1,430
views
0
recommends
+1 Recommend
1 collections
    8
    shares

      Celebrating 65 years of The Computer Journal - free-to-read perspectives - bcs.org/tcj65

      scite_
       
      • Record: found
      • Abstract: found
      • Conference Proceedings: found
      Is Open Access

      Multitasking and Monetary Incentive in a Realistic Phishing Study

      proceedings-article
      , , , ,
      Proceedings of the 32nd International BCS Human Computer Interaction Conference (HCI)
      Human Computer Interaction Conference
      4 - 6 July 2018
      Computer Security, Phishing, User Behavior, Multitasking, Incentive
      Bookmark

            Abstract

            This paper introduces an empirical study focusing on task settings similar to those in the real-world that captures user behavioral information of fine granularity. In online experiments, participants recruited from the Mechanical Turk human subject pool sorted legitimate and phishing emails. Subgroups of these remote users performed a secondary question-answering task and/or were incentivized by a monetary reward based on email sorting accuracy. This web-based framework automates a complete process from the informed consent to a post-study questionnaire, which can be scaled up to a large number of human subjects. In the preliminary result analysis, the monetary incentive can positively affect users’ behavior and performance, but not in a straightforward manner. Multitasking, on the other hand, has a negative effect on users’ ability to correctly classify emails.

            Content

            Author and article information

            Contributors
            Conference
            July 2018
            July 2018
            : 1-5
            Affiliations
            [0001]Johns Hopkins University Information Security Institute

            3400 North Charles Street, Baltimore, Maryland, 21218, USA
            Article
            10.14236/ewic/HCI2018.115
            cf17e59a-48e6-4537-a215-fcff9196f857
            © Zhang et al. Published by BCS Learning and Development Ltd. Proceedings of British HCI 2018. Belfast, UK.

            This work is licensed under a Creative Commons Attribution 4.0 Unported License. To view a copy of this license, visit http://creativecommons.org/licenses/by/4.0/

            Proceedings of the 32nd International BCS Human Computer Interaction Conference
            HCI
            32
            Belfast, UK
            4 - 6 July 2018
            Electronic Workshops in Computing (eWiC)
            Human Computer Interaction Conference
            History
            Product

            1477-9358 BCS Learning & Development

            Self URI (article page): https://www.scienceopen.com/hosted-document?doi=10.14236/ewic/HCI2018.115
            Self URI (journal page): https://ewic.bcs.org/
            Categories
            Electronic Workshops in Computing

            Applied computer science,Computer science,Security & Cryptology,Graphics & Multimedia design,General computer science,Human-computer-interaction
            Computer Security,Multitasking,Phishing,Incentive,User Behavior

            References

            1. , & (2006) Knowing the user's every move: User activity tracking for website usability evaluation and implicit interaction Proceedings of the 15th International Conference on World Wide Web 203–212 ACM, New York, NY, USA.

            2. , & (2015) Comparing the similarity of responses received from studies in Amazon's Mechanical Turk to studies conducted online and with direct recruitment PLOS One 10(4).

            3. , & (2017) A Web-Based tool for automatic data collection, curation, and visualization of complex healthcare survey studies including social network analysis Computational and Mathematical Methods in Medicine 1–8.

            4. , & (2015) What the App is That? Deception and Countermeasures in the Android User Interface 2015 IEEE Symposium on Security and Privacy.

            5. (n.d.) Multitasking Test http://multitasking.labinthewild.org/multitasking/ (Retrieved April 06 2018)

            6. , & (2015). An unattended study of users performing security critical tasks under adversarial noise Proceedings of 2015 Workshop on Usable Security.

            7. , & (2008) Crowdsourcing User Studies with Mechanical Turk,” in Proceedings of the SIGCHI Conference on Human Factors in Computing Systems 453–456 ACM, New York, NY, USA.

            8. (2005) LAMP lights enterprise development efforts Computer 38(9), 18–20.

            9. , & (2013) Using Amazons Mechanical Turk for user studies: Eight things you need to know 2013 ACM / IEEE International Symposium on Empirical Software Engineering and Measurement.

            10. , & (2006) Physical or virtual presence of the experimenter: Psychological online-experiments in different settings,” International Journal of Internet Science 1(1), 71–81.

            11. , & (1998) Information security awareness: Educating your users effectively Information Management & Computer Security 6(4), 167–173.

            12. , & (2013) Beyond Deterrence: An Expanded View of Employee Computer Abuse MIS Quarterly 37(1), 1-20.

            Comments

            Comment on this article