簡易檢索 / 詳目顯示

研究生: 馬卡薇
Kavitha Mani
論文名稱: Online Medical Advertisement Scams: Investigating the Scam on Medical Donations and Charities Experienced by Plebeians. The Meditating Role of Perceived Severity.
Online Medical Advertisement Scams: Investigating the Scam on Medical Donations and Charities Experienced by Plebeians. The Meditating Role of Perceived Severity.
指導教授: 溫敏杰
Wen, Miin-Jye
學位類別: 碩士
Master
系所名稱: 管理學院 - 國際經營管理研究所
Institute of International Management
論文出版年: 2022
畢業學年度: 110
語文別: 英文
論文頁數: 51
外文關鍵詞: Social networks, Medical scam, Covid-19, Humanitarian crises, Perceived security, Perceived severity
相關次數: 點閱:57下載:0
分享至:
查詢本校圖書館目錄 查詢臺灣博碩士論文知識加值系統 勘誤回報
  • The internet ushered forth a new era of global connectedness. Even the internet's creators were unable to fully grasp its immense potential. Conversely, the internet has always been a plague that leads to cybercrime and other virtual scandals. This study will examine the impact of information sharing, risk perception, and vulnerability on information security. In terms of digital platforms, research is still in its infancy, with most studies focusing on humanistic catastrophes. Humanity has always been present in pandemics and disasters. People from all across the world have stepped forward to help those in need. Sadly, we've noticed an uptick in charity frauds as crooks try to profit from the situation. Since perceived severity is a negative emotion, this study will only focus on the meditation impact of perceived severity. This study is based on data acquired from 308 ordinary people in India via an online poll. Perceived severity influences information security favorably, proving the study's objective and extending our research to futuristic concepts on sorts of information security like extortion and other thefts of information on perceived severity.

    ABSTRACT I ACKNOWLEDGEMENTS II TABLE OF CONTENTS III LIST OF TABLES VI LIST OF FIGURES VII CHAPTER ONE INTRODUCTION 1 1.1 Research Background. 1 1.2 Research Gaps. 5 1.3 Research Objectives. 5 1.4 Research Questions. 5 1.5 Research Process. 6 CHAPTER TWO LITERATURE REVIEW 7 2.1 Theoretical Background. 7 2.2 Cultivation Theory. 8 2.3 Protection and Motivation Theory. 9 2.4 Cyber Security Issues during Times of Crises. 9 2.5 An Overview of the Online Advertisement Scams. 10 2.6 The Impact of Covid-19 on the Healthcare Industry. 11 2.7 Mitigation of Advertisement Scams and Cyber Security Issues. 13 2.8 Theoretical Background and Research Hypothesis. 14 2.8.1 Information Sharing. 14 2.8.2 Affective Risk Perception. 15 2.8.3 Vulnerability. 16 2.8.4 The Mediating Role of Perceived Severity. 17 2.8.5 Information Security. 18 CHAPTER THREE RESEARCH DESIGN AND METHODOLOGY 19 3.1 Conceptual Framework. 19 3.2 Overview of Construct Definitions. 19 3.3 Summary of Hypotheses. 20 3.4 Sampling Plan. 20 3.5 Variable & Construct Measurements. 22 3.6 Demographic Variables. 24 3.7 Data Analysis and Method. 24 3.7.1 Descriptive Statistics. 25 3.7.2 Common Method Bias. 25 3.7.3 Explanatory Factor Analysis. 25 3.7.4 Hierarchical Regression in SPSS. 26 CHAPTER FOUR RESEARCH RESULTS 27 4.1 Characteristic of Respondents. 27 4.2 Common Method Bias. 28 4.3 Descriptive Data Statistical Analysis. 29 4.4 Explanatory Factor Analysis. 30 4.5 Hierarchal Regression in SPSS. 33 4.6 Mediation Analysis Using PROCESS Macro. 34 CHAPTER FIVE CONCLUSION AND SUGGESTIONS 39 5.1 Recommendations for Scam Preventive Policy. 39 5.2 Implications. 40 5.3 Limitations of the Study. 41 5.4 Conclusion. 41 REFERENCES 43 APPENDICES 48

    Abdulkareem, S. A., Augustijn, E.-W., Filatova, T., Musial, K., & Mustafa, Y. T.
    (2020). Risk perception and behavioral change during epidemics: Comparing
    models of individual and collective learning. PloS one, 15(1), e0226483.
    Akdemir, N., & Yenal, S. (2021). How Phishers Exploit the Coronavirus Pandemic: A
    Content Analysis of COVID-19 Themed Phishing Emails. SAGE Open, 11(3),
    21582440211031879.
    Akram, M., Nasar, A., & Rehman, A. (2021). Misuse of charitable giving to finance
    violent extremism; A futuristic actions study amidst COVID-19 pandemic.
    Social Sciences & Humanities Open, 4(1), 100140.
    Al-Mubaraki, H. M., & Busler, M. (2017). Challenges and opportunities of innovation
    and incubators as a tool for knowledge-based economy. Journal of Innovation
    and Entrepreneurship, 6(1), 1-18.
    Amundsen, I. (2020). Covid-19, cash transfers, and corruption. U4 Brief, 9.
    Anderson, C. L., & Agarwal, R. (2010). Practicing safe computing: A multimethod
    empirical examination of home computer user security behavioral intentions.
    MIS quarterly, 613-643.
    Aquino, K., Galperin, B. L., & Bennett, R. J. (2004). Social status and aggressiveness
    as moderators of the relationship between interactional justice and workplace
    deviance. Journal of Applied Social Psychology, 34(5), 1001-1029.
    Archdeacon, T. J. (1994). Correlation and regression analysis: a historian's guide:
    Univ of Wisconsin Press.
    Baron, R. M., & Kenny, D. A. (1986). The moderator–mediator variable distinction in
    social psychological research: Conceptual, strategic, and statistical
    considerations. Journal of personality and social psychology, 51(6), 1173.
    Bernardi, L. (2002). Determinants of individual AIDS risk perception: knowledge,
    behavioural control and social influence. African Journal of AIDS Research,
    1(2), 111-124.
    Berry, C. M., Ones, D. S., & Sackett, P. R. (2007). Interpersonal deviance,
    organizational deviance, and their common correlates: a review and metaanalysis. Journal of applied psychology, 92(2), 410.
    Biernacki, P., & Waldorf, D. (1981). Snowball sampling: Problems and techniques of
    chain referral sampling. Sociological methods & research, 10(2), 141-163.
    Buglass, S. L., Binder, J. F., Betts, L. R., & Underwood, J. D. (2016). When ‘friends’
    collide: Social heterogeneity and user vulnerability on social network sites.
    Computers in Human Behavior, 54, 62-72.
    Buil-Gil, D., Miró-Llinares, F., Moneva, A., Kemp, S., & Díaz-Castaño, N. (2021).
    Cybercrime and shifts in opportunities during COVID-19: a preliminary
    analysis in the UK. European Societies, 23(sup1), S47-S59.
    Chen, L. M., Cheng, W., & Ho, H.-C. (2015). Perceived severity of school bullying in
    elementary schools based on participants’ roles. Educational Psychology,
    35(4), 484-496.
    Consumer Reports , D. L. (2015). Privacy Experiences & Attitudes Survey. CR Survey
    Research Department.
    Crossler, R. E., Johnston, A. C., Lowry, P. B., Hu, Q., Warkentin, M., & Baskerville,
    R. (2013). Future directions for behavioral information security research.
    computers & security, 32, 90-101.
    Dang-Pham, D., Pittayachawan, S., & Bruno, V. (2017). Applications of social
    network analysis in behavioural information security research: Concepts and
    empirical analysis. Computers & Security, 68, 1-15.
    Deloitte. (2021). Changing consumer preferences towards health care services: The
    impact of COVID-19. Deloitte Healthcare Consumer Survey.
    Estrada-Jiménez, J., Parra-Arnau, J., Rodríguez-Hoyos, A., & Forné, J. (2017). Online
    advertising: Analysis of privacy threats and protection approaches. Computer
    Communications, 100, 32-51.
    Ferrer, R. A., Klein, W. M., Persoskie, A., Avishai-Yitshak, A., & Sheeran, P. (2016).
    The tripartite model of risk perception (TRIRISK): distinguishing deliberative,
    affective, and experiential components of perceived risk. Annals of Behavioral
    Medicine, 50(5), 653-663.
    Ferrer, R. A., Portnoy, D. B., & Klein, W. M. (2013). Worry and risk perceptions as
    independent and interacting predictors of health protective behaviors. Journal
    of health communication, 18(4), 397-409.
    Gao, S., Li, W., Ling, S., Dou, X., & Liu, X. (2019). An empirical study on the
    influence path of environmental risk perception on behavioral responses in
    China. International journal of environmental research and public health,
    16(16), 2856.
    Goel, I., Sharma, S., & Kashiramka, S. (2021). Effects of the COVID-19 pandemic in
    India: an analysis of policy and technological interventions. Health Policy and
    Technology, 10(1), 151-164.
    Goldfarb, A., & Tucker, C. E. (2011). Privacy regulation and online advertising.
    Management science, 57(1), 57-71.
    Grabe, M. E., & Drew, D. G. (2007). Crime cultivation: Comparisons across media
    genres and channels. Journal of Broadcasting & Electronic Media, 51(1), 147-171.
    Hajli, N. (2015). Social commerce constructs and consumer's intention to buy.
    International journal of information management, 35(2), 183-191.
    Hatala, J. P., & George Lutta, J. (2009). Managing information sharing within an
    organizational setting: A social network perspective. Performance Improvement Quarterly, 21(4), 5-33.
    Hayes, A. F. (2012). PROCESS: A versatile computational tool for observed variable
    mediation, moderation, and conditional process modeling: University of
    Kansas, KS.
    Hillemane, B. S. M., Satyanarayana, K., & Chandrashekar, D. (2019). Technology
    business incubation for start-up generation: A literature review toward a
    conceptual framework. International Journal of Entrepreneurial Behavior &
    Research.
    Hulland, J. (1999). Use of partial least squares (PLS) in strategic management
    research: A review of four recent studies. Strategic management journal,
    20(2), 195-204.
    Ifinedo, P. (2012). Understanding information systems security policy compliance: An integration of the theory of planned behavior and the protection motivation
    theory. Computers & Security, 31(1), 83-95.
    James, R. N. (2018). Increasing charitable donation intentions with preliminary
    importance ratings. International Review on Public and Nonprofit Marketing,
    15(3), 393-411.
    Jones, E. C., Faas, A. J., Murphy, A. D., Tobin, G. A., Whiteford, L. M., & McCarty,
    C. (2013). Cross-cultural and site-based influences on demographic, wellbeing, and social network predictors of risk perception in hazard and disaster
    settings in Ecuador and Mexico. Human Nature, 24(1), 5-32.
    Kim, H. J. (2012). Online social media networking and assessing its security risks.
    International journal of security and its applications, 6(3), 11-18.
    Kim, J.-N., & Grunig, J. E. (2011). Problem solving and communicative action: A
    situational theory of problem solving. Journal of communication, 61(1), 120-149.
    Kim, J., Lee, C., & Elias, T. (2015). Factors affecting information sharing in social
    networking sites amongst university students: Application of the knowledge sharing model to social networking sites. Online Information Review.
    Kitchovitch, S., & Lio, P. (2010). Risk perception and disease spread on social
    networks. Procedia Computer Science, 1(1), 2345-2354.
    Laitinen, K., & Sivunen, A. (2020). Enablers of and constraints on employees'
    information sharing on enterprise social media. Information Technology &
    People.
    Laplume, A. (2018). Blockchain ventures and international business International
    Business in the Information and Digital Age: Emerald Publishing Limited.
    Lazer, D. M. J., Baum, M. A., Benkler, Y., Berinsky, A. J., Greenhill, K. M.,
    Menczer, F., . . . Zittrain, J. L. (2018). The science of fake news. Science,359(6380), 1094-1096.
    Lee, S.-L. (2019). Predicting SNS addiction with the Big Five and the Dark Triad.
    Cyberpsychology: Journal of Psychosocial Research on Cyberspace, 13(1).
    Lewicki, R. J., Poland, T., Minton, J. W., & Sheppard, B. H. (1997). Dishonesty as
    deviance: A typology of workplace dishonesty and contributing factors:
    Elsevier Science/JAI Press.
    Marcoux, T., Galeano, K., Galeano, R., DiCicco, K., Rubaye, H., Mead, E., . . .
    Galeano, A. (2021). A public online resource to track COVID-19
    misinfodemic. Social Network Analysis and Mining, 11.
    Martens, M., De Wolf, R., & De Marez, L. (2019). Investigating and comparing the
    predictors of the intention towards taking security measures against malware,
    scams and cybercrime in general. Computers in Human Behavior, 92, 139-150.
    Miller, W. R., & Rollnick, S. (2012). Motivational interviewing: Helping people
    change: Guilford press.
    Norman, P., Boer, H., Seydel, E. R., & Mullan, B. (2015). Protection motivation
    theory. Predicting and changing health behavior, 70-106.
    Owen, T., Noble, W., & Speed, F. C. (2017). The challenges posed by scammers to
    online support groups: The ‘deserving’and the ‘undeserving’victims of scams
    New perspectives on cybercrime (pp. 213-240): Springer.
    Patwa, P., Sharma, S., Pykl, S., Guptha, V., Kumari, G., Akhtar, M. S., . . .Chakraborty, T. (2021). Fighting an Infodemic: COVID-19 Fake News Dataset. Paper presented at the CONSTRAINT@AAAI.
    Pooranian, Z., Conti, M., Haddadi, H., & Tafazolli, R. (2021). Online Advertising
    Security: Issues, Taxonomy, and Future Directions. IEEE Communications
    Surveys & Tutorials.
    Potter, W. J. (2014). A Critical Analysis of Cultivation Theory. Journal of
    Communication, 64(6), 1015-1036.
    Rangone, A., & Busolli, L. (2021). Managing charity 4.0 with Blockchain: a case
    study at the time of Covid-19. International Review on Public and Nonprofit
    Marketing, 18(4), 491-521.
    Richards, M. (2019). Disruptive innovations: Blockchain and spinoffs Advances in the Technology of Managing People: Contemporary Issues in Business: Emerald
    Publishing Limited.
    Romer, D., Jamieson, K. H., & Aday, S. (2003). Television news and the cultivation
    of fear of crime. Journal of communication, 53(1), 88-104.
    Scherer, C. W., & Cho, H. (2003). A social network contagion theory of risk
    perception. Risk Analysis: An International Journal, 23(2), 261-267.
    Sheikh, Z., Yezheng, L., Islam, T., Hameed, Z., & Khan, I. U. (2019). Impact of social
    commerce constructs and social support on social commerce intentions.
    Information Technology & People, 32.
    Shi, L., & Stevens, G. D. (2021). Vulnerable populations in the United States: John
    Wiley & Sons.
    Sjöberg, L. (2000). Factors in Risk Perception. Risk Analysis, 20(1), 1-12.
    Stephenson, R., Chavanduka, T. M., Rosso, M. T., Sullivan, S. P., Pitter, R. A.,
    Hunter, A. S., & Rogers, E. (2020). Contrasting the perceived severity of
    COVID-19 and HIV infection in an online survey of gay, bisexual, and other
    men who have sex with men during the US COVID-19 epidemic. American
    Journal of Men's Health, 14(5), 1557988320957545.
    Stewart, A. (2004). On risk: Perception and direction. Computers & Security, 23, 362-370.
    Sura, S., Ahn, J., & Lee, O. (2017). Factors influencing intention to donate via social
    network site (SNS): From Asian’s perspective. Telematics and Informatics,
    34(1), 164-176.
    Surka, M. (2020). Combatting Fraud in the time of COVID-19: A Consumer Markets
    Perspective. KPMG.
    Tabachnick, B. G., Fidell, L. S., & Ullman, J. B. (2007). Using multivariate statistics
    (Vol. 5): Pearson Boston, MA.
    Treiblmaier, H., & Pollach, I. (2006). A framework for measuring people's intention to donate online. PACIS 2006 Proceedings, 88.
    UNDP. (2020). Temporary Basic Income to protect the world's poorest people could
    slow the surge in COVID-19 cases. UNDP Press Release.
    Väyrynen, K., Hekkala, R., & Liias, T. (2013). Knowledge protection challenges of
    social media encountered by organizations. Journal of Organizational
    Computing and Electronic Commerce, 23(1-2), 34-55.
    Waizenegger, L., McKenna, B., Cai, W., & Bendz, T. (2020). An affordance
    perspective of team collaboration and enforced working from home during
    COVID-19. European Journal of Information Systems, 29(4), 429-442.
    Weinstein, N. D. (2000). Perceived probability, perceived severity, and health protective behavior. Health Psychology, 19(1), 65.
    Whitty, M. T. (2013). The scammers persuasive techniques model: Development of a stage model to explain the online dating romance scam. British Journal of
    Criminology, 53(4), 665-684.
    Williams, E. J., Beardmore, A., & Joinson, A. N. (2017). Individual differences in
    susceptibility to online influence: A theoretical review. Computers in Human
    Behavior, 72, 412-421.
    Witte, K. (1996). Predicting risk behaviors: Development and validation of a
    diagnostic scale. Journal of health communication, 1(4), 317-342.
    Witte, K., & Allen, M. (2000). A meta-analysis of fear appeals: Implications for
    effective public health campaigns. Health education & behavior, 27(5), 591-615.
    Workman, M. (2008). Wisecrackers: A theory‐grounded investigation of phishing and pretext social engineering threats to information security. Journal of the
    American Society for Information Science and Technology, 59(4), 662-674.
    Zuboff, S. (2019). The Age of Surveillance Capitalism: The Fight for a Human Future
    at the New Frontier of Power: Barack Obama's Books of 2019: Profile.

    下載圖示
    2024-01-05公開
    QR CODE