Composite Behavioral Modeling for Identity Theft Detection in Online Social Networks

Authors

  • Shaista Sayeed  Assistant Professor, Department of Information Technology, Bhoj Reddy Engineering College for Women, Hyderabad, India
  • Indu Cherupally  Department of Information Technology, Bhoj Reddy Engineering College for Women, Hyderabad, India
  • Narmada Muthyala  Department of Information Technology, Bhoj Reddy Engineering College for Women, Hyderabad, India

Keywords:

Confidential Data, Health Belief Model, Online User, Phishing Attack, Security Behavior.

Abstract

Despite Emails and websites being widely used for communication, collaboration, and day-to-day activity, not all online users have the same knowledge and skills when determining the credibility of visited websites and email content. As a result, phishing, an identity theft cyber-attack that targets humans rather than computers, was born to harvest internet users' confidential information by taking advantage of human behavior and hurting an organization's continuity, reputation, and credibility. Because the success of phishing attacks depends on human behavior, using the Health-Belief Model, the study's objective is to examine significant factors that influence online users' security behavior in the context of Email and website-based phishing attacks. The model included eight predictor variables and was validated using quantitative data from 138 academic staff. The study findings exhibit that 4 out of 8 predictor variables, namely Perceived-Barriers, Perceived-Susceptibility, Self-efficacy, and Security-Awareness, are statistically significant in determining users' security behavior. The study's outcome is to assist in the appropriate design of both online and offline content for cyber security awareness programs, focusing on Email and website-based phishing attacks.

References

  1. Composite Behavioral Modeling for IdentityTheft Detection in Online Social NetworksCheng Wang, Senior Member, IEEE, and Bo Yang
  2. The Continuous Rise for Social Networking Privacy and Security, Adrian M. Powell Professor Li Yang CPSC 5620, Computer Network Security University of Tennessee at Chattanooga April 20, 2012
  3. Social networking and identity theft in the digitalSocietyEric HolmBond University, [email protected]
  4. Business Growth thru Social Media Marketing, AbeerAlharbie,College of Public and International Affairs,University of Bridgeport, Bridgeport, CT06604, USA
  5. Quaestus multidisciplinary research journalthe growing importance of social mediaIn business marketing Pavel Ciprian
  6. Awareness of Behavioral Tracking and InformationPrivacy Concern in Facebook andGoogleEmilee RaderDepartment of Media and InformationCollege of Communication Arts and SciencesMichigan State [email protected]
  7. The Impact of Social Media on Business Growth andPerformance in IndiaITina P. Singh, IIDr.RatnaSinhaIResearch Scholar, ISBR Research Centre, Mysore University, Karnataka, IndiaIIResearch Guide, ISBR Research Centre, Mysore University, Karnataka, India
  8. Developing an Internet Marketing Strategy 2011 The Internet Marketing Academy &Ventus Publishing ApSISBN 978-87-7681-813-5.
  9. “IntSocial Media, How does it Work for Business?”,W. V.Siricharoen, Member, IACSITernational Journal of Innovation, Management and Technology, Vol. 3, No. 4, August 2012
  10. International Journal of Enterprise Computing and Business System, “Social media and its role in Marketing”,Ms.SisiraNeti, ISSN: 2230-8849, July 2011

Downloads

Published

2023-04-30

Issue

Section

Research Articles

How to Cite

[1]
Shaista Sayeed, Indu Cherupally, Narmada Muthyala, " Composite Behavioral Modeling for Identity Theft Detection in Online Social Networks, IInternational Journal of Scientific Research in Computer Science, Engineering and Information Technology(IJSRCSEIT), ISSN : 2456-3307, Volume 9, Issue 2, pp.672-676, March-April-2023.