Search results

1 – 10 of 21
Article
Publication date: 7 December 2020

Keith S. Jones, Miriam E. Armstrong, McKenna K. Tornblad and Akbar Siami Namin

This study aims to examine how social engineers use persuasion principles during vishing attacks.

1703

Abstract

Purpose

This study aims to examine how social engineers use persuasion principles during vishing attacks.

Design/methodology/approach

In total, 86 examples of real-world vishing attacks were found in articles and videos. Each example was coded to determine which persuasion principles were present in that attack and how they were implemented, i.e. what specific elements of the attack contributed to the presence of each persuasion principle.

Findings

Authority (A), social proof (S) and distraction (D) were the most widely used persuasion principles in vishing attacks, followed by liking, similarity and deception (L). These four persuasion principles occurred in a majority of vishing attacks, while commitment, reciprocation and consistency (C) did not. Further, certain sets of persuasion principles (i.e. authority, distraction, liking, similarity, and deception and social proof; , authority, commitment, reciprocation, and consistency, distraction, liking, similarity and deception, and social proof; and authority, distraction and social proof) were used more than others. It was noteworthy that despite their similarities, those sets of persuasion principles were implemented in different ways, and certain specific ways of implementing certain persuasion principles (e.g. vishers claiming to have authority over the victim) were quite rare.

Originality/value

To the best of authors’ knowledge, this study is the first to investigate how social engineers use persuasion principles during vishing attacks. As such, it provides important insight into how social engineers implement vishing attacks and lays a critical foundation for future research investigating the psychological aspects of vishing attacks. The present results have important implications for vishing countermeasures and education.

Details

Information & Computer Security, vol. 29 no. 2
Type: Research Article
ISSN: 2056-4961

Keywords

Article
Publication date: 14 April 2022

Keith S. Jones, Natalie R. Lodinger, Benjamin P. Widlus, Akbar Siami Namin, Emily Maw and Miriam E. Armstrong

Nonexperts do not always follow the advice in cybersecurity warning messages. To increase compliance, it is recommended that warning messages use nontechnical language, describe…

Abstract

Purpose

Nonexperts do not always follow the advice in cybersecurity warning messages. To increase compliance, it is recommended that warning messages use nontechnical language, describe how the cyberattack will affect the user personally and do so in a way that aligns with how the user thinks about cyberattacks. Implementing those recommendations requires an understanding of how nonexperts think about cyberattack consequences. Unfortunately, research has yet to reveal nonexperts’ thinking about cyberattack consequences. Toward that end, the purpose of this study was to examine how nonexperts think about cyberattack consequences.

Design/methodology/approach

Nonexperts sorted cyberattack consequences based on perceived similarity and labeled each group based on the reason those grouped consequences were perceived to be similar. Participants’ labels were analyzed to understand the general themes and the specific features that are present in nonexperts’ thinking.

Findings

The results suggested participants mainly thought about cyberattack consequences in terms of what the attacker is doing and what will be affected. Further, the results suggested participants thought about certain aspects of the consequences in concrete terms and other aspects of the consequences in general terms.

Originality/value

This research illuminates how nonexperts think about cyberattack consequences. This paper also reveals what aspects of nonexperts’ thinking are more or less concrete and identifies specific terminology that can be used to describe aspects that fall into each case. Such information allows one to align warning messages to nonexperts’ thinking in more nuanced ways than would otherwise be possible.

Details

Information & Computer Security, vol. 30 no. 4
Type: Research Article
ISSN: 2056-4961

Keywords

Article
Publication date: 1 April 1980

Not many weeks back, according to newspaper reports, three members of the library staff of the School of Slavonic and East European Studies in London were dismissed. All had…

Abstract

Not many weeks back, according to newspaper reports, three members of the library staff of the School of Slavonic and East European Studies in London were dismissed. All had refused to carry out issue desk duty. All, according to the newspaper account, were members of ASTMS. None, according to the Library Association yearbook, was a member of the appropriate professional organisation for librarians in Great Britain.

Details

Library Review, vol. 29 no. 4
Type: Research Article
ISSN: 0024-2535

Article
Publication date: 1 January 1954

Aarhus Kommunes Biblioteker (Teknisk Bibliotek), Ingerslevs Plads 7, Aarhus, Denmark. Representative: V. NEDERGAARD PEDERSEN (Librarian).

Abstract

Aarhus Kommunes Biblioteker (Teknisk Bibliotek), Ingerslevs Plads 7, Aarhus, Denmark. Representative: V. NEDERGAARD PEDERSEN (Librarian).

Details

Aslib Proceedings, vol. 6 no. 1
Type: Research Article
ISSN: 0001-253X

Article
Publication date: 5 February 2021

Miriam Mason and David Galloway

A non-governmental organisation (NGO) with schools in Sierra Leone prioritises admission of the most disadvantaged children but nevertheless achieves high educational and social…

Abstract

Purpose

A non-governmental organisation (NGO) with schools in Sierra Leone prioritises admission of the most disadvantaged children but nevertheless achieves high educational and social standards. These schools were asked to provide continuing professional development and learning (CPDL) for other schools. This paper aims to report the design, development and delivery of CPDL which aimed to mobilise effective practices more widely. It also reports the design and results of an impact evaluation.

Design/methodology/approach

It was recognised that CPDL delivered by foreigners would be (1) unaffordable in this impoverished West African country and (2) culturally inappropriate. It was therefore delivered by local teachers from the NGO's own schools. Most had obtained no formal teaching qualification. They were trained to collect data using a quasi-experimental design for an impact evaluation of children's attendance and literacy. A total of five schools participated in the CPDL, with ten control schools.

Findings

A largely unqualified team succeeded in mobilising knowledge in the experimental schools. Children's attendance in experimental schools improved over that in control schools. Performance in literacy also improved significantly and was maintained at follow-up.

Research limitations/implications

Findings of the impact evaluation are seen as indicative rather than causal because a quasi-experimental study was conducted rather than a randomised controlled trial.

Originality/value

This lies in (1) teachers in schools with a severely disadvantaged intake providing a structured programme of CPDL for teachers in other schools; (2) school improvement through knowledge mobilisation in CPDL; (3) an impact evaluation with a quasi-experimental design showing improvement in children's performance.

Details

Journal of Professional Capital and Community, vol. 6 no. 2
Type: Research Article
ISSN: 2056-9548

Keywords

Article
Publication date: 1 April 1981

Miriam Pollet

Concerns of nursing literature today reflect the aspirations and changing character of the profession as it seeks to:

Abstract

Concerns of nursing literature today reflect the aspirations and changing character of the profession as it seeks to:

Details

Reference Services Review, vol. 9 no. 4
Type: Research Article
ISSN: 0090-7324

Article
Publication date: 1 April 1988

Paul Nieuwenhuysen

The following bibliography focuses mainly on programs which can run on IBM microcomputers and compatibles under the operating system PC DOS/MS DOS, and which can be used in online…

Abstract

The following bibliography focuses mainly on programs which can run on IBM microcomputers and compatibles under the operating system PC DOS/MS DOS, and which can be used in online information and documentation work. They fall into the following categories:

Details

The Electronic Library, vol. 6 no. 4
Type: Research Article
ISSN: 0264-0473

Article
Publication date: 12 February 2018

Miriam Catarina Soares Aharonovitz, José Geraldo Vidal Vieira and Suzi Sanae Suyama

The purpose of this paper is to evaluate the effect of logistics collaboration, meetings, relationship history, and supplier selection on the logistics performance of shippers…

3457

Abstract

Purpose

The purpose of this paper is to evaluate the effect of logistics collaboration, meetings, relationship history, and supplier selection on the logistics performance of shippers, carriers, and logistics services providers. Rather than focusing on collaboration and performance, the research provides a wide analysis of how logistics collaboration and performance interact with other organizational practices.

Design/methodology/approach

To investigate the interaction among the constructs, the authors proposed a structural equation model to understand the influence of meetings, relationship history, supplier selection, and collaboration on logistics performance. The data were obtained through a survey of 199 managers of Brazilian companies in the retail sector.

Findings

Supplier selection has the strongest effect on logistics collaboration, and relationship history has the strongest effect on logistics performance. Rather than meetings and operational features, the elements of interpersonal skills, organizational culture, and communication appear to be the most important contributors to logistics performance achievements; relationship history leads to better performance.

Originality/value

This study contributes to our understanding of how and with whom to collaborate by highlighting the relationships among supplier selection, relationship history, meetings, and logistics collaboration and logistics performance.

Details

The International Journal of Logistics Management, vol. 29 no. 1
Type: Research Article
ISSN: 0957-4093

Keywords

Article
Publication date: 1 January 1979

In order to succeed in an action under the Equal Pay Act 1970, should the woman and the man be employed by the same employer on like work at the same time or would the woman still…

Abstract

In order to succeed in an action under the Equal Pay Act 1970, should the woman and the man be employed by the same employer on like work at the same time or would the woman still be covered by the Act if she were employed on like work in succession to the man? This is the question which had to be solved in Macarthys Ltd v. Smith. Unfortunately it was not. Their Lordships interpreted the relevant section in different ways and since Article 119 of the Treaty of Rome was also subject to different interpretations, the case has been referred to the European Court of Justice.

Details

Managerial Law, vol. 22 no. 1
Type: Research Article
ISSN: 0309-0558

Article
Publication date: 1 March 1974

Frances Neel Cheney

Communications regarding this column should be addressed to Mrs. Cheney, Peabody Library School, Nashville, Tenn. 37203. Mrs. Cheney does not sell the books listed here. They are…

Abstract

Communications regarding this column should be addressed to Mrs. Cheney, Peabody Library School, Nashville, Tenn. 37203. Mrs. Cheney does not sell the books listed here. They are available through normal trade sources. Mrs. Cheney, being a member of the editorial board of Pierian Press, will not review Pierian Press reference books in this column. Descriptions of Pierian Press reference books will be included elsewhere in this publication.

Details

Reference Services Review, vol. 2 no. 3
Type: Research Article
ISSN: 0090-7324

1 – 10 of 21