This article complements extant literature on entrepreneurship and trust by proposing a model of over-trust (the tendency to trust more than what is warranted) using entrepreneurial characteristics and effectual logic. We trace how entrepreneurs following effectual processes may tend to over-trust. More formally, we propose that specific personality characteristics of the entrepreneur interact with effectual logic to make the entrepreneur more susceptible to over-trust. The proposed model is value neutral in that we do not imply that over-trust has negative consequences for entrepreneurs. In fact, it may be part of the overall risk that entrepreneurs assume in a new venture creation.
In entrepreneurship, entrepreneurial exploration and exploitation have been considered central activities for the survival, growth, and renewal of businesses. In this review we systematically examine research on these topics in family business. Our review comprises 59 publications examining exploration and/or exploitation in family firms published between 2001 and 2015 in 32 publications. The article highlights the contributions of family business in this area and reveals additional areas where a stronger connection between these concepts and the family business field could be developed. We suggest several new research directions that may enhance the understanding of these entrepreneurial activities in family business.
A leading cause of security breaches is a basic human vulnerability: our susceptibility to deception. Hackers exploit this vulnerability by sending phishing emails that induce users to click on malicious links that then download malware or trick the victim into revealing personal confidential information to the hacker. Past research has focused on human susceptibility to generic phishing emails or individually targeted spear-phishing emails. This study addresses how contextualization of phishing emails for targeted groups impacts their susceptibility to phishing. We manipulated the framing and content of email messages and tested the effects on users' susceptibility to phishing. We constructed phishing emails to elicit either the fear of losing something valuable (e.g., course registrations, tuition assistance) or the anticipation of gaining something desirable (e.g., iPad, gift card, social networks). We designed the emails' context to manipulate human psychological weaknesses such as greed, social needs, and so on. We sent fictitious (benign) emails to 7,225 undergraduate students and recorded their responses. Results revealed that contextualizing messages to appeal to recipients' psychological weaknesses increased their susceptibility to phishing. The fear of losing or anticipation of gaining something valuable increased susceptibility to deception and vulnerability to phishing. The results of our study provide important contributions to information security research, including a theoretical framework based on the heuristic-systematic processing model to study the susceptibility of users to deception. We demonstrate through our experiment that several situational factors do, in fact, alter the effectiveness of phishing attempts.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.