Publication:
The use of subliminal and supraliminal messages in phishing and spear phishing based social engineering attacks; feasibility study

dc.contributor.authorIlangakoon, S. D
dc.contributor.authorAbeywardena, K. Y
dc.date.accessioned2022-04-26T10:13:30Z
dc.date.available2022-04-26T10:13:30Z
dc.date.issued2018-08-08
dc.description.abstractThis paper evaluates the background research to identify the possibility of using a new vector of social engineering attack using a psychological concept which thus far had been only used in marketing and promotional campaigns. Subliminal and supraliminal messages have been studied by academia with respect to its ability to influence individual behavior. Social engineering attacks are defined as the art of manipulating people into performing actions or divulging confidential information. Most of modern social engineering attacks depend on phishing and spear phishing attacks. This paper explores the possibility of identifying a correlations between the above mentioned psychological concepts and phishing/spear phishing attacks in the domain of cyber security.en_US
dc.identifier.citationS. Deshan Ilangakoon and K. Y. Abeywardena, "The Use of Subliminal and Supraliminal Messages in Phishing and Spear Phishing Based Social Engineering Attacks; Feasibility Study," 2018 13th International Conference on Computer Science & Education (ICCSE), 2018, pp. 1-5, doi: 10.1109/ICCSE.2018.8468681.en_US
dc.identifier.doi10.1109/ICCSE.2018.8468681en_US
dc.identifier.issn2473-9464
dc.identifier.urihttps://rda.sliit.lk/handle/123456789/2075
dc.language.isoenen_US
dc.publisherIEEEen_US
dc.relation.ispartofseries2018 13th International Conference on Computer Science & Education (ICCSE);Pages 1-5
dc.subjectSubliminalen_US
dc.subjectSupraliminal Messagesen_US
dc.subjectPhishingen_US
dc.subjectFeasibility Studyen_US
dc.subjectSocial Engineering Attacksen_US
dc.subjectSpear Phishing Baseden_US
dc.titleThe use of subliminal and supraliminal messages in phishing and spear phishing based social engineering attacks; feasibility studyen_US
dc.typeArticleen_US
dspace.entity.typePublication

Files

Original bundle

Now showing 1 - 1 of 1
No Thumbnail Available
Name:
The_Use_of_Subliminal_and_Supraliminal_Messages_in_Phishing_and_Spear_Phishing_Based_Social_Engineering_Attacks_Feasibility_Study.pdf
Size:
1.39 MB
Format:
Adobe Portable Document Format
Description:

License bundle

Now showing 1 - 1 of 1
No Thumbnail Available
Name:
license.txt
Size:
1.71 KB
Format:
Item-specific license agreed upon to submission
Description: