Protect Against Unintentional Insider Threats: The risk of an employee's
cyber misconduct on a Social Media Site
- URL: http://arxiv.org/abs/2103.04744v1
- Date: Mon, 8 Mar 2021 13:30:01 GMT
- Title: Protect Against Unintentional Insider Threats: The risk of an employee's
cyber misconduct on a Social Media Site
- Authors: Guerrino Mazzarolo, Juan Carlos Fernandez Casas, Anca Delia Jurcut,
Nhien-AnLe-Khac
- Abstract summary: This research project aims to collect and analyse open-source data from LinkedIn.
The final aim of the study is to understand if there are behavioral factors that can predicting one's attitude toward disclosing sensitive data.
- Score: 3.2548794659022393
- License: http://creativecommons.org/publicdomain/zero/1.0/
- Abstract: Social Media is a cyber-security risk for every business. What do people
share on the Internet? Almost everything about oneself is shared: friendship,
demographics, family, activities, and work-related information. This could
become a potential risk in every business if the organization's policies,
training and technology fail to properly address these issues. In many cases,
it is the employees' behaviour that can put key company information at danger.
Social media has turned into a reconnaissance tool for malicious actors and
users accounts are now seen as a goldmine for cyber criminals. Investigation of
Social Media is in the embryonic stage and thus, is not yet well understood.
This research project aims to collect and analyse open-source data from
LinkedIn, discover data leakage and analyse personality types through software
as a service (SAAS). The final aim of the study is to understand if there are
behavioral factors that can predicting one's attitude toward disclosing
sensitive data.
Related papers
- Knowledge Boundary and Persona Dynamic Shape A Better Social Media Agent [69.12885360755408]
We construct a social media agent based on personalized knowledge and dynamic persona information.
For personalized knowledge, we add external knowledge sources and match them with the persona information of agents, thereby giving the agent personalized world knowledge.
For dynamic persona information, we use current action information to internally retrieve the persona information of the agent, thereby reducing the interference of diverse persona information on the current action.
arXiv Detail & Related papers (2024-03-28T10:01:23Z) - PsySafe: A Comprehensive Framework for Psychological-based Attack, Defense, and Evaluation of Multi-agent System Safety [70.84902425123406]
Multi-agent systems, when enhanced with Large Language Models (LLMs), exhibit profound capabilities in collective intelligence.
However, the potential misuse of this intelligence for malicious purposes presents significant risks.
We propose a framework (PsySafe) grounded in agent psychology, focusing on identifying how dark personality traits in agents can lead to risky behaviors.
Our experiments reveal several intriguing phenomena, such as the collective dangerous behaviors among agents, agents' self-reflection when engaging in dangerous behavior, and the correlation between agents' psychological assessments and dangerous behaviors.
arXiv Detail & Related papers (2024-01-22T12:11:55Z) - knowCC: Knowledge, awareness of computer & cyber ethics between CS/non-CS university students [0.0]
This research focuses on the relations between cybersecurity awareness, cyber knowledge, computer ethics, cyber ethics, and cyber behavior.
The findings express that while internet users are alert of cyber threats, they only take the most elementary and easy-to-implement precautions.
arXiv Detail & Related papers (2023-10-19T12:29:26Z) - It's more than just money: The real-world harms from ransomware attacks [1.5391321019692432]
This article conducts a novel exploration into the multitude of real-world harms that can arise from cyber-attacks.
We draw on publicly-available case data on high-profile ransomware incidents to examine the types of harm that emerge at various stages after a ransomware attack.
arXiv Detail & Related papers (2023-07-06T08:46:16Z) - Graph Mining for Cybersecurity: A Survey [61.505995908021525]
The explosive growth of cyber attacks nowadays, such as malware, spam, and intrusions, caused severe consequences on society.
Traditional Machine Learning (ML) based methods are extensively used in detecting cyber threats, but they hardly model the correlations between real-world cyber entities.
With the proliferation of graph mining techniques, many researchers investigated these techniques for capturing correlations between cyber entities and achieving high performance.
arXiv Detail & Related papers (2023-04-02T08:43:03Z) - Global Pandemics Influence on Cyber Security and Cyber Crimes [5.8010446129208155]
COVID-19 has caused widespread damage across many areas of life and has made humans more dependent on the internet and technology.
This paper examines the different types of security threats and cyber crimes that people faced in the pandemic time and the need for a safe and secure cyber infrastructure.
arXiv Detail & Related papers (2023-02-24T05:26:42Z) - Incidental Data: Observation of Privacy Compromising Data on Social
Media Platforms [0.0]
We show how unindented published data can be revealed and further analyze possibilities that can potentially compromise one's privacy.
We were able to show that only 2 hours of manually fetching data are sufficient in order to unveil private personal information.
Our work has shown that awareness among persons on social media needs to be raised.
arXiv Detail & Related papers (2022-08-18T07:49:26Z) - Adherence to Misinformation on Social Media Through Socio-Cognitive and
Group-Based Processes [79.79659145328856]
We argue that when misinformation proliferates, this happens because the social media environment enables adherence to misinformation.
We make the case that polarization and misinformation adherence are closely tied.
arXiv Detail & Related papers (2022-06-30T12:34:24Z) - A vision for global privacy bridges: Technical and legal measures for
international data markets [77.34726150561087]
Despite data protection laws and an acknowledged right to privacy, trading personal information has become a business equated with "trading oil"
An open conflict is arising between business demands for data and a desire for privacy.
We propose and test a vision of a personal information market with privacy.
arXiv Detail & Related papers (2020-05-13T13:55:50Z) - Quantifying the Vulnerabilities of the Online Public Square to Adversarial Manipulation Tactics [43.98568073610101]
We use a social media model to quantify the impacts of several adversarial manipulation tactics on the quality of content.
We find that the presence of influential accounts, a hallmark of social media, exacerbates the vulnerabilities of online communities to manipulation.
These insights suggest countermeasures that platforms could employ to increase the resilience of social media users to manipulation.
arXiv Detail & Related papers (2019-07-13T21:12:08Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.