Picture of athlete cycling

Open Access research with a real impact on health...

The Strathprints institutional repository is a digital archive of University of Strathclyde's Open Access research outputs. Strathprints provides access to thousands of Open Access research papers by Strathclyde researchers, including by researchers from the Physical Activity for Health Group based within the School of Psychological Sciences & Health. Research here seeks to better understand how and why physical activity improves health, gain a better understanding of the amount, intensity, and type of physical activity needed for health benefits, and evaluate the effect of interventions to promote physical activity.

Explore open research content by Physical Activity for Health...

Vulnerability to social engineering in social networks : a proposed user-centric framework

Albladi, Samar and Weir, George R S (2016) Vulnerability to social engineering in social networks : a proposed user-centric framework. In: 2016 IEEE International Conference on Cybercrime and Computer Forensic (ICCCF). IEEE, Piscataway, NJ, pp. 95-100. ISBN 9781509060962

[img]
Preview
Text (Albladi-Weir-ICCCF2016-Vulnerability-to-social-engineering-in-social-networks)
Albladi_Weir_ICCCF2016_Vulnerability_to_social_engineering_in_social_networks.pdf - Accepted Author Manuscript

Download (270kB) | Preview

Abstract

Social networking sites have billions of users who communicate and share their personal information every day. Social engineering is considered one of the biggest threats to information security nowadays. Social engineering is an attacker technique to manipulate and deceive users in order to access or gain privileged information. Such attacks are continuously developed to deceive a high number of potential victims. The number of social engineering attacks has risen dramatically in the past few years, causing unpleasant damage both to organizations and individuals. Yet little research has discussed social engineering in the virtual environments of social networks. One approach to counter these exploits is through research that aims to understand why people fall victim to such attacks. Previous social engineering and deception research have not satisfactory identified the factors that influence the users' ability to detect attacks Characteristics that influence users' vulnerability must be investigated to address this issue and help to build a profile for vulnerable users in order to focus on increasing the training programs and education for those users. In this context, the present study proposes a user-centric framework to understand the user's susceptibility, relevant factors and dimensions.