{"id":1305,"date":"2020-11-09T13:44:18","date_gmt":"2020-11-09T18:44:18","guid":{"rendered":"http:\/\/community.mis.temple.edu\/seminars\/?p=1305"},"modified":"2020-11-09T13:44:18","modified_gmt":"2020-11-09T18:44:18","slug":"oct-2-ryan-wright-to-present-a-multi-level-contextualized-view-of-phishing-susceptibility","status":"publish","type":"post","link":"https:\/\/community.mis.temple.edu\/seminars\/oct-2-ryan-wright-to-present-a-multi-level-contextualized-view-of-phishing-susceptibility\/","title":{"rendered":"Oct 2 &#8211; Ryan Wright to present &#8220;A Multi-level Contextualized View of Phishing Susceptibility&#8221;"},"content":{"rendered":"<h2 style=\"text-align: center\">A Multi-level Contextualized View of Phishing Susceptibility<\/h2>\n<p style=\"text-align: center\">by<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-medium aligncenter\" src=\"https:\/\/msba.virginia.edu\/sites\/msba\/files\/styles\/profile_photo_large\/public\/wright.jpg?itok=Y1ltsgW3\" width=\"169\" height=\"221\" \/><\/p>\n<h2 style=\"text-align: center\"><a href=\"https:\/\/www.commerce.virginia.edu\/faculty\/rtw2n\">Ryan Wright<\/a><\/h2>\n<p style=\"margin: 0in;text-align: center\" align=\"center\">C. Coleman McGehee Professor of Commerce<br \/>\nDirector, Certificate in Cybersecurity<br \/>\nAssociate Director, Center for the Management of Information Technology<br \/>\nMcIntire School of Commerce<br \/>\nUniversity of Virginia<\/p>\n<h2 style=\"text-align: center\"><strong>Friday, Oct 2<br \/>\n<\/strong><\/h2>\n<h2 style=\"text-align: center\"><strong>9 \u2013 10 am | Zoom<\/strong><\/h2>\n<p style=\"text-align: center\"><strong>Abstact:<\/strong><\/p>\n<p style=\"text-align: center\">With billions of dollars in annual IT security-related damages, organizations are well aware of the critical need for protection from phishing attacks with IT security policies and best practices. However, after decades of academic research and industry interventions, phishing remains one of the top cybersecurity threats to organizations. This significant effort to combat phishing by both practitioners and academics has largely focused on three factors: 1) individual characteristics, 2) message characteristics, and 3) interventions. We advocate for moving beyond this predominant focus to encompass a context-driven understanding of phishing susceptibility. We develop a phishing susceptibility model that includes how contextual factors, including workgroup characteristics and an individual\u2019s position in organizational social networks, can be used to predict susceptibility to phishing messages. We show the utility of this approach through a field study of the ability to detect deception email communication using a multi-wave phishing simulation in the finance division of a large university in the US. Our findings extend the understanding of phishing susceptibility through a model that incorporates variation in the workgroup and network-based factors. In addition, this research generates practical insights regarding how organizations may identify and support employees that are likely to be susceptible to phishing attacks.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>A Multi-level Contextualized View of Phishing Susceptibility by Ryan Wright C. Coleman McGehee Professor of Commerce Director, Certificate in Cybersecurity Associate Director, Center for the Management of Information Technology McIntire School of Commerce University of Virginia Friday, Oct 2 9 \u2013 10 am | Zoom Abstact: With billions of dollars in annual IT security-related damages, [&hellip;]<\/p>\n","protected":false},"author":17227,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"categories":[1],"tags":[838361,16286,8262,838363,823245,838360,838362],"class_list":{"0":"post-1305","1":"post","2":"type-post","3":"status-publish","4":"format-standard","6":"category-uncategorized","7":"tag-contextual-theory","8":"tag-cyber-security","9":"tag-information-security","10":"tag-multi-level-model","11":"tag-phishing","12":"tag-phishing-susceptibility","13":"tag-social-network-analysis","14":"entry"},"jetpack_featured_media_url":"","_links":{"self":[{"href":"https:\/\/community.mis.temple.edu\/seminars\/wp-json\/wp\/v2\/posts\/1305","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/community.mis.temple.edu\/seminars\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/community.mis.temple.edu\/seminars\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/community.mis.temple.edu\/seminars\/wp-json\/wp\/v2\/users\/17227"}],"replies":[{"embeddable":true,"href":"https:\/\/community.mis.temple.edu\/seminars\/wp-json\/wp\/v2\/comments?post=1305"}],"version-history":[{"count":1,"href":"https:\/\/community.mis.temple.edu\/seminars\/wp-json\/wp\/v2\/posts\/1305\/revisions"}],"predecessor-version":[{"id":1306,"href":"https:\/\/community.mis.temple.edu\/seminars\/wp-json\/wp\/v2\/posts\/1305\/revisions\/1306"}],"wp:attachment":[{"href":"https:\/\/community.mis.temple.edu\/seminars\/wp-json\/wp\/v2\/media?parent=1305"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/community.mis.temple.edu\/seminars\/wp-json\/wp\/v2\/categories?post=1305"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/community.mis.temple.edu\/seminars\/wp-json\/wp\/v2\/tags?post=1305"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}