2013 IEEE Third International Conference on Information Science and Technology (ICIST) 2013
DOI: 10.1109/icist.2013.6747602
|View full text |Cite
|
Sign up to set email alerts
|

Social engineering in social networking sites: Affect-based model

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
20
0

Year Published

2014
2014
2020
2020

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 13 publications
(20 citation statements)
references
References 77 publications
0
20
0
Order By: Relevance
“…It has been argued that in social networking sites, there are three main sources in the user's profile that cybercriminals use to reach their victims, content, friendship connections, and privacy settings [20]. A network's privacy and security settings are important measures to protect the user.…”
Section: Social Engineering In Social Networkmentioning
confidence: 99%
“…It has been argued that in social networking sites, there are three main sources in the user's profile that cybercriminals use to reach their victims, content, friendship connections, and privacy settings [20]. A network's privacy and security settings are important measures to protect the user.…”
Section: Social Engineering In Social Networkmentioning
confidence: 99%
“…Algarni et al [18] propose a social engineering schema to describe threats in social networks. The schema covers the environment, the attacker, the trick, and the victims.…”
Section: Related Workmentioning
confidence: 99%
“…Algarni et al (2013) examine social engineering threats on social networking sites and inquire the questions of "which entities exist and how do they effect social engineering in social networking sites?" It is concluded in their study that the success of social engineering attacks is affected by the characteristics of four main entities: the online social network (the environment), the social engineer (the attacker), the plan and technique (the trick), and the online social network user (the victim).…”
Section: General Social Engineering Attacksmentioning
confidence: 99%
“…To analyze social engineering attacks, the entities (e.g., environment, attacker, trick and victim) need to be identified and their roles should be investigated (Algarni et al, 2013). Algarni et al (2013) examine social engineering threats on social networking sites and inquire the questions of "which entities exist and how do they effect social engineering in social networking sites?"…”
Section: General Social Engineering Attacksmentioning
confidence: 99%