首页> 外文期刊>Decision support systems >Getting phished on social media
【24h】

Getting phished on social media

机译:在社交媒体上钓鱼

获取原文
获取原文并翻译 | 示例
获取外文期刊封面目录资料

摘要

The study experimentally simulated a level-1 social networking-based phishing (SNP) attack, where a phisher using a phony profile attempts to friend an individual on Facebook, and a level-2 SNP attack, where a phisher attempts to extract information directly. The results implicate the use of cognitive shortcuts triggered by the cues afforded in Facebook's interface. Individuals appeared to be using the phisher's friend count as a heuristic for judging the authenticity of a level-1 request. They, thus, responded to a phisher displaying a large friend count even in the absence of a profile picture. Interestingly, the affordance of smartphones used to access social media an issue that has received little academic attention increased the odds of considering such requests sevenfold. (C) 2017 Elsevier B.V. All rights reserved.
机译:这项研究实验性地模拟了基于1级社交网络的网络钓鱼(SNP)攻击,其中使用假冒个人资料的网络钓鱼者试图在Facebook上与某人交朋友,以及进行2级SNP攻击,网络钓鱼者试图直接提取信息。结果暗示使用由Facebook界面提供的线索触发的认知捷径。个人似乎在使用phisher的好友计数作为判断1级请求真实性的一种启发法。因此,即使在没有个人头像的情况下,他们也对显示出大量好友的网络钓鱼者做出了响应。有趣的是,用于访问社交媒体的智能手机的价格在学术界很少受到关注,这使考虑此类请求的几率增加了七倍。 (C)2017 Elsevier B.V.保留所有权利。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号