2017
DOI: 10.1007/978-981-10-6454-8_24
|View full text |Cite
|
Sign up to set email alerts
|

Social Media Information Security Threats: Anthropomorphic Emoji Analysis on Social Engineering

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
6
0
3

Year Published

2019
2019
2024
2024

Publication Types

Select...
4
2
2

Relationship

0
8

Authors

Journals

citations
Cited by 12 publications
(9 citation statements)
references
References 11 publications
0
6
0
3
Order By: Relevance
“…When embedded in text, emoji sometimes simply replace a word, but more often they provide new information which was not contained in the text alone [1], [29]. Emoji can be used as a supplemental modality to clarify the intended sense of an ambiguous message [35], attach sentiment to a message [37], or subvert the original meaning of the text entirely in ways a word could not [12], [30]. Emoji carry meaning on their own, and possess compositionality allowing (00:08.33) (00: 16.67) (00:25.00) (00:33.33) (00:41.67) Entire Video A.…”
Section: Introductionmentioning
confidence: 99%
“…When embedded in text, emoji sometimes simply replace a word, but more often they provide new information which was not contained in the text alone [1], [29]. Emoji can be used as a supplemental modality to clarify the intended sense of an ambiguous message [35], attach sentiment to a message [37], or subvert the original meaning of the text entirely in ways a word could not [12], [30]. Emoji carry meaning on their own, and possess compositionality allowing (00:08.33) (00: 16.67) (00:25.00) (00:33.33) (00:41.67) Entire Video A.…”
Section: Introductionmentioning
confidence: 99%
“…Subsequently, it was concluded that the game has positively impacted players' understanding of social engineering attacks. In an another interesting study, 17 Njenga, tries to explore the effectiveness of using emoji in chat, SMS, or email in social engineering attacks. Researchers of this study performed a controlled experiment on students.…”
Section: F I G U R E 1 Research Protocolmentioning
confidence: 99%
“…The results show that the most commonly cited rationale for not adopting social media was related to (security issues) (42%). Security concerns have been reported in different studies related to social media use and are a main concern among different adopters of social media services [9][10][11]. Close behind this, the second-highest percentage (39%) selected (technical challenges).…”
Section: A Governmental Entities' Utilization Of Social Mediamentioning
confidence: 99%
“…The previous driving forces have been related to the case of KSA governmental entities. However, different driving forces can be outlined for adopting social media services within governmental entities, as some driving forces are similar to the ones defined in this study, as all depend on the intentions of use, position, and sensitivity of services and operations [5,9].…”
Section: B Ownership Of Social Media Within Governmental Agenciesmentioning
confidence: 99%