Open Access. Powered by Scholars. Published by Universities.®
Articles 1 - 2 of 2
Full-Text Articles in Entire DC Network
The Effects Of Conformity And Training In A Phishing Context :Conforming To The School Of Phish, Matt Jones
The Effects Of Conformity And Training In A Phishing Context :Conforming To The School Of Phish, Matt Jones
Theses
Over the past decade, cybercrime has increased dramatically, and a popular way to steal someone’s information is via phishing. There are three major ways to protect from a phishing attack: automatic filters, warnings, and user training. User training makes a good safety net for the few instances when filters fail to catch a security risk and warnings go unheeded. Training is most effective when feedback is given immediately and when it is simple and engaging. Phishermen often use psychological techniques in order to gain access to sensitive information, and conformity is a well-documented phenomenon that can cause people to make …
Cross-Training In Virtual Teams, Amanda Pryor
Cross-Training In Virtual Teams, Amanda Pryor
Theses
Prior research has investigated the benefits that cross-training can have on a number of team outcomes, including performance, transactive memory, team efficacy, and interpositional knowledge. The present study examined the effect that different types of cross-training can have on these outcomes. Rotational and clarification cross-training were predicted to result in better team performance than own-role training alone. Transactive memory, team efficacy, task interdependency, and interpositional knowledge were predicted to mediate this relationship. Results indicate that cross-training had no effect on team performance, which could have been the consequence of information overload or a weak manipulation. Cross-training did significantly impact transactive …