Computer and Modernization ›› 2025, Vol. 0 ›› Issue (02): 1-12.doi: 10.3969/j.issn.1006-2475.2025.02.001
Online:
2025-02-28
Published:
2025-02-28
CLC Number:
WANG Le, WANG Zhiying. An Empirical Study on the Drift Diffusion of Task Interruption in User Identification of Phishing[J]. Computer and Modernization, 2025, 0(02): 1-12.
Add to citation manager EndNote|Ris|BibTeX
URL: http://www.c-a-m.org.cn/EN/10.3969/j.issn.1006-2475.2025.02.001
[1] 弋晓洋,张健. 基于图像的网络钓鱼邮件检测方法研究[J]. 信息网络安全, 2021,21(09):52-58. [2] TAM L, GLASSMAN M, VANDENWAUVER M. The psychology of password management: A tradeoff between security and convenience[J]. Behaviour & Information Technology, 2010, 29(3): 233-244. [3] Anti-Phishing Working Group. Phishing Activity Trends Report, 2st Quarter 2023 [EB/OL]. (2023-11-07). https://apwg.org/. [4] MARK G, IQBAL S T, CZERWINSKI M, e t al. Email duration, batching and self-interruption: Patterns of email use on productivity and stress[C]// Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems. ACM, 2016:1717-1728. [5] SLIFKIN E J D, NEIDER M B, et al. Phishing interrupted: The impact of task interruptions on phishing email classification[J]. International Journal of Human-Computer Studies, 2023,174. DOI: 10.1016/j.ijhcs.2023.103017. [6] LEROY S, GLOMB T M. Tasks interrupted: How anticipating time pressure on resumption of an interrupted task causes attention residue and low performance on interrupting ta sks and how a “ready-to-resume” plan mitigates the effects[J]. Organization Science, 2018,29(3):380-397. [7] 乔万通,李爱梅,肖晨洁,等. 工作任务中断的双刃剑效应: 基于自我控制的理论模型[J]. 中国人力资源开发, 2021,38(2):57-70. [8] FOROUGHI C K, WERNER N E, MCKENDRICK R, et al. Individual differences in working-memory capacity and task resumption following interruptions[J]. Journal of Experimental Psychology: Learning, Memory, and Cognition, 2016,42(9):1480-1488. [9] ALTMANN E M, TRAFTON J G, HAMBRICK D Z. Momentary interruptions can derail the train of thought[J]. Journal of Experimental Psychology: General, 2014,143(1):215-226. [10] ARIGA A, LLERAS A. Brief and rare mental “breaks” keep you focused: Deactivation and reactivation of task goals preempt vigilance decrements[J]. Cognition, 2011,118(3):439-443. [11] WRIGHT R T, JOHNSON S L, KITCHENS B J. Phishing susceptibility in context: A multilevel information processing perspective on deception detection[J]. MIS Quarterly, 2023,47(2):803-832. [12] RASH W. FBI Crime Report Lists Business Email Compromise as Top Scam[EB/OL]. (2019-04-25). https://www.eweek.com/security/fbi-email-enterprises-scam/. [13] 袁昀,袁勤俭. 详尽可能性模型及其在信息系统研究领域的应用与展望[J]. 现代情报, 2023,43(5):156-167. [14] PROCTOR R W, CHEN J. The role of human factors/ergonomics in the science of security: Decision making and action selection in cyberspace[J]. Human Factors, 2015,57(5):721-727. [15] FLORES W R, HOLM H, NOHLBERG M, et al. Investigating personal determinants of phishing and the effect of national culture[J]. Information & Computer Security, 2015,23(2):178-199. [16] GE Y, LU L, CUI X Y, et al. How personal characteristics impact phishing susceptibility: The mediating role of mail processing[J]. Applied Ergonomics, 2021,97. DOI: 10.1016/j.apergo.2021.103526. [17] MOODY G D, GALLETTA D F, DUNN B K. Which phish get caught? An exploratory study of individuals’ susceptibility to phishing[J]. European Journal of Information Systems, 2017,26(6):564-584. [18] WILLIAMS R, MORRISON B W, WIGGINS M W, et al. The role of conscientiousness and cue utilisation in the detection of phishing emails in controlled and naturalistic settings[J]. Behaviour & Information Technology. 2023,43(9):1842-1858. [19] HOUSE D, RAJA M K. Phishing: message Appraisal and the exploration of fear and self-confidence[J]. Behaviour & Information Technology, 2020,39(11):1204-1224. [20] ZHOU Y, CUI X Y, QU W N, et al. The effect of automation trust tendency, system reliability and feedback on users’ phishing detection[J]. Applied Ergonomics, 2022,102. DOI: 10.1016/j.apergo.2022.103754. [21] PARSONS K, BUTAVICIUS M, DELFABBRO P, et al. Predicting susceptibility to social influence in phishing emails[J]. International Journal of Human-Computer Studies, 2019,128:17-26. [22] SARNO D M, NEIDER M B. So many phish, so little time: Exploring email task factors and phishing susceptibility[J]. Human Factors, 2022,64(8):1379-1403. [23] WILLIAMS E J, POLAGE D. How persuasive is phishing email? The role of authentic design, influence and current events in email judgements[J]. Behaviour & Information Technology, 2019,38(2):184-197. [24] BUTAVICIUS M, TAIB R, HAN S J. Why people keep falling for phishing scams: The effects of time pressure and deception cues on the detection of phishing emails[J]. Computers & Security, 2022,123. DOI: 10.1016/j.cose.2022.102937. [25] FRANK M, JAEGER L, RANFT L M. Contextual drivers of employees’ phishing susceptibility: Insights from a field study[J]. Decision Support Systems, 2022,160. DOI: 10.1016/j.dss.2022.113818. [26] AYABURI E W, ANDOH-BAIDOO F K. How do technology use patterns influence phishing susceptibility? A two-wave study of the role of reformulated locus of control[J]. European Journal of Information Systems. 2024,33(4):540-560. [27] PURANIK H, KOOPMAN J, VOUGH H C. Pardon the interruption: An integrative review and future research agenda for research on work interruptions[J]. Journal of Management, 2020,46(6):806-842. [28] BAETHGE A, RIGOTTI T, ROE R A. Just more of the same, or different? An integrative theoretical framework for the study of cumulative interruptions at work[J]. European Journal of Work and Organizational Psychology, 2015,24(2):308-323. [29] COUFFE C, MICHAEL G A. Failures due to interruptions or distractions: A review and a new framework[J]. The American Journal of Psychology, 2017,130(2):163-181. [30] CLITHERO J A. Response times in economics: Looking through the lens of sequential s ampling models[J]. Journal of Economic Psychology, 2018,69:61-86. [31] JOHNSON D J, HOPWOOD C J, CESARIO J, et al. Advancing research on cognitive processes in social and personality psychology: A hierarchical drift diffusion model primer[J]. Psychological and Personality Science, 2017,8(4):413-423. [32] PE M L, VANDEKERCKHOVE J, KUPPENS P. A diffusion model account of the relationship between the emotional flanker task and rumination and depression[J]. Emotion, 2013,13(4):739-747. [33] WHITE C N, RATCLIFF R, VASEY M W, et al. Anxiety enhances threat processing without competition among multiple inputs: a diffusion model analysis[J]. Emotion, 2010,10(5):662-677. [34] RATCLIFF R, ROUDER J N. Modeling response times for two-choice decisions[J]. Psychological Science, 1998,9(5):347-356. [35] WIECKI T V, SOFER I, FRANK M J. HDDM: Hierarchical Bayesian estimation of the drift-diffusion model in Python[J]. Frontiers in Neuroinformatics, 2013,7. DOI: 10.3389/fninf.2013.00014. [36] RATCLIFF R, TUERLINCKX F. Estimating parameters of the diffusion model: Approaches to dealing with contaminant reaction times and parameter variability[J]. Psychonomic Bulletin & Review, 2002,9(3):438-481. [37] GELMAN A, RUBIN D B. Inference from iterative simulation using multiple sequences[J]. Statistical Science, 1992,7(4):457-472. [38] KUMARAGURU P, SHENG S, ACQUISTI A, et al. Teaching Johnny not to fall for phish[J]. ACM Transactions on Internet Technology, 2010,10(2). DOI: 10.1145/1754393.1754396. [39] PATTINSON M, JERRAM C, PARSONS K, et al. Why do some people manage phishing e‐mails better than others?[J]. Information Management & Computer Security, 2012,20(1):18-28. [40] RAJAB M. Visualisation model based on phishing features[J]. Journal of Information & Knowledge Management, 2019,18(1). DOI: 10.1142/S0219649219500102. [41] CAVANAGH J F, WIECKI T V, COHEN M X, et al. Subthalamic nucleus stimulation reverses mediofrontal influence over decision threshold[J]. Nature Neuroscience, 2011,14(11):1462-1467. [42] SPIEGELHALTER D J, BEST N G, CARLIN B P, et al. Bayesian measures of model complexity and fit[J]. Journal of the Royal Statistical Society, 2002,64(4):583-639. [43] SARNO D M, LEWIS J E, BOHIL C J, et al. Which phish is on the hook? Phishing vulnerability for older versus younger adults[J]. Human Factors, 2020,62(5):704-717. [44] CANFIELD C I, FISCHHOFF B, DAVIS A. Quantifying phishing susceptibility for detection and behavior decisions[J]. Human Factors, 2016,58(8):1158-1172. [45] MARK G, GUDITH D, KLOCKE U. The cost of interrupted work: More speed and stress[C]// Proceedings Of The ACM CHI 2008 Conference on Human Factors in Computing Systems. ACM, 2008:107-110. [46] KONOVALOV A, KRAJBICH I. Revealed strength of preference: Inference from response times[J]. Judgment and Decision Making, 2019,14(4):381-394. [47] FRYDMAN C, KRAJBICH I. Using response times to infer others’ private information: An application to information cascades[J]. Management Science, 2021,68(4):2970-2986. [48] CHIONG K X, SHUM M, WEBB R, et al. Combining choice and response time data: a drift-diffusion model of mobile advertisements[J]. Management Science, 2024,70(2):1238-1257. [49] ALTMANN E M, TRAFTON J G. Memory for goals: An activation‐based model[J]. Cognitive Science, 2002,26(1):39-83. |
[1] | FENG Xinjie, WANG Wei. Twin Feature Fusion Network for Scene Text Image Super Resolution [J]. Computer and Modernization, 2025, 0(02): 86-93. |
[2] | FENG Zuyan, WEI Yan, CHEN Jiakun, YU Xin. Real-time Semantic Segmentation Based on Gate-controlled Fusion [J]. Computer and Modernization, 2025, 0(02): 121-126. |
[3] | HAN Xiaolong, ZENG Xi, LIU Kun, SHANG Yu. Stance Detection with LoRA-based Fine-tuning General Language Model [J]. Computer and Modernization, 2025, 0(01): 1-6. |
[4] | XU Shengchao, CHEN Fuqiang. A Food Safety Risk Warning Method Based on BP Neural Network [J]. Computer and Modernization, 2025, 0(01): 20-24. |
[5] | CHEN Siyun1, MA Huaibo2, ZHANG Huajun2, LAN Zining2, CHEN Wenxin2 , HU Jie1, CHANG Sheng1. Optimization and Deployment of Object Detection Algorithm Based on Domestic AI Chips [J]. Computer and Modernization, 2025, 0(01): 25-29. |
[6] | YUAN Jie, ZHU Yan. Multi-Target Adversarial Cross-domain Recommendation Based on Attributed Heterogeneous Graph [J]. Computer and Modernization, 2025, 0(01): 37-43. |
[7] | YAN Xiaoqi, PENG Yiqing, REN Xiaoling. Point Cloud Data Classification Method of PointNet++ with Position Adaptive Convolution [J]. Computer and Modernization, 2025, 0(01): 44-49. |
[8] | LIU Haitao, FENG Fan. BD Based Lattice Reduction Assisted Continuous Interference Cancellation Detection Algorithm [J]. Computer and Modernization, 2025, 0(01): 67-73. |
[9] | ZHENG Jiuchao, ZHAO Xinyuan. Entity Linking Method Based on Topics and Description Information [J]. Computer and Modernization, 2024, 0(12): 10-14. |
[10] | ZHANG Kun1, ZHANG Yongwei1, WU Yongcheng1, ZHANG Xiaowen2, ZHAI Shichen2. An LLM-based Method for Automatic Construction of Equipment Failure Knowledge Graphs [J]. Computer and Modernization, 2024, 0(11): 46-53. |
[11] | ZHANG Yu1, 2, LI Jing1, 2, MA Ming1, 2, WANG Zhongxiang1, 2, SUN Yan1, 2. YOLOLW: A Novel Lightweight Object Detection Model [J]. Computer and Modernization, 2024, 0(11): 91-98. |
[12] | DU Mengjun1, LI Ang1, TONG Jun1, QIAN Jin1, KANG Kai1, WANG Ruoding1, JIN Wenxing2. Power Information Data Fusion Model Based on Improved Extreme Learning Algorithm [J]. Computer and Modernization, 2024, 0(10): 61-64. |
[13] | JIAO Yikai1, 2, ZHU Xinjuan1, 2. Label Recommendation Methods for Public Cultural Resources [J]. Computer and Modernization, 2024, 0(10): 107-112. |
[14] | YANG Yufeng1, 2, XIA Xiaoyun2, CHEN Zefeng3, LIAO Weizhi2, LI Jiwu2. Dung Beetle Optimization Algorithm Integrating Multiple Strategies for Take-out Order Distribution Route Optimization [J]. Computer and Modernization, 2024, 0(09): 25-32. |
[15] | MA Yu, YANG Yong, REN Ge, Palidan Tuerxun. Automated Essay Scoring Method Based on GCN and Fine Tuned BERT [J]. Computer and Modernization, 2024, 0(09): 33-37. |
Viewed | ||||||
Full text |
|
|||||
Abstract |
|
|||||