Organizations Respond to Phishing: Exploring the Public Relations Tackle Box

@article{Baker2007OrganizationsRT,
  title={Organizations Respond to Phishing: Exploring the Public Relations Tackle Box},
  author={Emiley M. Baker and Wade H. Baker and John C. Tedesco},
  journal={Communication Research Reports},
  year={2007},
  volume={24},
  pages={327 - 339}
}
Relationship management theory focuses on processes of shared goals and favorable outcomes for organizations and their publics. Relationship management theory also provides theoretical justification for research exploring the threat phishing poses to upend the shared goal between organizations and their publics to secure online financial and personal information. Phishing refers to the fraudulent and increasingly authentic looking e-mail attempts aimed to lure unsuspecting recipients into… 

Phishing counter measures and their effectiveness - literature review

  • S. Purkait
  • Business, Computer Science
    Inf. Manag. Comput. Secur.
  • 2012
The findings reveal that the current anti‐phishing approaches that have seen significant deployments over the internet can be classified into eight categories and the different approaches proposed so far are all preventive in nature.

Organizational Characteristics Associated with Vulnerability to Social Engineering Deception: A Qualitative Analysis

ABSTRACT Social engineering, the manipulation and deception of individuals to gain access to otherwise secure systems and information, has become a major vector to compromise the information security

A Losing Strategy: The Impact of Nondisclosure in Social Media on Relationships

Using a posttest-only experimental design with control (N = 409), this study investigated the role of nondisclosure and its impact on perceived relational maintenance strategies in the context of

Research Article Phishing Susceptibility: An Investigation Into the Processing of a Targeted Spear Phishing Email

This study examines how users' attention to “visual triggers” and “phishing deception indicators” influence their decision-making processes and consequently their decisions, and suggests that overall cognitive effort expended in email processing decreases with attention to visual triggers and phishing deceived indicators.

Native Advertising as a New Public Relations Tactic

Using a pretest and posttest online experiment (N = 105), this study empirically explored the impact of native advertising sponsorship disclosure on organization–public relationships (OPR),

Framework for Phishing Detection in Email under Heave Using Conceptual Similarity

A novel procedure named as “Framework for Phishing detection in email under heave using conceptual similarity” to adaptively classify the emails based on specified and critical properties which give more information about the source of the phishing.

Cyber Perspectives: Internet Exploitation and Business Survivability

This article examined the changing nature of cyber-attacks and techniques in the context of an online marketplace and provided a taxonomy of tools and best practices that could create awareness and enhance the survivability of businesses in a highly collaborative yet insecure environment.

Promoting information secure behaviour in an organizational context.

Supervisor: Ilke Aydogan Handed in: 21-06-2016

A Comparative Study of Network Securities on Mobile Transaction

If mobile payments offer acceptable security to the average user is verified, as this research presents, explains, and compares some of the most common wireless networks that enable mobile payments.

Phishing counter measures and their effectiveness – literature review

Purpose – Phishing is essentially a social engineering crime on the Web, whose rampant occurrences and technique advancements are posing big challenges for researchers in both academia and the

References

SHOWING 1-10 OF 20 REFERENCES

Plugging the “Phishing” Hole: Legislation Versus Technology

It is concluded that although the Anti-Phishing Act can play a supporting role in the battle, technological solutions are the most effective means of reducing or eliminating phishing attacks.

Public relations as relationship management : a relational approach to the study and practice of public relations

Foreword (By James Grunig) Introduction (By Eyun-Jung Ki, Jeong-Nam Kim, & John Ledingham) Section I. Relationship Theory Evolvement since Vol. 1 Ch-1. Revisiting Organization-Public Relationship

Building relationships between organizations and publics: Examining the linkage between organization‐public relationships, evaluations of satisfaction, and behavioral intent

Many public relations practitioners have not incorporated relationship management theory into the practice of public relations because the quantitative and qualitative benefits derived from effective

Using Research in Public Relations: Applications to Program Management

The Role of Research in Public Relations is used to plan programs and evaluate programs, and the Findings for Organizational Change are used fororganizational change.

Explicating Relationship Management as a General Theory of Public Relations

Although the relationship management perspective of public relations is the focus of a substantial body of scholarship, a theory of that perspective has yet to be articulated and explicated. Herein,

Technology and web user data privacy - a survey of risks and countermeasures

  • J. Linn
  • Computer Science
    IEEE Security & Privacy
  • 2005
The author examines privacy risks to user data in a Web environment and explores the characteristics and roles of technical countermeasures, including mechanized privacy policy representations,

Effective public relations.

FraudWatch International

  • Retrieved October 25, 2005, from http:// www.fraudwatchinternational.com/internet/phishing/index/ebay.shtm
  • 2005