Social Engineering in Social Networking Sites: The Art of Impersonation
Title | Social Engineering in Social Networking Sites: The Art of Impersonation |
Publication Type | Conference Paper |
Year of Publication | 2014 |
Authors | Algarni, A., Yue Xu, Chan, T. |
Conference Name | Services Computing (SCC), 2014 IEEE International Conference on |
Date Published | June |
Keywords | attacker, Computer crime, deceptive people, encoding, Facebook, financial abuse, fraud, fraudulent people, grounded theory method, human behaviors complexity, identity theft, impersonation, information security management, Interviews, large information base, Organizations, phishing, physical crime, Receivers, security, sexual abuse, SNS, social aspects of automation, Social Engineering, social engineering traps, social engineering victimization, social engineeringtactics, social networking (online), social networking sites, source credibility, threats, Trust management, user susceptibility |
Abstract | Social networking sites (SNSs), with their large number of users and large information base, seem to be the perfect breeding ground for exploiting the vulnerabilities of people, who are considered the weakest link in security. Deceiving, persuading, or influencing people to provide information or to perform an action that will benefit the attacker is known as "social engineering." Fraudulent and deceptive people use social engineering traps and tactics through SNSs to trick users into obeying them, accepting threats, and falling victim to various crimes such as phishing, sexual abuse, financial abuse, identity theft, and physical crime. Although organizations, researchers, and practitioners recognize the serious risks of social engineering, there is a severe lack of understanding and control of such threats. This may be partly due to the complexity of human behaviors in approaching, accepting, and failing to recognize social engineering tricks. This research aims to investigate the impact of source characteristics on users' susceptibility to social engineering victimization in SNSs, particularly Facebook. Using grounded theory method, we develop a model that explains what and how source characteristics influence Facebook users to judge the attacker as credible. |
DOI | 10.1109/SCC.2014.108 |
Citation Key | 6930610 |
- social engineering victimization
- physical crime
- Receivers
- security
- sexual abuse
- SNS
- social aspects of automation
- social engineering
- social engineering traps
- Phishing
- social engineeringtactics
- social networking (online)
- Social networking sites
- source credibility
- threats
- Trust management
- user susceptibility
- attacker
- Organizations
- large information base
- Interviews
- information security management
- impersonation
- identity theft
- human behaviors complexity
- grounded theory method
- fraudulent people
- fraud
- financial abuse
- encoding
- deceptive people
- Computer crime