Search results

1 – 10 of 34
Article
Publication date: 8 August 2024

Keith S. Jones, McKenna K. Tornblad, Miriam E. Armstrong, Jinwoo Choi and Akbar Siami Namin

This study aimed to investigate how honest participants perceived an attacker to be during shoulder surfing scenarios that varied in terms of which Principle of Persuasion in…

Abstract

Purpose

This study aimed to investigate how honest participants perceived an attacker to be during shoulder surfing scenarios that varied in terms of which Principle of Persuasion in Social Engineering (PPSE) was used, whether perceived honesty changed as scenarios progressed, and whether any changes were greater in some scenarios than others.

Design/methodology/approach

Participants read one of six shoulder surfing scenarios. Five depicted an attacker using one of the PPSEs. The other depicted an attacker using as few PPSEs as possible, which served as a control condition. Participants then rated perceived attacker honesty.

Findings

The results revealed honesty ratings in each condition were equal during the beginning of the conversation, participants in each condition perceived the attacker to be honest during the beginning of the conversation, perceived attacker honesty declined when the attacker requested the target perform an action that would afford shoulder surfing, perceived attacker honesty declined more when the Distraction and Social Proof PPSEs were used, participants perceived the attacker to be dishonest when making such requests using the Distraction and Social Proof PPSEs and perceived attacker honesty did not change when the attacker used the target’s computer.

Originality/value

To the best of the authors’ knowledge, this experiment is the first to investigate how persuasion tactics affect perceptions of attackers during shoulder surfing attacks. These results have important implications for shoulder surfing prevention training programs and penetration tests.

Article
Publication date: 7 December 2020

Keith S. Jones, Miriam E. Armstrong, McKenna K. Tornblad and Akbar Siami Namin

This study aims to examine how social engineers use persuasion principles during vishing attacks.

1647

Abstract

Purpose

This study aims to examine how social engineers use persuasion principles during vishing attacks.

Design/methodology/approach

In total, 86 examples of real-world vishing attacks were found in articles and videos. Each example was coded to determine which persuasion principles were present in that attack and how they were implemented, i.e. what specific elements of the attack contributed to the presence of each persuasion principle.

Findings

Authority (A), social proof (S) and distraction (D) were the most widely used persuasion principles in vishing attacks, followed by liking, similarity and deception (L). These four persuasion principles occurred in a majority of vishing attacks, while commitment, reciprocation and consistency (C) did not. Further, certain sets of persuasion principles (i.e. authority, distraction, liking, similarity, and deception and social proof; , authority, commitment, reciprocation, and consistency, distraction, liking, similarity and deception, and social proof; and authority, distraction and social proof) were used more than others. It was noteworthy that despite their similarities, those sets of persuasion principles were implemented in different ways, and certain specific ways of implementing certain persuasion principles (e.g. vishers claiming to have authority over the victim) were quite rare.

Originality/value

To the best of authors’ knowledge, this study is the first to investigate how social engineers use persuasion principles during vishing attacks. As such, it provides important insight into how social engineers implement vishing attacks and lays a critical foundation for future research investigating the psychological aspects of vishing attacks. The present results have important implications for vishing countermeasures and education.

Details

Information & Computer Security, vol. 29 no. 2
Type: Research Article
ISSN: 2056-4961

Keywords

Article
Publication date: 14 April 2022

Keith S. Jones, Natalie R. Lodinger, Benjamin P. Widlus, Akbar Siami Namin, Emily Maw and Miriam E. Armstrong

Nonexperts do not always follow the advice in cybersecurity warning messages. To increase compliance, it is recommended that warning messages use nontechnical language, describe…

Abstract

Purpose

Nonexperts do not always follow the advice in cybersecurity warning messages. To increase compliance, it is recommended that warning messages use nontechnical language, describe how the cyberattack will affect the user personally and do so in a way that aligns with how the user thinks about cyberattacks. Implementing those recommendations requires an understanding of how nonexperts think about cyberattack consequences. Unfortunately, research has yet to reveal nonexperts’ thinking about cyberattack consequences. Toward that end, the purpose of this study was to examine how nonexperts think about cyberattack consequences.

Design/methodology/approach

Nonexperts sorted cyberattack consequences based on perceived similarity and labeled each group based on the reason those grouped consequences were perceived to be similar. Participants’ labels were analyzed to understand the general themes and the specific features that are present in nonexperts’ thinking.

Findings

The results suggested participants mainly thought about cyberattack consequences in terms of what the attacker is doing and what will be affected. Further, the results suggested participants thought about certain aspects of the consequences in concrete terms and other aspects of the consequences in general terms.

Originality/value

This research illuminates how nonexperts think about cyberattack consequences. This paper also reveals what aspects of nonexperts’ thinking are more or less concrete and identifies specific terminology that can be used to describe aspects that fall into each case. Such information allows one to align warning messages to nonexperts’ thinking in more nuanced ways than would otherwise be possible.

Details

Information & Computer Security, vol. 30 no. 4
Type: Research Article
ISSN: 2056-4961

Keywords

Book part
Publication date: 15 November 2021

Miriam Mason and David Galloway

Abstract

Details

Lessons in School Improvement from Sub-Saharan Africa: Developing Professional Learning Networks and School Communities
Type: Book
ISBN: 978-1-80117-505-0

Abstract

Details

Lessons in School Improvement from Sub-Saharan Africa: Developing Professional Learning Networks and School Communities
Type: Book
ISBN: 978-1-80117-505-0

Article
Publication date: 1 April 1980

Not many weeks back, according to newspaper reports, three members of the library staff of the School of Slavonic and East European Studies in London were dismissed. All had…

Abstract

Not many weeks back, according to newspaper reports, three members of the library staff of the School of Slavonic and East European Studies in London were dismissed. All had refused to carry out issue desk duty. All, according to the newspaper account, were members of ASTMS. None, according to the Library Association yearbook, was a member of the appropriate professional organisation for librarians in Great Britain.

Details

Library Review, vol. 29 no. 4
Type: Research Article
ISSN: 0024-2535

Content available
Book part
Publication date: 15 November 2021

Miriam Mason and David Galloway

Abstract

Details

Lessons in School Improvement from Sub-Saharan Africa: Developing Professional Learning Networks and School Communities
Type: Book
ISBN: 978-1-80117-505-0

Article
Publication date: 1 January 1954

Aarhus Kommunes Biblioteker (Teknisk Bibliotek), Ingerslevs Plads 7, Aarhus, Denmark. Representative: V. NEDERGAARD PEDERSEN (Librarian).

Abstract

Aarhus Kommunes Biblioteker (Teknisk Bibliotek), Ingerslevs Plads 7, Aarhus, Denmark. Representative: V. NEDERGAARD PEDERSEN (Librarian).

Details

Aslib Proceedings, vol. 6 no. 1
Type: Research Article
ISSN: 0001-253X

Article
Publication date: 5 February 2021

Miriam Mason and David Galloway

A non-governmental organisation (NGO) with schools in Sierra Leone prioritises admission of the most disadvantaged children but nevertheless achieves high educational and social…

Abstract

Purpose

A non-governmental organisation (NGO) with schools in Sierra Leone prioritises admission of the most disadvantaged children but nevertheless achieves high educational and social standards. These schools were asked to provide continuing professional development and learning (CPDL) for other schools. This paper aims to report the design, development and delivery of CPDL which aimed to mobilise effective practices more widely. It also reports the design and results of an impact evaluation.

Design/methodology/approach

It was recognised that CPDL delivered by foreigners would be (1) unaffordable in this impoverished West African country and (2) culturally inappropriate. It was therefore delivered by local teachers from the NGO's own schools. Most had obtained no formal teaching qualification. They were trained to collect data using a quasi-experimental design for an impact evaluation of children's attendance and literacy. A total of five schools participated in the CPDL, with ten control schools.

Findings

A largely unqualified team succeeded in mobilising knowledge in the experimental schools. Children's attendance in experimental schools improved over that in control schools. Performance in literacy also improved significantly and was maintained at follow-up.

Research limitations/implications

Findings of the impact evaluation are seen as indicative rather than causal because a quasi-experimental study was conducted rather than a randomised controlled trial.

Originality/value

This lies in (1) teachers in schools with a severely disadvantaged intake providing a structured programme of CPDL for teachers in other schools; (2) school improvement through knowledge mobilisation in CPDL; (3) an impact evaluation with a quasi-experimental design showing improvement in children's performance.

Details

Journal of Professional Capital and Community, vol. 6 no. 2
Type: Research Article
ISSN: 2056-9548

Keywords

Article
Publication date: 1 April 1981

Miriam Pollet

Concerns of nursing literature today reflect the aspirations and changing character of the profession as it seeks to:

Abstract

Concerns of nursing literature today reflect the aspirations and changing character of the profession as it seeks to:

Details

Reference Services Review, vol. 9 no. 4
Type: Research Article
ISSN: 0090-7324

1 – 10 of 34