| 研究生: |
馬卡薇 Kavitha Mani |
|---|---|
| 論文名稱: |
Online Medical Advertisement Scams: Investigating the Scam on Medical Donations and Charities Experienced by Plebeians. The Meditating Role of Perceived Severity. Online Medical Advertisement Scams: Investigating the Scam on Medical Donations and Charities Experienced by Plebeians. The Meditating Role of Perceived Severity. |
| 指導教授: |
溫敏杰
Wen, Miin-Jye |
| 學位類別: |
碩士 Master |
| 系所名稱: |
管理學院 - 國際經營管理研究所 Institute of International Management |
| 論文出版年: | 2022 |
| 畢業學年度: | 110 |
| 語文別: | 英文 |
| 論文頁數: | 51 |
| 外文關鍵詞: | Social networks, Medical scam, Covid-19, Humanitarian crises, Perceived security, Perceived severity |
| 相關次數: | 點閱:57 下載:0 |
| 分享至: |
| 查詢本校圖書館目錄 查詢臺灣博碩士論文知識加值系統 勘誤回報 |
The internet ushered forth a new era of global connectedness. Even the internet's creators were unable to fully grasp its immense potential. Conversely, the internet has always been a plague that leads to cybercrime and other virtual scandals. This study will examine the impact of information sharing, risk perception, and vulnerability on information security. In terms of digital platforms, research is still in its infancy, with most studies focusing on humanistic catastrophes. Humanity has always been present in pandemics and disasters. People from all across the world have stepped forward to help those in need. Sadly, we've noticed an uptick in charity frauds as crooks try to profit from the situation. Since perceived severity is a negative emotion, this study will only focus on the meditation impact of perceived severity. This study is based on data acquired from 308 ordinary people in India via an online poll. Perceived severity influences information security favorably, proving the study's objective and extending our research to futuristic concepts on sorts of information security like extortion and other thefts of information on perceived severity.
Abdulkareem, S. A., Augustijn, E.-W., Filatova, T., Musial, K., & Mustafa, Y. T.
(2020). Risk perception and behavioral change during epidemics: Comparing
models of individual and collective learning. PloS one, 15(1), e0226483.
Akdemir, N., & Yenal, S. (2021). How Phishers Exploit the Coronavirus Pandemic: A
Content Analysis of COVID-19 Themed Phishing Emails. SAGE Open, 11(3),
21582440211031879.
Akram, M., Nasar, A., & Rehman, A. (2021). Misuse of charitable giving to finance
violent extremism; A futuristic actions study amidst COVID-19 pandemic.
Social Sciences & Humanities Open, 4(1), 100140.
Al-Mubaraki, H. M., & Busler, M. (2017). Challenges and opportunities of innovation
and incubators as a tool for knowledge-based economy. Journal of Innovation
and Entrepreneurship, 6(1), 1-18.
Amundsen, I. (2020). Covid-19, cash transfers, and corruption. U4 Brief, 9.
Anderson, C. L., & Agarwal, R. (2010). Practicing safe computing: A multimethod
empirical examination of home computer user security behavioral intentions.
MIS quarterly, 613-643.
Aquino, K., Galperin, B. L., & Bennett, R. J. (2004). Social status and aggressiveness
as moderators of the relationship between interactional justice and workplace
deviance. Journal of Applied Social Psychology, 34(5), 1001-1029.
Archdeacon, T. J. (1994). Correlation and regression analysis: a historian's guide:
Univ of Wisconsin Press.
Baron, R. M., & Kenny, D. A. (1986). The moderator–mediator variable distinction in
social psychological research: Conceptual, strategic, and statistical
considerations. Journal of personality and social psychology, 51(6), 1173.
Bernardi, L. (2002). Determinants of individual AIDS risk perception: knowledge,
behavioural control and social influence. African Journal of AIDS Research,
1(2), 111-124.
Berry, C. M., Ones, D. S., & Sackett, P. R. (2007). Interpersonal deviance,
organizational deviance, and their common correlates: a review and metaanalysis. Journal of applied psychology, 92(2), 410.
Biernacki, P., & Waldorf, D. (1981). Snowball sampling: Problems and techniques of
chain referral sampling. Sociological methods & research, 10(2), 141-163.
Buglass, S. L., Binder, J. F., Betts, L. R., & Underwood, J. D. (2016). When ‘friends’
collide: Social heterogeneity and user vulnerability on social network sites.
Computers in Human Behavior, 54, 62-72.
Buil-Gil, D., Miró-Llinares, F., Moneva, A., Kemp, S., & Díaz-Castaño, N. (2021).
Cybercrime and shifts in opportunities during COVID-19: a preliminary
analysis in the UK. European Societies, 23(sup1), S47-S59.
Chen, L. M., Cheng, W., & Ho, H.-C. (2015). Perceived severity of school bullying in
elementary schools based on participants’ roles. Educational Psychology,
35(4), 484-496.
Consumer Reports , D. L. (2015). Privacy Experiences & Attitudes Survey. CR Survey
Research Department.
Crossler, R. E., Johnston, A. C., Lowry, P. B., Hu, Q., Warkentin, M., & Baskerville,
R. (2013). Future directions for behavioral information security research.
computers & security, 32, 90-101.
Dang-Pham, D., Pittayachawan, S., & Bruno, V. (2017). Applications of social
network analysis in behavioural information security research: Concepts and
empirical analysis. Computers & Security, 68, 1-15.
Deloitte. (2021). Changing consumer preferences towards health care services: The
impact of COVID-19. Deloitte Healthcare Consumer Survey.
Estrada-Jiménez, J., Parra-Arnau, J., Rodríguez-Hoyos, A., & Forné, J. (2017). Online
advertising: Analysis of privacy threats and protection approaches. Computer
Communications, 100, 32-51.
Ferrer, R. A., Klein, W. M., Persoskie, A., Avishai-Yitshak, A., & Sheeran, P. (2016).
The tripartite model of risk perception (TRIRISK): distinguishing deliberative,
affective, and experiential components of perceived risk. Annals of Behavioral
Medicine, 50(5), 653-663.
Ferrer, R. A., Portnoy, D. B., & Klein, W. M. (2013). Worry and risk perceptions as
independent and interacting predictors of health protective behaviors. Journal
of health communication, 18(4), 397-409.
Gao, S., Li, W., Ling, S., Dou, X., & Liu, X. (2019). An empirical study on the
influence path of environmental risk perception on behavioral responses in
China. International journal of environmental research and public health,
16(16), 2856.
Goel, I., Sharma, S., & Kashiramka, S. (2021). Effects of the COVID-19 pandemic in
India: an analysis of policy and technological interventions. Health Policy and
Technology, 10(1), 151-164.
Goldfarb, A., & Tucker, C. E. (2011). Privacy regulation and online advertising.
Management science, 57(1), 57-71.
Grabe, M. E., & Drew, D. G. (2007). Crime cultivation: Comparisons across media
genres and channels. Journal of Broadcasting & Electronic Media, 51(1), 147-171.
Hajli, N. (2015). Social commerce constructs and consumer's intention to buy.
International journal of information management, 35(2), 183-191.
Hatala, J. P., & George Lutta, J. (2009). Managing information sharing within an
organizational setting: A social network perspective. Performance Improvement Quarterly, 21(4), 5-33.
Hayes, A. F. (2012). PROCESS: A versatile computational tool for observed variable
mediation, moderation, and conditional process modeling: University of
Kansas, KS.
Hillemane, B. S. M., Satyanarayana, K., & Chandrashekar, D. (2019). Technology
business incubation for start-up generation: A literature review toward a
conceptual framework. International Journal of Entrepreneurial Behavior &
Research.
Hulland, J. (1999). Use of partial least squares (PLS) in strategic management
research: A review of four recent studies. Strategic management journal,
20(2), 195-204.
Ifinedo, P. (2012). Understanding information systems security policy compliance: An integration of the theory of planned behavior and the protection motivation
theory. Computers & Security, 31(1), 83-95.
James, R. N. (2018). Increasing charitable donation intentions with preliminary
importance ratings. International Review on Public and Nonprofit Marketing,
15(3), 393-411.
Jones, E. C., Faas, A. J., Murphy, A. D., Tobin, G. A., Whiteford, L. M., & McCarty,
C. (2013). Cross-cultural and site-based influences on demographic, wellbeing, and social network predictors of risk perception in hazard and disaster
settings in Ecuador and Mexico. Human Nature, 24(1), 5-32.
Kim, H. J. (2012). Online social media networking and assessing its security risks.
International journal of security and its applications, 6(3), 11-18.
Kim, J.-N., & Grunig, J. E. (2011). Problem solving and communicative action: A
situational theory of problem solving. Journal of communication, 61(1), 120-149.
Kim, J., Lee, C., & Elias, T. (2015). Factors affecting information sharing in social
networking sites amongst university students: Application of the knowledge sharing model to social networking sites. Online Information Review.
Kitchovitch, S., & Lio, P. (2010). Risk perception and disease spread on social
networks. Procedia Computer Science, 1(1), 2345-2354.
Laitinen, K., & Sivunen, A. (2020). Enablers of and constraints on employees'
information sharing on enterprise social media. Information Technology &
People.
Laplume, A. (2018). Blockchain ventures and international business International
Business in the Information and Digital Age: Emerald Publishing Limited.
Lazer, D. M. J., Baum, M. A., Benkler, Y., Berinsky, A. J., Greenhill, K. M.,
Menczer, F., . . . Zittrain, J. L. (2018). The science of fake news. Science,359(6380), 1094-1096.
Lee, S.-L. (2019). Predicting SNS addiction with the Big Five and the Dark Triad.
Cyberpsychology: Journal of Psychosocial Research on Cyberspace, 13(1).
Lewicki, R. J., Poland, T., Minton, J. W., & Sheppard, B. H. (1997). Dishonesty as
deviance: A typology of workplace dishonesty and contributing factors:
Elsevier Science/JAI Press.
Marcoux, T., Galeano, K., Galeano, R., DiCicco, K., Rubaye, H., Mead, E., . . .
Galeano, A. (2021). A public online resource to track COVID-19
misinfodemic. Social Network Analysis and Mining, 11.
Martens, M., De Wolf, R., & De Marez, L. (2019). Investigating and comparing the
predictors of the intention towards taking security measures against malware,
scams and cybercrime in general. Computers in Human Behavior, 92, 139-150.
Miller, W. R., & Rollnick, S. (2012). Motivational interviewing: Helping people
change: Guilford press.
Norman, P., Boer, H., Seydel, E. R., & Mullan, B. (2015). Protection motivation
theory. Predicting and changing health behavior, 70-106.
Owen, T., Noble, W., & Speed, F. C. (2017). The challenges posed by scammers to
online support groups: The ‘deserving’and the ‘undeserving’victims of scams
New perspectives on cybercrime (pp. 213-240): Springer.
Patwa, P., Sharma, S., Pykl, S., Guptha, V., Kumari, G., Akhtar, M. S., . . .Chakraborty, T. (2021). Fighting an Infodemic: COVID-19 Fake News Dataset. Paper presented at the CONSTRAINT@AAAI.
Pooranian, Z., Conti, M., Haddadi, H., & Tafazolli, R. (2021). Online Advertising
Security: Issues, Taxonomy, and Future Directions. IEEE Communications
Surveys & Tutorials.
Potter, W. J. (2014). A Critical Analysis of Cultivation Theory. Journal of
Communication, 64(6), 1015-1036.
Rangone, A., & Busolli, L. (2021). Managing charity 4.0 with Blockchain: a case
study at the time of Covid-19. International Review on Public and Nonprofit
Marketing, 18(4), 491-521.
Richards, M. (2019). Disruptive innovations: Blockchain and spinoffs Advances in the Technology of Managing People: Contemporary Issues in Business: Emerald
Publishing Limited.
Romer, D., Jamieson, K. H., & Aday, S. (2003). Television news and the cultivation
of fear of crime. Journal of communication, 53(1), 88-104.
Scherer, C. W., & Cho, H. (2003). A social network contagion theory of risk
perception. Risk Analysis: An International Journal, 23(2), 261-267.
Sheikh, Z., Yezheng, L., Islam, T., Hameed, Z., & Khan, I. U. (2019). Impact of social
commerce constructs and social support on social commerce intentions.
Information Technology & People, 32.
Shi, L., & Stevens, G. D. (2021). Vulnerable populations in the United States: John
Wiley & Sons.
Sjöberg, L. (2000). Factors in Risk Perception. Risk Analysis, 20(1), 1-12.
Stephenson, R., Chavanduka, T. M., Rosso, M. T., Sullivan, S. P., Pitter, R. A.,
Hunter, A. S., & Rogers, E. (2020). Contrasting the perceived severity of
COVID-19 and HIV infection in an online survey of gay, bisexual, and other
men who have sex with men during the US COVID-19 epidemic. American
Journal of Men's Health, 14(5), 1557988320957545.
Stewart, A. (2004). On risk: Perception and direction. Computers & Security, 23, 362-370.
Sura, S., Ahn, J., & Lee, O. (2017). Factors influencing intention to donate via social
network site (SNS): From Asian’s perspective. Telematics and Informatics,
34(1), 164-176.
Surka, M. (2020). Combatting Fraud in the time of COVID-19: A Consumer Markets
Perspective. KPMG.
Tabachnick, B. G., Fidell, L. S., & Ullman, J. B. (2007). Using multivariate statistics
(Vol. 5): Pearson Boston, MA.
Treiblmaier, H., & Pollach, I. (2006). A framework for measuring people's intention to donate online. PACIS 2006 Proceedings, 88.
UNDP. (2020). Temporary Basic Income to protect the world's poorest people could
slow the surge in COVID-19 cases. UNDP Press Release.
Väyrynen, K., Hekkala, R., & Liias, T. (2013). Knowledge protection challenges of
social media encountered by organizations. Journal of Organizational
Computing and Electronic Commerce, 23(1-2), 34-55.
Waizenegger, L., McKenna, B., Cai, W., & Bendz, T. (2020). An affordance
perspective of team collaboration and enforced working from home during
COVID-19. European Journal of Information Systems, 29(4), 429-442.
Weinstein, N. D. (2000). Perceived probability, perceived severity, and health protective behavior. Health Psychology, 19(1), 65.
Whitty, M. T. (2013). The scammers persuasive techniques model: Development of a stage model to explain the online dating romance scam. British Journal of
Criminology, 53(4), 665-684.
Williams, E. J., Beardmore, A., & Joinson, A. N. (2017). Individual differences in
susceptibility to online influence: A theoretical review. Computers in Human
Behavior, 72, 412-421.
Witte, K. (1996). Predicting risk behaviors: Development and validation of a
diagnostic scale. Journal of health communication, 1(4), 317-342.
Witte, K., & Allen, M. (2000). A meta-analysis of fear appeals: Implications for
effective public health campaigns. Health education & behavior, 27(5), 591-615.
Workman, M. (2008). Wisecrackers: A theory‐grounded investigation of phishing and pretext social engineering threats to information security. Journal of the
American Society for Information Science and Technology, 59(4), 662-674.
Zuboff, S. (2019). The Age of Surveillance Capitalism: The Fight for a Human Future
at the New Frontier of Power: Barack Obama's Books of 2019: Profile.