Abstract

Social engineering is a growing source of information security concern. Exploits appear to evolve, with increasing levels of sophistication, in order to target multiple victims. Despite increased concern with this risk, there has been little research activity focused upon social engineering in the potentially rich hunting ground of social networks. In this setting, factors that influence users’ proficiency in threat detection need to be understood if we are to build a profile of susceptible users, develop suitable advice and training programs, and generally help address this issue for those individuals most likely to become targets of social engineering in social networks. To this end, the present study proposes and validates a user-centric framework based on four perspectives: socio-psychological, habitual, socio-emotional, and perceptual. Previous research tends to rely on selected aspects of these perspectives and has not combined them into a single model for a more cohesive understanding of user’s susceptibility.

Highlights

  • Stronger security measures are increasingly developed, promoted and deployed, the number of security breaches is still increasing [1]

  • The proposed user-centric framework was the result of integrating previous research, after conducting a comprehensive study of existing human-centric frameworks and related theories

  • Some amendments have been made to the framework according to the experts’ recommendations

Read more

Summary

Introduction

Stronger security measures are increasingly developed, promoted and deployed, the number of security breaches is still increasing [1]. This may be because cybercriminals often target a weak and easy access point, the user. Using advanced and sophisticated deception methods to manipulate the user in order to access sensitive information is the essence of social engineering (SE). Most communication media, such as email, telephone, and recently social networks, have been affected by social engineering threats (Additional file 1)

Objectives
Methods
Results
Conclusion
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call