Towards understanding phishing victims' profile
Document Type
Conference Proceeding
Source of Publication
2012 International Conference on Computer Systems and Industrial Informatics, ICCSII 2012
Publication Date
12-1-2012
Abstract
Today it is known that the weakest link in the cyber security chain is the computer user. Social engineering attacks are commonly used to deceive computer users to perform actions that could leak private information. Such attacks psychologically manipulate the computer users to reveal his/her confidential information. Therefore, the computer user has been carefully studied by security researchers to understand the relationship between cyber security incidents and the victim background. In this paper, we present a breadth-first survey of recent studies that aim to understand the relationship between victims' backgrounds and phishing attacks. We summarize the characteristics of the phishing victims, following a review of their demographic and personality traits. © 2012 IEEE.
DOI Link
ISBN
9781467351577
Publisher
Institute of Electrical and Electronics Engineers (IEEE)
Disciplines
Computer Sciences | Social and Behavioral Sciences
Keywords
Breadth-first, Computer users, Confidential information, Cyber security, Personality traits, Phishing, Phishing attacks, Private information, Social engineering, Weakest links, Computer crime, Information science, Network security
Scopus ID
Recommended Citation
Darwish, Ali; Zarka, Ahmed El; and Aloul, Fadi, "Towards understanding phishing victims' profile" (2012). All Works. 3667.
https://zuscholars.zu.ac.ae/works/3667
Indexed in Scopus
yes
Open Access
no