<p>Social engineering attacks, especially trust exploitation, have become a focus of attention</p>
<p>for cybercriminals attempting to manipulate or deceive users to take actions that further</p>
<p>expose their vulnerabilities. This has also become a budding field for researchers as these</p>
<p>interactions are based on complex social equations that are constantly taken advantage of.</p>
<p>Identifying the "weakest link" is a popular method of identifying how these exploits take</p>
<p>place, generally by observing when individuals fall for a social engineering attack. However,</p>
<p>valuable insights may be used to harden security by observing patterns in users resistant</p>
<p>or vigilant to these attacks. Primarily, this trend may be discovered in resistant users’</p>
<p>personality traits. This has been found to be a more accurate indicator of behavior than</p>
<p>self-reported intentions. Survey responses (n=120) indicate correlations between high test</p>
<p>scores in trust exploitation exercises and Conscientiousness in the Big 5 Personality Model</p>
<p>(p<0.001). No significant correlation was seen between self-reported cybersecurity habits</p>
<p>and actual security behavior.</p>
Identifer | oai:union.ndltd.org:purdue.edu/oai:figshare.com:article/23740131 |
Date | 07 August 2023 |
Creators | Vaishnavi Mahindra (16642734) |
Source Sets | Purdue University |
Detected Language | English |
Type | Text, Thesis |
Rights | CC BY 4.0 |
Relation | https://figshare.com/articles/thesis/Personality_Traits_and_Resistance_to_Online_Trust_Exploitation/23740131 |
Page generated in 0.0039 seconds