Security, Spear-phishing, Training, Fear Appeals, Protection Motivation Theory, Construal Level Theory
information security (ISec), security threats, fear appeals, construal level theory (CLT), protection motivation theory (PMT), fear-appeal design, argument nature, temporal distance, organizational security, behavioral security
Information security (ISec) threats, fear appeals, protection motivation theory (PMT), construal-level theory (CLT), concrete, abstract