Abstract
AbstractSocial engineering is a growing source of information security concern. Exploits appear to evolve, with increasing levels of sophistication, in order to target multiple victims. Despite increased concern with this risk, there has been little research activity focused upon social engineering in the potentially rich hunting ground of social networks. In this setting, factors that influence users’ proficiency in threat detection need to be understood if we are to build a profile of susceptible users, develop suitable advice and training programs, and generally help address this issue for those individuals most likely to become targets of social engineering in social networks. To this end, the present study proposes and validates a user-centric framework based on four perspectives: socio-psychological, habitual, socio-emotional, and perceptual. Previous research tends to rely on selected aspects of these perspectives and has not combined them into a single model for a more cohesive understanding of user’s susceptibility.
Publisher
Springer Science and Business Media LLC
Reference49 articles.
1. Ponemon Institute and IBM Security (2017) 2017 cost of data breach study: global overview
2. Mulligan DK, Schneider FB (2011) Doctrine for cybersecurity. Daedalus 140(4):70–92
3. Martin KD, Borah A, Palmatier RW (2017) Data privacy: effects on customer and firm performance. J Mark 81(1):36–58
4. Hinz O, Nofer M, Schiereck D, Trillig J (2015) The influence of data theft on the share prices and systematic risk of consumer electronics companies. Inf Mana 52(3):337–347
5. Weiss NE, Miller RS (2015) The target and other financial data breaches: frequently asked questions. Congr Res Serv 4:1–38
Cited by
55 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献