• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • No language data
  • Tagged with
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
1

Personality Traits and Resistance to Online Trust Exploitation

Vaishnavi Mahindra (16642734) 07 August 2023 (has links)
<p>Social engineering attacks, especially trust exploitation, have become a focus of attention</p> <p>for cybercriminals attempting to manipulate or deceive users to take actions that further</p> <p>expose their vulnerabilities. This has also become a budding field for researchers as these</p> <p>interactions are based on complex social equations that are constantly taken advantage of.</p> <p>Identifying the "weakest link" is a popular method of identifying how these exploits take</p> <p>place, generally by observing when individuals fall for a social engineering attack. However,</p> <p>valuable insights may be used to harden security by observing patterns in users resistant</p> <p>or vigilant to these attacks. Primarily, this trend may be discovered in resistant users’</p> <p>personality traits. This has been found to be a more accurate indicator of behavior than</p> <p>self-reported intentions. Survey responses (n=120) indicate correlations between high test</p> <p>scores in trust exploitation exercises and Conscientiousness in the Big 5 Personality Model</p> <p>(p<0.001). No significant correlation was seen between self-reported cybersecurity habits</p> <p>and actual security behavior.</p>

Page generated in 0.1443 seconds