135 research outputs found

    Developing a Measure of Information Seeking about Phishing

    Get PDF
    Phishing e-mails are fraudulent e-mails used to gain access to sensitive information or secure computer systems. They persuade users to click on malicious links, download attachments or provide sensitive information, such as usernames or passwords. One approach that aims to reduce peopleā€™s susceptibility to phishing is the provision of information to users regarding the phishing threat and the techniques used within phishing e-mails. In line with this, awareness campaigns are often used within organizations and wider society to raise awareness of phishing and encourage people to engage with protective information. However, the potential effectiveness of such approaches in reducing susceptibility remains uncertain. In particular, there is a lack of research investigating (i) whether the propensity to access such information may in itself influence susceptibility to phishing and (ii) the different factors that motivate people to engage with information in the first place. In order to understand how current and future interventions regarding phishing may be consumed by users, as well as their potential impact on phishing susceptibility, it is important to conduct theoretically based research that provides a foundation to investigate these issues. This study provides a first step in addressing this by developing and validating a theoretically based survey measure across two studies centred upon the constructs of protection motivation theory (perceived vulnerability, severity, self-efficacy and response efficacy) to assess the factors that influence whether people choose to keep up to date with protective information about phishing. This survey measure is then used within Study 2 to provide an initial investigation of the role of these constructs in (i) self-reported user intentions to keep up to date with phishing techniques in the future and (ii) phishing discrimination ability, assessed using a phishing quiz. Overall, higher perceived threat severity, self-efficacy and response efficacy were associated with greater intentions, while greater perceived vulnerability was associated with lower intentions. No relationship was found with phishing discrimination ability. By understanding the factors that influence user intention to maintain knowledge and seek information about phishing threats, it will be possible to ensure that, as effective interventions are developed, their potential impact can be maximized

    Personality and Motives for Social Media Use When Physically Distanced: A Uses and Gratifications Approach

    Get PDF
    This paper explores individualsā€™ motives for using social media when living underā€˜social distancingā€™ conditions imposed during the COVID-19 pandemic, where they were instructed to physically distance from other people. Adopting a ā€˜uses and gratificationsā€™ approach, and using a previously established five-factor scale, we examine the relationship between individualsā€™ motives for using social media and their personality traits. Hundred and eighty-nine social media users living in the United Kingdom completed surveys assessing their motives for using social media and their personality. Our findings demonstrate that participants were generally motivated to use social media to ā€˜pass timeā€™ and to ā€˜maintain relationships.ā€™ Further, we find that those high in extraversion in particular use social media to ā€˜maintain relationships.ā€™ By comparing our findings to previous studies where face-to-face interaction was not restricted, our findings indicate that individualsā€™ motives for using social media change when they are placed under physical distancing restrictions. We reflect on the potential application of our findings for others experiencing similar conditions, such as those working in remote locations, as well as the potential implications for living in a post-pandemic world with increased virtual ā€˜meetingsā€™ using social media

    When Communication Accommodation Backfires:Interpersonal Effects of Social Power and Linguistic Style Accommodation in Computer-Mediated-Communication

    Get PDF
    Within Communication Accommodation Theory, social power is an important influence upon the likelihood of accommodation in communicative behaviours. Across two studies, we explore if the influence of power extends to a non-conscious aspect of accommodation, linguistic style, and to computer mediated forms of communication. We manipulated social power experimentally to create a series of instant messaging conversations between high and low power participants. Low power induced greater likelihood of linguistic style accommodation, whilst in a low versus high power role (study 1) and when participants undertook both roles (study 2). Notably, linguistic style accommodation by individuals in a high power role ā€˜backfiredā€™: greater accommodation was associated with a negative impression formed by their conversational partner. The results show robust effects of power in shaping language use across CMC. Further, the interpersonal effects of linguistic accommodation depend upon a complex interplay of social context, social norms, and the communication medium

    Characterizing the Linguistic Chameleon: Personal and Social Correlates of Linguistic Style Accommodation

    Get PDF
    Ā© 2016 International Communication Association Linguistic style accommodation between conversationalists is associated with positive social outcomes. We examine social power and personality as factors driving the occurrence of linguistic style accommodation, and the social outcomes of accommodation. Social power was manipulated to create 144 face-to-face dyadic interactions between individuals of high versus low power and 64 neutral power interactions. Particular configurations of personality traits (high self-monitoring, Machiavellianism and leadership, and low self-consciousness, impression management and agreeableness), combined with a low-power role, led to an increased likelihood of linguistic style accommodation. Further, greater accommodation by low-power individuals positively influenced perceptions of subjective rapport and attractiveness. We propose individual differences interact with social context to influence the conditions under which nonconscious communication accommodation occurs

    Identifying linguistic correlates of power

    Get PDF
    Previous work on social power modelling from linguistic cues has been limited by the range of available data. We introduce a new corpus of dialogues, generated in a controlled experimental setting where participant roles were manipulated to generate a perceived difference in social power. Initial results demonstrate successful differentiation of upwards, downwards, and level communications, using a classifier built on a small set of stylistic features

    Linguistic Style Accommodation Shapes Impression Formation and Rapport in Computer-Mediated-Communication

    Get PDF
    Communication accommodation theory predicts that social power plays an important role in influencing communicative behaviors. Previous research suggests these effects extend to linguistic style, thought to be a non-conscious aspect of communication. Here, we explore if these effects hold when individuals converse using a medium limited in personal cues, computer-mediated-communication (CMC). We manipulated social power in instant messaging conversations and measured subsequent interpersonal impressions. Low power induced greater likelihood of linguistic style accommodation, across between- (Study 1) and within-subjects (Study 2) experiments. Accommodation by those in a low power role had no impact on impressions formed by their partner. In contrast, linguistic style accommodation by individuals in a high-power role was associated with negative interpersonal impressions formed by their lower power partner. The results show robust effects of power in shaping language use across CMC. Further, the interpersonal effects of linguistic accommodation depend upon the conversational norms of the social context

    ā€œIt wouldn't happen to meā€:Privacy concerns and perspectives following the Cambridge Analytica scandal

    Get PDF
    In March 2018, news of the Facebook-Cambridge Analytica scandal made headlines around the world. By inappropriately collecting data from approximately 87 million usersā€™ Facebook profiles, the data analytics company, Cambridge Analytica, created psychographically tailored advertisements that allegedly aimed to influence people's voting preferences in the 2016 US presidential election. In the aftermath of this incident, we conducted a series of semi-structured interviews with 30 participants based at a UK university, discussing their understanding of online privacy and how they manage it in the wake of the scandal. We analysed this data using an inductive (i.e. ā€˜bottom-upā€™) thematic analysis approach. Contrary to many opinions reported in the news, the respondents in our sample did not delete their accounts, frantically change their privacy settings, or even express that much concern. As a result, individuals often consider themselves immune to psychographically tailored advertisements, and lack understanding of how automated approaches and algorithms work in relation to their (and their networksā€™) personal data. We discuss our findings in relation to wider related research (e.g. crisis fatigue, networked privacy, Protection Motivation Theory) and discuss directions for future research.</p

    Tagger's delight? Disclosure and liking in Facebook: the effects of sharing photographs amongst multiple known social circles

    Get PDF
    The present work identifies the relationship between sharing photographs with different depictions in Facebook on relationship quality, which varies depending on the type of target sharing the photographs. With over 1 billion active users, disclosure on Facebook is frequent, considered a norm of online interaction, and actively encouraged by site providers. The extant academic literature identifies Facebook as an effective tool to connect with known and unknown others, and identifies the differences in sharing behaviour when users are aware of their audience. Operating within a lowest common denominator approach to disclosure on Facebook, the present work identifies the potential consequences to personal relationships when sharing day-to-day information. Results found from a sample of 508 Facebook users suggests individuals should actively adjust their privacy settings to ensure that even amongst flattened information ā€“ i.e. that deemed appropriate for release to all target types ā€“ disclosure does not harm current and potential relationships. Implications for, users, academic theory and disclosure practice are discussed

    Strength matters:self-presentation to the strongest audience rather than lowest common denominator when faced with multiple audiences in social network sites

    Get PDF
    On social network sites (e.g. Facebook), individuals self-present to multiple audiences simultaneously twenty-four hours a day. Prior research has inferred this results in a lowest common denominator effect (LCDE) whereby people constrain their online presentation to the standards of their strictest audience. However, this existing work neglects to address differences in the ā€˜valueā€™ (social/economic) of the audience. Through the lens of self-presentation theory, we argue that it is not the strictest audience that constrains behavior but the strongest (i.e. that which has the highest score for standards and value combined). We call this the strongest audience effect (SAE). The aim of this research is to examine and contrast the LCDE and SAE. A survey of young Facebook users (n=379) provides support for the SAE when compared to LCDE, with the strength of the strongest audience predicting behavioral constraint and also social anxiety. Additional insights are generated into which audiences are perceived as the strongest. This study contributes a novel and more holistic lens to understand self-presentation in the presence of multiple audiences in social media
    • ā€¦
    corecore