1,117
views
0
recommends
+1 Recommend
1 collections
    15
    shares

      Celebrating 65 years of The Computer Journal - free-to-read perspectives - bcs.org/tcj65

      scite_
       
      • Record: found
      • Abstract: found
      • Conference Proceedings: found
      Is Open Access

      Fusing system design and social science to reduce susceptibility to online influence

      proceedings-article
      1 , 1
      Proceedings of the 30th International BCS Human Computer Interaction Conference (HCI)
      Fusion
      11 - 15 July 2016
      Social influence, individual differences, online scams, phishing, human-computer interaction
      Bookmark

            Abstract

            Spear phishing and other forms of online scams are having an increasing impact on society. This paper overviews our current work exploring individual differences in susceptibility to malicious influence online from a social science perspective and asks how fusion with adaptive and collaborative system approaches could be harnessed to reduce differential susceptibility across individuals via system design processes.

            Content

            Author and article information

            Contributors
            Conference
            July 2016
            July 2016
            : 1-3
            Affiliations
            [0001]School of Management University of Bath, BA2 7AY
            Article
            10.14236/ewic/HCI2016.58
            96499640-9154-418d-9ff4-0c852533e160
            © Williams et al. Published by BCS Learning and Development Ltd. Proceedings of British HCI 2016 Conference Fusion, Bournemouth, UK

            This work is licensed under a Creative Commons Attribution 4.0 Unported License. To view a copy of this license, visit http://creativecommons.org/licenses/by/4.0/

            Proceedings of the 30th International BCS Human Computer Interaction Conference
            HCI
            30
            Bournemouth University, Poole, UK
            11 - 15 July 2016
            Electronic Workshops in Computing (eWiC)
            Fusion
            History
            Product

            1477-9358 BCS Learning & Development

            Self URI (article page): https://www.scienceopen.com/hosted-document?doi=10.14236/ewic/HCI2016.58
            Self URI (journal page): https://ewic.bcs.org/
            Categories
            Electronic Workshops in Computing

            Applied computer science,Computer science,Security & Cryptology,Graphics & Multimedia design,General computer science,Human-computer-interaction
            Social influence,phishing,individual differences,human-computer interaction,online scams

            REFERENCES

            1. 2000 Transcending the individual human mind – creating shared understanding through collaborative design ACM Transactions on Computer-Human Interaction 7 1 84 113

            2. 2013 A study of social engineering in online frauds Open Journal of Social Sciences 1 3 23 23

            3. 2006 Accuracy of deception judgments Personality and Social Psychology Review 10 214 234

            4. 2007 Influence: The psychology of persuasion HarperCollins New York

            5. 1989 Can attempted deception by salespersons and customers be detected through nonverbal behavioural cues? Journal of Applied Social Psychology 19 1552 1577

            6. 2014 Comparing the impact of explicit and implicit resistance induction strategies on message persuasiveness Journal of Communication 64 5 915 934

            7. 2004 Police officers credibility judgements: Accuracy and estimated ability International Journal of Psychology 39 254 275

            8. 2000 Perils of Internet fraud: an empirical investigation of deception and trust with experienced Internet consumers IEEE Transactions on Systems, Man, and Cybernetics 30 4 395 410

            9. 1983 The effect of positive feelings on risk-taking: When the chips are down Organizational Behavior and Human Performance 31 194 202

            10. 2009 Adaptive interfaces and agents Human-computer interaction: design issues, solutions, and applications FL, US CRC Press 105 130

            11. 2011 Thinking, fast and slow Penguin London

            12. 2005 Spotlight: directing users’ attention on large displays Proceedings of the SIGCHI Conference on Human Factors in Computing Systems Portland 2-7 April 2005 NY, USA ACM New York 791 798

            13. 2014 Truth-default theory: A theory of human deception and deception detection Journal of Language and Social Psychology 33 4 378 392

            14. 2014 Decision-making under risk: Integrating perspectives from biology, economics, and psychology Personality and Social Psychology 18 3 280 307

            15. 2013 Compliant sinners, obstinate saints: How power and self-focus determine the effectiveness of social influences in ethical decision making Academy of Management Journal 56 3 635 658

            16. 2012 Cooking up a recipe for self-control: The three ingredients of self-control and its impact on impulse buying Journal of Marketing Theory and Practice 20 2 173 188

            17. 2011 Understanding scam victims: Seven principles for systems security Communications of the ACM 54 3 70 75

            18. 1988 Cognitive load during problem solving: Effects on learning Cognitive Science 12 2 257 285

            19. 2016 Suspicion, cognition, and automaticity model of phishing susceptibility Communication Research, online pre-print 1 21

            20. 2011 Why do people get phished? Testing individual differences in phishing vulnerability within an integrated, information processing model Decision Support Systems 51 576 586

            21. 2014 Building a self-regulatory model of sleep deprivation and deception: The role of caffeine and social influence Journal of Applied Psychology 99 6 1268 1277

            22. 2013 A Review of young people’s vulnerabilities to online grooming Aggression and Violent Behavior 18 62 70

            23. 2014 The influence of experiential and dispositional factors in phishing: An empirical investigation of the deceived Journal of Management Information Systems 27 1 273 303

            24. 2015 Persuasion, interrupted: The effect of momentary interruptions on message processing and persuasion. Journal of Consumer Research 42 300 315

            Comments

            Comment on this article