A phishing victimisation avoidance model to identify factors

Running head: ARTICLE ANALYSIS 1
Article Analysis
Student’s Name
Institution Affiliation
No
.
Studies
Focus(Dimen
sion)
Factoes
Outcomes
Method
used
Theories
No. of
participant
1-
The
effectiveness
of hints for
online
banking
customers on
reducing
phishing
susceptibility
: A Dutch
customer's
perspective
authored by
Wietse van
der Leest
Management
related
Top
manage
ment
support
Employ
ee
Awaren
ess
The results
showed that
there exists a
significant
difference
directed to
the amount
of bank
emails that
were
correctly
judged.
The hints
were
effective
when it came
to reducing
phishing
susceptibility
The eye
tracking heat
maps were
critical in
reduction of
phishing in
banking
emails.
Controlle
d
experime
nt
method
of
research
was used
by the
experts in
data
collection
method.
Risk
theories
in
Phishing
activitie
s
27 participants
were used and
the aim was to
judge the
legitimateness
of bank emails.
The
participants
were split into
two groups one
that read hints
which was the
experimental
group while
the other was a
control group.
2-
Applying
Routine
Activity
Theory to
Cybercrime:
A
Theoretical
and
Empirical
Analysis
Technologica
lly related
Compat
ibility
Comple
xity
Data
Concer
ns
Findings
indicate that
there are
some RAT
that are
working
effective
more than
the others
hence they
are more
applicable.
A
qualitativ
e
research
study was
conducte
d in this
research
study
Routine
Activity
Theory
11 empirical
studies
reviewed in the
research
ARTICLE ANALYSIS 2
Eric Rutger
Leukfeldt &
Majid Yar
When
dealing with
cybercrime
victimization
, then
visibility
plays an
important
role in the
process.
3-
COPING
WITH
CYBERCRI
ME
VICTIMIZA
TION: AN
EXPLORAT
ORY
STUDY
INTO
IMPACT
AND
CHANGE
authored by
Jurjen
Jansen and
Rutger
Leukfeldt
Individual
related
Attitude
Ease of
Use
.
It was
established
that close to
the financial
damage, the
victims were
keen on
describing
different
form of
effects like
the emotional
and
psychologica
l effects they
face on
internet use.
Consequentl
y, the victims
reported that
there are
various kinds
of impacts,
the
secondary
impacts like
time loss
which they
faced when
handling the
incidences.
Quantitat
ive
research
method
Coping
Theory
Behavio
ral
Theory
A total of 30
cybercrime
victims were
assessed in the
research
ARTICLE ANALYSIS 3
4-
A Qualitative
Investigation
of Bank
Employee
Experiences
of
Information
Security and
Phishing
authored by
Dan
Conway,
Ronnie Taib,
Mitch Harris,
Kun Yu,
Shlomo
Berkovsky,
and Fang
Chen
Organization
al Related
Top
Manage
ment
Support
Technol
ogical
Support
The first
finding is
that there is a
possible
association
that takes
place
between high
valuable
security and
the low
perception to
vulnerability.
These lead to
poor issues
of security
practices.
The self-
efficacy was
strong when
determining
issues about
the negative
experiences
and variances
about the
non-relevant
emails that
the staff
member’s
process.
Qualitati
ve
Research
method
whereby
the
authors
used the
semi-
structure
d
interview
s that had
both open
and close
ended
questions
.
homeost
asis
theory
Social
Bond
Theory
Protecti
on
Motivati
on
Theory
A total of 18
staff members
took part in the
study. 4 were
located in
Australia and
14 located in
New Zealand.
5-
An empirical
study on the
susceptibility
to social
engineering
in social
networking
sites: the
case of
Facebook
authored by
Individual
related
Ease of
Use
Attitude
of the
Users
The
outcomes of
the study
show that
issues of
sincerity,
attraction,
competence
and
worthiness
are important
An
experime
ntal
research
design
dubbed
as role
play was
used
whereby
the
Suscepti
bility to
social
engineer
ing
theory
Source
credibili
ty theory
89 participants
of the study
were involved
in the research
process. They
include 46
women and 43
men
ARTICLE ANALYSIS 4
Abdullah
Algarni, Yue
Xu & Taizan
Chan
sources of
predicting
human
susceptibility
to social
engineering
victimization
.
participa
nt acted
scripts
Grounde
d
Theory
6-
An empirical
investigation
of the
factors that
influence
Internet
user’s ability
to correctly
identify a
phishing
website
authored by
Swapan
Purkait and
Sadhan
Kumar De
and Damodar
Suar
Individual
related
Ease of
Use
Attitude
of the
users
The findings
of the
research
show that the
established
model is
appropriate
and has great
explanatory
power in
understandin
g phishing
websites and
activities.
Internet users
have an
ability to
identify
phishing
websites
A
quantitati
ve
research
method
with the
dependen
ce of a
structure
d survey
question
was used
in the
study.
Grounde
d
Theory
A total of 621
participants of
the study were
used in the
research
process.
7-
Behavioral
intention in
social
networking
sites ethical
dilemmas:
An
extended
model based
on Theory of
Organization
al related
Organiz
ational
Attitude
Top
level
manage
ment
support
The result
findings
indicated that
there was
attitude and
it was the
most
influential
factor. The
other
Qualitati
ve
research
design
methods
Theory
of
planned
behavior
The research
aimed at using
a total of 98
participants in
each subgroup
with a total of
394 research
participants.
ARTICLE ANALYSIS 5
Planned
Behavior
authored by
Hosein
Jafarkarimi,
Robab
Saadatdoost,
Alex Tze
Hiang Sim,
Jee Mei Hee
in the
risks
established
factors
included the
subjective
norms,
behavioral
control that
is perceived
and moral
beliefs which
controlled
the social
networking.
Assessing the
level of
education
age and also
scenarios
found out
that there is a
significant
effect that
occurs in the
relation
behavior and
behavior
intentions.
8-
A new
approach to
modelling
the effects of
cognitive
processing
and threat
detection on
phishing
susceptibility
authored by
Paula M.W.
Musuva,
Katherine W.
Getao (PhD,
EBS),
Christopher
Technologic
ally related
Comple
xity
Compat
ibility
The
relative
advanta
ge of
the
Approa
ch
Research
findings give
the indication
that the
presence of
threat
detection
brings about
the strongest
effect when
reducing
phishing
susceptibility
.
In this case,
threat
The
research
employed
the mixed
research
method
where
direct
observati
ons and
questionn
aires
were
used in
data
collection
process.
Interpers
onal
Decepti
on
Theory
(IDT),
Theory
of
Decepti
on
(ToD),
Heuristi
c
Systema
tic
Model
The total
participants of
the study were
192 cases of
analysis
ARTICLE ANALYSIS 6
K. Chepken
(PhD)
detection in
the results
explained the
reason why
people were
expanding
the cognitive
effort
processing
are members
who are less
likely to fall
victim of
phishing
activities and
threats.
9-
An Empirical
Evaluation of
Security tips
in
Phishing
Prevention:
A Case
Study of
Nigerian
Banks
authored by
Abdul
Abiodun
Orunsolu, A.
S. Sodiya, A.
T. Akinwale,
B. I.
Olajuwon,
M. A.
Alaran,
O. O.
Bamgboye,
and O. A.
Afolabi
Organization
al Related
Top
Level
manage
ment
factoes
Most of the
customers
are faced
with the
challenges as
they have
inadequate
knowledge
regarding the
security tips
in the
organization
or the banks.
The
authors
used a
quantitati
ve
research
method
design
that had
an
experime
ntal
method
of
research.
Technol
ogy
Threat
Avoidan
ce
Theory
The study used
a total of 247
participants
10
A routine
activity
perspective
on online
victimization
Individual
related
Attitud
e
The findings
indicate that
the different
online
behaviors
The
research
study
applied
the
Routine
Activity
theory
Secondary data
from the 23rd
Cycle of the
Canadian GSS
were
ARTICLE ANALYSIS 7
authored by
Bradford W.
Reyns
The
ease of
Use
were
consistent
especially to
facts such as
online
victimization
, the act of
booking or
making
reservations
and having
an
individual'’
information
being posted
online.
qualitativ
e
research
methods
11-
A
Personality
Based Model
for
Determining
Susceptibilit
y to Phishing
Attacks
authored by
James L.
Parrish, Jr,
Janet L.
Bailey and
James F.
Courtney
Technologica
lly related
Compl
exity
The findings
of the article
revealed that
the
application
of the Big-
Five
personality
traits are
instrumental
and used in
many area
arenas. The
main
application is
for predicting
different
human
behavior
aspects.
aspects of
human
behavior
A
qualitativ
e
research
study was
used
Grounde
d
Theory
Secondary
resource
review no
exact number
of research
participants.
ARTICLE ANALYSIS 8
ARTICLE ANALYSIS 9
REFERENCES
Algarni, A., Xu, Y & Chan, T. (2017) An empirical study on the susceptibility to social
engineering in social networking sites: the case of Facebook, European Journal of
Information Systems, 26:6, 661-687, DOI: 10.1057/s41303-017-0057-y
Conway, D., Taib, R., Harris, M., Yu, K., Berkovsky, S & Fang, C. (2017). A Qualitative
Investigation of Bank Employee Experiences of Information Security and Phishing. Santa
Clara, CA, USA. ISBN 978-1-931971-39-3.
Jafarkarimi, H., Saadatdoost, R., & Sim, A. (2015). Behavioral intention in social networking
sites ethical dilemmas: An extended model based on Theory of Planned Behavior.
Computers in Human Behavior.
Jansen, J., & Leukfeldt, R. (2018). COPING WITH CYBERCRIME VICTIMIZATION: AN
EXPLORATORY STUDY INTO IMPACT AND CHANGE. Jansen, J., & Leukfeldt, R.
(2018).
Leest, W. (2018). The effectiveness of hints for online banking customers on reducing phishing
susceptibility: A Dutch customer's perspective. University of Twente
Musuva,P., Getao, K., & Chepken, (2018). A New Approach to Modelling the Effects of
Cognitive Processing and Threat Detection On Phishing Susceptibility, Computers in
Human Behavior (2018), doi: 10.1016/j.chb.2018.12.036
Orunsolu, A., Sodiya, A., Akinwale, T., Olajuwon, B., Alaran, M., & Bamgboye, O. (2017). An
Empirical Evaluation of Security tips in Phishing Prevention: A Case Study of Nigerian
Banks. I.J. of Electronics and Information Engineering, Vol.6, No.1, PP.25-39, Mar. 2017
(DOI: 10.6636/IJEIE.201703.6(1).03) 25
Purkait, S., & Sadhan, K. (2014),"An empirical investigation of the factors that influence Internet
user’s ability to correctly identify a phishing website", Information Management &
Computer Security, Vol. 22 Iss 3 pp. 194 234.
Parrish, Jr, J., Bailey, L., & Courtney, J. (2015). A Personality Based Model for Determining
Susceptibility to Phishing Attacks. University of Arkansas at Little Rock, 2801 S.
University Ave., Little Rock, AR 72204-1099
Rutger, E., & Yar, M. (2016). Applying Routine Activity Theory to Cybercrime: A Theoretical
and Empirical Analysis. Deviant Behavior, DOI: 10.1080/01639625.2015.1012409
Reyns, B. (2015),"A routine activity perspective on online victimization", Journal of Financial
Crime, Vol. 22 Iss 4 pp. 396 411.
ARTICLE ANALYSIS 10

Place new order. It's free, fast and safe

-+
550 words

Our customers say

Customer Avatar
Jeff Curtis
USA, Student

"I'm fully satisfied with the essay I've just received. When I read it, I felt like it was exactly what I wanted to say, but couldn’t find the necessary words. Thank you!"

Customer Avatar
Ian McGregor
UK, Student

"I don’t know what I would do without your assistance! With your help, I met my deadline just in time and the work was very professional. I will be back in several days with another assignment!"

Customer Avatar
Shannon Williams
Canada, Student

"It was the perfect experience! I enjoyed working with my writer, he delivered my work on time and followed all the guidelines about the referencing and contents."

  • 5-paragraph Essay
  • Admission Essay
  • Annotated Bibliography
  • Argumentative Essay
  • Article Review
  • Assignment
  • Biography
  • Book/Movie Review
  • Business Plan
  • Case Study
  • Cause and Effect Essay
  • Classification Essay
  • Comparison Essay
  • Coursework
  • Creative Writing
  • Critical Thinking/Review
  • Deductive Essay
  • Definition Essay
  • Essay (Any Type)
  • Exploratory Essay
  • Expository Essay
  • Informal Essay
  • Literature Essay
  • Multiple Choice Question
  • Narrative Essay
  • Personal Essay
  • Persuasive Essay
  • Powerpoint Presentation
  • Reflective Writing
  • Research Essay
  • Response Essay
  • Scholarship Essay
  • Term Paper
We use cookies to provide you with the best possible experience. By using this website you are accepting the use of cookies mentioned in our Privacy Policy.