2022
DOI: 10.1177/02666669221116336
|View full text |Cite
|
Sign up to set email alerts
|

Using machine learning algorithms to predict individuals’ tendency to be victim of social engineering attacks

Abstract: In information security context, social engineering is defined as malicious activities caused by cybercriminals by means of human interactions. It is mainly a psychological manipulation technique which gets benefit of human error to reach private information. This study used machine learning algorithms to predict individuals’ susceptibility to be tricked by social engineering attacks. Simulated scenarios were presented to study participants, and they were asked to identify whether each scenario was a social en… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
1
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 6 publications
(2 citation statements)
references
References 63 publications
0
1
0
Order By: Relevance
“…Specifically, characteristic A3 (don't insult) plays a central role, as it represents the essential difference between victims and aggressors and aggressors/victims, at all levels of education. Characteristic A3 indicates the decision made and the attitude to refrain from aggressive behavior (Huseynov & Ozdenizci Kose, 2022).…”
Section: Personality Traits and Bully Victim And Bully/victim At Each...mentioning
confidence: 99%
“…Specifically, characteristic A3 (don't insult) plays a central role, as it represents the essential difference between victims and aggressors and aggressors/victims, at all levels of education. Characteristic A3 indicates the decision made and the attitude to refrain from aggressive behavior (Huseynov & Ozdenizci Kose, 2022).…”
Section: Personality Traits and Bully Victim And Bully/victim At Each...mentioning
confidence: 99%
“…The Agent Web Model provides a framework for understanding the relationships between the various components involved in these attacks, while machine learning algorithms and social engineering taxonomy are used to analyze and detect these attacks. Human factor analysis is used to understand how individuals behave and respond to these attacks and to develop more effective defenses (Alkawaz et al, 2021;Huseynov and Ozdenizci Kose, 2022). Fig.…”
Section: Hybrid Modelmentioning
confidence: 99%