Cusack et al., 2018 - Google Patents
The impact of personality traits on user's susceptibility to social engineering attacksCusack et al., 2018
View PDF- Document ID
- 4781106139661955169
- Author
- Cusack B
- Adedokun K
- Publication year
External Links
Snippet
Phishing attacks and other social manipulation attacks are an everyday occurrence for most workers in their email boxes. Others experience social engineering tricks to take and divert payments on legitimate electronic commerce transactions. This exploratory pilot study aims …
- 238000011160 research 0 abstract description 19
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/316—User authentication by observing the pattern of computer usage, e.g. typical user behaviour
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/552—Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/10—Office automation, e.g. computer aided management of electronic mail or groupware; Time management, e.g. calendars, reminders, meetings or time accounting
- G06Q10/107—Computer aided management of electronic mail
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/40—Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
- G06Q20/401—Transaction verification
- G06Q20/4016—Transaction verification involving fraud or risk level assessment in transaction processing
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2133—Verifying human interaction, e.g., Captcha
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2131—Lost password, e.g. recovery of lost or forgotten passwords
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q40/00—Finance; Insurance; Tax strategies; Processing of corporate or income taxes
- G06Q40/02—Banking, e.g. interest calculation, credit approval, mortgages, home banking or on-line banking
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Syafitri et al. | Social engineering attacks prevention: A systematic literature review | |
Naidoo | A multi-level influence model of COVID-19 themed cybercrime | |
Cusack et al. | The impact of personality traits on user’s susceptibility to social engineering attacks | |
Younis et al. | A framework to protect against phishing attacks | |
Archibald et al. | Refining the PoinTER “human firewall” pentesting framework | |
Khadka et al. | A survey on the principles of persuasion as a social engineering strategy in phishing | |
He et al. | The self-efficacy variable in behavioral information security research | |
Imtiaz et al. | Analysis of cybersecurity measures for detection, prevention, and misbehaviour of social systems | |
Dada et al. | Information security awareness, a tool to mitigate information security risk: A literature review | |
Kulkarni et al. | Human Susceptibility to Social Engineering Attacks: an innovative approach to social change | |
Black et al. | Insider Threat and White Collar Crime in Non-Government Organisations and Industries | |
Kessler | Effectiveness of the protection motivation theory on small business employee security risk behavior | |
Ishaq et al. | A survey on human factors in cyberspace: A new dimension of privacy threats | |
Hammarstrand et al. | Information security awareness and behaviour: of trained and untrained home users in Sweden. | |
Watters | Counterintelligence in a Cyber World | |
Anthony | Barriers to Adoption of Advanced Cybersecurity Tools in Organizations | |
Dorasamy et al. | Cybersecurity issues among working youths in an iot environment: A design thinking process for solution | |
Sutter | The cyber profile: Determining human behavior through cyber-actions | |
Sturlese et al. | Modeling the Case of Cyber Espionage for Executive Game Simulations | |
Perova | Creating guidelines and best practices against phishing and ransomware attacks for healthcare personnel | |
Thomson | Cybersecurity: reducing the attack surface | |
Nonum et al. | SOCIAL ENGINEERING: UNDERSTANDING HUMAN FACTORS IN CYBER SECURITY | |
Kumar | Thee machine learning analysis of data granularity for insider threat detection | |
Donato | Computer criminal profiling applied to digital investigations | |
Liang et al. | Identifying common characteristics of malicious insiders |