Towards Understanding Phishing Victims' Profile

被引:0
|
作者
Darwish, Ali [1 ]
El Zarka, Ahmed [1 ]
Aloul, Fadi [1 ]
机构
[1] Zayed Univ UAE, Coll Informat Technol, Dubai, U Arab Emirates
来源
2012 INTERNATIONAL CONFERENCE ON COMPUTER SYSTEMS AND INDUSTRIAL INFORMATICS (ICCSII) | 2012年
关键词
PERSONALITY;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Today it is known that the weakest link in the cyber security chain is the computer user. Social engineering attacks are commonly used to deceive computer users to perform actions that could leak private information. Such attacks psychologically manipulate the computer users to reveal his/her confidential information. Therefore, the computer user has been carefully studied by security researchers to understand the relationship between cyber security incidents and the victim background. In this paper, we present a breadth-first survey of recent studies that aim to understand the relationship between victims' backgrounds and phishing attacks. We summarize the characteristics of the phishing victims, following a review of their demographic and personality traits.
引用
收藏
页数:5
相关论文
共 50 条
  • [21] CULTURAL COMPARISON TOWARDS USERS' SUSCEPTIBLE TO PHISHING EMAILS
    Alseadoon, Ibrahim Mohammed
    Othman, Mohd Fairuz Iskandar
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2021, 21 (10): : 240 - 244
  • [22] Towards Lightweight URL-Based Phishing Detection
    Butnaru, Andrei
    Mylonas, Alexios
    Pitropakis, Nikolaos
    FUTURE INTERNET, 2021, 13 (06)
  • [23] Profile of the victims of sexual offense in Bulgaria
    Tumbev, L.
    Chumpalova, P.
    Stoimenova-Popova, M.
    Krysteva, E.
    Popov, P.
    Stoychev, K.
    Valtchev, V.
    EUROPEAN PSYCHIATRY, 2019, 56 : S136 - S136
  • [24] The profile of female victims of conjugal violence
    Vasseur, P
    PRESSE MEDICALE, 2004, 33 (22): : 1566 - 1568
  • [25] MtDNA profile of West Africa Guineans: Towards a better understanding of the Senegambia region
    Rosa, A
    Brehm, A
    Kivisild, T
    Metspalu, E
    Villems, R
    ANNALS OF HUMAN GENETICS, 2004, 68 : 340 - 352
  • [26] Towards understanding the detection of profile asymmetry from Mueller matrix differential decomposition
    Chen, Xiuguo
    Jiang, Hao
    Zhang, Chuanwei
    Liu, Shiyuan
    JOURNAL OF APPLIED PHYSICS, 2015, 118 (22)
  • [27] Victims of Bullying: Emotion Recognition and Understanding
    Franzen, Minita
    de Jong, Peter J.
    Veling, Wim
    aan het Rot, Marije
    FRONTIERS IN PSYCHOLOGY, 2021, 12
  • [28] Where Did They Go Right? Understanding the Deception in Phishing Communications
    Wright, Ryan
    Chakraborty, Suranjan
    Basoglu, Asli
    Marett, Kent
    GROUP DECISION AND NEGOTIATION, 2010, 19 (04) : 391 - 416
  • [29] The dark side of social networking sites:Understanding phishing risks
    Silic, Mario
    Back, Andrea
    COMPUTERS IN HUMAN BEHAVIOR, 2016, 60 : 35 - 43
  • [30] Rods with Laser Beams: Understanding Browser Fingerprinting on Phishing Pages
    Sanchez-Rola, Iskander
    Bilge, Leyla
    Balzarotti, Davide
    Buescher, Armin
    Efstathopoulos, Petros
    PROCEEDINGS OF THE 32ND USENIX SECURITY SYMPOSIUM, 2023, : 4157 - 4173