Organizations Respond to Phishing: Exploring the Public Relations Tackle Box

@article{Baker2007OrganizationsRT,
  title={Organizations Respond to Phishing: Exploring the Public Relations Tackle Box},
  author={Emiley M. Baker and W. Baker and J. Tedesco},
  journal={Communication Research Reports},
  year={2007},
  volume={24},
  pages={327 - 339}
}
  • Emiley M. Baker, W. Baker, J. Tedesco
  • Published 2007
  • Psychology
  • Communication Research Reports
  • Relationship management theory focuses on processes of shared goals and favorable outcomes for organizations and their publics. Relationship management theory also provides theoretical justification for research exploring the threat phishing poses to upend the shared goal between organizations and their publics to secure online financial and personal information. Phishing refers to the fraudulent and increasingly authentic looking e-mail attempts aimed to lure unsuspecting recipients into… CONTINUE READING
    9 Citations
    Phishing counter measures and their effectiveness – literature review
    • 7
    • Highly Influenced
    • PDF
    Phishing counter measures and their effectiveness - literature review
    • 100
    • Highly Influenced
    A Losing Strategy: The Impact of Nondisclosure in Social Media on Relationships
    • 80
    • PDF
    Research Article Phishing Susceptibility: An Investigation Into the Processing of a Targeted Spear Phishing Email
    • 107
    Native Advertising as a New Public Relations Tactic
    • 37
    • PDF
    Promoting information secure behaviour in an organizational context.
    • PDF

    References

    SHOWING 1-10 OF 20 REFERENCES
    Plugging the “Phishing” Hole: Legislation Versus Technology
    • 15
    • Highly Influential
    Government-community relationships: extending the relational theory of public relations
    • 153
    Using Research in Public Relations: Applications to Program Management
    • 188
    Explicating Relationship Management as a General Theory of Public Relations
    • 534
    • Highly Influential
    Technology and web user data privacy - a survey of risks and countermeasures
    • J. Linn
    • Computer Science
    • IEEE Security & Privacy
    • 2005
    • 31
    • Highly Influential
    Crisis Management: Advantages of a Relational Perspective
    • 115
    • Highly Influential
    FraudWatch International
    • Retrieved October 25, 2005, from http:// www.fraudwatchinternational.com/internet/phishing/index/ebay.shtm
    • 2005
    Survey: two million bank accounts robbed
    • MSNBC.com. Retrieved August 18, 2005, from http://msnbc.msn.com/id/5184077/print/1/displaymode/1098/
    • 2004