Spelling suggestions: "subject:"ersonality assessment -- 3research"" "subject:"ersonality assessment -- 1research""
1 |
Personality Traits and Resistance to Online Trust ExploitationVaishnavi Mahindra (16642734) 07 August 2023 (has links)
<p>Social engineering attacks, especially trust exploitation, have become a focus of attention</p>
<p>for cybercriminals attempting to manipulate or deceive users to take actions that further</p>
<p>expose their vulnerabilities. This has also become a budding field for researchers as these</p>
<p>interactions are based on complex social equations that are constantly taken advantage of.</p>
<p>Identifying the "weakest link" is a popular method of identifying how these exploits take</p>
<p>place, generally by observing when individuals fall for a social engineering attack. However,</p>
<p>valuable insights may be used to harden security by observing patterns in users resistant</p>
<p>or vigilant to these attacks. Primarily, this trend may be discovered in resistant users’</p>
<p>personality traits. This has been found to be a more accurate indicator of behavior than</p>
<p>self-reported intentions. Survey responses (n=120) indicate correlations between high test</p>
<p>scores in trust exploitation exercises and Conscientiousness in the Big 5 Personality Model</p>
<p>(p<0.001). No significant correlation was seen between self-reported cybersecurity habits</p>
<p>and actual security behavior.</p>
|
Page generated in 0.1329 seconds