Towards Understanding Phishing Victims' Profile

被引:0
|
作者
Darwish, Ali [1 ]
El Zarka, Ahmed [1 ]
Aloul, Fadi [1 ]
机构
[1] Zayed Univ UAE, Coll Informat Technol, Dubai, U Arab Emirates
来源
2012 INTERNATIONAL CONFERENCE ON COMPUTER SYSTEMS AND INDUSTRIAL INFORMATICS (ICCSII) | 2012年
关键词
PERSONALITY;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Today it is known that the weakest link in the cyber security chain is the computer user. Social engineering attacks are commonly used to deceive computer users to perform actions that could leak private information. Such attacks psychologically manipulate the computer users to reveal his/her confidential information. Therefore, the computer user has been carefully studied by security researchers to understand the relationship between cyber security incidents and the victim background. In this paper, we present a breadth-first survey of recent studies that aim to understand the relationship between victims' backgrounds and phishing attacks. We summarize the characteristics of the phishing victims, following a review of their demographic and personality traits.
引用
收藏
页数:5
相关论文
共 50 条
  • [1] Addressing the spectre of phishing: are adequate measures in place to protect victims of phishing?
    Cassim, Fawzia
    COMPARATIVE AND INTERNATIONAL LAW JOURNAL OF SOUTHERN AFRICA-CILSA, 2014, 47 (03): : 401 - 428
  • [2] TxPhishScope: Towards Detecting and Understanding Transaction-based Phishing on Ethereum
    He, Bowen
    Chen, Yuan
    Chen, Zhuo
    Hu, Xiaohui
    Hu, Yufeng
    Wu, Lei
    Chang, Rui
    Wang, Haoyu
    Zhou, Yajin
    PROCEEDINGS OF THE 2023 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, CCS 2023, 2023, : 120 - 134
  • [3] Heuristic Systematic model based guidelines for phishing victims
    Shan, Ting Li
    Samy, Ganthan Narayana
    Shanmugam, Bharanidharan
    Azam, Sami
    Yeo, Kheng Cher
    Kannoorpatti, Krishnan
    2016 IEEE ANNUAL INDIA CONFERENCE (INDICON), 2016,
  • [4] Phishing email strategies: Understanding cybercriminals' strategies of crafting phishing emails
    Stojnic, Tatyana
    Vatsalan, Dinusha
    Arachchilage, Nalin A. G.
    SECURITY AND PRIVACY, 2021, 4 (05)
  • [5] From Victims to Defenders: An Exploration of the Phishing Attack Reporting Ecosystem
    Sun, Zhibo
    Kokulu, Faris Bugra
    Zhang, Penghui
    Oest, Adam
    Stringhini, Gianluca
    Bao, Tiffany
    Wang, Ruoyu
    Shoshitaishvili, Yan
    Doupe, Adam
    Ahn, Gail-Joon
    PROCEEDINGS OF 27TH INTERNATIONAL SYMPOSIUM ON RESEARCH IN ATTACKS, INTRUSIONS AND DEFENSES, RAID 2024, 2024, : 49 - 64
  • [6] Phishing attacks: An analysis of the victims' characteristics based on administrative data
    Fedele, Alessandro
    Tonin, Mirco
    Valerio, Matteo
    ECONOMICS LETTERS, 2024, 237
  • [7] Not All Victims Are Created Equal: Investigating Differential Phishing Susceptibility
    Canham, Matthew
    Dawkins, Shanee
    Jacobs, Jody
    AUGMENTED COGNITION, PT I, AC 2024, 2024, 14694 : 3 - 21
  • [9] Understanding Phishing Experiences of Screen Reader Users
    Janeiro, Joao
    Alves, Sergio
    Guerreiro, Tiago
    Alt, Florian
    Distler, Verena
    IEEE SECURITY & PRIVACY, 2024, 22 (05) : 63 - 72
  • [10] Understanding the Experience of Crime Victims with Disabilities and Deaf Victims
    Child, Beckie
    Oschwald, Mary
    Curry, Mary Ann
    Hughes, Rosemary B.
    Powers, Laurie E.
    JOURNAL OF POLICY PRACTICE, 2011, 10 (04) : 247 - 267