Abstract
The increasing threat of social engineers targeting social media channels to advance their attack effectiveness on company data has seen many organizations introducing initiatives to better understand these vulnerabilities. This paper examines concerns of social engineering through social media within the enterprise and explores countermeasures undertaken to stem ensuing risk. Also included is an analysis of existing social media security policies and guidelines within the public and private sectors.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Almeida, F.: Web 2.0 technologies and social networking security fears in enterprises (2012). arXiv preprint arXiv:1204.1824
Amigorena, F.: The threat from within: how to start taking internal security more seriously. Computer Fraud & Security 2014(7), 5–7 (2014)
Arachchilage, N.A.G., Love, S.: Security awareness of computer users: A phishing threat avoidance perspective. Computers in Human Behavior 38, 304–312 (2014)
Bada, M., Sasse, A.: Cyber Security Awareness Campaigns Why do they fail to change behaviour? (2014)
Bell, J.: Clearing the AIR. Communication World 27(1), 27–30 (2010)
Boudreaux, C.: Social media policies. In: The Social Media Management Handbook, pp. 274–285
CERT-Australia: 2012 Cybercrime and Security Survey. Report from CERT-Australia. Australian Government, Attorney General’s Department (2012)
Colwill, C.: Human factors in information security: The insider threat–Who can you trust these days? Information Security Technical Report 14(4), 186–196 (2009)
Foreshew, J.: Companies should develop their own social media policies, The Australian online (2012)
Franchi, E., Poggi, A., Tomaiuolo, M.: Information Attacks on Online Social Networks. Journal of Information Technology Research (JITR) 7(3), 54–71 (2014)
Furnell, S.: End User Security Culture – A Lesson That Will Never Be Learnt? Computer Fraud & Security, 6–9, April 2008
GovLoop: Knowledge Network for Government. Website (2014)
He, W.: A review of social media security risks and mitigation techniques. Journal of Systems and Information Technology 14(2), 171–180 (2012)
Ikhalia, E.J.: A New Social Media Security Model (SMSM)
King, P.: Cyber Crooks Target Social Networking Sites. Point for Credit Research & Advice, 9, January 1, 2008
Luxford, H.: UK Lauches New Cybersecurity Initiative. Plans to work with infrastructure providers to create a safer business environment. Article from Datacenter Dynamics (2014)
Meister, J.C., Willyerd, K.: The 2020 workplace. HarperCollins, New York (2010)
Mitnick, K.D., Simon, W.L.: The art of deception: Controlling the human element of security. John Wiley & Sons (2001)
Nayak, D., Prince, S., Robinson, R.: Information privacy risk assessment of facebook graph search. In: Science and Information Conference (SAI), pp. 1005–1006. IEEE, August 2014
Oxley, A.: A best practices guide for mitigating risk in the use of social media. IBM Center for The Business of Government (2011)
PriceWaterhouseCoopers: The Global State of Information Security Survey. Price Waterhouse Coopers (2014)
Rudman, R.J.: Framework to identify and manage risks in Web 2.0 applications. African Journal of Business Management 4(13), 3251–3264 (2010)
Slonka, K.J.: Awareness of malicious social engineering among facebook users (Doctoral dissertation, Robert Morris University) (2014)
Symantec: Social Media Protection Flash Poll Global Results. Powerpoint Presentation (2011)
VMIA: Risk Insight. Social Media: What’s the risk? Report from VMIA Risk Roundtable (2010)
Wilcox, H., Bhattacharya, M., Islam, R: Social engineering through social media: an investigation on enterprise security. In: ATIS 2014, CCIS 490, pp. 243–255 (2014) (in press)
Wong, K., Wong, A., Yeung, A., Fan, W., Tang, S.K.: Trust and Privacy Exploitation in Online Social Networks. IT Professional 16(5), 28–33 (2014)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2015 Springer International Publishing Switzerland
About this paper
Cite this paper
Wilcox, H., Bhattacharya, M. (2015). Countering Social Engineering Through Social Media: An Enterprise Security Perspective. In: Núñez, M., Nguyen, N., Camacho, D., Trawiński, B. (eds) Computational Collective Intelligence. Lecture Notes in Computer Science(), vol 9330. Springer, Cham. https://doi.org/10.1007/978-3-319-24306-1_6
Download citation
DOI: https://doi.org/10.1007/978-3-319-24306-1_6
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-24305-4
Online ISBN: 978-3-319-24306-1
eBook Packages: Computer ScienceComputer Science (R0)