skip to main content
10.1145/3510548.3519379acmconferencesArticle/Chapter ViewAbstractPublication PagescodaspyConference Proceedingsconference-collections
keynote

Shadows Behind the Keyboard: Dark Personalities and Deception in Cyberattacks

Published:23 April 2022Publication History

ABSTRACT

Understanding the psychology of cyberattacks is critical for finding ways to minimize their efficacy and harm. Specifically, there are multiple types of attackers, and different attackers have different goals and varied approaches. Through the study of individual differences, we can better understand not only who is most likely to engage in criminal activity in cyberspace but the dispositional tendencies towards specific types of online attacks. Thus, by understanding the psychology of malevolent characters, we can better understand (a) how different attackers go about launching their attacks, (b) who these attackers are likely to target, and (c) the tactics and strategies these different attackers are likely to use.

Skip Supplemental Material Section

Supplemental Material

ACM-final.mp4

mp4

52.9 MB

References

  1. Basak, A., Cerný, J., Gutierrez, M., Curtis, S., Kamhoua, C., Jones, D., ... & Kiekintveld, C. (2018, October). An initial study of targeted personality models in the flipit game. In International conference on decision and game theory for security (pp. 623--636). Springer, Cham.Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. Curtis, S. R., Basak, A., Carre, J. R., Boanský, B., Cerný, J., Ben-Asher, N., ... & Kiekintveld, C. (2021). The Dark Triad and strategic resource control in a competitive computer game. Personality and Individual Differences, 168, 110343.Google ScholarGoogle ScholarCross RefCross Ref
  3. Curtis, S. R., Rajivan, P., Jones, D. N., & Gonzalez, C. (2018). Phishing attempts among the dark triad: Patterns of attack and vulnerability. Computers in Human Behavior, 87, 174--182.Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Jones, D. N. (2014). Predatory personalities as behavioral mimics and parasites: Mimicry--deception theory. Perspectives on Psychological Science, 9(4), 445--451.Google ScholarGoogle ScholarCross RefCross Ref
  5. Jones, D. N., & Figueredo, A. J. (2013). The core of darkness: Uncovering the heart of the Dark Triad. European Journal of Personality, 27(6), 521--531.Google ScholarGoogle ScholarCross RefCross Ref
  6. Jones, D. N., Padilla, E., Curtis, S. R., & Kiekintveld, C. (2021). Network discovery and scanning strategies and the dark triad. Computers in Human Behavior, 122, 106799.Google ScholarGoogle ScholarCross RefCross Ref
  7. Jones, D. N., & Paulhus, D. L. (2017). Duplicity among the dark triad: Three faces of deceit. Journal of Personality and Social Psychology, 113(2), 329--342.Google ScholarGoogle ScholarCross RefCross Ref
  8. Paulhus, D. L., & Williams, K. M. (2002). The dark triad of personality: Narcissism, Machiavellianism, and psychopathy. Journal of research in personality, 36(6), 556--563.Google ScholarGoogle ScholarCross RefCross Ref
  9. Van Dijk, M., Juels, A., Oprea, A., & Rivest, R. L. (2013). FlipIt: The game of "stealthy takeover". Journal of Cryptology, 26, 655--713.Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Shadows Behind the Keyboard: Dark Personalities and Deception in Cyberattacks

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in
      • Published in

        cover image ACM Conferences
        IWSPA '22: Proceedings of the 2022 ACM on International Workshop on Security and Privacy Analytics
        April 2022
        110 pages
        ISBN:9781450392303
        DOI:10.1145/3510548

        Copyright © 2022 Owner/Author

        Permission to make digital or hard copies of part or all of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for third-party components of this work must be honored. For all other uses, contact the Owner/Author.

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 23 April 2022

        Check for updates

        Qualifiers

        • keynote

        Acceptance Rates

        Overall Acceptance Rate18of58submissions,31%

        Upcoming Conference

        CODASPY '24
      • Article Metrics

        • Downloads (Last 12 months)20
        • Downloads (Last 6 weeks)3

        Other Metrics

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader