Abstract
Recently, on social media, various kinds of social engineering (SE) have made individuals more susceptible to attacks. A phishing attempt is a widely used SE technique that takes advantage of people’s vulnerabilities to acquire personal or confidential information. These attempts are growing at an astonishing speed, causing harm to both individuals and corporations. According to the latest studies, certain individuals are more vulnerable to such kinds of attacks than others. However, the relationship between psychological characteristics and phishing attacks has not been adequately investigated. This study empirically explores the connection between phishing vulnerability that causes data biases and the Big Five personality traits. Recognizing personality traits that make people more vulnerable to phishing attempts is a key step in developing protection and safeguarding individuals. The individuals who scored high in some traits are more probable to suffer from such assault. To the best of our knowledge, no prior quantitative study has attempted to find many genuine phishing victims and their personality behavior. This problem lacks the availability of publically accessible data. It is also challenging to estimate the probability distribution of rows in tabular data and generate realistic synthetic data to train/test the model on more data. This work employs a conditional generative adversarial network (C-GAN) for both data generation and classification to find the correlation between personality traits and phishing attacks.
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have
Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.