4.6 Article

Situational Contingencies in Susceptibility of Social Media to Phishing: A Temptation and Restraint Model

Related references

Note: Only part of the references are listed.
Article Neurosciences

How distinct functional insular subdivisions mediate interacting neurocognitive systems

Haichao Zhao et al.

Summary: Recent neurocognitive models suggest that the insula plays a vital role in the interoceptive awareness system, regulating two interconnected neurocognitive systems associated with the posterior insula (PI) and the anterior insula. This study used a multimodal approach to investigate the neuro-cognitive association between insular connectivity and cognitive performance, and the findings supported the theoretical roles of different subinsular functionality in the overall operation of cognitive systems.

CEREBRAL CORTEX (2023)

Review Computer Science, Information Systems

Negativity bias in the diagnosticity of online review content: the effects of consumers' prior experience and need for cognition

Hamed Qahri-Saremi et al.

Summary: The importance of online review valence is debated among scholars. Prior studies focused on valence as a peripheral cue, limiting the negativity bias effects to a specific group of consumers. This study shows that experienced and thoughtful consumers are also influenced by negativity bias when considering the content of online reviews, highlighting the need for response strategies to reduce adverse effects.

EUROPEAN JOURNAL OF INFORMATION SYSTEMS (2023)

Article Information Science & Library Science

Responses to ambivalence toward social networking sites: A typological perspective

Ofir Turel et al.

Summary: Previous research has often assumed that users' attitudes towards social networking site (SNS) use can be positioned on a bipolar continuum from negative to positive orientation. However, recent findings suggest that this linear approach is too simplistic to capture the intricacies of SNS use patterns. This paper draws on ambivalence literature to propose that users can have both positive and negative orientations towards SNS use. The authors develop typologies of attitudinal and behavioral responses to ambivalence and test their hypotheses using data from ambivalent SNS users. The findings validate the typologies and offer insights into the possible outcomes of users' attitudinal responses to ambivalence in terms of SNS use patterns.

INFORMATION SYSTEMS JOURNAL (2023)

Article Information Science & Library Science

The Phishing Funnel Model: A Design Artifact to Predict User Susceptibility to Phishing Websites

Ahmed Abbasi et al.

Summary: Phishing poses significant security threats for organizations and the general public. The phishing funnel model (PFM) is an effective design artifact for predicting user susceptibility to phishing attacks, incorporating user, threat, and tool-related factors to anticipate actions across different stages of the phishing process.

INFORMATION SYSTEMS RESEARCH (2021)

Article Business

A Triple-System Neural Model of Maladaptive Consumption

Ofir Turel et al.

Summary: This study expands on the neuro-marketing literature on normal consumption by describing a triple neural model of maladaptive consumption, highlighting the roles of reward, self-control/inhibition, and interoceptive awareness circuits in maladaptive consumption. Imbalance between these systems drives maladaptive consumption.

JOURNAL OF THE ASSOCIATION FOR CONSUMER RESEARCH (2021)

Article Business

Toward an Integrative Conceptualization of Maladaptive Consumer Behavior

John A. Clithero et al.

Summary: This research highlights the importance of integrating knowledge and approaches from proximal disciplines in exploring maladaptive consumer decisions. It discusses neural mechanisms and the co-occurrence of behavioral addictions with other disorders, outlining ways to leverage this comorbidity to enhance relevant models. It provides a multilayered framework for understanding the complex mechanisms of maladaptive choices in consumer settings and suggests opportunities for firms and individuals to mitigate the harm caused by these choice patterns.

JOURNAL OF THE ASSOCIATION FOR CONSUMER RESEARCH (2021)

Article Computer Science, Information Systems

Addiction to Social Networking Sites and User Responses: Toward A Typological Theory and its Relation to Users' Personality Traits

Hamed Qahri-Saremi et al.

Summary: This study introduces a typological theory of SNS addiction and user responses, categorizing users into five prototypical profiles based on their extent of addiction and responses. The research demonstrates how personality traits can predict user affiliations with these profiles, shedding light on the understanding of user behaviors towards SNS use.

DATA BASE FOR ADVANCES IN INFORMATION SYSTEMS (2021)

Article Computer Science, Information Systems

TECHNOLOGY-MEDIATED DANGEROUS BEHAVIORS AS FORAGING FOR SOCIAL-HEDONIC REWARDS: THE ROLE OF IMPLIED INEQUALITY

Ofir Turel

Summary: This research focuses on the drivers of technology-mediated dangerous behaviors (TMDBs) and introduces foraging and risk-sensitivity theories. The study finds that inequality information can increase TMDBs, and impact risk appetite through social comparison mechanisms.

MIS QUARTERLY (2021)

Article Computer Science, Information Systems

EXAMINING THE NEURAL BASIS OF INFORMATION SECURITY POLICY VIOLATIONS: A NONINVASIVE BRAIN STIMULATION APPROACH

Ofir Turel et al.

Summary: This study aims to understand why employees engage in nonmalicious information security policy violations by using noninvasive brain stimulation techniques. The research suggests that reducing neuron excitability in the left dorsolateral prefrontal cortex can lower the endorsement of ISP violations. These findings support the common assumption that ISP violations are motivated by perceived benefits and pave the way for future research using brain stimulation techniques in information systems research.

MIS QUARTERLY (2021)

Article Social Sciences, Interdisciplinary

Encouraging Employee Engagement With Cybersecurity: How to Tackle Cyber Fatigue

A. Reeves et al.

Summary: Cybersecurity fatigue is a specific form of work disengagement that arises from overexposure to cybersecurity-related work demands or training. The phenomenon can result in weariness or aversion to cybersecurity-related behaviors and advice, and can be categorized into attitudinal and cognitive fatigue. A four-component model is proposed to identify and address cybersecurity fatigue in employees for improved workplace behavior.

SAGE OPEN (2021)

Article Information Science & Library Science

A comparison of features in a crowdsourced phishing warning system

Christopher Nguyen et al.

Summary: This study examined the features of crowdsourced systems that influence individuals' utilization of information, particularly in the context of warnings for phishing emails. The results showed that crowdsourcing features work together to encourage warning acceptance and reduce anxiety, with accuracy rate demonstrating the most prominent effects on judgement accuracy, adherence to warning recommendations, and anxiety with system use.

INFORMATION SYSTEMS JOURNAL (2021)

Article Information Science & Library Science

Eyes wide open: The role of situational information security awareness for security-related behaviour

Lennart Jaeger et al.

Summary: The study suggests that security-related behaviors are influenced by interactions between individuals and their perceptions of threatening situations. Past experience with phishing and security warnings increase awareness, while contextual relevance and misplaced salience of phishing emails decrease awareness.

INFORMATION SYSTEMS JOURNAL (2021)

Article Computer Science, Information Systems

Susceptibility to phishing on social network sites: A personality information processing model

Edwin Donald Frauenstein et al.

COMPUTERS & SECURITY (2020)

Article Computer Science, Information Systems

Measuring Implicit Attitude in Information Systems Research with the Implicit Association Test

Alexander Serenko et al.

COMMUNICATIONS OF THE ASSOCIATION FOR INFORMATION SYSTEMS (2020)

Article Computer Science, Information Systems

Ambivalence and Coping Responses in Post-Adoptive Information Systems Use

Hamed Qahri-Saremi et al.

JOURNAL OF MANAGEMENT INFORMATION SYSTEMS (2020)

Article Computer Science, Information Systems

The Effectiveness of Abstract Versus Concrete Fear Appeals in Information Security

Sebastian W. Schuetz et al.

JOURNAL OF MANAGEMENT INFORMATION SYSTEMS (2020)

Article Psychology, Social

Helping or hurting? Effects of sexism and likeability on third party perceptions of women

Christopher R. Warren et al.

SOCIAL BEHAVIOR AND PERSONALITY (2020)

Article Computer Science, Information Systems

Factors Affecting the Adoption of an Electronic Word of Mouth Message: A Meta-Analysis

Hamed Qahri-Saremi et al.

JOURNAL OF MANAGEMENT INFORMATION SYSTEMS (2019)

Article Psychology, Social

Predictors of Social Media Self-Control Failure: Immediate Gratifications, Habitual Checking, Ubiquity, and Notifications

Jie Du et al.

CYBERPSYCHOLOGY BEHAVIOR AND SOCIAL NETWORKING (2019)

Article Neurosciences

Dynamic Causal Modeling of Insular, Striatal, and Prefrontal Cortex Activities During a Food-Specific Go/NoGo Task

Qinghua He et al.

BIOLOGICAL PSYCHIATRY-COGNITIVE NEUROSCIENCE AND NEUROIMAGING (2019)

Article Computer Science, Information Systems

A LONGITUDINAL STUDY OF UNAUTHORIZED ACCESS ATTEMPTS ON INFORMATION SYSTEMS: THE ROLE OF OPPORTUNITY CONTEXTS

Jingguo Wang et al.

MIS QUARTERLY (2019)

Article Computer Science, Information Systems

THE NEEDS-AFFORDANCES-FEATURES PERSPECTIVE FOR THE USE OF SOCIAL MEDIA

Elena Karahanna et al.

MIS QUARTERLY (2018)

Article Psychology, Multidisciplinary

Zero Likes - Symbolic interactions and need satisfaction online

Sabine Reich et al.

COMPUTERS IN HUMAN BEHAVIOR (2018)

Article Computer Science, Information Systems

An Enhanced Fear Appeal Rhetorical Framework: Leveraging Threats to the Human Asset Through Sanctioning Rhetoric

Allen C. Johnston et al.

MIS QUARTERLY (2017)

Article Computer Science, Information Systems

Which phish get caught? An exploratory study of individuals' susceptibility to phishing

Gregory D. Moody et al.

EUROPEAN JOURNAL OF INFORMATION SYSTEMS (2017)

Article Computer Science, Information Systems

An empirical study on the susceptibility to social engineering in social networking sites: the case of Facebook

Abdullah Algarni et al.

EUROPEAN JOURNAL OF INFORMATION SYSTEMS (2017)

Review Computer Science, Information Systems

The Effect of Belongingness on Obsessive-Compulsive Disorder in the Use of Online Social Networks

Tabitha L. James et al.

JOURNAL OF MANAGEMENT INFORMATION SYSTEMS (2017)

Article Computer Science, Information Systems

Got Phished? Internet Security and Human Vulnerability

Sanjay Goel et al.

JOURNAL OF THE ASSOCIATION FOR INFORMATION SYSTEMS (2017)

Article Computer Science, Information Systems

Ontology-Based Evaluation of Natural Disaster Management Websites: A Multistakeholder Perspective

Chen-Huei Chou et al.

MIS QUARTERLY (2017)

Article Multidisciplinary Sciences

Ror2 signaling regulates Golgi structure and transport through IFT20 for tumor invasiveness

Michiru Nishita et al.

SCIENTIFIC REPORTS (2017)

Article Social Sciences, Interdisciplinary

Valuing information security from a phishing attack

Kenneth D. Nguyen et al.

JOURNAL OF CYBERSECURITY (2017)

Article Communication

Fear-Appeal Messages: Message Processing and Affective Attitudes

Nancy Rhodes

COMMUNICATION RESEARCH (2017)

Article Computer Science, Artificial Intelligence

Getting phished on social media

Arun Vishwanath

DECISION SUPPORT SYSTEMS (2017)

Article Psychology, Multidisciplinary

Social media ostracism: The effects of being excluded online

Frank M. Schneider et al.

COMPUTERS IN HUMAN BEHAVIOR (2017)

Article Computer Science, Information Systems

Problematic Use of Social Networking Sites: Antecedents and Consequence from a Dual-System Theory Perspective

Ofir Turel et al.

JOURNAL OF MANAGEMENT INFORMATION SYSTEMS (2016)

Article Psychology, Social

Disgust predicts prejudice and discrimination toward individuals with obesity

Lenny R. Vartanian et al.

JOURNAL OF APPLIED SOCIAL PSYCHOLOGY (2016)

Article Psychology, Multidisciplinary

Eudaimonia as a Way of Living: Connecting Aristotle with Self-Determination Theory

Richard M. Ryan et al.

HANDBOOK OF EUDAIMONIC WELL-BEING (2016)

Article Computer Science, Information Systems

Diffusion of deception in social media: Social contagion effects and its antecedents

Arun Vishwanath

INFORMATION SYSTEMS FRONTIERS (2015)

Article Communication

Examining the Distinct Antecedents of E-Mail Habits and its Influence on the Outcomes of a Phishing Attack

Arun Vishwanath

JOURNAL OF COMPUTER-MEDIATED COMMUNICATION (2015)

Article Psychology, Social

Saying No to Temptation: Want-to Motivation Improves Self-Regulation by Reducing Temptation Rather Than by Increasing Self-Control

Marina Milyavskaya et al.

JOURNAL OF PERSONALITY AND SOCIAL PSYCHOLOGY (2015)

Article Psychology, Social

Epistemic curiosity and self-regulation

Marco Lauriola et al.

PERSONALITY AND INDIVIDUAL DIFFERENCES (2015)

Article Psychology, Mathematical

Ostracism Online: A social media ostracism paradigm

Wouter Wolf et al.

BEHAVIOR RESEARCH METHODS (2015)

Article Communication

Habitual Facebook Use and its Impact on Getting Deceived on Social Media

Arun Vishwanath

JOURNAL OF COMPUTER-MEDIATED COMMUNICATION (2015)

Article Psychology, Developmental

Sleep Deprivation, Low Self-Control, and Delinquency: A Test of the Strength Model of Self-Control

Ryan C. Meldrum et al.

JOURNAL OF YOUTH AND ADOLESCENCE (2015)

Article Substance Abuse

Self-Control and Implicit Drinking Identity as Predictors of Alcohol Consumption, Problems, and Cravings

Kristen P. Lindgren et al.

JOURNAL OF STUDIES ON ALCOHOL AND DRUGS (2014)

Article Behavioral Sciences

Self-regulation, ego depletion, and inhibition

Roy F. Baumeister

NEUROPSYCHOLOGIA (2014)

Article Psychology, Multidisciplinary

EXAMINATION OF NEURAL SYSTEMS SUB-SERVING FACEBOOK ADDICTION

Ofir Turel et al.

PSYCHOLOGICAL REPORTS (2014)

Article Information Science & Library Science

Influence Techniques in Phishing Attacks: An Examination of Vulnerability and Resistance

Ryan T. Wright et al.

INFORMATION SYSTEMS RESEARCH (2014)

Article Substance Abuse

Alcohol Cues, Approach Bias, and Inhibitory Control: Applying a Dual Process Model of Addiction to Alcohol Sensitivity

Kimberly A. Fleming et al.

PSYCHOLOGY OF ADDICTIVE BEHAVIORS (2014)

Article Information Science & Library Science

A Framework and Guidelines for Context-Specific Theorizing in Information Systems Research

Weiyin Hong et al.

INFORMATION SYSTEMS RESEARCH (2014)

Article Computer Science, Information Systems

Investigating phishing victimization with the Heuristic-Systematic Model: A theoretical framework and an exploration

Xin (Robert) Luo et al.

COMPUTERS & SECURITY (2013)

Article Psychology, Social

Everyday Temptations: An Experience Sampling Study of Desire, Conflict, and Self-Control

Wilhelm Hofmann et al.

JOURNAL OF PERSONALITY AND SOCIAL PSYCHOLOGY (2012)

Article Behavioral Sciences

Sleep deprivation lowers inhibition and enhances impulsivity to negative stimuli

Clare Anderson et al.

BEHAVIOURAL BRAIN RESEARCH (2011)

Article Computer Science, Information Systems

Understanding Nonmalicious Security Violations in the Workplace: A Composite Behavior Model

Ken H. Guo et al.

JOURNAL OF MANAGEMENT INFORMATION SYSTEMS (2011)

Review Psychology, Multidisciplinary

Impulse and Self-Control From a Dual-Systems Perspective

Wilhelm Hofmann et al.

PERSPECTIVES ON PSYCHOLOGICAL SCIENCE (2009)

Review Computer Science, Information Systems

How habit limits the predictive power of intention: The case of information systems continuance

Moez Limayem et al.

MIS QUARTERLY (2007)

Review Information Science & Library Science

Psychological contract violation in online marketplaces: Antecedents, consequences, and moderating role

PA Pavlou et al.

INFORMATION SYSTEMS RESEARCH (2005)

Article Psychology, Social

Social exclusion impairs self-regulation

RF Baumeister et al.

JOURNAL OF PERSONALITY AND SOCIAL PSYCHOLOGY (2005)

Review Psychology, Experimental

The relations among inhibition and interference control functions: A latent-variable analysis

NP Friedman et al.

JOURNAL OF EXPERIMENTAL PSYCHOLOGY-GENERAL (2004)

Review Behavioral Sciences

Conflict monitoring and anterior cingulate cortex: an update

Matthew M. Botvinick et al.

TRENDS IN COGNITIVE SCIENCES (2004)

Review Psychology, Social

Reflective and impulsive determinants of social behavior

F Strack et al.

PERSONALITY AND SOCIAL PSYCHOLOGY REVIEW (2004)

Article Psychology, Social

What a coincidence! The effects of incidental similarity on compliance

JM Burger et al.

PERSONALITY AND SOCIAL PSYCHOLOGY BULLETIN (2004)

Article Psychology, Social

Social exclusion and the deconstructed state: Time perception, meaninglessness, lethargy, lack of emotion, and self-awareness

JM Twenge et al.

JOURNAL OF PERSONALITY AND SOCIAL PSYCHOLOGY (2003)

Article Psychology, Multidisciplinary

The dominance analysis approach for comparing predictors in multiple regression

R Azen et al.

PSYCHOLOGICAL METHODS (2003)

Article Psychology, Multidisciplinary

Self-regulatory failure: A resource-depletion approach

KD Vohs et al.

PSYCHOLOGICAL SCIENCE (2000)

Article Psychology, Social

A meta-analysis of research on protection motivation theory

DL Floyd et al.

JOURNAL OF APPLIED SOCIAL PSYCHOLOGY (2000)