Chapter

Does the Anchoring Effect Influence Individuals’ Anti-phishing Behavior Intentions?

Authors:
To read the full-text of this research, you can request a copy directly from the authors.

No full-text available

Request Full-text Paper PDF

To read the full-text of this research,
you can request a copy directly from the authors.

ResearchGate has not been able to resolve any citations for this publication.
Article
Full-text available
Browsing privacy tools can help people protect their digital privacy. However, tools which provide the strongest protections—such as Tor Browser—have struggled to achieve widespread adoption. This may be due to usability challenges, misconceptions, behavioral biases, or mere lack of awareness. In this study, we test the effectiveness of nudging interventions that encourage the adoption of Tor Browser. First, we test an informational nudge based on protection motivation theory (PMT), designed to raise awareness of Tor Browser and help participants form accurate perceptions of it. Next, we add an action planning implementation intention, designed to help participants identify opportunities for using Tor Browser. Finally, we add a coping planning implementation intention, designed to help participants overcome challenges to using Tor Browser, such as extreme website slowness. We test these nudges in a longitudinal field experiment with 537 participants. We find that our PMT-based intervention increased use of Tor Browser in both the short- and long-term. Our coping planning nudge also increased use of Tor Browser, but only in the week following our intervention. We did not find statistically significant evidence of our action planning nudge increasing use of Tor Browser. Our study contributes to a greater understanding of factors influencing the adoption of Tor Browser, and how nudges might be used to encourage the adoption of Tor Browser and similar privacy enhancing technologies.
Article
Full-text available
The anchoring effect is a form of cognitive bias in which exposure to some piece of information affects its subsequent numerical estimation. Previous studies have discussed which stimuli, such as numbers or semantic priming stimuli, are most likely to induce anchoring effects. However, it has not been determined whether anchoring effects will occur when a number is presented alone or when the semantic priming stimuli have an equivalent dimension between a target and the stimuli without a number. We conducted five experimental studies (N = 493) using stimuli to induce anchoring effects. We found that anchoring effects did not occur when a number was presented alone or when phrases to induce semantic priming were used without presenting a number. These results indicate that both numerical and semantic priming stimuli must be presented for anchoring effects to occur. Our findings represent a substantial contribution to the literature on anchoring effects by offering insights into how these effects are generated.
Conference Paper
Full-text available
Ten years ago, Thaler and Sunstein introduced the notion of nudging to talk about how subtle changes in the ‘choice architecture’ can alter people's behaviors in predictable ways. This idea was eagerly adopted in HCI and applied in multiple contexts, including health, sustainability and privacy. Despite this, we still lack an understanding of how to design effective technology-mediated nudges. In this paper we present a sys- tematic review of the use of nudging in HCI research with the goal of laying out the design space of technology-mediated nudging –the why (i.e., which cognitive biases do nudges combat) and the how (i.e., what exact mechanisms do nudges employ to incur behavior change). All in all, we found 23 distinct mechanisms of nudging, grouped in 6 categories, and leveraging 15 different cognitive biases. We present these as a framework for technology-mediated nudging, and discuss the factors shaping nudges’ effectiveness and their ethical implications.
Article
Full-text available
This study’s purpose was to examine the structural relationship of the transtheoretical model (TTM) and the amount of physical activity (PA) among undergraduate students in health and medicine at Universiti Sains Malaysia. A cross-sectional study was carried out among students who took part in the co-curricular program. Co-curricular program includes activities that take place outside of the regular lectures or tutorials in the University. Students recruited through purposive sampling were informed that their participation was entirely voluntarily. Those interested completed the self-administered questionnaire, which consisted of the decisional balance, processes of change, self-efficacy, stages of change scales, and Godin leisure-time exercise questionnaire. Data were analyzed using Mplus version 8 for descriptive statistics and structural equation modeling analysis for inferential statistics. A total of 562 students participated in the study. The majority of the students was female (79.0%) and Malay (73.3%) and average of exercise sessions per week was 2.62, with a mean of 43.37 min per exercise session. The final structural model fit the data well based on several fit indices (SRMR = 0.046, RMSEA (CI: 90%) = 0.061 (0.045, 0.078), RMSEA p = 0.130). The model showed that stages of change significantly affected self-efficacy (p < 0.001), pros (benefits of exercise; p < 0.001), cons (barriers to exercise; p = 0.022), and processes of change (p < 0.001). The model also showed significant inter-relationships among the TTM constructs and supported seven hypotheses. Among all the variables examined, only processes of change significantly affected PA (p < 0.001). However, stages of change (p < 0.001) and pros (p =< 0.001) had significant indirect effects on PA via processes of change. The findings support that individuals’ stages of change affect their self-efficacy level, or the ability to make positive and negative decisions and perform behavior accordingly. The study confirms that making correct decisions and taking action accordingly can increase PA levels.
Conference Paper
Full-text available
Nudge theory has been widely used in government and health interventions for the subtlety with which it positively influences choices. But, can this gentle nudge influence users to exhibit secure online account behaviors? And further, which of the nudge types is most effective? We conducted a between-subjects experiment with five conditions, plus a control, in which participants (n = 263) experienced different types of nudges (incentives, norms, default, salience, ego) before indicating their comfort levels with an auto-generated password and intentions to create a new password. Results show the salience nudge most effectively reduced one's comfort level with keeping the auto-generated password. These preliminary findings imply nudges using multiple psychological effects could serve as important design cues, thereby making intended behaviors easy to perform.
Article
Full-text available
In Nudge (2008) Richard Thaler and Cass Sunstein suggested that public policy–makers arrange decision–making contexts in ways to promote behaviour change in the interest of individual citizens as well as that of society. However, in the public sphere and Academia alike widespread discussions have appeared concerning the public acceptability of nudgebased behavioural policy. Thaler and Sunstein's own position is that the anti–nudge position is a literal non–starter, because citizens are always influenced by the decision making context anyway, and nudging is liberty preserving and acceptable if guided by Libertarian Paternalism and Rawls’ publicity principle. A persistent and central tenet in the criticism disputing the acceptability of the approach is that nudging works by manipulating citizens’ choices. In this paper, we argue that both lines of argumentation are seriously flawed. We show how the anti–nudge position is not a literal non–starter due to the responsibilities that accrue on policy–makers by the intentional intervention in citizens’ life, how nudging is not essentially liberty preserving and why the approach is not necessarily acceptable even if satisfying Rawls’ publicity principle. We then use the psychological dual process theory underlying the approach as well as an epistemic transparency criterion identified by Thaler and Sunstein themselves to show that nudging is not necessarily about “manipulation”, nor necessarily about influencing “choice”. The result is a framework identifying four types of nudges that may be used to provide a central component for more nuanced normative considerations as well as a basis for policy recommendations.
Article
Full-text available
Because violations of information security (ISec) and privacy have become ubiquitous in both personal and work environments, academic attention to ISec and privacy has taken on paramount importance. Consequently, a key focus of ISec research has been discovering ways to motivate individuals to engage in more secure behaviors. Over time, the protection motivation theory (PMT) has become a leading theoretical foundation used in ISec research to help motivate individuals to change their security-related behaviors to protect themselves and their organizations. Our careful review of the foundation for PMT identified three opportunities for improving ISec PMT research. First, extant ISec studies do not use the full nomology of PMT constructs. Second, only one study uses fear-appeal manipulations, even though these are a core element of PMT, and virtually no ISec study models or measures fear. Third, whereas these studies have made excellent progress in predicting security intentions, none of them have addressed actual security behaviors. This article describes the theoretical foundation of these three opportunities for improvement. We tested the nomology of PMT, including manipulated fear appeals, in two different ISec contexts that model PMT’s modern theoretical treatment more closely than do extant ISec studies. The first data collection was a longitudinal study in the context of data backups. The second study was a short-term cross-sectional study in the context of anti-malware software. Our new model demonstrated better results and stronger fit than the existing models and confirmed the efficacy of the three potential improvements we identified.
Article
Full-text available
This paper examines how an individual's moral norms and demographic characteristics interact with the standard ‘Theory of Planned Behavior’ predictors (Attitude; Subjective Norms; and Perceived Behavioral Control (PBC)) in explaining the intention to recycle (RI). Our data originate from an empirical research of Greek citizens conducted in Autumn 2013 (N = 293). Through structural equation modeling, we find that PBC is consistently the most important predictor of RI. Moral norms have a larger effect on RI than Attitude while their influence is primarily direct. On the contrary, demographic characteristics were found to be statistically non-significant predictors of RI, similarly to Subjective Norms.
Article
Full-text available
We investigate the effects of a range of different types of anchor on WTP and WTA valuations of familiar consumer products, elicited through individuals’ buying or selling decisions at given prices. We find anchoring effects only when the anchor value is framed as a plausible price for the good for which the individual is a potential buyer or seller. Anchoring effects are stronger for WTA than for WTP. We conclude that anchoring effects can affect market behaviour, but that not all anchors are effective.
Article
Full-text available
Two experiments examined the impact of financial incentives and forewarnings on judgmental anchoring effects, or the tendency for judgments of uncertain qualities to be biased in the direction of salient anchor values. Previous research has found no effect of either manipulation on the magnitude of anchoring effects. We argue, however, that anchoring effects are produced by multiple mechanisms—one involving an effortful process of adjustment from “self-generated” anchors, and another involving the biased recruitment of anchor-consistent information from “externally provided” anchors—and that only the former should be influenced by incentives and forewarning. Two studies confirmed these predictions, showing that responses to “self-generated” anchors are influenced by both incentives and forewarnings whereas responses to “externally provided” anchors are not. Discussion focuses on the implications of these effects for debiasing efforts. Copyright © 2005 John Wiley & Sons, Ltd.
Article
Full-text available
People's estimates of uncertain quantities are commonly influenced by irrelevant values. These anchoring effects were originally explained as insufficient adjustment away from an initial anchor value. The existing literature provides little support for the postulated process of adjustment, however, and a consensus that none takes place seems to be emerging. We argue that this conclusion is premature, and we present evidence that insufficient adjustment produces anchoring effects when the anchors are self-generated. In Study 1, participants' verbal reports made reference to adjustment only, from self-generated anchors. In Studies 2 and 3, participants induced to accept values by nodding their heads gave answers that were closer to an anchor (i.e., they adjusted less) than participants induced to deny values by shaking their heads--again, only when the anchor was self-generated. These results suggest it is time to reintroduce anchoring and adjustment as an explanation for some judgments under uncertainty.
Article
Full-text available
One way to make judgments under uncertainty is to anchor on information that comes to mind and adjust until a plausible estimate is reached. This anchoring-and-adjustment heuristic is assumed to underlie many intuitive judgments, and insufficient adjustment is commonly invoked to explain judgmental biases. However, despite extensive research on anchoring effects, evidence for adjustment-based anchoring biases has only recently been provided, and the causes of insufficient adjustment remain unclear. This research was designed to identify the origins of insufficient adjustment. The results of two sets of experiments indicate that adjustments from self-generated anchor values tend to be insufficient because they terminate once a plausible value is reached (Studies 1a and 1b) unless one is able and willing to search for a more accurate estimate (Studies 2a-2c).
Conference Paper
Fact-checking messages are shared or ignored subjectively. Users tend to seek like-minded information and ignore information that conflicts with their preexisting beliefs, leaving like-minded misinformation uncontrolled on the Internet. To understand the factors that distract fact-checking engagement, we investigated the psychological characteristics associated with users’ selective avoidance of clicking uncongenial facts. In a pre-registered experiment, we measured participants’ (N = 506) preexisting beliefs about COVID-19-related news stimuli. We then examined whether they clicked on fact-checking links to false news that they believed to be accurate. We proposed an index that divided participants into fact-avoidance and fact-exposure groups using a mathematical baseline. The results indicated that 43% of participants selectively avoided clicking on uncongenial facts, keeping 93% of their false beliefs intact. Reflexiveness is the psychological characteristic that predicts selective avoidance. We discuss susceptibility to click bias that prevents users from utilizing fact-checking websites and the implications for future design.
Conference Paper
Despite experts agreeing on many security best practices, there remains a gap between their advice and users' behavior. One example is the low adoption of secure mobile payments in the United States, despite widespread prevalence of credit and debit card fraud. Prior work has proposed nudging interventions to help users adopt security experts' recommendations. We designed and tested nudging interventions based on protection motivation theory (PMT) and implementation intentions (II) to encourage participants to use secure mobile payments. We designed the interventions using an interview study with 20 participants, and then tested them in a longitudinal, between-subjects field experiment with 411 participants. In one condition, drawing on PMT, we informed participants about the threat of card fraud and the protection offered by mobile payments. In a second condition, we combined the PMT intervention with an II-based intervention, and asked participants to formulate a plan to make a mobile payment in the week ahead. A third condition acted as a control. Both PMT-only and PMT+II interventions made participants more likely to make mobile payments relative to the control group. The results suggest that PMT and implementation intention-based nudges can help people translate their desire to behave securely into actual behavior.Presented at the 16th Symposium on Usable Privacy and Security
Article
Purpose Phishing attacks are the most common cyber threats targeted at users. Digital nudging in the form of framing and priming may reduce user susceptibility to phishing. This research focuses on two types of digital nudging, framing and priming, and examines the impact of framing and priming on users' behavior (i.e. action) in a cybersecurity setting. It draws on prospect theory, instance-based learning theory and dual-process theory to generate the research hypotheses. Design/methodology/approach A 3 × 2 experimental study was carried out to test the hypotheses. The experiment consisted of three levels for framing (i.e. no framing, negative framing and positive framing) and two levels for priming (i.e. with and without priming). Findings The findings suggest that priming users to information security risks reduces their risk-taking behavior, whereas positive and negative framing of information security messages regarding potential consequences of the available choices do not change users' behavior. The results also indicate that risk-averse cybersecurity behavior is associated with greater confidence with the action, greater perceived severity of cybersecurity risks, lower perceived susceptibility to cybersecurity risks resulting from the action and lower trust in the download link. Originality/value This research shows that digital nudging in the form of priming is an effective way to reduce users' exposure to cybersecurity risks.
Article
Structural equation modeling (SEM) is a multivariate statistical technique for estimating complex relationships between observed and latent variables. Although numerous SEM packages currently exist, they each have limitations and more importantly they are not free or open-source. The only package that is both free and open-source is lavaan. However, because this package is written in R, it is often difficult to integrate it with other programming language functionalities. This paper provides an overview of a new Python package called semopy that was specifically developed to overcome these limitations. Using illustrative examples we introduce the new package and then compare its performance in accuracy and execution time to lavaan.
Article
Security warning is a form of computer dialog communication that is used to inform the users on the risks of allowing random applications to run on a computer system. Accordingly, it is specifically designed to impersonate a legitimate security alerting function (e.g., notify, warn and advice) to a user about the consequence effect of an action. However, most of the computer users tend to ignore those security warnings conveying the same message over and over again. This eventually leads to habituation. Considering the fact that there is a significant lack of focus been paid to address this issue, the main objective of this paper is to describe and summarize the related studies on users’ habituation to the security warnings. This paper presents a systematic literature review to explore the current key issues, challenges and the possible solutions related to habituation effects in security warnings. It is expected that this paper could contribute to a more complete understanding of the habituation effects in security warnings and eventually bring benefits to the research communities or general publics.
Article
Advancements in information technology often task users with complex and consequential privacy and security decisions. A growing body of research has investigated individuals’ choices in the presence of privacy and information security tradeoffs, the decision-making hurdles affecting those choices, and ways to mitigate such hurdles. This article provides a multi-disciplinary assessment of the literature pertaining to privacy and security decision making. It focuses on research on assisting individuals’ privacy and security choices with soft paternalistic interventions that nudge users toward more beneficial choices. The article discusses potential benefits of those interventions, highlights their shortcomings, and identifies key ethical, design, and research challenges.
Conference Paper
Computer security tools usually provide universal solutions without taking user characteristics (origin, income level, ...) into account. In this paper, we test the validity of using such universal security defenses, with a particular focus on culture. We apply the previously proposed Security Behavior Intentions Scale (SeBIS) to 3,500 participants from seven countries. We first translate the scale into seven languages while preserving its reliability and structure validity. We then build a regression model to study which factors affect participants' security behavior. We find that participants from different countries exhibit different behavior. For instance, participants from Asian countries, and especially Japan, tend to exhibit less secure behavior. Surprisingly to us, we also find that actual knowledge influences user behavior much less than user self-confidence in their computer security knowledge. Stated differently, what people think they know affects their security behavior more than what they do know.
Article
A range of risk factors lead to opioid use and substance-related problems (SRP) including childhood maltreatment, elevated impulsivity, and psychopathology. These constructs are highly interrelated such that childhood maltreatment is associated with elevated impulsivity and trauma-related psychopathology such as posttraumatic stress disorder (PTSD), and impulsivity-particularly urgency-and PTSD are related. Prior work has examined the association between these constructs and substance-related problems independently and it is unclear how these multi-faceted constructs (i.e., maltreatment types and positive and negative urgency) are associated with one another and SRP. The current study used structural equation modeling (SEM) to examine the relations among childhood maltreatment, trait urgency, PTSD symptoms, and SRP in a sample of individuals with a history of opioid use. An initial model that included paths from each type of childhood maltreatment, positive and negative urgency, PTSD and SRP did not fit the data well. A pruned model with excellent fit was identified that suggested emotional abuse, positive urgency, and negative urgency were directly related to PTSD symptoms and only PTSD symptoms were directly related to SRP. Furthermore, significant indirect effects suggested that emotional abuse and negative urgency were related to SRP via PTSD symptom severity. These results suggest that PTSD plays an important role in the severity of SRP.
Conference Paper
To assist users'€™ privacy decision-making with mobile applications, prior research has investigated ways of enhancing information transparency, via improving privacy permission interfaces. This study takes a soft paternalism approach by proposing two interface cues as "€œprivacy nudges"€ in a mobile permission interface: the frequency nudge indicates how frequently user information is used, and the social nudge presents the percentage of other users approving certain data permission. We compared the effects of these privacy nudges on users'€™ creepiness emotion and privacy attitudes, through a between-subject online experimental study (n=387). Our results suggest that privacy nudges are effective in altering privacy attitudes, but the direction of effects depends on the nudge'€™s framing valence. In addition, the creepiness emotion mediates the relationship between nudging and privacy attitudes.
Article
Clear self-concept beliefs are thought to be fundamental for well-being; and, mindfulness is believed to be intimately linked with beliefs about the self and well-being. Self-concept clarity suggests greater self-knowledge, which in turn may encourage more consistent involvement with fulfilling pursuits and relationships. Results from this study of 1089 undergraduate students indicate that self-concept clarity mediates the relationship between dispositional mindfulness and psychological well-being, with the mindful tendencies to act with awareness and remain non-judgmental identified as most closely linked with self-concept clarity and psychological well-being. Thus, dispositional mindfulness may encourage greater clarity with respect to beliefs about the self, which in turn may be associated with greater psychological well-being.
Article
‘This is an excellent book which introduces the underlying concepts and practical issues related to psychosocial measurement and scale development’ - Statistics in Medicine. Effective measurement is a cornerstone of scientific research. Yet many social science researchers lack the tools to develop appropriate assessment instruments for the measurement of latent social-psychological constructs. Scaling Procedures: Issues and Applications examines the issues involved in developing and validating multi-item self-report scales of latent constructs. Distinguished researchers and award-winning educators Richard G Netemeyer, William O Bearden, and Subhash Sharma present a four-step approach for multi-indicator scale development. With these steps, the authors include relevant empirical examples and a review of the concepts of dimensionality, reliability, and validity. Scaling Procedures: Issues and Applications supplies cutting-edge strategies for developing and refining measures. Providing concise chapter introductions and summaries, as well as numerous tables, figures, and exhibits, the authors present recommended steps and overlapping activities in a logical, sequential progression. Designed for graduate students in measurement//psychometrics, structural equation modeling, and survey research seminars across the social science disciplines, this book also addresses the needs of researchers and academics in all business, psychology, and sociology-related disciplines.
Article
Within the classic anchoring paradigm, in which respondents are forced to consider provided numbers as possible responses to a target judgment, Wegener et al. (2008) proposed that cognitive load affects the psychological mechanism by which these anchors influence judgments. We propose, instead, that level of cognitive resources does not fundamentally affect how anchoring works, but only whether respondents can access other considerations that bear on the target judgment. Though we share the authors' view that environmental circumstances can influence the relative contribution of associative and deliberative inputs in judgments, we contend that cognitive load primarily affects the types of information that respondents consider, not the manner by which a focal element is processed.
Article
Unlabelled: Neutrophil elastase (NE) activity is increased in bronchiectasis and may play a role in this condition. We wished to determine the effect of AZD9668, a selective oral inhibitor of NE. Efficacy and safety of AZD9668 60 mg twice daily over 4 weeks were evaluated in a randomised, double-blind, placebo-controlled, parallel-group, Phase II, signal-searching study in patients with bronchiectasis. Outcome measures included: waking and post-waking sputum neutrophil counts; lung function tests; 24-h sputum weight; BronkoTest(®) diary card data; St George's Respiratory Questionnaire for COPD patients (SGRQ-C); sputum NE activity; inflammatory biomarker levels; desmosine levels; adverse events, safety haematology and biochemistry. AZD9668 levels in plasma and sputum were measured to confirm exposure. Thirty-eight patients were randomised: 16 to placebo and 22 to AZD9668. There was no change in sputum neutrophils with AZD9668. Forced expiratory volume in 1 s improved by 100 mL in the AZD9668 group compared with placebo (p = 0.006). Significant changes (defined a priori as p < 0.1) in favour of AZD9668 were also seen in slow vital capacity, plasma interleukin-8, and post-waking sputum interleukin-6 and Regulated on Activation, Normal T-cell Expressed and Secreted levels. Non-significant changes in favour of AZD9668 were seen in other lung function tests, sputum weight and the SGRQ-C. AZD9668 was well tolerated. In this small signal-searching study, 4 weeks' treatment with AZD9668 improved lung function in patients with bronchiectasis and there were trends for reductions in sputum inflammatory biomarkers. Larger studies of longer duration would be needed to confirm the potential benefits of this agent in bronchiectasis. Registration: NCT00769119.
Article
Proposes a protection motivation theory that postulates the 3 crucial components of a fear appeal to be (a) the magnitude of noxiousness of a depicted event, (b) the probability of that event's occurrence, and (c) the efficacy of a protective response. Each of these communication variables initiates corresponding cognitive appraisal processes that mediate attitude change. The proposed conceptualization is a special case of a more comprehensive theoretical schema: expectancy-value theories. Several suggestions are offered for reinterpreting existing data, designing new types of empirical research, and making future studies more comparable. The principal advantages of protection motivation theory over the rival formulations of I. L. Janis and of H. Leventhal are discussed. (81 ref) (PsycINFO Database Record (c) 2012 APA, all rights reserved)
Article
Protection motivation theory is one formulation of the effects of threatening health information on attitude and behavior change. This chapter provides an updated description of protection motivation theory, reviews the research of the past 15 yrs, and poses questions for future research. This description represents a revision of protection motivation theory by examining one theory of how health threat information can persuade people to adopt a health communicator's recommendations. (PsycINFO Database Record (c) 2012 APA, all rights reserved)
Article
This article examines the adequacy of the “rules of thumb” conventional cutoff criteria and several new alternatives for various fit indexes used to evaluate model fit in practice. Using a 2‐index presentation strategy, which includes using the maximum likelihood (ML)‐based standardized root mean squared residual (SRMR) and supplementing it with either Tucker‐Lewis Index (TLI), Bollen's (1989) Fit Index (BL89), Relative Noncentrality Index (RNI), Comparative Fit Index (CFI), Gamma Hat, McDonald's Centrality Index (Mc), or root mean squared error of approximation (RMSEA), various combinations of cutoff values from selected ranges of cutoff criteria for the ML‐based SRMR and a given supplemental fit index were used to calculate rejection rates for various types of true‐population and misspecified models; that is, models with misspecified factor covariance(s) and models with misspecified factor loading(s). The results suggest that, for the ML method, a cutoff value close to .95 for TLI, BL89, CFI, RNI, and Gamma Hat; a cutoff value close to .90 for Mc; a cutoff value close to .08 for SRMR; and a cutoff value close to .06 for RMSEA are needed before we can conclude that there is a relatively good fit between the hypothesized model and the observed data. Furthermore, the 2‐index presentation strategy is required to reject reasonable proportions of various types of true‐population and misspecified models. Finally, using the proposed cutoff criteria, the ML‐based TLI, Mc, and RMSEA tend to overreject true‐population models at small sample size and thus are less preferable when sample size is small.
Article
This paper explores a judgmental heuristic in which a person evaluates the frequency of classes or the probability of events by availability, i.e., by the ease with which relevant instances come to mind. In general, availability is correlated with ecological frequency, but it is also affected by other factors. Consequently, the reliance on the availability heuristic leads to systematic biases. Such biases are demonstrated in the judged frequency of classes of words, of combinatorial outcomes, and of repeated events. The phenomenon of illusory correlation is explained as an availability bias. The effects of the availability of incidents and scenarios on subjective probability are discussed.
How to reduce the risk of phishing and ransomware
  • Osterman Research
semopy 2: a structural equation modeling package with random effects in Python. arXiv
  • G Meshcheryakov
  • A A Igolkina
  • M G Samsonova