Organizations Respond to Phishing: Exploring the Public Relations Tackle Box

  title={Organizations Respond to Phishing: Exploring the Public Relations Tackle Box},
  author={Emiley M. Baker and Wade H. Baker and John C. Tedesco},
  journal={Communication Research Reports},
  pages={327 - 339}
Relationship management theory focuses on processes of shared goals and favorable outcomes for organizations and their publics. Relationship management theory also provides theoretical justification for research exploring the threat phishing poses to upend the shared goal between organizations and their publics to secure online financial and personal information. Phishing refers to the fraudulent and increasingly authentic looking e-mail attempts aimed to lure unsuspecting recipients into… 
Phishing counter measures and their effectiveness – literature review
Purpose – Phishing is essentially a social engineering crime on the Web, whose rampant occurrences and technique advancements are posing big challenges for researchers in both academia and the
Phishing counter measures and their effectiveness - literature review
  • S. Purkait
  • Computer Science
    Inf. Manag. Comput. Secur.
  • 2012
The findings reveal that the current anti‐phishing approaches that have seen significant deployments over the internet can be classified into eight categories and the different approaches proposed so far are all preventive in nature.
A Losing Strategy: The Impact of Nondisclosure in Social Media on Relationships
Using a posttest-only experimental design with control (N = 409), this study investigated the role of nondisclosure and its impact on perceived relational maintenance strategies in the context of
Research Article Phishing Susceptibility: An Investigation Into the Processing of a Targeted Spear Phishing Email
This study examines how users' attention to “visual triggers” and “phishing deception indicators” influence their decision-making processes and consequently their decisions, and suggests that overall cognitive effort expended in email processing decreases with attention to visual triggers and phishing deceived indicators.
Native Advertising as a New Public Relations Tactic
Using a pretest and posttest online experiment (N = 105), this study empirically explored the impact of native advertising sponsorship disclosure on organization–public relationships (OPR),
Organizational Characteristics Associated with Vulnerability to Social Engineering Deception: A Qualitative Analysis
Social engineering, the manipulation and deception of individuals to gain access to otherwise secure systems and information, has become a major vector to compromise the information security of org...
Framework for Phishing Detection in Email under Heave Using Conceptual Similarity
-Today everything is available in online. Every day so many users start their online transactions. The main reason behind this is number of alternatives and best deals are available there. They can
Cyber Perspectives: Internet Exploitation and Business Survivability
The purpose of this article is to present an overview of the challenges of cyber threats and the survivability of businesses. The ubiquitous and uncontrollable nature of the internet has caused the
Promoting information secure behaviour in an organizational context.
Supervisor: Ilke Aydogan Handed in: 21-06-2016


Plugging the “Phishing” Hole: Legislation Versus Technology
This iBrief analyzes the Anti-Phishing Act of 2005, legislation aimed at curbing the problem of “phishing.” Phishing is the sending of fraudulent emails which appear to be from legitimate businesses
Public relations as relationship management : a relational approach to the study and practice of public relations
Foreword (By James Grunig) Introduction (By Eyun-Jung Ki, Jeong-Nam Kim, & John Ledingham) Section I. Relationship Theory Evolvement since Vol. 1 Ch-1. Revisiting Organization-Public Relationship
Building relationships between organizations and publics: Examining the linkage between organization‐public relationships, evaluations of satisfaction, and behavioral intent
Many public relations practitioners have not incorporated relationship management theory into the practice of public relations because the quantitative and qualitative benefits derived from effective
Government-community relationships: extending the relational theory of public relations
Abstract A study of government-citizen relationships found that public relations can contribute to community building. The study also found that the Bruning-Ledingham Relationship Scale is an
Using Research in Public Relations: Applications to Program Management
The Role of Research in Public Relations is used to plan programs and evaluate programs, and the Findings for Organizational Change are used fororganizational change.
Explicating Relationship Management as a General Theory of Public Relations
Although the relationship management perspective of public relations is the focus of a substantial body of scholarship, a theory of that perspective has yet to be articulated and explicated. Herein,
Technology and web user data privacy - a survey of risks and countermeasures
  • J. Linn
  • Computer Science
    IEEE Security & Privacy
  • 2005
The author examines privacy risks to user data in a Web environment and explores the characteristics and roles of technical countermeasures, including mechanized privacy policy representations,
FraudWatch International
  • Retrieved October 25, 2005, from http://
  • 2005
Survey: two million bank accounts robbed
  • Retrieved August 18, 2005, from
  • 2004