Return to search

Personality Traits and Resistance to Online Trust Exploitation

<p>Social engineering attacks, especially trust exploitation, have become a focus of attention</p>
<p>for cybercriminals attempting to manipulate or deceive users to take actions that further</p>
<p>expose their vulnerabilities. This has also become a budding field for researchers as these</p>
<p>interactions are based on complex social equations that are constantly taken advantage of.</p>
<p>Identifying the "weakest link" is a popular method of identifying how these exploits take</p>
<p>place, generally by observing when individuals fall for a social engineering attack. However,</p>
<p>valuable insights may be used to harden security by observing patterns in users resistant</p>
<p>or vigilant to these attacks. Primarily, this trend may be discovered in resistant users’</p>
<p>personality traits. This has been found to be a more accurate indicator of behavior than</p>
<p>self-reported intentions. Survey responses (n=120) indicate correlations between high test</p>
<p>scores in trust exploitation exercises and Conscientiousness in the Big 5 Personality Model</p>
<p>(p<0.001). No significant correlation was seen between self-reported cybersecurity habits</p>
<p>and actual security behavior.</p>

  1. 10.25394/pgs.23740131.v1
Identiferoai:union.ndltd.org:purdue.edu/oai:figshare.com:article/23740131
Date07 August 2023
CreatorsVaishnavi Mahindra (16642734)
Source SetsPurdue University
Detected LanguageEnglish
TypeText, Thesis
RightsCC BY 4.0
Relationhttps://figshare.com/articles/thesis/Personality_Traits_and_Resistance_to_Online_Trust_Exploitation/23740131

Page generated in 0.0039 seconds