CRIM 218 Lecture Notes - Lecture 9: Routine Activity Theory, Identity Theft, Cybercrime

106 views9 pages

Document Summary

Question: a controlled phishing experiment using students from idianna university found that: answer: 72% were tricked. Question: the heuristic-systematic model has its roots in: answer: social psychology and routine activity theory. Originated from persuasion research in social psychology. People establish validity of received messages using a mixture of heuristic processing and systematic processing. Known as a dual process model , because it incorporates two information processing modes (luo, zhang, burn, & seazzu, 2013). Done quickly, to make a validity assessment. Looks of heuristic cues surrounding or embedded within the message. Heuristic cues could include length, format, source, and subject. Takes more time and e ort than heuristic processing. Undertaken when heuristic processing doesn"t meet the su ciency threshold . Considers perceived importance, perceived risk, time and skill level required. Include false cues that will induce quick and incorrect heuristic processing decision re: message validity.

Get access

Grade+20% off
$8 USD/m$10 USD/m
Billed $96 USD annually
Grade+
Homework Help
Study Guides
Textbook Solutions
Class Notes
Textbook Notes
Booster Class
40 Verified Answers
Class+
$8 USD/m
Billed $96 USD annually
Class+
Homework Help
Study Guides
Textbook Solutions
Class Notes
Textbook Notes
Booster Class
30 Verified Answers