ABSTRACT
Understanding the psychology of cyberattacks is critical for finding ways to minimize their efficacy and harm. Specifically, there are multiple types of attackers, and different attackers have different goals and varied approaches. Through the study of individual differences, we can better understand not only who is most likely to engage in criminal activity in cyberspace but the dispositional tendencies towards specific types of online attacks. Thus, by understanding the psychology of malevolent characters, we can better understand (a) how different attackers go about launching their attacks, (b) who these attackers are likely to target, and (c) the tactics and strategies these different attackers are likely to use.
Supplemental Material
- Basak, A., Cerný, J., Gutierrez, M., Curtis, S., Kamhoua, C., Jones, D., ... & Kiekintveld, C. (2018, October). An initial study of targeted personality models in the flipit game. In International conference on decision and game theory for security (pp. 623--636). Springer, Cham.Google ScholarDigital Library
- Curtis, S. R., Basak, A., Carre, J. R., Boanský, B., Cerný, J., Ben-Asher, N., ... & Kiekintveld, C. (2021). The Dark Triad and strategic resource control in a competitive computer game. Personality and Individual Differences, 168, 110343.Google ScholarCross Ref
- Curtis, S. R., Rajivan, P., Jones, D. N., & Gonzalez, C. (2018). Phishing attempts among the dark triad: Patterns of attack and vulnerability. Computers in Human Behavior, 87, 174--182.Google ScholarDigital Library
- Jones, D. N. (2014). Predatory personalities as behavioral mimics and parasites: Mimicry--deception theory. Perspectives on Psychological Science, 9(4), 445--451.Google ScholarCross Ref
- Jones, D. N., & Figueredo, A. J. (2013). The core of darkness: Uncovering the heart of the Dark Triad. European Journal of Personality, 27(6), 521--531.Google ScholarCross Ref
- Jones, D. N., Padilla, E., Curtis, S. R., & Kiekintveld, C. (2021). Network discovery and scanning strategies and the dark triad. Computers in Human Behavior, 122, 106799.Google ScholarCross Ref
- Jones, D. N., & Paulhus, D. L. (2017). Duplicity among the dark triad: Three faces of deceit. Journal of Personality and Social Psychology, 113(2), 329--342.Google ScholarCross Ref
- Paulhus, D. L., & Williams, K. M. (2002). The dark triad of personality: Narcissism, Machiavellianism, and psychopathy. Journal of research in personality, 36(6), 556--563.Google ScholarCross Ref
- Van Dijk, M., Juels, A., Oprea, A., & Rivest, R. L. (2013). FlipIt: The game of "stealthy takeover". Journal of Cryptology, 26, 655--713.Google ScholarDigital Library
Index Terms
- Shadows Behind the Keyboard: Dark Personalities and Deception in Cyberattacks
Recommendations
The Dark Triad and Facebook surveillance: How Machiavellianism, psychopathy, but not narcissism predict using Facebook to spy on others
AbstractThe Dark Triad of personality – Machiavellianism, narcissism, and psychopathy – has been shown to influence a variety of behaviours. Typically, high levels of these traits predict engaging in behaviour at the periphery of what is ...
Highlights- The Dark Triad of personality is related to using Facebook as a surveillance tool.
Phishing attempts among the dark triad: Patterns of attack and vulnerability
AbstractPhishing attacks are more common and more sophisticated than other forms of social engineering attacks. This study presents an investigation of the relationships between three personality traits—Machiavellianism, narcissism, and psychopathy (i.e.,...
Highlights- We investigate the relationship between personality, phishing effort, and success.
- Three traits are: Machiavellianism, narcissism, and psychopathy (dark triad).
- Attackers high in Machiavellianism were more likely to put more ...
Dangerous dating in the digital age: Jealousy, hostility, narcissism, and psychopathy as predictors of Cyber Dating Abuse
AbstractCyber Dating Abuse includes perpetration of aggressive and controlling behaviours against an intimate partner via technology. Despite the significant physical and psychological outcomes, there is a paucity in research exploring ...
Highlights- Cyber Dating Abuse includes perpetration of relational aggressive and controlling behaviours via technology.
Comments