{"id":334,"date":"2023-11-04T23:47:03","date_gmt":"2023-11-04T23:47:03","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/anyiahp\/?p=334"},"modified":"2023-11-04T23:47:03","modified_gmt":"2023-11-04T23:47:03","slug":"article-two-review","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/anyiahp\/2023\/11\/04\/article-two-review\/","title":{"rendered":"Article Two Review"},"content":{"rendered":"\n<p><br><strong>Article Review Two: The Stimulation of Human Response to Social Engineering Attacks<\/strong><\/p>\n\n\n\n<p><strong>Introduction <\/strong><\/p>\n\n\n\n<p>The article that I am reviewing is titled Harnessing Large Language Models to Simulate<br>Realistic Human Responses to Social Engineering Attacks: A Case Study. The article is adapted<br>from the International Journal of Cybersecurity Intelligence and Cybercrime. In this paper, I will<br>discuss how the article relates to social science principles, a description of the study\u2019s questions<br>or hypotheses, and additional information about the article.<\/p>\n\n\n\n<p><strong>Study relations to social science principles<\/strong><\/p>\n\n\n\n<p>The topic of this article relates to the criminology, psychology, and sociology<br>components of the principles of the social sciences. The article relates to the criminology<br>component due to the fact that it evaluates social engineering attacks and phishing attacks,<br>attacks that cybercriminals use to commit crimes. The article involves the psychology aspect of<br>the principles of social science because it explains how human behavior can be altered due to<br>cyberattacks. For example, the authors discussed how they used social engineering attacks on<br>large language models such as the GPT-4 device that generate human-like behavior to analyze<br>how humans reacted to cybercriminals attacks. The authors demonstrate the sociology aspect by<br>investigating human behavior involving hacking.<\/p>\n\n\n\n<p><strong>Description of the study\u2019s research questions<\/strong><\/p>\n\n\n\n<p>The research question the authors analyzed was \u201cHow does the stimulated behavior of<br>human targets, based on the Big Five personality traits, respond to social engineering attacks?\u201d<br>Asfour, M., and Murillo, J. C. (2023) The author conducted this research by implementing<br>several methods. The methods used were the Big Five personality traits and social engineering<br>attacks, especially phishing attacks. The article illustrates the methods while explaining in<br>specifics the components that contribute to each of the Big Five personality traits, which are<br>experiment design, simulation tool setup, target persona generation, attack simulation, and<br>response analysis. From the data collected in this article, the authors concluded that certain<br>personality traits can affect the vulnerability of a person to social engineering attacks (Asfour,<br>M., &amp; Murillo, J. C., 2023). The authors prove the analysis of this experiment through the<br>various trials they completed on phishing attacks against people with different personality traits.<\/p>\n\n\n\n<p><strong>Conclusion of the study<\/strong><\/p>\n\n\n\n<p>The main point of this article was for the authors to analyze realistic human responses to<br>social engineering attacks. The experiment implemented various methods to analyze it, such as<br>GPT-4 innovation that mimics human behavior and the Big Five personality traits chart. To<br>conclude, the findings demonstrate that certain personality traits can make a person vulnerable to<br>cybersecurity attacks. The article also explains how society has to take into consideration the<br>importance of learning how to maneuver with technology based on certain personality traits. The<br>authors highlighted valuable components in this article about human interactions with<br>cyberattacks.<\/p>\n\n\n\n<p><\/p>\n\n\n\n<p><\/p>\n\n\n\n<p>The research question the authors analyzed was \u201cHow does the stimulated behavior of<br>human targets, based on the Big Five personality traits, respond to social engineering attacks?\u201d<br>Asfour, M., and Murillo, J. C. (2023) The author conducted this research by implementing<br>several methods. The methods used were the Big Five personality traits and social engineering<br>attacks, especially phishing attacks. The article illustrates the methods while explaining in<br>specifics the components that contribute to each of the Big Five personality traits, which are<br>experiment design, simulation tool setup, target persona generation, attack simulation, and<br>response analysis. From the data collected in this article, the authors concluded that certain<br>personality traits can affect the vulnerability of a person to social engineering attacks (Asfour,<br>M., &amp; Murillo, J. C., 2023). The authors prove the analysis of this experiment through the<br>various trials they completed on phishing attacks against people with different personality traits.<br>Conclusion of the study<br>The main point of this article was for the authors to analyze realistic human responses to<br>social engineering attacks. The experiment implemented various methods to analyze it, such as<br>GPT-4 innovation that mimics human behavior and the Big Five personality traits chart. To<br>conclude, the findings demonstrate that certain personality traits can make a person vulnerable to<br>cybersecurity attacks. The article also explains how society has to take into consideration the<br>importance of learning how to maneuver with technology based on certain personality traits. The<br>authors highlighted valuable components in this article about human interactions with<br>cyberattacks.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Article Review Two: The Stimulation of Human Response to Social Engineering Attacks Introduction The article that I am reviewing is titled Harnessing Large Language Models to SimulateRealistic Human Responses to Social Engineering Attacks: A Case Study. The article is adaptedfrom the International Journal of Cybersecurity Intelligence and Cybercrime. In this paper, I willdiscuss how the&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/anyiahp\/2023\/11\/04\/article-two-review\/\">Read More<\/a><\/div>\n","protected":false},"author":26271,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/anyiahp\/wp-json\/wp\/v2\/posts\/334"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/anyiahp\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/anyiahp\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/anyiahp\/wp-json\/wp\/v2\/users\/26271"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/anyiahp\/wp-json\/wp\/v2\/comments?post=334"}],"version-history":[{"count":1,"href":"https:\/\/sites.wp.odu.edu\/anyiahp\/wp-json\/wp\/v2\/posts\/334\/revisions"}],"predecessor-version":[{"id":335,"href":"https:\/\/sites.wp.odu.edu\/anyiahp\/wp-json\/wp\/v2\/posts\/334\/revisions\/335"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/anyiahp\/wp-json\/wp\/v2\/media?parent=334"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/anyiahp\/wp-json\/wp\/v2\/categories?post=334"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/anyiahp\/wp-json\/wp\/v2\/tags?post=334"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}