Fogg behavioral model

130 views 10:37 am 0 Comments May 21, 2023

Fogg behavioral model

Fogg Behavior Model for Vishing and

Smishing Scam Prevention:

Increase motivation by educating on negative

impacts

Improve ability by providing practical advice

Create triggers with reminders to be vigilant

Cladini Principles of influence

The Cialdini Principles of Influence are six

principles used to persuade people: reciprocity,

commitment and consistency, social proof, liking,

authority, and scarcity. Applying these principles to

prevent cyber attacks involves offering incentives

for completing cybersecurity training, encouraging

individuals to commit to regularly updating their

passwords, and highlighting the number of

individuals who have already taken steps to secure

their online presence.

Mind Space model

The MINDSPACE model is a framework that

consists of nine elements and can be used to

influence individuals to practice safe online

behavior. These elements include the

messenger, incentives, norms, defaults,

salience, priming, affect, commitment, and ego.

By leveraging different elements of the model,

such as social norms and defaults, organizations

can design effective cybersecurity interventions

and reduce the risk of successful cyber attacks.

Cognitive

Theory

Cognitive theory explains how individuals process

information and make decisions, and can be applied

to preventing cyber attacks. By understanding how

individuals perceive and process information related

to cybersecurity, organizations can encourage safe

online behavior. This can be done by making the risks

of cyber attacks more salient, providing practical tips

for staying safe online, and implementing security

measures such as two-factor authentication and

automatic updates to reduce cognitive load

Conclusion

Preventing cyber attacks requires a multi-faceted

approach that takes into account human behavior.

By applying frameworks such as the Fogg Behavior

Model, Cialdini Principles of Influence,

MINDSPACE Model, and cognitive theory,

individuals and organizations can work to prevent

cyber attacks and protect themselves from harm.

Through education, training, and the

implementation of security measures, we can

create a safer digital environment for all.

References

American Management Association (AMA). (2017). Cybersecurity and the Six Principles of

Influence. https://www.amanet.org/articles/cybersecurity-and-the-six-principles-of-influence/

Marczak, M., Krol, D., & McKeown, J. (2019). Hacking human behavior: Applying the Social Engineering Principles of

Influence. https://www.fireeye.com/blog/threat-research/2019/03/hacking-human-behavior-applying-social-engineering-princip

les-influence.html

Liu, H., Li, Z., & Zhao, Y. (2021). Applying MINDSPACE Model to Study Cybersecurity Behaviors of Young Adults. International

Journal of Cyber Criminology, 15(1), 1-20.

Schneier, B., & Larson, M. (2018). The psychology of cybersecurity and risk. Journal of Cybersecurity, 4(1), 1-13.

Kirlappos, I., & Sasse, M. A. (2017). Security education against the phishing threat: a reality check on user recall of phishing

indicators. Journal of Cybersecurity, 3(1), 37-48.

Sharma, S. K., & Gupta, B. B. (2021). Modelling cognitive behaviour for cybersecurity awareness: a conceptual framework.

International Journal of Electronic Security and Digital Forensics, 13(1), 1-22.

.

Felt, A. P., Evans, D., Klingenstein, K., & Song, D. (2015). Android permissions: User attention, comprehension, and behavior. In

Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems (pp. 209-218).

Sheng, S., Holbrook, M., Kumaraguru, P., & Cranor, L. F. (2010). Who falls for phishing scams? A demographic analysis of phishing

susceptibility and effectiveness of interventions. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems

(pp. 373-382).

National Institute of Standards and Technology. (2017). Framework for improving