2014
DOI: 10.3233/aic-140650
|View full text |Cite
|
Sign up to set email alerts
|

Guided socialbots: Infiltrating the social networks of specific organizations’ employees

Abstract: A dimension of the Internet that has gained great popularity in recent years is the platform of online social networks (OSNs). Users all over the world write, share, and publish personal information about themselves, their friends, and their workplaces within this platform of communication. In this study we demonstrate the relative ease of creating malicious socialbots that act as social network "friends," resulting in OSN users unknowingly exposing potentially harmful information about themselves and their pl… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2017
2017
2023
2023

Publication Types

Select...
4
3
2

Relationship

0
9

Authors

Journals

citations
Cited by 13 publications
(5 citation statements)
references
References 38 publications
0
4
0
Order By: Relevance
“…Social botnets are used in political disagreements [12]. Furthermore, bots of an organization's penetration act apparently like friends [13]. Finally, cyberbullying bots entail the deliberate and aggressive use of information and communication technology by an individual or group with the intent to harm others [14,15].…”
Section: Inteligencia Artificialmentioning
confidence: 99%
“…Social botnets are used in political disagreements [12]. Furthermore, bots of an organization's penetration act apparently like friends [13]. Finally, cyberbullying bots entail the deliberate and aggressive use of information and communication technology by an individual or group with the intent to harm others [14,15].…”
Section: Inteligencia Artificialmentioning
confidence: 99%
“…It has been suggested that this movement was meant to intentionally alter the perception of social media to benefit groups that desired public mistrust in social media and to further their political goals [66]. Third, a study using social bots and Facebook to infiltrate specific organizations through friend requests revealed that most social bots succeeded in gathering private information from high-ranking organization officials [67]. Thus, organizational security may also be at risk due to the malicious use of social bots.…”
Section: Iv2 Financial and Economic Threatsmentioning
confidence: 99%
“…Their work proved the feasibility of privacy breach by exploiting social bots. Elyashar et al 30 studied the infiltration of social bots in organizations related to computer technology, whose employees should theoretically be more security-conscious. However, their experiments showed that the infiltration of computer-related workers also had a high success rate and found that the more mutual friends the user had, the more likely he or she was to accept a friend request from a social bot.…”
Section: Related Workmentioning
confidence: 99%
“…Besides, it can provide a reference for the social bots detections as well. The social bots in Facebook or Twitter have been studied by some researchers [28][29][30] . However, due to differences of users, social network structure, active time, regulatory requirements and other aspects, the strategies to construct social bots of Sina Microblog need to be different.…”
mentioning
confidence: 99%