DocumentCode :
127692
Title :
Social Engineering in Social Networking Sites: The Art of Impersonation
Author :
Algarni, Abdulmohsen ; Yue Xu ; Chan, Thomas
Author_Institution :
Sci. & Eng. Fac., Queensland Univ. of Technol., Brisbane, QLD, Australia
fYear :
2014
fDate :
June 27 2014-July 2 2014
Firstpage :
797
Lastpage :
804
Abstract :
Social networking sites (SNSs), with their large number of users and large information base, seem to be the perfect breeding ground for exploiting the vulnerabilities of people, who are considered the weakest link in security. Deceiving, persuading, or influencing people to provide information or to perform an action that will benefit the attacker is known as "social engineering." Fraudulent and deceptive people use social engineering traps and tactics through SNSs to trick users into obeying them, accepting threats, and falling victim to various crimes such as phishing, sexual abuse, financial abuse, identity theft, and physical crime. Although organizations, researchers, and practitioners recognize the serious risks of social engineering, there is a severe lack of understanding and control of such threats. This may be partly due to the complexity of human behaviors in approaching, accepting, and failing to recognize social engineering tricks. This research aims to investigate the impact of source characteristics on users\´ susceptibility to social engineering victimization in SNSs, particularly Facebook. Using grounded theory method, we develop a model that explains what and how source characteristics influence Facebook users to judge the attacker as credible.
Keywords :
computer crime; fraud; social aspects of automation; social networking (online); Facebook; SNS; attacker; deceptive people; financial abuse; fraudulent people; grounded theory method; human behaviors complexity; identity theft; impersonation; large information base; phishing; physical crime; security; sexual abuse; social engineering traps; social engineering victimization; social engineeringtactics; social networking sites; threats; user susceptibility; Encoding; Facebook; Interviews; Organizations; Receivers; Security; impersonation; information security management; social engineering; social networking sites; source credibility; trust management;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Services Computing (SCC), 2014 IEEE International Conference on
Conference_Location :
Anchorage, AK
Print_ISBN :
978-1-4799-5065-2
Type :
conf
DOI :
10.1109/SCC.2014.108
Filename :
6930610
Link To Document :
بازگشت