Skip to main content

Phishing Attack Victims and the Effect on Work Engagement

  • Conference paper
  • First Online:
Digital-for-Development: Enabling Transformation, Inclusion and Sustainability Through ICTs (IDIA 2022)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 1774))

Included in the following conference series:

  • 230 Accesses

Abstract

Most of the research carried out in cybersecurity considers the technical aspects of the security of an organisation’s systems. This work highlights the importance of considering the ‘softer’ social side of cybersecurity that looks at the lived experiences of phishing attack victims and the effect of such attacks on work engagement. In order to understand these effects, the study adopted the grounded theory (GT) approach to collecting and analysing data elicited from participants. The participants were theoretically sampled from the metropole area of Johannesburg and presented lived experiences of phishing attacks in their unique contexts. The data were transcribed and coded using GT techniques. From the codes, categories derived, and substantive theory that explains the effects of phishing attack victims on work engagement was generated. The implications of this theory to previous theories and scholars and practitioners are discussed.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 69.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 89.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Craigen, D., Diakun-Thibault, N., Purse, R.: Defining cybersecurity. Technol. Innov. Manag. Rev. 4(10) (2014)

    Google Scholar 

  2. Von Solms, R., Van Niekerk, J.: From information security to cybersecurity. Comput. Secur. 38, 97–102 (2013)

    Article  Google Scholar 

  3. Benson, V., McAlaney, J., Frumkin, L.A.: Emerging threats for the human element and countermeasures in current cybersecurity landscape. In: Cyber Law, Privacy, and Security: Concepts, Methodologies, Tools, and Applications, pp. 1264–1269. IGI Global (2019)

    Google Scholar 

  4. Jain, A.K., Gupta, B.B.: A survey of phishing attack techniques, defence mechanisms and open research challenges. Enterp. Inf. Syst. 16(4), 527–565 (2022)

    Article  Google Scholar 

  5. Mihai, I.C.: Overview on phishing attacks. Int. J. Inf. Sec. Cybercrime 1, 61 (2012)

    Google Scholar 

  6. Singh, A.P., Kumar, V., Sengar, S.S., Wairiya, M.: Detection and prevention of phishing attack using dynamic watermarking. In: Das, V.V., Thomas, G., Lumban Gaol, F. (eds.) AIM 2011. CCIS, vol. 147, pp. 132–137. Springer, Heidelberg (2011). https://doi.org/10.1007/978-3-642-20573-6_21

    Chapter  Google Scholar 

  7. Chaudhry, J.A., Chaudhry, S.A., Rittenhouse, R.G.: Phishing attacks and defenses. Int. J. Secur. Appl. 10(1), 247–256 (2016)

    Google Scholar 

  8. Yushtina, A.: Ontology-based data extraction in the scholarship-related content. MS thesis (2013)

    Google Scholar 

  9. Gupta, C.P., Goyal, K.K.: Cybersecurity: a self-teaching introduction. Mercury Learning and Information (2020)

    Google Scholar 

  10. Cui, Q., et al.: Tracking phishing attacks over time. In: Proceedings of the 26th International Conference on World Wide Web (2017)

    Google Scholar 

  11. Shakela, V., Jazri, H.: Assessment of spear phishing user experience and awareness: an evaluation framework model of spear phishing exposure level (spel) in the namibian financial industry. In: 2019 International Conference on Advances in Big Data, Computing and Data Communication Systems (icABCD). IEEE (2019)

    Google Scholar 

  12. Bhardwaj, A., et al.: Why is phishing still successful? Comput. Fraud Secur. 2020(9), 15–19 (2020)

    Article  Google Scholar 

  13. Abu-Shamaa, R., Al-Rabayah, W.A., Khasawneh, R.T.: The effect of job satisfaction and work engagement on organisational commitment. IUP J. Organ. Behav. 14(4) (2015)

    Google Scholar 

  14. Kuok, A.C.H., Taormina, R.J.: Work engagement: evolution of the concept and a new inventory. Psychol. Thought 10(2) (2017)

    Google Scholar 

  15. Winkler, K., Saur, C.: Employee retention management: long-term retention of employees–a comparison of generations. J. Appl. Leadersh. Manag. 7, 96–111 (2019)

    Google Scholar 

  16. Kelley, C.M., et al.: Something smells phishy: exploring definitions, consequences, and reactions to phishing. In: Proceedings of the Human Factors and Ergonomics Society Annual Meeting, vol. 56, no. 1. SAGE Publications, Los Angeles (2012)

    Google Scholar 

  17. Strauss, A., Corbin, J.M.: Grounded Theory in Practice. Sage (1997)

    Google Scholar 

  18. Engward, H., Davis, G.: Being reflexive in qualitative grounded theory: discussion and application of a model of reflexivity. J. Adv. Nurs. 71(7), 1530–1538 (2015)

    Article  Google Scholar 

  19. Stoupe, D.: Understanding abstract wonderment: the reflections of a novice researcher. Grounded Theory Rev. 15(2) (2016)

    Google Scholar 

  20. Glaser, B.G., Strauss, A.L.: The Discovery of Grounded Theory: Strategies for Qualitative Research. Routledge (2017)

    Google Scholar 

  21. Glaser, B.G., Strauss, A.L., Strutzel, E.: The discovery of grounded theory; strategies for qualitative research. Nurs. Res. 17(4), 364 (1968)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Kennedy Njenga .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2023 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Werner, M.J., Njenga, K. (2023). Phishing Attack Victims and the Effect on Work Engagement. In: Ndayizigamiye, P., Twinomurinzi, H., Kalema, B., Bwalya, K., Bembe, M. (eds) Digital-for-Development: Enabling Transformation, Inclusion and Sustainability Through ICTs. IDIA 2022. Communications in Computer and Information Science, vol 1774. Springer, Cham. https://doi.org/10.1007/978-3-031-28472-4_13

Download citation

  • DOI: https://doi.org/10.1007/978-3-031-28472-4_13

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-031-28471-7

  • Online ISBN: 978-3-031-28472-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics