⚠ Vui lòng bật JavaScript để có trải nghiệm tốt nhất trên website này!

Impact of framing and priming on users’ behavior in cybersecurityImpact of framing and priming on users' behavior in cybersecurity

Screenshot 2025 06 10 121435
Miễn phí
Tác giả: Chưa cập nhật
Ngày: Trước 2025
Định dạng file: .PDF
Đánh giá post
9 lượt xem

TABLE OF CONTENTS

ABSTRACT ……………………………………………………………………………………………………….. iii
ACKNOWLEDGMENTS ……………………………………………………………………………………. iv
LIST OF ILLUSTRATIONS ………………………………………………………………………………. viii
LIST OF TABLES ………………………………………………………………………………………………. ix
SECTION
1. INTRODUCTION ……………………………………………………………………………………….1
2. LITERATURE REVIEW ……………………………………………………………………………..3
2.1. USERS’ BEHAVIOR IN CYBERSECURITY …………………………………………3
2.2. LITERATURE REVIEW ON MESSAGE FRAMING ……………………………..4
2.3. LITERATURE REVIEW ON PRIMING …………………………………………………5
3. THEORETICAL FOUNDATION AND HYPOTHESES …………………………………8
3.1. PROSPECT THEORY…………………………………………………………………………..8
3.2. INSTANCE-BASED LEARNING THEORY …………………………………………10
4. RESEARCH METHODOLOGY …………………………………………………………………12
4.1. EXPERIMENTAL DESIGN ………………………………………………………………..12
4.2. RESEARCH PROCEDURES ……………………………………………………………….12
4.3. MEASUREMENT ………………………………………………………………………………14
4.3.1. Confidence With Action ……………………………………………………………..14
4.3.2. Perceived Severity ……………………………………………………………………..15
4.3.3. Perceived Susceptibility ………………………………………………………………15
4.3.4. Trust …………………………………………………………………………………………16
4.3.5. Fear ………………………………………………………………………………………….16
4.3.6. Framing Manipulation Check ………………………………………………………17
4.3.7. Priming Manipulation Check ……………………………………………………….17
4.3.8. Subject Background Questionnaire ………………………………………………18
4.4. PILOT TESTS ……………………………………………………………………………………18
5. DATA ANALYSIS ……………………………………………………………………………………19
5.1. MANIPULATION CHECK ANALYSIS……………………………………………….21
5.2. MEASUREMENT VALIDATION ……………………………………………………….21
5.3. BINARY LOGISTIC REGRESSION ANALYSIS………………………………….24
5.3.1. Framing …………………………………………………………………………………….25
5.3.2. Priming …………………………………………………………………………………….25
5.4. MULTIVARIATE ANALYSIS OF VARIANCE ……………………………………26
5.4.1. Confidence With Action ……………………………………………………………..28
5.4.2. Perceived Severity ……………………………………………………………………..29
5.4.3. Perceived Susceptibility ………………………………………………………………29
5.4.4. Trust …………………………………………………………………………………………29
5.4.5. Fear ………………………………………………………………………………………….30
6. DISCUSSIONS………………………………………………………………………………………….31
7. LIMITATIONS AND FUTURE RESEARCH ………………………………………………32
8. CONCLUSIONS ……………………………………………………………………………………….33
APPENDICES
A. SCENARIO DETAILS ………………………………………………………………………………34
B. EXPERIMENTAL CONDITIONS FOR 3X2 FACTORIAL DESIGN …………….36
C. SUBJECT BACKGROUND QUESTIONNAIRE …………………………………………43
D. CYBERSECURITY AWARENESS QUESTIONNAIRE ………………………………45
E. SUMMARY OF LITERATURE REVIEW …………………………………………………..47
BIBLIOGRAPHY ………………………………………………………………………………………………..52
VITA ………………………………………………………………………………………………………………….56

Liên kết tải về