Update search
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
NARROW
Format
Journal
Type
Date
Availability
1-2 of 2
Keywords: Truth-default theory
Close
Follow your search
Access your saved searches in your account
Would you like to receive an alert when new items match your search?
Sort by
Journal Articles
Message involvement increases phishing susceptibility: can suspicion and awareness make a difference?
Available to Purchase
Journal:
Information and Computer Security
Information and Computer Security 1–21.
Published: 01 January 2026
...Jiangwei Li; Alton Chua Purpose This paper aims to investigate the influence of message involvement, suspicion and phishing awareness on users’ susceptibility to phishing attacks through the theoretical lens of the truth-default theory. Design/methodology/approach An online scenario-based...
Journal Articles
The effects of persuasion principles on perceived honesty during shoulder surfing attacks
Available to Purchase
Journal:
Information and Computer Security
Information and Computer Security (2025) 33 (2): 267–283.
Published: 08 August 2024
... and deception Social proof Truth-default theory Perceived honesty Social engineering is the act of manipulating a person to take an action such as divulging sensitive information, e.g. passwords (Hadnagy, 2011). Social engineering is a common and costly cybersecurity threat. For example, a survey...
