information and investor sentiment are transmitted, so thought and behavior contagion should be incorporated into the theory of capital markets.  ...  Section 6 describes agency and reputation-based herding models. Section 7 describes theory and evidence on herding and cascades in security analysis.  ... 
doi:10.1016/b978-012374258-2.50005-1 fatcat:muqitjwxmnhhvd4ej5wvusr24y

Human Cognition Through the Lens of Social Engineering Cyberattacks

Rosana Montañez, Edward Golob, Shouhuai Xu
2020 Frontiers in Psychology  
These questions have received some amount of attention, but the state-of-the-art understanding is superficial and scattered in the literature.  ...  In this paper, we review human cognition through the lens of social engineering cyberattacks.  ...  Ferreira and colleagues present five Principles of Persuasion by combining (i) Cialdini Principles of Persuasion; (ii) Stajano's study on scams and how distraction, social compliance, herd, dishonesty  ... 
doi:10.3389/fpsyg.2020.01755 pmid:33101096 pmcid:PMC7554349 fatcat:zpflpspxjfgulfqqkxo52e7usy

Human Cognition through the Lens of Social Engineering Cyberattacks [article]

Rosana Montanez Rodriguez, Edward Golob, Shouhuai Xu
2020 arXiv   pre-print
These questions have received some amount of attention but the state-of-the-art understanding is superficial and scattered in the literature.  ...  In this paper, we review human cognition through the lens of social engineering cyberattacks.  ...  The funders had no role in study design, data collection and analysis, decision to publish, or preparation of the manuscript.  ... 
arXiv:2007.04932v2 fatcat:m2j6tqm2nrallo54nfufyzvt5m

Moody Investing and the Supreme Court: Rethinking the Materiality of Information and the Reasonableness of Investors

Peter H. Huang
2005 Supreme Court Economic Review  
This Article critically analyzes the judicial decisions and reasoning of the United States Supreme Court and lower courts accepting certain defenses in securities fraud litigation.  ...  This Article develops how and why the core notions of materiality of information and the reasonable investor should be revised in light of recent empirical data, experimental evidence, and theoretical  ...  , Increasing the Persuasiveness of Fear Appeals: The Effect of Arousal and Elaboration, 22 J Consumer Rsrch 448, 450- 56 (1996) (finding conditions under which anti-smoking messages that prompt low  ... 
doi:10.1086/scer.13.3655302 fatcat:m6ufwi742bbolo4unvbbfbbrra

Moody Investing and the Supreme Court: Rethinking Materiality of Information and Reasonableness of Investors

Peter H. Huang
2003 Social Science Research Network  
This Article critically analyzes the judicial decisions and rea soning of the United States Supreme Court and lower courts accepting certain defenses in securities fraud litigation.  ...  This Article develops how and why the core notions of materiality of information and the reasonable investor should be revised in light of recent empirical data, experimental evidence, and theoretical  ...  & Lauren Goldberg Block, Increasing the Persuasiveness of Fem Appeals: Th e Effect of Arousal and Elaboration, 22 J Consumer Rsrch 448,450- 56 ( 1996) (finding conditions under which anti-smoking messages  ... 
doi:10.2139/ssrn.478421 fatcat:tv2l5xw5a5bmlg3jnfzosgf56m

International Journal of Business and Management, Vol. 4, No. 9, September 2009, all in one PDF file

Lisa Wang
2009 International Journal of Business and Management  
Myers and Majluf (1984) and Diekerns (1991) present an "information asymmetry" model in which the potential purchasers of securities have less information about the prospects of the firm than management  ...  in model 2, model 3 and model 4.  ...  Operation and Management. Beijing, China Machine Press. Note 5. Yang Xunwen. (2005) . Intel Integrates market in China. Economic Observer, July 14.  ... 
doi:10.5539/ijbm.v4n9p0 fatcat:efikc3xfcred3fa6icirvfiobu

Digital Nudging with Recommender Systems: Survey and Future Directions [article]

Mathias Jesse, Dietmar Jannach
2020 arXiv   pre-print
In this work, we therefore outline potential ways of integrating nudging mechanisms into recommender systems.  ...  These systems thereby influence which information is easily accessible to us and thus affect our decision-making processes though the automated selection and ranking of the presented content.  ...  [54] Nudging goal: To increase the use of more secure networks by recommending and highlighting more secure alternatives. Finding: Nudges had a significant impact on the selection of networks.  ... 
arXiv:2011.03413v1 fatcat:kxjb5hx4g5hsjmpusaxz7bx5wy

Does Good Design Matter in the Seedstock Advertising Business? Effects of Graphic Design in Beef Seedstock Ads on Cattle Producers' Trust and Credibility

Morgan L Marley, Katie M Abrams, Daniela Castillo
2019 Journal of Applied Communications  
cues than design to inform their purchasing decisions.  ...  Within the beef seedstock industry, ad design varies widely in terms of technical effectiveness, but how do those differences affect potential customers?  ...  Elaboration Likelihood Model According to Petty and Cacioppo (1986) , the elaboration likelihood model supposes two distinct processes of attitude change by taking in information via central and peripheral  ... 
doi:10.4148/1051-0834.2267 fatcat:746usz23t5gurorqqtjsvgdq6a

Who's Calling the Emergency? The Black Panters, Securitisation and the Question of Identity

Peer Illner
2015 Culture Unbound: Journal of Current Cultural Research  
and ontological security in times of crisis.  ...  This article intervenes in a debate in cultural disaster studies that interprets disasters as objects, whose study opens up an understanding of societies' fears, anxieties and vulnerabilities.  ...  Ontological Security Following Waever, several theorists working in security studies have elaborated the link between security and identity to shed light on the politics of self-defence.  ... 
doi:10.3384/cu.2000.1525.1572479 fatcat:26a6uoruu5fk7hjj325u3j4oae

An empirical investigation of signaling in reward-based crowdfunding

Michael Marcin Kunz, Ulrich Bretschneider, Max Erler, Jan Marco Leimeister
2016 Electronic Commerce Research  
signaling theory.  ...  In contrast, the funding goal, a campaign's runtime and the estimated time of delivery for the rewards have a negative impact on the successful completion of a campaign.  ...  The model relevance is marked as good in accordance with Nagelkerke-R 2 = 0.467; Statistic reliability (model fit) was tested using the Likelihood-ratio test (LR test).  ... 
doi:10.1007/s10660-016-9249-0 fatcat:7y5alytr5bdopacivf3ucai5x4

Visual gut punch: persuasion, emotion, and the constitutional meaning of graphic disclosure

Ellen P Goodman
2014 Cornell law review  
Using autonomy theory and the communications research on speech processing, I conclude that disclosures do not bypass reason simply by reaching for the heart.  ...  Office of Disciplinary Counsel, from a consumer autonomy standpoint; brings to bear empirical communications research on questions of facticity and rationality in emotional and graphic communications;  ...  then prompts a quest for, and receptivity to, factual information. 307 Contemporary theories of emotion such as hot cognition theory, 308 the affect-infusion model, 309 and affect-as-information theory  ... 
pmid:24745102 fatcat:bykaicik4vedfo2ru3e4iekt64
« Previous Showing results 1 — 15 out of 968 results