Skip navigation

Predicting the performance of users as human sensors of security threats in social media

Predicting the performance of users as human sensors of security threats in social media

Heartfield, Ryan and Loukas, George ORCID logoORCID: https://orcid.org/0000-0003-3559-5182 (2016) Predicting the performance of users as human sensors of security threats in social media. International Journal on Cyber Situational Awareness (IJCSA), 1 (1). ISSN 2057-2182 (Print), 2057-2182 (Online) (doi:10.22619/IJCSA.2016.100106)

[thumbnail of Author's Accepted Manuscript]
Preview
PDF (Author's Accepted Manuscript)
15999 LOUKAS_Predicting_the_Performance_of_Users_2016.pdf - Accepted Version

Download (1MB) | Preview

Abstract

While the human as a sensor concept has been utilised extensively for the detection of threats to safety and security in physical space, especially in emergency response and crime reporting, the concept is largely unexplored in the area of cyber security. Here, we evaluate the potential of utilising users as human sensors for the detection of cyber threats, specifically on social media. For this, we have conducted an online test and accompanying questionnaire-based survey, which was taken by 4,457 users. The test included eight realistic social media scenarios (four attack and four non-attack) in the form of screenshots, which the participants were asked to categorise as “likely attack” or “likely not attack”. We present the overall performance of human sensors in our experiment for each exhibit, and also apply logistic regression and Random Forest classifiers to evaluate the feasibility of predicting that performance based on different characteristics of the participants. Such prediction would be useful where accuracy of human sensors in detecting and reporting social media security threats is important. We identify features that are good predictors of a human sensor’s performance and evaluate them in both a theoretical ideal case and two more realistic cases, the latter corresponding to limited access to a user’s characteristics.

Item Type: Article
Uncontrolled Keywords: Cyber security; Semantic social engineering; Cyber attacks; Cyber crime; Social media; Social networks
Subjects: Z Bibliography. Library Science. Information Resources > ZA Information resources > ZA4050 Electronic information resources
Faculty / School / Research Centre / Research Group: Faculty of Engineering & Science > Internet of Things and Security Research Centre (ISEC)
Faculty of Engineering & Science > School of Computing & Mathematical Sciences (CMS)
Faculty of Engineering & Science
Related URLs:
Last Modified: 04 Mar 2022 13:07
URI: http://gala.gre.ac.uk/id/eprint/15999

Actions (login required)

View Item View Item

Downloads

Downloads per month over past year

View more statistics