2021 4th International Conference on Blockchain Technology and Applications 2021
DOI: 10.1145/3510487.3510494
|View full text |Cite
|
Sign up to set email alerts
|

Under Pressure. A User-Centered Threat Model for Cryptocurrency Owners

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
26
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
3
2
1

Relationship

1
5

Authors

Journals

citations
Cited by 10 publications
(26 citation statements)
references
References 31 publications
0
26
0
Order By: Relevance
“…Since some publications include human aspects, such as social engineering, we add the human layer to the blockchain layer model. Whereas most publications concentrate on the end-user, Fröhlich et al [131] explicitly state staff members. In the following, we summarize the results, grouped into the categories of social engineering (see Section 6.2.1), human errors and accidental threats (see Section 6.2.2), and wallet threats (see Section 6.2.3), which can have various reasons.…”
Section: Human Layermentioning
confidence: 99%
See 3 more Smart Citations
“…Since some publications include human aspects, such as social engineering, we add the human layer to the blockchain layer model. Whereas most publications concentrate on the end-user, Fröhlich et al [131] explicitly state staff members. In the following, we summarize the results, grouped into the categories of social engineering (see Section 6.2.1), human errors and accidental threats (see Section 6.2.2), and wallet threats (see Section 6.2.3), which can have various reasons.…”
Section: Human Layermentioning
confidence: 99%
“…In the field of blockchain, the variants of asking for the private key, credentials, or cryptocurrency (as exchange or contribution) exist, according to Weber et al [129]. Fröhlich et al [131] name email phishing, ad phishing, social media phishing, voice phishing, short message service (SMS) phishing, and spear-phishing. In addition, the authors state the variants of exit scams, fraudulent cryptocurrency scams, transaction scams, impersonation giveaway scams, and blackmail scams.…”
Section: Social Engineeringmentioning
confidence: 99%
See 2 more Smart Citations
“…Across studies self-induced human errors are frequently reported (e.g. [2,47,50,79,87,132]). Examples include forgotten passwords [115], forgotten storage locations, lost private keys, wrongly sent transactions [50], or ill investment decisions [2].…”
Section: Behavior and Perceptionmentioning
confidence: 99%