Picture of neon light reading 'Open'

Discover open research at Strathprints as part of International Open Access Week!

23-29 October 2017 is International Open Access Week. The Strathprints institutional repository is a digital archive of Open Access research outputs, all produced by University of Strathclyde researchers.

Explore recent world leading Open Access research content this Open Access Week from across Strathclyde's many research active faculties: Engineering, Science, Humanities, Arts & Social Sciences and Strathclyde Business School.

Explore all Strathclyde Open Access research outputs...

Vulnerability to social engineering in social networks : a proposed user-centric framework

Albladi, Samar and Weir, George R S (2016) Vulnerability to social engineering in social networks : a proposed user-centric framework. In: 2016 IEEE International Conference on Cybercrime and Computer Forensic (ICCCF). IEEE, Piscataway, NJ, pp. 95-100. ISBN 9781509060962

[img]
Preview
Text (Albladi-Weir-ICCCF2016-Vulnerability-to-social-engineering-in-social-networks)
Albladi_Weir_ICCCF2016_Vulnerability_to_social_engineering_in_social_networks.pdf - Accepted Author Manuscript

Download (270kB) | Preview

Abstract

Social networking sites have billions of users who communicate and share their personal information every day. Social engineering is considered one of the biggest threats to information security nowadays. Social engineering is an attacker technique to manipulate and deceive users in order to access or gain privileged information. Such attacks are continuously developed to deceive a high number of potential victims. The number of social engineering attacks has risen dramatically in the past few years, causing unpleasant damage both to organizations and individuals. Yet little research has discussed social engineering in the virtual environments of social networks. One approach to counter these exploits is through research that aims to understand why people fall victim to such attacks. Previous social engineering and deception research have not satisfactory identified the factors that influence the users' ability to detect attacks Characteristics that influence users' vulnerability must be investigated to address this issue and help to build a profile for vulnerable users in order to focus on increasing the training programs and education for those users. In this context, the present study proposes a user-centric framework to understand the user's susceptibility, relevant factors and dimensions.