2018
DOI: 10.1109/lra.2018.2856272
|View full text |Cite
|
Sign up to set email alerts
|

Trust and Social Engineering in Human Robot Interaction: Will a Robot Make You Disclose Sensitive Information, Conform to Its Recommendations or Gamble?

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

1
38
0
1

Year Published

2019
2019
2023
2023

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 61 publications
(40 citation statements)
references
References 34 publications
1
38
0
1
Order By: Relevance
“…Social engineering attacks may combine the different aspects previously discussed, namely: human, computer, technical, social, and physical-based. Examples of social engineering attacks include phishing, impersonation on help desk calls, shoulder surfing, dumpster diving, stealing important documents, diversion theft, fake software, baiting, quid pro quo, pretexting, tailgating, Pop-Up windows, Robocalls, ransomware, online social engineering, reverse social engineering, and phone social engineering [1][2][3][4][5][6][7][8][9][10][11][12][13][14][15][16][17][18]. Figure 4 illustrates the classification of these attacks.…”
Section: Attacks Classificationmentioning
confidence: 99%
See 1 more Smart Citation
“…Social engineering attacks may combine the different aspects previously discussed, namely: human, computer, technical, social, and physical-based. Examples of social engineering attacks include phishing, impersonation on help desk calls, shoulder surfing, dumpster diving, stealing important documents, diversion theft, fake software, baiting, quid pro quo, pretexting, tailgating, Pop-Up windows, Robocalls, ransomware, online social engineering, reverse social engineering, and phone social engineering [1][2][3][4][5][6][7][8][9][10][11][12][13][14][15][16][17][18]. Figure 4 illustrates the classification of these attacks.…”
Section: Attacks Classificationmentioning
confidence: 99%
“…They cannot be prevented using software or hardware solutions as long as people are not trained to prevent these attacks. Cyber criminals choose these attacks when there is no way to hack a system with no technical vulnerabilities [3].…”
Section: Introductionmentioning
confidence: 99%
“…In addition to the explicit type of game model, researchers have established some game models based on different application scenarios [70][71][72][73][74]. Most of these game models are established with the following objectives as the ultimate goal: To establish trust relationships and increase the credibility of data, to defend against malicious attacks in the network, to help the system by choosing a better strategy, and to maximize network utility by achieving these goals [75][76][77][78][79][80][81].…”
Section: Relate Summarized Workmentioning
confidence: 99%
“…Wu et al [60] Ruan et al [61] John et al [62] Wu et al [63] Jin and van Dijk [64] Yu et al [66] Abbass et al [68] Chica et al [69] Hu et al [6] Zhu et al [70] Ding et al [71] Zhang et al [72] Aloqaily et al [74] Rishwaraj et al [75] Pouryazdan et al [76] Chen et al [77] Lorenzo et al [78] Li et al [79] Aroyo et al [80] Moghadam and Modares [81] Cui et al [28] Yin et al [26] Chen et al [27] Li et al [14] According to whether the players cooperate, the game is divided into cooperative game and non-cooperative game. The common goal of both games can maximize network utility and improve network security.…”
Section: Security Game Trust Game Othersmentioning
confidence: 99%
See 1 more Smart Citation