Visible to the public Social Engineering in Social Networking Sites: The Art of Impersonation

TitleSocial Engineering in Social Networking Sites: The Art of Impersonation
Publication TypeConference Paper
Year of Publication2014
AuthorsAlgarni, A., Yue Xu, Chan, T.
Conference NameServices Computing (SCC), 2014 IEEE International Conference on
Date PublishedJune
Keywordsattacker, Computer crime, deceptive people, encoding, Facebook, financial abuse, fraud, fraudulent people, grounded theory method, human behaviors complexity, identity theft, impersonation, information security management, Interviews, large information base, Organizations, phishing, physical crime, Receivers, security, sexual abuse, SNS, social aspects of automation, Social Engineering, social engineering traps, social engineering victimization, social engineeringtactics, social networking (online), social networking sites, source credibility, threats, Trust management, user susceptibility
Abstract

Social networking sites (SNSs), with their large number of users and large information base, seem to be the perfect breeding ground for exploiting the vulnerabilities of people, who are considered the weakest link in security. Deceiving, persuading, or influencing people to provide information or to perform an action that will benefit the attacker is known as "social engineering." Fraudulent and deceptive people use social engineering traps and tactics through SNSs to trick users into obeying them, accepting threats, and falling victim to various crimes such as phishing, sexual abuse, financial abuse, identity theft, and physical crime. Although organizations, researchers, and practitioners recognize the serious risks of social engineering, there is a severe lack of understanding and control of such threats. This may be partly due to the complexity of human behaviors in approaching, accepting, and failing to recognize social engineering tricks. This research aims to investigate the impact of source characteristics on users' susceptibility to social engineering victimization in SNSs, particularly Facebook. Using grounded theory method, we develop a model that explains what and how source characteristics influence Facebook users to judge the attacker as credible.

DOI10.1109/SCC.2014.108
Citation Key6930610