Toward Predicting Susceptibility to Phishing Victimization on Facebook

Z. Alqarni, A. Algarni, Yue Xu
{"title":"Toward Predicting Susceptibility to Phishing Victimization on Facebook","authors":"Z. Alqarni, A. Algarni, Yue Xu","doi":"10.1109/SCC.2016.61","DOIUrl":null,"url":null,"abstract":"Social networking sites (SNSs), such as Facebook, have become part of everyday use. While many individuals and organizations use SNSs to maintain contact and to do a variety of services, attackers may see them as a prime target for performing different types of attacks. Phishing is one of the most common attacks, and one of the most challenging problems in SNSs. Existing human behaviours literature related to social capital, habitual usage, and risk perception shows a strong indication that it is possible to predict Facebook users' susceptibility to phishing victimization based on their demographics, anonymity, social capital, and risk perception. Using quantitative survey, this paper aims to predict Facebook users' susceptibility to phishing victimization based on these factors. Among the hypothesized factors, we found that it is possible to predict user's susceptibility to phishing victimization based on the user's anonymity status, the number of all friends the user is connected to, the number of strangers that the user is connected to, and the number of close friends that the user is connected to.","PeriodicalId":115693,"journal":{"name":"2016 IEEE International Conference on Services Computing (SCC)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2016-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"10","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2016 IEEE International Conference on Services Computing (SCC)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/SCC.2016.61","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 10

Abstract

Social networking sites (SNSs), such as Facebook, have become part of everyday use. While many individuals and organizations use SNSs to maintain contact and to do a variety of services, attackers may see them as a prime target for performing different types of attacks. Phishing is one of the most common attacks, and one of the most challenging problems in SNSs. Existing human behaviours literature related to social capital, habitual usage, and risk perception shows a strong indication that it is possible to predict Facebook users' susceptibility to phishing victimization based on their demographics, anonymity, social capital, and risk perception. Using quantitative survey, this paper aims to predict Facebook users' susceptibility to phishing victimization based on these factors. Among the hypothesized factors, we found that it is possible to predict user's susceptibility to phishing victimization based on the user's anonymity status, the number of all friends the user is connected to, the number of strangers that the user is connected to, and the number of close friends that the user is connected to.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
预测Facebook用户遭受网络钓鱼攻击的易感性
社交网站(sns),如Facebook,已经成为日常使用的一部分。虽然许多个人和组织使用sns来保持联系并提供各种服务,但攻击者可能会将其视为执行不同类型攻击的主要目标。网络钓鱼是最常见的攻击之一,也是sns中最具挑战性的问题之一。现有的与社会资本、习惯使用和风险感知相关的人类行为文献表明,基于Facebook用户的人口统计、匿名性、社会资本和风险感知,可以预测Facebook用户对网络钓鱼受害的易感性。本文采用定量调查的方法,旨在基于这些因素预测Facebook用户对网络钓鱼受害的易感性。在假设的因素中,我们发现可以根据用户的匿名状态、用户所连接的所有朋友的数量、用户所连接的陌生人数量以及用户所连接的亲密朋友的数量来预测用户对网络钓鱼受害的易感性。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Implementing the Required Degree of Multitenancy Isolation: A Case Study of Cloud-Hosted Bug Tracking System Complexity Reduction: Local Activity Ranking by Resource Entropy for QoS-Aware Cloud Scheduling An Elasticity-Aware Governance Platform for Cloud Service Delivery An Approach for Modeling and Ranking Node-Level Stragglers in Cloud Datacenters Dynamic Selection for Service Composition Based on Temporal and QoS Constraints
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1