2014 9th International Conference on Malicious and Unwanted Software: The Americas (MALWARE) 2014
DOI: 10.1109/malware.2014.6999412
|View full text |Cite
|
Sign up to set email alerts
|

Risk prediction of malware victimization based on user behavior

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
5

Citation Types

0
2
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 21 publications
(5 citation statements)
references
References 6 publications
0
2
0
Order By: Relevance
“…Profit-driven cybercrime, which is the focus of this paper/research, has been studied by both social scientists and computer scientists. It has been characterised by empirical contributions that have sought to illuminate the nature and organisation of cybercrime both online and offline [15][16][17][18][19][20]. But, as noted above, the geography of cybercrime has only been addressed by a handful of scholars, and they have identified a number of challenges connected to existing data.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…Profit-driven cybercrime, which is the focus of this paper/research, has been studied by both social scientists and computer scientists. It has been characterised by empirical contributions that have sought to illuminate the nature and organisation of cybercrime both online and offline [15][16][17][18][19][20]. But, as noted above, the geography of cybercrime has only been addressed by a handful of scholars, and they have identified a number of challenges connected to existing data.…”
Section: Introductionmentioning
confidence: 99%
“…Often using technical data, cybersecurity firms, law enforcement agencies and international organisations regularly publish reports that identify the major sources of cyber attacks (see for example [21][22][23][24]). Some of these sources have been aggregated by scholars (see [20,[25][26][27][28][29]). But the kind of technical data contained in these reports cannot accurately measure offender location.…”
Section: Introductionmentioning
confidence: 99%
“…Overall, it is estimated that the majority of users fall victim to some form of cybercrime [21][22][23], with malware and fraudulent activities being the most common [18,23,24]. In terms of predictors, self-protective behavior (related to users' threat and risk perception, their perceptions and attitudes towards security technologies) [25,26], online activities [27][28][29], psychological traits [30][31][32], and socio-demographic characteristics [33,34] were established to have a significant influence on cybercrime victimization.…”
Section: Introductionmentioning
confidence: 99%
“…First, some researchers examined the differences between users regarding their browsing habits and the corresponding needs for personalized protection [1,[4][5][6][7][8][9][10][11]. Second, several systems addressed the benefit of having a proactive or predictive approach rather than a reactive one; taking action only once the attack occurred could lower the effectiveness of blocking the malware [3,4,8,[12][13][14][15]. Third, some projects considered the need to maintain a low level of privacy invasion while supplying means of protection to the users [8].…”
Section: Introductionmentioning
confidence: 99%
“…For a security system to be proactive, it needs to predict the level of risk or forecast an upcoming malware attack. The subject of predicting the risk of infection has been addressed in several studies [3,4,8,[12][13][14][15]. Bilge et al [13] achieved excellent results in predicting infections by analyzing the binaries installed on users' computers and identifying ones that are more likely to be attacked.…”
Section: Introductionmentioning
confidence: 99%