Fogg behavioral model
Fogg Behavior Model for Vishing and
Smishing Scam Prevention:
Increase motivation by educating on negative
impacts
Improve ability by providing practical advice
Create triggers with reminders to be vigilant
Cladini Principles of influence
The Cialdini Principles of Influence are six
principles used to persuade people: reciprocity,
commitment and consistency, social proof, liking,
authority, and scarcity. Applying these principles to
prevent cyber attacks involves offering incentives
for completing cybersecurity training, encouraging
individuals to commit to regularly updating their
passwords, and highlighting the number of
individuals who have already taken steps to secure
their online presence.
Mind Space model
The MINDSPACE model is a framework that
consists of nine elements and can be used to
influence individuals to practice safe online
behavior. These elements include the
messenger, incentives, norms, defaults,
salience, priming, affect, commitment, and ego.
By leveraging different elements of the model,
such as social norms and defaults, organizations
can design effective cybersecurity interventions
and reduce the risk of successful cyber attacks.
Cognitive
Theory
Cognitive theory explains how individuals process
information and make decisions, and can be applied
to preventing cyber attacks. By understanding how
individuals perceive and process information related
to cybersecurity, organizations can encourage safe
online behavior. This can be done by making the risks
of cyber attacks more salient, providing practical tips
for staying safe online, and implementing security
measures such as two-factor authentication and
automatic updates to reduce cognitive load
Conclusion
Preventing cyber attacks requires a multi-faceted
approach that takes into account human behavior.
By applying frameworks such as the Fogg Behavior
Model, Cialdini Principles of Influence,
MINDSPACE Model, and cognitive theory,
individuals and organizations can work to prevent
cyber attacks and protect themselves from harm.
Through education, training, and the
implementation of security measures, we can
create a safer digital environment for all.
References
American Management Association (AMA). (2017). Cybersecurity and the Six Principles of
Influence. https://www.amanet.org/articles/cybersecurity-and-the-six-principles-of-influence/
Marczak, M., Krol, D., & McKeown, J. (2019). Hacking human behavior: Applying the Social Engineering Principles of
Influence. https://www.fireeye.com/blog/threat-research/2019/03/hacking-human-behavior-applying-social-engineering-princip
les-influence.html
Liu, H., Li, Z., & Zhao, Y. (2021). Applying MINDSPACE Model to Study Cybersecurity Behaviors of Young Adults. International
Journal of Cyber Criminology, 15(1), 1-20.
Schneier, B., & Larson, M. (2018). The psychology of cybersecurity and risk. Journal of Cybersecurity, 4(1), 1-13.
Kirlappos, I., & Sasse, M. A. (2017). Security education against the phishing threat: a reality check on user recall of phishing
indicators. Journal of Cybersecurity, 3(1), 37-48.
Sharma, S. K., & Gupta, B. B. (2021). Modelling cognitive behaviour for cybersecurity awareness: a conceptual framework.
International Journal of Electronic Security and Digital Forensics, 13(1), 1-22.
.
Felt, A. P., Evans, D., Klingenstein, K., & Song, D. (2015). Android permissions: User attention, comprehension, and behavior. In
Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems (pp. 209-218).
Sheng, S., Holbrook, M., Kumaraguru, P., & Cranor, L. F. (2010). Who falls for phishing scams? A demographic analysis of phishing
susceptibility and effectiveness of interventions. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
(pp. 373-382).
National Institute of Standards and Technology. (2017). Framework for improving