Companion of the 2018 ACM/IEEE International Conference on Human-Robot Interaction 2018
DOI: 10.1145/3173386.3176908
|View full text |Cite
|
Sign up to set email alerts
|

Robot Social Engineering

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
5
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
3
3
1
1

Relationship

0
8

Authors

Journals

citations
Cited by 15 publications
(5 citation statements)
references
References 35 publications
0
5
0
Order By: Relevance
“…This behaviour opens the door to social engineers who will connect with you on social media to work to develop more directed social engineering attacks (Hallas, 2018) (Vishwanath, 2014) (Kayes & Iamnitchi, 2017) (Tsikerdekis & Zeadally, 2014). Before the invention of Social Media and Social Media scraping tools, the reconnaissance process was very labour-intensive, so a social engineer would be limited to targeting a small number of people at a time (Postnikoff & Goldberg, 2018). Now social engineers can gather information on hundreds of potential targets and then develop an increased number of attacks, which increases their likelihood of being successful (Wilcox & Bhattacharya, 2019) (Gharibi & Shaabi, 2012) (Weir et al, 2011).…”
Section: Humans and Their Behavioursmentioning
confidence: 99%
“…This behaviour opens the door to social engineers who will connect with you on social media to work to develop more directed social engineering attacks (Hallas, 2018) (Vishwanath, 2014) (Kayes & Iamnitchi, 2017) (Tsikerdekis & Zeadally, 2014). Before the invention of Social Media and Social Media scraping tools, the reconnaissance process was very labour-intensive, so a social engineer would be limited to targeting a small number of people at a time (Postnikoff & Goldberg, 2018). Now social engineers can gather information on hundreds of potential targets and then develop an increased number of attacks, which increases their likelihood of being successful (Wilcox & Bhattacharya, 2019) (Gharibi & Shaabi, 2012) (Weir et al, 2011).…”
Section: Humans and Their Behavioursmentioning
confidence: 99%
“…Social engineering is already prevalent, and requires an emotional connection to the person being engineered. These issues are discussed in depth by Postnikoff (2020), but authority, conformity, reciprocity, empathy and trust are key elements to the definition of the problem. With more well defined models of social agents, we are running into the dilemma posed by these security and privacy concerns.…”
Section: Ethical Considerationsmentioning
confidence: 99%
“…In future, there is a strong need to educate people regarding social engineering attacks and to develop a mechanism to protect against robotic social engineering attacks. 22 Similarly in many studies, the author emphasized the importance to educate people regarding information security and social engineering attacks. 12,23 The authors of the study, 23 Ghafir et al, first analyzed the threats associated with human and then suggested the strategies to defend those attacks.…”
Section: F I G U R E 1 Research Protocolmentioning
confidence: 99%
“…In case of time pressure, as there is less time to consult and a person is expected to respond quickly, this factor is used by the social engineers. By putting victim under time pressure and make him not think rationale Diffusion of responsibility 5 A person in less likely to take responsibility for work in which others are present by assuming others responsible for work Lying 22 Person under certain pressure, situation, or fear may speak lie Laziness 15 A person is thought to be lazy if he can perform a particular task but do not perform as an effort is involved in it Natural inclination to help 23 By nature people help others who are in need of assistance T A B L E 4 Various theories and concepts used in literature to relate social engineering activities…”
Section: Human Factors References Explanationmentioning
confidence: 99%