Emma J. Williams
Press accept to update now: Individual differences in susceptibility to malevolent interruptions
Williams, Emma J.; Joinson, Adam N.; Morgan, Phil
Authors
Adam N. Joinson
Phil Morgan
Abstract
© 2017 The Authors Increasingly, connected communication technologies have resulted in people being exposed to fraudulent communications by scammers and hackers attempting to gain access to computer systems for malicious purposes. Common influence techniques, such as mimicking authority figures or instilling a sense of urgency, are used to persuade people to respond to malevolent messages by, for example, accepting urgent updates. An ‘accept’ response to a malevolent influence message can result in severe negative consequences for the user and for others, including the organisations they work for. This paper undertakes exploratory research to examine individual differences in susceptibility to fraudulent computer messages when they masquerade as interruptions during a demanding memory recall primary task compared to when they are presented in a post-task phase. A mixed-methods approach was adopted to examine when and why people choose to accept or decline three types of interrupting computer update message (genuine, mimicked, and low authority) and the relative impact of such interruptions on performance of a serial recall memory primary task. Results suggest that fraudulent communications are more likely to be accepted by users when they interrupt a demanding memory-based primary task, that this relationship is impacted by the content of the fraudulent message, and that influence techniques used in fraudulent communications can over-ride authenticity cues when individuals decide to accept an update message. Implications for theories, such as the recently proposed Suspicion, Cognition and Automaticity Model and the Integrated Information Processing Model of Phishing Susceptibility, are discussed.
Journal Article Type | Article |
---|---|
Acceptance Date | Feb 24, 2017 |
Online Publication Date | Feb 27, 2017 |
Publication Date | Apr 1, 2017 |
Deposit Date | Mar 13, 2017 |
Publicly Available Date | Mar 13, 2017 |
Journal | Decision Support Systems |
Print ISSN | 0167-9236 |
Publisher | Elsevier |
Peer Reviewed | Peer Reviewed |
Volume | 96 |
Pages | 119-129 |
DOI | https://doi.org/10.1016/j.dss.2017.02.014 |
Keywords | influence techniques, malevolent interruptions, fraudulent messages, individual differences, cyber-security |
Public URL | https://uwe-repository.worktribe.com/output/888769 |
Publisher URL | http://dx.doi.org/10.1016/j.dss.2017.02.014 |
Contract Date | Mar 13, 2017 |
Files
1-s2.0-S0167923617300404-main.pdf
(518 Kb)
PDF
Downloadable Citations
About UWE Bristol Research Repository
Administrator e-mail: repository@uwe.ac.uk
This application uses the following open-source libraries:
SheetJS Community Edition
Apache License Version 2.0 (http://www.apache.org/licenses/)
PDF.js
Apache License Version 2.0 (http://www.apache.org/licenses/)
Font Awesome
SIL OFL 1.1 (http://scripts.sil.org/OFL)
MIT License (http://opensource.org/licenses/mit-license.html)
CC BY 3.0 ( http://creativecommons.org/licenses/by/3.0/)
Powered by Worktribe © 2025
Advanced Search