Author:
Sharma Kavya,Zhan Xinhui,Nah Fiona Fui-Hoon,Siau Keng,Cheng Maggie X.
Abstract
PurposePhishing attacks are the most common cyber threats targeted at users. Digital nudging in the form of framing and priming may reduce user susceptibility to phishing. This research focuses on two types of digital nudging, framing and priming, and examines the impact of framing and priming on users' behavior (i.e. action) in a cybersecurity setting. It draws on prospect theory, instance-based learning theory and dual-process theory to generate the research hypotheses.Design/methodology/approachA 3 × 2 experimental study was carried out to test the hypotheses. The experiment consisted of three levels for framing (i.e. no framing, negative framing and positive framing) and two levels for priming (i.e. with and without priming).FindingsThe findings suggest that priming users to information security risks reduces their risk-taking behavior, whereas positive and negative framing of information security messages regarding potential consequences of the available choices do not change users' behavior. The results also indicate that risk-averse cybersecurity behavior is associated with greater confidence with the action, greater perceived severity of cybersecurity risks, lower perceived susceptibility to cybersecurity risks resulting from the action and lower trust in the download link.Originality/valueThis research shows that digital nudging in the form of priming is an effective way to reduce users' exposure to cybersecurity risks.
Reference76 articles.
1. ‘I’ seek pleasures and ‘we’ avoid pains: the role of self-regulatory goals in information processing and persuasion;Journal of Consumer Research,2001
2. Alice in warningland: a large-scale field study of browser security warning effectiveness,2013
3. Practicing safe computing: a multimethod empirical examination of home computer user security behavioral intentions;MIS Quarterly,2010
4. Equifax breach caused by lone employee's error, former C.E.O. says;The New York Times,2017
5. Beware of these top five social engineering scams;Forbes,2020
Cited by
11 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献