A test of sensory bias for long tails in the house finch

1998 ◽  
Vol 56 (1) ◽  
pp. 71-78 ◽  
Author(s):  
MARJORY C TOBIAS ◽  
GEOFFREY E HILL
Keyword(s):  
2012 ◽  
Author(s):  
Alexander V. Badyaev ◽  
Virginia Belloni ◽  
Geoffrey E. Hill

SAGE Open ◽  
2021 ◽  
Vol 11 (1) ◽  
pp. 215824402199065
Author(s):  
Matthew Canham ◽  
Clay Posey ◽  
Delainey Strickland ◽  
Michael Constantino

Organizational cybersecurity efforts depend largely on the employees who reside within organizational walls. These individuals are central to the effectiveness of organizational actions to protect sensitive assets, and research has shown that they can be detrimental (e.g., sabotage and computer abuse) as well as beneficial (e.g., protective motivated behaviors) to their organizations. One major context where employees affect their organizations is phishing via email systems, which is a common attack vector used by external actors to penetrate organizational networks, steal employee credentials, and create other forms of harm. In analyzing the behavior of more than 6,000 employees at a large university in the Southeast United States during 20 mock phishing campaigns over a 19-month period, this research effort makes several contributions. First, employees’ negative behaviors like clicking links and then entering data are evaluated alongside the positive behaviors of reporting the suspected phishing attempts to the proper organizational representatives. The analysis displays evidence of both repeat clicker and repeat reporter phenomena and their frequency and Pareto distributions across the study time frame. Second, we find that employees can be categorized according to one of the four unique clusters with respect to their behavioral responses to phishing attacks—“Gaffes,” “Beacons,” “Spectators,” and “Gushers.” While each of the clusters exhibits some level of phishing failures and reports, significant variation exists among the employee classifications. Our findings are helpful in driving a new and more holistic stream of research in the realm of all forms of employee responses to phishing attacks, and we provide avenues for such future research.


1986 ◽  
Vol 22 (3) ◽  
pp. 420-422 ◽  
Author(s):  
Douglas E. Docherty ◽  
Renee I. Romaine Long

2012 ◽  
Vol 367 (1600) ◽  
pp. 2324-2338 ◽  
Author(s):  
Patricia L. R. Brennan ◽  
Richard O. Prum

Sexual conflict occurs when the evolutionary interests of the sexes differ and it broadly applies to decisions over mating, fertilization and parental investment. Recently, a narrower view of sexual conflict has emerged in which direct selection on females to avoid male-imposed costs during mating is considered the distinguishing feature of conflict, while indirect selection is considered negligible. In this view, intersexual selection via sensory bias is seen as the most relevant mechanism by which male traits that harm females evolve, with antagonistic coevolution between female preferences and male manipulation following. Under this narrower framework, female preference and resistance have been synonymized because both result in a mating bias, and similarly male display and coercion are not distinguished. Our recent work on genital evolution in waterfowl has highlighted problems with this approach. In waterfowl, preference and resistance are distinct components of female phenotype, and display and coercion are independent male strategies. Female preference for male displays result in mate choice, while forced copulations by unpreferred males result in resistance to prevent these males from achieving matings and fertilizations. Genital elaborations in female waterfowl appear to function in reinforcing female preference to maintain the indirect benefits of choice rather than to reduce the direct costs of coercive mating. We propose a return to a broader view of conflict where indirect selection and intrasexual selection are considered important in the evolution of conflict.


Sign in / Sign up

Export Citation Format

Share Document