Open Access. Powered by Scholars. Published by Universities.®

Psychology Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 2 of 2

Full-Text Articles in Psychology

More Than Just Virtual Communication: Examining Canadian Volunteers’ Virtual Contact Experiences With Refugees, Maria Besselink Apr 2022

More Than Just Virtual Communication: Examining Canadian Volunteers’ Virtual Contact Experiences With Refugees, Maria Besselink

Electronic Thesis and Dissertation Repository

Canada plays a key role in addressing the ‘global refugee crisis’ as it accepts more refugees per capita than any other country. Although Canadians increasingly view support for immigration and multiculturalism as integral components of their national identity, the number of immigrants and refugees Canada accepts yearly is an increasingly polarized issue. In line with the Intergroup Contact Hypothesis, the current study investigated how Canadian volunteers’ repeated virtual contact experiences with refugees affected their generalized attitudes towards refugees over time. Our findings did not suggest that the quality and quantity of participants’ virtual contact experiences affected their attitudes. The findings …


Precursors Of Email Response To Cybersecurity Scenarios: Factor Exploration And Scale Development, Miguel A. Toro-Jarrin, Pilar Pazos-Lago, Miguel Padilla Jan 2022

Precursors Of Email Response To Cybersecurity Scenarios: Factor Exploration And Scale Development, Miguel A. Toro-Jarrin, Pilar Pazos-Lago, Miguel Padilla

Engineering Management & Systems Engineering Faculty Publications

In the last decade, information security research has further expanded to include human factors as key elements of the organization's cybersecurity infrastructure. Numerous factors from several theories have been explored to explain and predict the multitude of information security-related behaviors in organizations. Lately, there has been a call for the study of specific cybersecurity behaviors in contextualized scenarios that reflect specific and realistic situations of a potential cyber-attack. This paper focuses on precursors of email response in situations that can be the origin of cybersecurity incidents in organizations (i.e., phishing attacks, ransomware, etc.). This study explores participants' intentions to follow …