Something Looks Phishy Here: Applications of Signal Detection Theory to Cyber-Security Behaviors in the Workplace

[1]  W. W. Peterson,et al.  The theory of signal detectability , 1954, Trans. IRE Prof. Group Inf. Theory.

[2]  Jeffrey N Rouder,et al.  Detection of patient risk by nurses: a theoretical framework. , 2010, Journal of advanced nursing.

[3]  Ponnurangam Kumaraguru,et al.  Who falls for phish?: a demographic analysis of phishing susceptibility and effectiveness of interventions , 2010, CHI.

[4]  Corey J. Bohil,et al.  Category discriminability, base-rate, and payoff effects in perceptual categorization , 2001, Perception & psychophysics.

[5]  E. C. Cmm,et al.  on the Recognition of Speech, with , 2008 .

[6]  Daniel R. Ilgen,et al.  What If Industrial–Organizational Psychology Decided to Take Workplace Decisions Seriously? , 2010, Industrial and Organizational Psychology.

[7]  Jerome R. Busemeyer,et al.  Judgment and decision-making theory. , 1990 .

[8]  Tamara Dinev,et al.  Managing Employee Compliance with Information Security Policies: The Critical Role of Top Management and Organizational Culture , 2012, Decis. Sci..

[9]  John A. Clark,et al.  The Human Factor in Mobile Phishing , 2015 .

[10]  W. Borman,et al.  A Theory of Individual Differences in Task and Contextual Performance , 1997 .

[11]  J. Wixted Dual-process theory and signal-detection theory of recognition memory. , 2007, Psychological review.

[12]  L. Beach,et al.  A Contingency Model for the Selection of Decision Strategies , 1978 .

[13]  Neil A. Macmillan,et al.  Detection Theory: A User's Guide , 1991 .

[14]  Brenda K. Wiederhold,et al.  The Role of Psychology in Enhancing Cybersecurity , 2014, Cyberpsychology Behav. Soc. Netw..

[15]  J. Swets,et al.  A decision-making theory of visual detection. , 1954, Psychological review.

[16]  M. Kubovy,et al.  Probability matching and the formation of conservative decision rules in a numerical analog of signal detection. , 1981 .

[17]  Robert Willison,et al.  Understanding the perpetration of employee computer crime in the organisational context , 2006, Inf. Organ..

[18]  Richard G. Gardner,et al.  The Five-factor Model of Personality Traits and Organizational Citizenship Behaviors: a Meta-analysis Unresolved Issues regarding Citizenship and Personality , 2022 .

[19]  W. Borman,et al.  Expanding the Criterion Domain to Include Elements of Contextual Performance , 1993 .

[20]  A. Tversky,et al.  Judgment under Uncertainty , 1982 .

[21]  R. Dalal A meta-analysis of the relationship between organizational citizenship behavior and counterproductive work behavior. , 2005, The Journal of applied psychology.

[22]  Norman H. Anderson,et al.  Empirical Direction in Design and Analysis , 2001 .

[23]  Ali Darwish,et al.  Towards understanding phishing victims' profile , 2012, 2012 International Conference on Computer Systems and Industrial Informatics.

[24]  Philip H. Siegel,et al.  A signal detection theory approach to analyzing the efficiency and effectiveness of auditing to detect management fraud , 1998 .

[25]  Edward M. Baker,et al.  Theoretical note: Use of signal detection theory to clarify problems of evaluating performance in industry , 1975 .

[26]  L B Lusted,et al.  Signal detectability and medical decision-making. , 1971, Science.

[27]  Arun Vishwanath,et al.  Examining the Distinct Antecedents of E-Mail Habits and its Influence on the Outcomes of a Phishing Attack , 2015, J. Comput. Mediat. Commun..

[28]  F. Schmidt,et al.  The validity and utility of selection methods in personnel psychology: Practical and theoretical implications of 85 years of research findings. , 1998 .

[29]  Naomi M. Kenner,et al.  Low target prevalence is a stubborn source of errors in visual search tasks. , 2007, Journal of experimental psychology. General.

[30]  R. Lord Accuracy in behavioral measurement: An alternative definition based on raters' cognitive schema and signal detection theory. , 1985 .

[31]  Jason Hong,et al.  The state of phishing attacks , 2012, Commun. ACM.

[32]  Bradley K. Jensen,et al.  Analysis of Student Vulnerabilities to Phishing , 2008, AMCIS.

[33]  H Stanislaw,et al.  Calculation of signal detection theory measures , 1999, Behavior research methods, instruments, & computers : a journal of the Psychonomic Society, Inc.

[34]  Jess Marcum,et al.  A statistical theory of target detection by pulsed radar , 1948, IRE Trans. Inf. Theory.

[35]  R D Sorkin,et al.  Spreadsheet signal detection , 1999, Behavior research methods, instruments, & computers : a journal of the Psychonomic Society, Inc.

[36]  Lisa Feldman Barrett,et al.  “Utilizing” Signal Detection Theory , 2014, Psychological science.

[37]  D. Kahneman Thinking, Fast and Slow , 2011 .

[38]  Ken H. Guo Security-related behavior in using information systems in the workplace: A review and synthesis , 2013, Comput. Secur..

[39]  Richard N. Landers,et al.  An Inconvenient Truth: Arbitrary Distinctions Between Organizational, Mechanical Turk, and Other Convenience Samples , 2015, Industrial and Organizational Psychology.

[40]  Chockalingam Viswesvaran,et al.  Perspectives on Models of Job Performance , 2000 .

[41]  J. Stillman,et al.  A detection theory approach to the evaluation of assessors in assessment centres , 2005 .

[42]  Ira S. Winkler,et al.  Information Security Technology? Don't Rely on It. A Case Study in Social Engineering , 1995, USENIX Security Symposium.

[43]  Angela M. Pazzaglia,et al.  A critical comparison of discrete-state and continuous models of recognition memory: implications for recognition and beyond. , 2013, Psychological bulletin.

[44]  Reeshad S. Dalal,et al.  Improving Cybersecurity Incident Response Team Effectiveness Using Teams-Based Research , 2015, IEEE Security & Privacy.

[45]  Karl Z Nadolsky It's what's on the inside that counts , 2017, Obesity.

[46]  Reeshad S. Dalal,et al.  An Organizational Psychology Perspective to Examining Computer Security Incident Response Teams , 2014, IEEE Security & Privacy.

[47]  Filip Lievens,et al.  Can training improve the quality of inferences made by raters in competency modeling? A quasi-experiment. , 2007, The Journal of applied psychology.

[48]  Qing Hu,et al.  Future directions for behavioral information security research , 2013, Comput. Secur..

[49]  D. Dorfman,et al.  Maximum-likelihood estimation of parameters of signal-detection theory and determination of confidence intervals—Rating-method data , 1969 .