117 research outputs found
Recommended from our members
Smart labs and social practice: social tools for pervasive laboratory workspaces: a position paper
The emergence of pervasive and ubiquitous computing stimulates a view of future work environments where sharing of information, data and knowledge is easy and commonplace, particularly in highly interactive settings. Much of the work in this area focuses on tool development to support activities such as data collection, data recording and sharing, and so on. We are interested in this kind of technical development, which is both challenging and essential for science communities. But we are also interested in a broader interpretation of knowledge sharing and the human/social side of tools we develop to support this. We are keen to know more about how groups of different kinds of scientists can make their work understandable and shareable with each other in a multidisciplinary setting. This is a complex task because boundaries and barriers can emerge between disciplines engendered by differences in discourses and practices, which may not easily translate into other discipline areas. In the worst case, there may be some hostility between disciplines, or at least doubt and scepticism. Nevertheless, sharing approaches to research, research expertise, data and methods across disciplines can be a very fruitful exercise, and encouragement to engage in this activity is particularly pertinent in the digital era. Issues of privacy and security are also key aspects – knowing when and how to release data or information to other groups is crucial to providing a safe environment for people to work, and there are several sensitivities to be explored here.
In this paper we describe an evolving situation that captures many of these issues, which we aim to track longitudinally
Developing a Measure of Information Seeking about Phishing
Phishing e-mails are fraudulent e-mails used to gain access to sensitive information or secure computer systems. They persuade users to click on malicious links, download attachments or provide sensitive information, such as usernames or passwords. One approach that aims to reduce people’s susceptibility to phishing is the provision of information to users regarding the phishing threat and the techniques used within phishing e-mails. In line with this, awareness campaigns are often used within organizations and wider society to raise awareness of phishing and encourage people to engage with protective information. However, the potential effectiveness of such approaches in reducing susceptibility remains uncertain. In particular, there is a lack of research investigating (i) whether the propensity to access such information may in itself influence susceptibility to phishing and (ii) the different factors that motivate people to engage with information in the first place. In order to understand how current and future interventions regarding phishing may be consumed by users, as well as their potential impact on phishing susceptibility, it is important to conduct theoretically based research that provides a foundation to investigate these issues. This study provides a first step in addressing this by developing and validating a theoretically based survey measure across two studies centred upon the constructs of protection motivation theory (perceived vulnerability, severity, self-efficacy and response efficacy) to assess the factors that influence whether people choose to keep up to date with protective information about phishing. This survey measure is then used within Study 2 to provide an initial investigation of the role of these constructs in (i) self-reported user intentions to keep up to date with phishing techniques in the future and (ii) phishing discrimination ability, assessed using a phishing quiz. Overall, higher perceived threat severity, self-efficacy and response efficacy were associated with greater intentions, while greater perceived vulnerability was associated with lower intentions. No relationship was found with phishing discrimination ability. By understanding the factors that influence user intention to maintain knowledge and seek information about phishing threats, it will be possible to ensure that, as effective interventions are developed, their potential impact can be maximized
Characterizing the Linguistic Chameleon: Personal and Social Correlates of Linguistic Style Accommodation
© 2016 International Communication Association Linguistic style accommodation between conversationalists is associated with positive social outcomes. We examine social power and personality as factors driving the occurrence of linguistic style accommodation, and the social outcomes of accommodation. Social power was manipulated to create 144 face-to-face dyadic interactions between individuals of high versus low power and 64 neutral power interactions. Particular configurations of personality traits (high self-monitoring, Machiavellianism and leadership, and low self-consciousness, impression management and agreeableness), combined with a low-power role, led to an increased likelihood of linguistic style accommodation. Further, greater accommodation by low-power individuals positively influenced perceptions of subjective rapport and attractiveness. We propose individual differences interact with social context to influence the conditions under which nonconscious communication accommodation occurs
Identifying linguistic correlates of power
Previous work on social power modelling from linguistic cues has been limited by the range of available data. We introduce a new corpus of dialogues, generated in a controlled experimental setting where participant roles were manipulated to generate a perceived difference in social power. Initial results demonstrate successful differentiation of upwards, downwards, and level communications, using a classifier built on a small set of stylistic features
Tagger's delight? Disclosure and liking in Facebook: the effects of sharing photographs amongst multiple known social circles
The present work identifies the relationship between sharing photographs with different depictions in Facebook on relationship quality, which varies depending on the type of target sharing the photographs. With over 1 billion active users, disclosure on Facebook is frequent, considered a norm of online interaction, and actively encouraged by site providers. The extant academic literature identifies Facebook as an effective tool to connect with known and unknown others, and identifies the differences in sharing behaviour when users are aware of their audience. Operating within a lowest common denominator approach to disclosure on Facebook, the present work identifies the potential consequences to personal relationships when sharing day-to-day information. Results found from a sample of 508 Facebook users suggests individuals should actively adjust their privacy settings to ensure that even amongst flattened information – i.e. that deemed appropriate for release to all target types – disclosure does not harm current and potential relationships. Implications for, users, academic theory and disclosure practice are discussed
Recommended from our members
A multi-pronged empirical approach to mobile privacy investigation
We describe the design of three empirical studies planned as part of an investigation into privacy when mobile. The studies exemplify complementary investigation strands, whose aim is to uncover the multi-faceted nature of privacy for mobile computing applications
What demographic attributes do our digital footprints reveal? A systematic review
<div><p>To what extent does our online activity reveal who we are? Recent research has demonstrated that the digital traces left by individuals as they browse and interact with others online may reveal who they are and what their interests may be. In the present paper we report a systematic review that synthesises current evidence on predicting demographic attributes from online digital traces. Studies were included if they met the following criteria: (i) they reported findings where at least one demographic attribute was predicted/inferred from at least one form of digital footprint, (ii) the method of prediction was automated, and (iii) the traces were either visible (e.g. tweets) or non-visible (e.g. clickstreams). We identified 327 studies published up until October 2018. Across these articles, 14 demographic attributes were successfully inferred from digital traces; the most studied included gender, age, location, and political orientation. For each of the demographic attributes identified, we provide a database containing the platforms and digital traces examined, sample sizes, accuracy measures and the classification methods applied. Finally, we discuss the main research trends/findings, methodological approaches and recommend directions for future research.</p></div
To Intervene or not to Intervene:Young adults’ views on When and How to Intervene in Online Harassment
Incidents of online harassment are increasing and can have significant consequences for victims. Witnesses (‘digital bystanders’) can be crucial in identifying and challenging harassment. This study considered when and how young adults intervene online, with the aim of understanding the applicability of existing theoretical models (i.e., Bystander Intervention Model; Response Decision-Making Framework). Thematic analysis of eight focus groups (UK community sample, N=67, 18-25 years) resulted in five themes: Noticing and Interpreting the Harassment, Perceived Responsibility for Helping, Consequences of Intervening, Perceived Ability to Make a Difference, and Deciding How to Help. The online context amplified offline preferences, such as greater preference for anonymity and perceived costs of intervention (e.g., social costs). Intervention strategies varied in visibility and effort, preferring ‘indirect’ micro-interventions focused on supporting victims. A new, merged model specific to digital bystanders is proposed, with implications for the design and messaging on Social Networking Sites (SNS) discussed
Recommended from our members
Studying location privacy in mobile applications: 'predator vs. prey' probes
- …