2018
DOI: 10.1186/s13673-018-0128-7
|View full text |Cite
|
Sign up to set email alerts
|

User characteristics that influence judgment of social engineering attacks in social networks

Abstract: Social engineering is a growing source of information security concern. Exploits appear to evolve, with increasing levels of sophistication, in order to target multiple victims. Despite increased concern with this risk, there has been little research activity focused upon social engineering in the potentially rich hunting ground of social networks. In this setting, factors that influence users’ proficiency in threat detection need to be understood if we are to build a profile of susceptible users, develop suit… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
5

Citation Types

0
41
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
4
4

Relationship

1
7

Authors

Journals

citations
Cited by 53 publications
(41 citation statements)
references
References 42 publications
0
41
0
Order By: Relevance
“…This raises the necessity of finding a solution that helps the user toward acceptable defensive behaviour in the social network (SN) setting. Identifying the user characteristics that make them more or less vulnerable to social engineering threats is a major step toward protecting against such threats (Albladi and Weir 2018). Knowing where weakness resides can help focus awareness-raising and target training sessions for those individuals, with the aim of reducing their likely victimisation.…”
Section: Introductionmentioning
confidence: 99%
“…This raises the necessity of finding a solution that helps the user toward acceptable defensive behaviour in the social network (SN) setting. Identifying the user characteristics that make them more or less vulnerable to social engineering threats is a major step toward protecting against such threats (Albladi and Weir 2018). Knowing where weakness resides can help focus awareness-raising and target training sessions for those individuals, with the aim of reducing their likely victimisation.…”
Section: Introductionmentioning
confidence: 99%
“…When trying to evaluate human behavior towards online threats, it is crucial to identify the human factors related to those threats. According to the existing literature, demographic factors, Internet use, and security knowledge have been found as some of the major determinants associated with social engineering attacks [13,14].…”
Section: Introductionmentioning
confidence: 99%
“…Age. According to [13], young Internet users are more susceptible to phishing or social engineering attacks. Similar findings were concluded by Airehrour et al [14], who stated that people in the age group 28-38 years are less vulnerable to social engineering attacks.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…Heuristic-based malware detection involves malware scanning to detect features suspected of malicious behavior. Towards this end, many dynamic and static analysis methods have been developed [8][9][10][11]. A dynamic analysis method detects malicious behavior by executing the malware itself in an isolated virtual environment [12], whereas a static analysis method detects malicious behavior by identifying the overall structure without executing the malware [13,14].…”
Section: Introductionmentioning
confidence: 99%