Filters








130 Hits in 5.0 sec

Predicting User Susceptibility to Phishing Based on Multidimensional Features

Rundong Yang, Kangfeng Zheng, Bin Wu, Di Li, Zhe Wang, Xiujuan Wang, Ahmed Mostafa Khalil
2022 Computational Intelligence and Neuroscience  
In this study, we propose the multidimensional phishing susceptibility prediction model (MPSPM) to implement the prediction of user phishing susceptibility.  ...  We then applied 7 supervised learning methods to classify these volunteers into two categories using multidimensional features: susceptible and nonsusceptible.  ...  processes, knowledge and experience, and security behavior. ese are used as features for predicting user susceptibility using multidimensional features and multiple supervised machine learning methods  ... 
doi:10.1155/2022/7058972 pmid:35082844 pmcid:PMC8786481 fatcat:kjjr2wamwjb73ouixou5bqp34i

Detection of Phishing Websites using an Efficient Feature-Based Machine Learning Framework

2020 International Journal of Engineering and Advanced Technology  
A classification/prediction model is designed based on heuristic features that are extracted from website domain, URL, web protocol, source code to eliminate the drawbacks of existing anti-phishing techniques  ...  Phishing exploits several vulnerabilities effectively and there is no one solution which protects users from all vulnerabilities.  ...  Based on our results, we would recommend using the KNN algorithm to identify phishing websites.  ... 
doi:10.35940/ijeat.c5909.029320 fatcat:stgptiauindojaujgsoq3mot3y

Vulnerability to social engineering in social networks: a proposed user-centric framework

Samar Albladi, George R. S. Weir
2016 2016 IEEE International Conference on Cybercrime and Computer Forensic (ICCCF)  
In this context, the present study proposes a user-centric framework to understand the userÕs susceptibility, relevant factors and dimensions.  ...  Characteristics that influence usersÕ vulnerability must be investigated to address this issue and help to build a profile for vulnerable users in order to focus on increasing the training programs and  ...  victim susceptibility to phishing attacks.  ... 
doi:10.1109/icccf.2016.7740435 fatcat:n4zd66jhobf6rdhvymzzglbmbq

Examining the Relationship between Threat and Coping Appraisal in Phishing Detection among College Students

David John Lemay, Ram B. Basnet, Tenzin Doleck
2020 Journal of Internet Services and Information Security  
Intervention based research focused on changing users' responses to threat appraisals is informed by protection motivation theory (PMT).  ...  Partial least squares structural equation modeling was used to empirically test a model of college users' response to perceived phishing threat and the relationship to their coping appraisal.  ...  Prior Phishing Studies Prior phishing studies have found that email users rely on information cues such as the source, grammar and spelling, and semiotic features, including logos, titles, addresses, formatting  ... 
doi:10.22667/jisis.2020.02.29.038 dblp:journals/jisis/LemayBD20 fatcat:nil2wx3z4jc67j46jyxb3crrxa

Phishing Attacks: A Recent Comprehensive Study and a New Anatomy

Zainab Alkhalil, Chaminda Hewage, Liqaa Nawaf, Imtiaz Khan
2021 Frontiers in Computer Science  
Phishing is an example of a highly effective form of cybercrime that enables criminals to deceive users and steal important data.  ...  At present, phishing is considered one of the most frequent examples of fraud activity on the Internet.  ...  Research on social media-based phishing, Voice Phishing, and SMS Phishing is sparse and these emerging threats are predicted to be significantly increased over the next years. 3.  ... 
doi:10.3389/fcomp.2021.563060 fatcat:4pk6kcegebethm2anvwjdq7q4q

Applying Machine Learning Techniques to Understand User Behaviors When Phishing Attacks Occur

Yi Li, Kaiqi Xiong, Xiangyang Li
2018 EAI Endorsed Transactions on Security and Safety  
The proposed machine learning model can be used to predict the performance of a user based on the user profile.  ...  Based on the collected data, we investigate what factors, such as intervention, phishing types, and an incentive mechanism, play a key role in user behaviors when phishing attacks occur.  ...  We acknowledge National Science Foundation (NSF) to partially sponsor the work under grants #1620868, #1620871, #1620862, and #1651280.  ... 
doi:10.4108/eai.13-7-2018.162809 fatcat:7kgln3hb2neeriwm5vlcugd4jm

Online Social Deception and Its Countermeasures for Trustworthy Cyberspace: A Survey [article]

Zhen Guo, Jin-Hee Cho, Ing-Ray Chen, Srijan Sengupta, Michin Hong, Tanushree Mitra
2020 arXiv   pre-print
Based on this survey, we provide insights into the effectiveness of countermeasures and the lessons from existing literature.  ...  As a consequence, online social deception (OSD) in SNSs has emerged as a serious threat in cyberspace, particularly for users vulnerable to such cyberattacks.  ...  [26] developed a mathematical model based on Stochastic Petri Nets to investigate the effect of user personality traits on phishing susceptibility.  ... 
arXiv:2004.07678v1 fatcat:k4a6siywefb6lhkmyn67lmoqwe

Online Social Deception and Its Countermeasures: A Survey

Zhen Guo, Jin-Hee Cho, Ing-Ray Chen, Srijan Sengupta, Michin Hong, Tanushree Mitra
2020 IEEE Access  
Based on this survey, we provide insights into the effectiveness of countermeasures and the lessons learned from the existing literature.  ...  As a consequence, online social deception (OSD) in SNSs has emerged as a serious threat in cyberspace, particularly for users vulnerable to such cyberattacks.  ...  [25] developed a mathematical model based on Stochastic Petri Nets to investigate the effect of user personality traits on phishing susceptibility. Ding et al.  ... 
doi:10.1109/access.2020.3047337 fatcat:xw2rr2sjnrdf3nk4vfuowrkizy

Deep Learning for Phishing Detection: Taxonomy, Current Challenges and Future Directions

Nguyet Quang Do, Ali Selamat, Ondrej Krejcar, Enrique Herrera-Viedma, Hamido Fujita
2022 IEEE Access  
Motivated to solve these problems, many researchers in the cybersecurity domain have shifted their attention to phishing detection that capitalizes on machine learning techniques.  ...  Phishing has become an increasing concern and captured the attention of end-users as well as security experts.  ...  -Image-Based Phishing Detection Using Transfer Learning 1 Conference Phishing Website Detection Based on Multidimensional Features Driven by Deep Learning 54 Journal article paper Zero-day Malicious Email  ... 
doi:10.1109/access.2022.3151903 fatcat:hhuywvlz5bac5fc5eoizyam77i

User characteristics that influence judgment of social engineering attacks in social networks

Samar Muslah Albladi, George R. S. Weir
2018 Human-Centric Computing and Information Sciences  
To this end, the present study proposes and validates a user-centric framework based on four perspectives: socio-psychological, habitual, socio-emotional, and perceptual.  ...  In this setting, factors that influence users' proficiency in threat detection need to be understood if we are to build a profile of susceptible users, develop suitable advice and training programs, and  ...  Ethics approval and consent to participate This study has been approved by the University of Strathclyde Departmental Ethics Committee.  ... 
doi:10.1186/s13673-018-0128-7 fatcat:6iks4wkp5zfj3nm2qyefynm54i

What Message Characteristics Make Social Engineering Successful on Facebook: The Role of Central Route, Peripheral Route, and Perceived Risk

Abdullah Algarni
2019 Information  
' susceptibility to social engineering victimization on Facebook.  ...  Due to the vital role that persuasion and perception play on users' decision to accept or reject social engineering tricks, this paper aims to investigate the impact of message characteristics on users  ...  Predicting users' vulnerabilities based on their demographics represents a substantial practical contribution expected from this study's findings.  ... 
doi:10.3390/info10060211 fatcat:tiha2h2cgfcmlljmjquodey7eq

The Impact of Threats Appraisal on Security Strategies of Computer Users: A Survey

Mohamad Noorman Masrek, Faculty of Information Management, Universiti Teknologi MARA, Selangor Branch, Malaysia, Mohd Hudzari Razali, Ibrahim Arpaci, Cong Doan Truong
2022 International Journal of Emerging Technology and Advanced Engineering  
Nowadays, many people work from home, owing in part to the COVID-19 pandemic. Home users are susceptible to a variety of threats emanating from the internet.  ...  Numerous studies have been conducted linking threat appraisal and its relationship to multidimensional security behaviour.  ...  Phishing knowledge improves users' capacity to recognize phishing emails and websites, allowing them to prevent attacks [44] .  ... 
doi:10.46338/ijetae0622_10 fatcat:flagymzw2na7rmwvgekxmavp7q

Social Engineering in Social Networking Sites: The Art of Impersonation

Abdullah Algarni, Yue Xu, Taizan Chan
2014 2014 IEEE International Conference on Services Computing  
To predict the potential threats to the users based on their demographics, and to test the study hypotheses and the a priori model (Fig. 4) , a quantitative method will be used in the second phase.  ...  and legitimate users based on their characteristics.  ...  The hypotheses regarding the impact of source characteristics on users' susceptibility to social engineering victimization are: H1: Users are more susceptible to SE victimization by attackers who pretend  ... 
doi:10.1109/scc.2014.108 dblp:conf/IEEEscc/AlgarniXC14 fatcat:widhpmgj7vgnnkusm5bsleye6m

Toward Evaluating Trustworthiness of Social Networking Site Users: Reputation-Based Method

Abdullah Algarni ., Hashem AlMakrami ., Abdulrahman Alarifi .
2019 Archives of Business Research  
However, one of the key challenges that has faced researchers recently is how to distinguish between legitimate users and attackers.  ...  As social networking sites (SNSs) have risen in popularity, attackers have been using social engineering traps and tactics to trick SNS users into obeying them, accepting threats, and falling victim to  ...  ., phishing). One of the most important and probably the most challenging issues is how to detect attackers based on their activities in SNSs.  ... 
doi:10.14738/abr.73.6265 fatcat:5rqpzqq4wzg6ngnrcdxvjfhcyq

Organizational science and cybersecurity: abundant opportunities for research at the interface

Reeshad S. Dalal, David J. Howard, Rebecca J. Bennett, Clay Posey, Stephen J. Zaccaro, Bradley J. Brummel
2021 Journal of business and psychology  
In so doing, we emphasize both end-users of cybersecurity in organizations and employees focused specifically on cybersecurity work.  ...  We provide an expansive agenda for future organizational science research on cybersecurity—and we describe the benefits such research can provide not only to cybersecurity but also to basic research in  ...  Naïve end-users Most existing research examining the impact of individual differences on susceptibility to cyberattacks has focused on one specific type of cyberattack: namely, the phishing attack (see  ... 
doi:10.1007/s10869-021-09732-9 pmid:33564206 pmcid:PMC7861585 fatcat:fcxpphhewbbfphotipd4wuf3hu
« Previous Showing results 1 — 15 out of 130 results