CRIM 218 Lecture Notes - Lecture 9: Routine Activity Theory, Identity Theft, Cybercrime
Document Summary
Question: a controlled phishing experiment using students from idianna university found that: answer: 72% were tricked. Question: the heuristic-systematic model has its roots in: answer: social psychology and routine activity theory. Originated from persuasion research in social psychology. People establish validity of received messages using a mixture of heuristic processing and systematic processing. Known as a dual process model , because it incorporates two information processing modes (luo, zhang, burn, & seazzu, 2013). Done quickly, to make a validity assessment. Looks of heuristic cues surrounding or embedded within the message. Heuristic cues could include length, format, source, and subject. Takes more time and e ort than heuristic processing. Undertaken when heuristic processing doesn"t meet the su ciency threshold . Considers perceived importance, perceived risk, time and skill level required. Include false cues that will induce quick and incorrect heuristic processing decision re: message validity.