Abstract
Most of the research carried out in cybersecurity considers the technical aspects of the security of an organisation’s systems. This work highlights the importance of considering the ‘softer’ social side of cybersecurity that looks at the lived experiences of phishing attack victims and the effect of such attacks on work engagement. In order to understand these effects, the study adopted the grounded theory (GT) approach to collecting and analysing data elicited from participants. The participants were theoretically sampled from the metropole area of Johannesburg and presented lived experiences of phishing attacks in their unique contexts. The data were transcribed and coded using GT techniques. From the codes, categories derived, and substantive theory that explains the effects of phishing attack victims on work engagement was generated. The implications of this theory to previous theories and scholars and practitioners are discussed.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Craigen, D., Diakun-Thibault, N., Purse, R.: Defining cybersecurity. Technol. Innov. Manag. Rev. 4(10) (2014)
Von Solms, R., Van Niekerk, J.: From information security to cybersecurity. Comput. Secur. 38, 97–102 (2013)
Benson, V., McAlaney, J., Frumkin, L.A.: Emerging threats for the human element and countermeasures in current cybersecurity landscape. In: Cyber Law, Privacy, and Security: Concepts, Methodologies, Tools, and Applications, pp. 1264–1269. IGI Global (2019)
Jain, A.K., Gupta, B.B.: A survey of phishing attack techniques, defence mechanisms and open research challenges. Enterp. Inf. Syst. 16(4), 527–565 (2022)
Mihai, I.C.: Overview on phishing attacks. Int. J. Inf. Sec. Cybercrime 1, 61 (2012)
Singh, A.P., Kumar, V., Sengar, S.S., Wairiya, M.: Detection and prevention of phishing attack using dynamic watermarking. In: Das, V.V., Thomas, G., Lumban Gaol, F. (eds.) AIM 2011. CCIS, vol. 147, pp. 132–137. Springer, Heidelberg (2011). https://doi.org/10.1007/978-3-642-20573-6_21
Chaudhry, J.A., Chaudhry, S.A., Rittenhouse, R.G.: Phishing attacks and defenses. Int. J. Secur. Appl. 10(1), 247–256 (2016)
Yushtina, A.: Ontology-based data extraction in the scholarship-related content. MS thesis (2013)
Gupta, C.P., Goyal, K.K.: Cybersecurity: a self-teaching introduction. Mercury Learning and Information (2020)
Cui, Q., et al.: Tracking phishing attacks over time. In: Proceedings of the 26th International Conference on World Wide Web (2017)
Shakela, V., Jazri, H.: Assessment of spear phishing user experience and awareness: an evaluation framework model of spear phishing exposure level (spel) in the namibian financial industry. In: 2019 International Conference on Advances in Big Data, Computing and Data Communication Systems (icABCD). IEEE (2019)
Bhardwaj, A., et al.: Why is phishing still successful? Comput. Fraud Secur. 2020(9), 15–19 (2020)
Abu-Shamaa, R., Al-Rabayah, W.A., Khasawneh, R.T.: The effect of job satisfaction and work engagement on organisational commitment. IUP J. Organ. Behav. 14(4) (2015)
Kuok, A.C.H., Taormina, R.J.: Work engagement: evolution of the concept and a new inventory. Psychol. Thought 10(2) (2017)
Winkler, K., Saur, C.: Employee retention management: long-term retention of employees–a comparison of generations. J. Appl. Leadersh. Manag. 7, 96–111 (2019)
Kelley, C.M., et al.: Something smells phishy: exploring definitions, consequences, and reactions to phishing. In: Proceedings of the Human Factors and Ergonomics Society Annual Meeting, vol. 56, no. 1. SAGE Publications, Los Angeles (2012)
Strauss, A., Corbin, J.M.: Grounded Theory in Practice. Sage (1997)
Engward, H., Davis, G.: Being reflexive in qualitative grounded theory: discussion and application of a model of reflexivity. J. Adv. Nurs. 71(7), 1530–1538 (2015)
Stoupe, D.: Understanding abstract wonderment: the reflections of a novice researcher. Grounded Theory Rev. 15(2) (2016)
Glaser, B.G., Strauss, A.L.: The Discovery of Grounded Theory: Strategies for Qualitative Research. Routledge (2017)
Glaser, B.G., Strauss, A.L., Strutzel, E.: The discovery of grounded theory; strategies for qualitative research. Nurs. Res. 17(4), 364 (1968)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2023 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this paper
Cite this paper
Werner, M.J., Njenga, K. (2023). Phishing Attack Victims and the Effect on Work Engagement. In: Ndayizigamiye, P., Twinomurinzi, H., Kalema, B., Bwalya, K., Bembe, M. (eds) Digital-for-Development: Enabling Transformation, Inclusion and Sustainability Through ICTs. IDIA 2022. Communications in Computer and Information Science, vol 1774. Springer, Cham. https://doi.org/10.1007/978-3-031-28472-4_13
Download citation
DOI: https://doi.org/10.1007/978-3-031-28472-4_13
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-031-28471-7
Online ISBN: 978-3-031-28472-4
eBook Packages: Computer ScienceComputer Science (R0)