Title :
Towards understanding phishing victims´ profile
Author :
Darwish, Ali ; Zarka, A.E. ; Aloul, Fadi
Author_Institution :
Coll. of Inf. Technol., Zayed Univ. - UAE, Dubai, United Arab Emirates
Abstract :
Today it is known that the weakest link in the cyber security chain is the computer user. Social engineering attacks are commonly used to deceive computer users to perform actions that could leak private information. Such attacks psychologically manipulate the computer users to reveal his/her confidential information. Therefore, the computer user has been carefully studied by security researchers to understand the relationship between cyber security incidents and the victim background. In this paper, we present a breadth-first survey of recent studies that aim to understand the relationship between victims´ backgrounds and phishing attacks. We summarize the characteristics of the phishing victims, following a review of their demographic and personality traits.
Keywords :
behavioural sciences computing; data privacy; security of data; breadth-first survey; computer user deception; confidential information; cyber security chain; cyber security incident; demographic trait; personality trait; phishing attack; phishing victim profile understanding; private information leakage; psychological manipulation; security research; social engineering attack; victim background; Computers; Educational institutions; Electronic mail; Information filtering; Internet; Security; Training;
Conference_Titel :
Computer Systems and Industrial Informatics (ICCSII), 2012 International Conference on
Conference_Location :
Sharjah
Print_ISBN :
978-1-4673-5155-3
DOI :
10.1109/ICCSII.2012.6454454