NotesFAQContact Us
Collection
Advanced
Search Tips
Showing all 2 results Save | Export
Harrison, Brynne – ProQuest LLC, 2018
Phishing has become a preferred method among cyber criminals looking to gain access to confidential information. Although most businesses and governmental organizations provide employees with some sort of cyber security training, there is a lack of research examining whether such training methods work to actually reduce susceptibility to…
Descriptors: Training Methods, Information Security, Computer Security, Money Management
Peer reviewed Peer reviewed
Stiff, James; And Others – Communication Research, 1994
Employs time series analysis to model individual and discursive influences on the response latencies of deceivers and truthtellers. Shows that a decay impulse model provides a good description of the data. Finds that message veracity and self-monitoring combined to affect the fit of the decay impulse model. (SR)
Descriptors: Behavior Patterns, Communication Research, Deception, Higher Education