Top Banner
Enabling Protection Motivation in Heuristic-Systematic Defense against Email Phishing Weiai Wayne Xu, PhD Candidate, Department of Communication, SUNY- Buffalo Arun Vishwanath, PhD, Associate Professor, Department of Communication, SUNY-Buffalo Zhi Yang (Zed) Ngoh, Department of Communication, SUNY-Buffalo
9
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: How Do We Fight Email Phishing? (ICA2015 - San Juan, PR)

Enabling Protection Motivation in Heuristic-Systematic Defense against Email Phishing

• Weiai Wayne Xu, PhD Candidate, Department of Communication, SUNY- Buffalo• Arun Vishwanath, PhD, Associate Professor, Department of Communication, SUNY-Buffalo• Zhi Yang (Zed) Ngoh, Department of Communication, SUNY-Buffalo

Page 2: How Do We Fight Email Phishing? (ICA2015 - San Juan, PR)

2014: The year of cybersecurity

Page 3: How Do We Fight Email Phishing? (ICA2015 - San Juan, PR)

We are the moles!

Page 4: How Do We Fight Email Phishing? (ICA2015 - San Juan, PR)

What we know so far…

Based on heuristic-systematic processing model (HSM) (Chen & Chaiken, 1999)

Heuristic processing: bypass in-depth thinking and instead rely on heuristics, rules of thumbs, past experience, and instincts (for efficiency)

Systematic processing: scrutinize all elements and aspects of information presented (for accuracy)

Page 5: How Do We Fight Email Phishing? (ICA2015 - San Juan, PR)

Based on protection motivation theory (PMT) (Rogers,1975)

Severity

Vulnerability

Response efficacy

Self-efficacy

Protection enactment

What we know so far…

Page 6: How Do We Fight Email Phishing? (ICA2015 - San Juan, PR)

The integrated model

Page 7: How Do We Fight Email Phishing? (ICA2015 - San Juan, PR)

• 288 students• A simulated phishing email disguised to originate

from the university’s student ID card office. • The phishing email requested the participants to

provide personal information to update their credit card information

The experiment

Page 8: How Do We Fight Email Phishing? (ICA2015 - San Juan, PR)

The results

Page 9: How Do We Fight Email Phishing? (ICA2015 - San Juan, PR)

Theoretical implication: • It is one of the few studies that applies the PMT framework to an

email phishing context• The incorporation of both PMT and HSM

Practical insights: • Fear drives protection and more mindful internet behavior• Skills/knowledge (self-efficacy) matters

Takeaway