User Awareness

14,000,000 Leading Edge Experts on the ideXlab platform

Scan Science and Technology

Contact Leading Edge Experts & Companies

Scan Science and Technology

Contact Leading Edge Experts & Companies

The Experts below are selected from a list of 324 Experts worldwide ranked by ideXlab platform

Lech J Janczewski - One of the best experts on this subject based on the ideXlab platform.

  • a typology of social engineering attacks an information science perspective
    Pacific Asia Conference on Information Systems, 2012
    Co-Authors: Koteswara Ivaturi, Lech J Janczewski
    Abstract:

    Hackers are increasingly exploiting the social movement on the Internet, which is responsible for domestication of the web and its associated technologies, by using novel methods of online social engineering. However, there is not enough support in the form of published research that can help us gain a holistic understanding of human vulnerabilities that are central to online social engineering attacks. This paper extends prior published classifications and presents a new typology of online social engineering methods that manifest during the various information seeking contexts that Users engage while online. Concepts borrowed from the field of information science help us to build this typology that groups attack vectors with different human information seeking modes. The typology can be readily used as educational material to improve end User Awareness about online social engineering. In addition, the typology can be used as a conceptual starting point for future empirical research on human vulnerabilities in different information seeking contexts which in turn can inform systems designers to design more effective solutions that can help mitigate the effects of such attacks.

Melissa Hoover - One of the best experts on this subject based on the ideXlab platform.

  • the bigfoot initiative an investigation of digital footprint Awareness in social media
    Proceedings of the 9th International Conference on Social Media and Society, 2018
    Co-Authors: Kevin Koidl, Owen Conlan, Wessel Reijers, Mark Farrell, Melissa Hoover
    Abstract:

    Social media has become an important part of modern-day communication. Advantages span from instant communication via direct messages to sharing and consuming content and experiences. Lately, social media applications have been criticized for assisting the spreading of harmful or fake news and distorting reality by enabling unauthentic self-representation. It is often argued, that social media platforms are solely responsible for these challenges and for offering solutions. This research uses the notion of a digital footprint, a codified representation of a User's social media engagement, to facilitate User reflection. This footprint, however, is mostly a product of the User's deliberate and conscious engagement. This paper argues that Users also have a responsibility in addressing the above-mentioned challenges by increasing their Awareness of their social media usage. This paper presents a study with close to 300 participants investigating if they are aware of their digital footprint in social media. The paper presents the overall challenges, as well as experimental design and results, with the goal of motivating further debate regarding User Awareness of their social media usage.

Koteswara Ivaturi - One of the best experts on this subject based on the ideXlab platform.

  • a typology of social engineering attacks an information science perspective
    Pacific Asia Conference on Information Systems, 2012
    Co-Authors: Koteswara Ivaturi, Lech J Janczewski
    Abstract:

    Hackers are increasingly exploiting the social movement on the Internet, which is responsible for domestication of the web and its associated technologies, by using novel methods of online social engineering. However, there is not enough support in the form of published research that can help us gain a holistic understanding of human vulnerabilities that are central to online social engineering attacks. This paper extends prior published classifications and presents a new typology of online social engineering methods that manifest during the various information seeking contexts that Users engage while online. Concepts borrowed from the field of information science help us to build this typology that groups attack vectors with different human information seeking modes. The typology can be readily used as educational material to improve end User Awareness about online social engineering. In addition, the typology can be used as a conceptual starting point for future empirical research on human vulnerabilities in different information seeking contexts which in turn can inform systems designers to design more effective solutions that can help mitigate the effects of such attacks.

Kevin Koidl - One of the best experts on this subject based on the ideXlab platform.

  • the bigfoot initiative an investigation of digital footprint Awareness in social media
    Proceedings of the 9th International Conference on Social Media and Society, 2018
    Co-Authors: Kevin Koidl, Owen Conlan, Wessel Reijers, Mark Farrell, Melissa Hoover
    Abstract:

    Social media has become an important part of modern-day communication. Advantages span from instant communication via direct messages to sharing and consuming content and experiences. Lately, social media applications have been criticized for assisting the spreading of harmful or fake news and distorting reality by enabling unauthentic self-representation. It is often argued, that social media platforms are solely responsible for these challenges and for offering solutions. This research uses the notion of a digital footprint, a codified representation of a User's social media engagement, to facilitate User reflection. This footprint, however, is mostly a product of the User's deliberate and conscious engagement. This paper argues that Users also have a responsibility in addressing the above-mentioned challenges by increasing their Awareness of their social media usage. This paper presents a study with close to 300 participants investigating if they are aware of their digital footprint in social media. The paper presents the overall challenges, as well as experimental design and results, with the goal of motivating further debate regarding User Awareness of their social media usage.

Konstantinos E. Psannis - One of the best experts on this subject based on the ideXlab platform.

  • Defending against phishing attacks: taxonomy of methods, current issues and future directions
    Telecommunication Systems, 2018
    Co-Authors: B. B. Gupta, Nalin Asanka Gamagedara Arachchilage, Konstantinos E. Psannis
    Abstract:

    Internet technology is so pervasive today, for example, from online social networking to online banking, it has made people’s lives more comfortable. Due the growth of Internet technology, security threats to systems and networks are relentlessly inventive. One such a serious threat is “phishing”, in which, attackers attempt to steal the User’s credentials using fake emails or websites or both. It is true that both industry and academia are working hard to develop solutions to combat against phishing threats. It is therefore very important that organisations to pay attention to end-User Awareness in phishing threat prevention. Therefore, aim of our paper is twofold. First, we will discuss the history of phishing attacks and the attackers’ motivation in details. Then, we will provide taxonomy of various types of phishing attacks. Second, we will provide taxonomy of various solutions proposed in literature to protect Users from phishing based on the attacks identified in our taxonomy. Moreover, we have also discussed impact of phishing attacks in Internet of Things (IoTs). We conclude our paper discussing various issues and challenges that still exist in the literature, which are important to fight against with phishing threats.

  • Defending against Phishing Attacks: Taxonomy of Methods, Current Issues and Future Directions
    arXiv: Cryptography and Security, 2017
    Co-Authors: B. B. Gupta, Nalin Asanka Gamagedara Arachchilage, Konstantinos E. Psannis
    Abstract:

    Internet technology is so pervasive today, for example, from online social networking to online banking, it has made people's lives more comfortable. Due the growth of Internet technology, security threats to systems and networks are relentlessly inventive. One such a serious threat is "phishing", in which, attackers attempt to steal the User's credentials using fake emails or websites or both. It is true that both industry and academia are working hard to develop solutions to combat against phishing threats. It is therefore very important that organisations to pay attention to end-User Awareness in phishing threat prevention. Therefore, the aim of our paper is twofold. First, we will discuss the history of phishing attacks and the attackers' motivation in details. Then, we will provide taxonomy of various types of phishing attacks. Second, we will provide taxonomy of various solutions proposed in literature to protect Users from phishing based on the attacks identified in our taxonomy. Moreover, we have also discussed impact of phishing attacks in Internet of Things (IoTs). We conclude our paper discussing various issues and challenges that still exist in the literature, which are important to fight against with phishing threats.