117 research outputs found

    Developing a Measure of Information Seeking about Phishing

    Get PDF
    Phishing e-mails are fraudulent e-mails used to gain access to sensitive information or secure computer systems. They persuade users to click on malicious links, download attachments or provide sensitive information, such as usernames or passwords. One approach that aims to reduce people’s susceptibility to phishing is the provision of information to users regarding the phishing threat and the techniques used within phishing e-mails. In line with this, awareness campaigns are often used within organizations and wider society to raise awareness of phishing and encourage people to engage with protective information. However, the potential effectiveness of such approaches in reducing susceptibility remains uncertain. In particular, there is a lack of research investigating (i) whether the propensity to access such information may in itself influence susceptibility to phishing and (ii) the different factors that motivate people to engage with information in the first place. In order to understand how current and future interventions regarding phishing may be consumed by users, as well as their potential impact on phishing susceptibility, it is important to conduct theoretically based research that provides a foundation to investigate these issues. This study provides a first step in addressing this by developing and validating a theoretically based survey measure across two studies centred upon the constructs of protection motivation theory (perceived vulnerability, severity, self-efficacy and response efficacy) to assess the factors that influence whether people choose to keep up to date with protective information about phishing. This survey measure is then used within Study 2 to provide an initial investigation of the role of these constructs in (i) self-reported user intentions to keep up to date with phishing techniques in the future and (ii) phishing discrimination ability, assessed using a phishing quiz. Overall, higher perceived threat severity, self-efficacy and response efficacy were associated with greater intentions, while greater perceived vulnerability was associated with lower intentions. No relationship was found with phishing discrimination ability. By understanding the factors that influence user intention to maintain knowledge and seek information about phishing threats, it will be possible to ensure that, as effective interventions are developed, their potential impact can be maximized

    Characterizing the Linguistic Chameleon: Personal and Social Correlates of Linguistic Style Accommodation

    Get PDF
    © 2016 International Communication Association Linguistic style accommodation between conversationalists is associated with positive social outcomes. We examine social power and personality as factors driving the occurrence of linguistic style accommodation, and the social outcomes of accommodation. Social power was manipulated to create 144 face-to-face dyadic interactions between individuals of high versus low power and 64 neutral power interactions. Particular configurations of personality traits (high self-monitoring, Machiavellianism and leadership, and low self-consciousness, impression management and agreeableness), combined with a low-power role, led to an increased likelihood of linguistic style accommodation. Further, greater accommodation by low-power individuals positively influenced perceptions of subjective rapport and attractiveness. We propose individual differences interact with social context to influence the conditions under which nonconscious communication accommodation occurs

    Identifying linguistic correlates of power

    Get PDF
    Previous work on social power modelling from linguistic cues has been limited by the range of available data. We introduce a new corpus of dialogues, generated in a controlled experimental setting where participant roles were manipulated to generate a perceived difference in social power. Initial results demonstrate successful differentiation of upwards, downwards, and level communications, using a classifier built on a small set of stylistic features

    Tagger's delight? Disclosure and liking in Facebook: the effects of sharing photographs amongst multiple known social circles

    Get PDF
    The present work identifies the relationship between sharing photographs with different depictions in Facebook on relationship quality, which varies depending on the type of target sharing the photographs. With over 1 billion active users, disclosure on Facebook is frequent, considered a norm of online interaction, and actively encouraged by site providers. The extant academic literature identifies Facebook as an effective tool to connect with known and unknown others, and identifies the differences in sharing behaviour when users are aware of their audience. Operating within a lowest common denominator approach to disclosure on Facebook, the present work identifies the potential consequences to personal relationships when sharing day-to-day information. Results found from a sample of 508 Facebook users suggests individuals should actively adjust their privacy settings to ensure that even amongst flattened information – i.e. that deemed appropriate for release to all target types – disclosure does not harm current and potential relationships. Implications for, users, academic theory and disclosure practice are discussed

    What demographic attributes do our digital footprints reveal? A systematic review

    Get PDF
    <div><p>To what extent does our online activity reveal who we are? Recent research has demonstrated that the digital traces left by individuals as they browse and interact with others online may reveal who they are and what their interests may be. In the present paper we report a systematic review that synthesises current evidence on predicting demographic attributes from online digital traces. Studies were included if they met the following criteria: (i) they reported findings where at least one demographic attribute was predicted/inferred from at least one form of digital footprint, (ii) the method of prediction was automated, and (iii) the traces were either visible (e.g. tweets) or non-visible (e.g. clickstreams). We identified 327 studies published up until October 2018. Across these articles, 14 demographic attributes were successfully inferred from digital traces; the most studied included gender, age, location, and political orientation. For each of the demographic attributes identified, we provide a database containing the platforms and digital traces examined, sample sizes, accuracy measures and the classification methods applied. Finally, we discuss the main research trends/findings, methodological approaches and recommend directions for future research.</p></div

    To Intervene or not to Intervene:Young adults’ views on When and How to Intervene in Online Harassment

    Get PDF
    Incidents of online harassment are increasing and can have significant consequences for victims. Witnesses (‘digital bystanders’) can be crucial in identifying and challenging harassment. This study considered when and how young adults intervene online, with the aim of understanding the applicability of existing theoretical models (i.e., Bystander Intervention Model; Response Decision-Making Framework). Thematic analysis of eight focus groups (UK community sample, N=67, 18-25 years) resulted in five themes: Noticing and Interpreting the Harassment, Perceived Responsibility for Helping, Consequences of Intervening, Perceived Ability to Make a Difference, and Deciding How to Help. The online context amplified offline preferences, such as greater preference for anonymity and perceived costs of intervention (e.g., social costs). Intervention strategies varied in visibility and effort, preferring ‘indirect’ micro-interventions focused on supporting victims. A new, merged model specific to digital bystanders is proposed, with implications for the design and messaging on Social Networking Sites (SNS) discussed

    Linguistic markers of secrets and sensitive self-disclosure in Twitter

    Get PDF
    • …
    corecore