{"id":"https://openalex.org/W2602218799","doi":"https://doi.org/10.1145/2890509","title":"Understanding the Relationship between Human Behavior and Susceptibility to Cyber Attacks","display_name":"Understanding the Relationship between Human Behavior and Susceptibility to Cyber Attacks","publication_year":2017,"publication_date":"2017-03-22","ids":{"openalex":"https://openalex.org/W2602218799","doi":"https://doi.org/10.1145/2890509","mag":"2602218799"},"language":"en","primary_location":{"id":"doi:10.1145/2890509","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2890509","pdf_url":null,"source":{"id":"https://openalex.org/S2492086750","display_name":"ACM Transactions on Intelligent Systems and Technology","issn_l":"2157-6904","issn":["2157-6904","2157-6912"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319798","host_organization_name":"Association for Computing Machinery","host_organization_lineage":["https://openalex.org/P4310319798"],"host_organization_lineage_names":["Association for Computing Machinery"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"ACM Transactions on Intelligent Systems and Technology","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5035609161","display_name":"Michael Ovelg\u00f6nne","orcid":null},"institutions":[{"id":"https://openalex.org/I66946132","display_name":"University of Maryland, College Park","ror":"https://ror.org/047s2c258","country_code":"US","type":"education","lineage":["https://openalex.org/I66946132"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Michael Ovelg\u00f6nne","raw_affiliation_strings":["UMIACS, Univ. of Maryland, College Park, MD"],"affiliations":[{"raw_affiliation_string":"UMIACS, Univ. of Maryland, College Park, MD","institution_ids":["https://openalex.org/I66946132"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5033409139","display_name":"Tudor Dumitra\u015f","orcid":"https://orcid.org/0000-0003-4350-7226"},"institutions":[{"id":"https://openalex.org/I66946132","display_name":"University of Maryland, College Park","ror":"https://ror.org/047s2c258","country_code":"US","type":"education","lineage":["https://openalex.org/I66946132"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Tudor Dumitra\u015f","raw_affiliation_strings":["Dept. of Elect. Eng. and UMIACS, Univ. of Maryland, College Park, MD"],"affiliations":[{"raw_affiliation_string":"Dept. of Elect. Eng. and UMIACS, Univ. of Maryland, College Park, MD","institution_ids":["https://openalex.org/I66946132"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5061110232","display_name":"B. Aditya Prakash","orcid":"https://orcid.org/0000-0002-3252-455X"},"institutions":[{"id":"https://openalex.org/I859038795","display_name":"Virginia Tech","ror":"https://ror.org/02smfhw86","country_code":"US","type":"education","lineage":["https://openalex.org/I859038795"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"B. Aditya Prakash","raw_affiliation_strings":["Dept. of Computer Science, Virginia Tech., Blacksburg, VA"],"affiliations":[{"raw_affiliation_string":"Dept. of Computer Science, Virginia Tech., Blacksburg, VA","institution_ids":["https://openalex.org/I859038795"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5038645035","display_name":"V. S. Subrahmanian","orcid":"https://orcid.org/0000-0001-7191-0296"},"institutions":[{"id":"https://openalex.org/I66946132","display_name":"University of Maryland, College Park","ror":"https://ror.org/047s2c258","country_code":"US","type":"education","lineage":["https://openalex.org/I66946132"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"V. S. Subrahmanian","raw_affiliation_strings":["Dept. of Computer Science and UMIACS, Univ. of Maryland, College Park, MD"],"affiliations":[{"raw_affiliation_string":"Dept. of Computer Science and UMIACS, Univ. of Maryland, College Park, MD","institution_ids":["https://openalex.org/I66946132"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5101522286","display_name":"Benjamin Wang","orcid":"https://orcid.org/0000-0002-9492-1489"},"institutions":[{"id":"https://openalex.org/I859038795","display_name":"Virginia Tech","ror":"https://ror.org/02smfhw86","country_code":"US","type":"education","lineage":["https://openalex.org/I859038795"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Benjamin Wang","raw_affiliation_strings":["Dept. of Computer Science, Virginia Tech., Blacksburg, VA"],"affiliations":[{"raw_affiliation_string":"Dept. of Computer Science, Virginia Tech., Blacksburg, VA","institution_ids":["https://openalex.org/I859038795"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5035609161"],"corresponding_institution_ids":["https://openalex.org/I66946132"],"apc_list":null,"apc_paid":null,"fwci":13.5637,"has_fulltext":false,"cited_by_count":54,"citation_normalized_percentile":{"value":0.98700955,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":94,"max":100},"biblio":{"volume":"8","issue":"4","first_page":"1","last_page":"25"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9988999962806702,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/malware","display_name":"Malware","score":0.8688573241233826},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7759392261505127},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.7021582126617432},{"id":"https://openalex.org/keywords/speculation","display_name":"Speculation","score":0.5431848764419556},{"id":"https://openalex.org/keywords/cyber-threats","display_name":"Cyber threats","score":0.476928174495697},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.46324220299720764},{"id":"https://openalex.org/keywords/attack-patterns","display_name":"Attack patterns","score":0.45099401473999023},{"id":"https://openalex.org/keywords/product","display_name":"Product (mathematics)","score":0.4420314431190491},{"id":"https://openalex.org/keywords/ransomware","display_name":"Ransomware","score":0.424269437789917},{"id":"https://openalex.org/keywords/order","display_name":"Order (exchange)","score":0.41321977972984314},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.38668543100357056},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.14414933323860168},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.11569163203239441},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.08482345938682556}],"concepts":[{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.8688573241233826},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7759392261505127},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.7021582126617432},{"id":"https://openalex.org/C47941915","wikidata":"https://www.wikidata.org/wiki/Q107885","display_name":"Speculation","level":2,"score":0.5431848764419556},{"id":"https://openalex.org/C3018725008","wikidata":"https://www.wikidata.org/wiki/Q4071928","display_name":"Cyber threats","level":2,"score":0.476928174495697},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.46324220299720764},{"id":"https://openalex.org/C2780741293","wikidata":"https://www.wikidata.org/wiki/Q4818019","display_name":"Attack patterns","level":3,"score":0.45099401473999023},{"id":"https://openalex.org/C90673727","wikidata":"https://www.wikidata.org/wiki/Q901718","display_name":"Product (mathematics)","level":2,"score":0.4420314431190491},{"id":"https://openalex.org/C2777667771","wikidata":"https://www.wikidata.org/wiki/Q926331","display_name":"Ransomware","level":3,"score":0.424269437789917},{"id":"https://openalex.org/C182306322","wikidata":"https://www.wikidata.org/wiki/Q1779371","display_name":"Order (exchange)","level":2,"score":0.41321977972984314},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.38668543100357056},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.14414933323860168},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.11569163203239441},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.08482345938682556},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C10138342","wikidata":"https://www.wikidata.org/wiki/Q43015","display_name":"Finance","level":1,"score":0.0},{"id":"https://openalex.org/C2524010","wikidata":"https://www.wikidata.org/wiki/Q8087","display_name":"Geometry","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/2890509","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2890509","pdf_url":null,"source":{"id":"https://openalex.org/S2492086750","display_name":"ACM Transactions on Intelligent Systems and Technology","issn_l":"2157-6904","issn":["2157-6904","2157-6912"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319798","host_organization_name":"Association for Computing Machinery","host_organization_lineage":["https://openalex.org/P4310319798"],"host_organization_lineage_names":["Association for Computing Machinery"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"ACM Transactions on Intelligent Systems and Technology","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions","score":0.5899999737739563}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":31,"referenced_works":["https://openalex.org/W67486310","https://openalex.org/W1485200701","https://openalex.org/W1491237615","https://openalex.org/W1498585374","https://openalex.org/W1966775352","https://openalex.org/W1967930391","https://openalex.org/W1970809283","https://openalex.org/W1973697585","https://openalex.org/W1988826963","https://openalex.org/W1993246901","https://openalex.org/W1995841147","https://openalex.org/W2010065958","https://openalex.org/W2018137126","https://openalex.org/W2023429893","https://openalex.org/W2048375003","https://openalex.org/W2057541707","https://openalex.org/W2081526168","https://openalex.org/W2082180526","https://openalex.org/W2092043296","https://openalex.org/W2099647042","https://openalex.org/W2129586531","https://openalex.org/W2148156428","https://openalex.org/W2162532690","https://openalex.org/W2186088793","https://openalex.org/W2258956667","https://openalex.org/W2400462880","https://openalex.org/W2408621407","https://openalex.org/W2780934348","https://openalex.org/W2914982603","https://openalex.org/W3005993375","https://openalex.org/W3015883999"],"related_works":["https://openalex.org/W3201228709","https://openalex.org/W2922354075","https://openalex.org/W4243792164","https://openalex.org/W2147782221","https://openalex.org/W3214090987","https://openalex.org/W576517958","https://openalex.org/W2767004901","https://openalex.org/W2528597107","https://openalex.org/W2588560471","https://openalex.org/W4386108466"],"abstract_inverted_index":{"Despite":[0],"growing":[1],"speculation":[2],"about":[3],"the":[4,42,89,100,113,123,138],"role":[5],"of":[6,11,30,76,88,104,115,140,175],"human":[7,84],"behavior":[8,46],"in":[9,38,177],"cyber-security":[10],"machines,":[12],"concrete":[13],"data-driven":[14],"analysis":[15],"and":[16,47,64,72,108,137],"evidence":[17],"have":[18,161],"been":[19,148,162],"lacking.":[20],"Using":[21],"Symantec\u2019s":[22,151],"WINE":[23],"platform,":[24],"we":[25,98],"conduct":[26],"a":[27,67,74,131,155],"detailed":[28],"study":[29],"1.6":[31],"million":[32],"machines":[33],"over":[34],"an":[35],"8-month":[36],"period":[37],"order":[39],"to":[40],"learn":[41],"relationship":[43,101,133],"between":[44,102,134],"user":[45],"cyber":[48],"attacks":[49,118],"against":[50],"their":[51],"personal":[52],"computers.":[53],"We":[54],"classify":[55],"users":[56],"into":[57],"4":[58],"categories":[59,94],"(gamers,":[60],"professionals,":[61],"software":[62,169],"developers,":[63],"others,":[65],"plus":[66],"fifth":[68],"category":[69],"comprising":[70],"everyone)":[71],"identify":[73],"total":[75],"7":[77,96],"features":[78,107,136],"that":[79,128,168],"act":[80],"as":[81],"proxies":[82],"for":[83],"behavior.":[85],"For":[86],"each":[87,103],"35":[90],"possible":[91],"combinations":[92],"(5":[93],"times":[95],"features),":[97],"studied":[99],"these":[105,145],"seven":[106],"one":[109],"dependent":[110],"variable,":[111],"namely":[112],"number":[114,139],"attempted":[116,141],"malware":[117,142],"detected":[119],"by":[120,150],"Symantec":[121],"on":[122],"machine.":[124],"Our":[125],"results":[126,166],"show":[127,167],"there":[129],"is":[130],"strong":[132],"several":[135],"attacks.":[143],"Had":[144],"hosts":[146],"not":[147],"protected":[149],"anti-virus":[152],"product":[153],"or":[154],"similar":[156],"product,":[157],"they":[158],"would":[159],"likely":[160],"infected.":[163],"Surprisingly,":[164],"our":[165],"developers":[170],"are":[171],"more":[172],"at":[173],"risk":[174],"engaging":[176],"risky":[178],"cyber-behavior":[179],"than":[180],"other":[181],"categories.":[182]},"counts_by_year":[{"year":2026,"cited_by_count":2},{"year":2025,"cited_by_count":7},{"year":2024,"cited_by_count":6},{"year":2023,"cited_by_count":2},{"year":2022,"cited_by_count":3},{"year":2021,"cited_by_count":6},{"year":2020,"cited_by_count":8},{"year":2019,"cited_by_count":6},{"year":2018,"cited_by_count":10},{"year":2017,"cited_by_count":4}],"updated_date":"2026-03-01T08:55:55.761014","created_date":"2025-10-10T00:00:00"}
