A Framework to Mitigate Social Engineering through Social Media within the Enterprise

Heidi Wilcox, Maumita Bhattacharya

Research output: Book chapter/Published conference paperConference paperpeer-review

7 Citations (Scopus)

Abstract

The influx of employees using social media throughout the working environment has presented information security professionals with an extensive array of challenges facing people, process and technology. Social engineering through social media is a formidable enterprise concern due to the proclivity of social engineers targeting employees through these mediums to attack information assets residing within the organization. This research was motivated by a perceived gap in academic literature of organizational controls and guidance for employees concerning social engineering threats through social media adoption. The purpose of this paper is to propose a social media policy framework focusing on the practical reduction of social engineering risk through ICT security policy control. The framework’s development involved an analysis of the primary social engineering through social media challenges alongside current information security standard recommendations. The resulting proposal for the SESM (Social Engineering through Social Media) framework addresses these challenges by conceptualizing enterprise implementation through the interconnection of relevant existing IT security standards in juxtaposition with our own social media policy development framework.
Original languageEnglish
Title of host publicationProceedings of the 2016 IEEE 11th Conference on Industrial Electronics and Applications (ICIEA)
Place of PublicationUnited States
PublisherIEEE, Institute of Electrical and Electronics Engineers
Pages1039-1044
Number of pages6
Publication statusPublished - 2016
Event2016 IEEE 11th Conference on Industrial Electronics and Applications (ICIEA) - Hefei, China, Hefei, China
Duration: 05 Jun 201607 Jun 2016

Conference

Conference2016 IEEE 11th Conference on Industrial Electronics and Applications (ICIEA)
CountryChina
CityHefei
Period05/06/1607/06/16

Fingerprint Dive into the research topics of 'A Framework to Mitigate Social Engineering through Social Media within the Enterprise'. Together they form a unique fingerprint.

Cite this