Visualizing Cyber Personality

S Park, D Choi, J Kim - AMCIS 2004 Proceedings, 2004 - aisel.aisnet.org
personality on websites. Second, we explored and identified the relationships between e-brand
personalities and … We defined four e-brand personality factors and nineteen personality

A survey on human and personality vulnerability assessment in cyber-security: Challenges, approaches, and open issues

D Papatsaroucha, Y Nikoloudakis, I Kefaloukos… - arXiv preprint arXiv …, 2021 - arxiv.org
personality traits of an individual can be measured through a questionnaire of 50 questions
[66]. Personality traits can serve as indicators of the cyber-… that certain personality traits, like …

A comprehensive framework for cyber behavioral analysis based on a systematic review of cyber profiling literature

M Martineau, E Spiridon, M Aiken - Forensic Sciences, 2023 - mdpi.com
… on cyber profiling as a foundation for the development of a comprehensive framework for
applying profiling techniques to cybercrime—described as cyber … base in cyber behavioral …

Learning models to detect personality traits of cyber attackers: a combined approach using honeypot and surveys.

CJ Martínez Santander - 2024 - bibdigital.epn.edu.ec
… approach to detecting hacker personality traits. By combining … holistic perspective on the
psychology of cyber-attacks. This … and classify relevant personality traits in the context of cyber-…

Fostering Cyber-Physical Social Systems through an Ontological Approach to Personality Classification Based on Social Media Posts

A Cernian, N Vasile, IS Sacala - Sensors, 2021 - mdpi.com
… of personality study. We have found that there are many studies aimed at linking personality
… The Data Visualization Engine, which provides the output as a dashboard containing two …

An organizational visualization profiler tool based on social interactions

P Karampelas - … in Action: Technologies for Civilian, Military and Cyber …, 2018 - Springer
… the insider threat is that of the proactive personality or behavioral analysis of the employees.
… Moreover, an attempt is presented to classify employees into personality models monitoring …

A management system for cyber individuals and heterogeneous data

J Ren, J Ma, R Huang, Q Jin… - 2014 IEEE 11th Intl Conf …, 2014 - ieeexplore.ieee.org
… in Cyber-I’s growth. Numerous things can be done with the help of the Big Five personality
… Jquery plugin named Jstree is exploited as a visualization tool to display personal data. A …

Detecting user behavior in cyber threat intelligence: Development of Honeypsy system

M Odemis, C Yucel, A Koltuksuz - Security and Communication …, 2022 - Wiley Online Library
… Our Honeypsy system is composed of a Big-5 personality test, a cyber expertise test, and a
… to examining unknown cyber threats. We use SPLUNK to monitor and visualize the honeypot …

Research on Cyber ISR Visualization Method Based on BGP Archive Data through Hacking Case Analysis of North Korean Cyber-Attack Groups

J Youn, K Kim, D Kang, J Lee, M Park, D Shin - Electronics, 2022 - mdpi.com
cyber-attack groups for cyber ISR battlefield visualization. … visualization of the cyber ISR
battlefield based on the BGP archive data. Through this, we propose a method to visualize cyber

Archetype-based modeling of persona for comprehensive personality computing from personal big data

A Guo, J Ma - Sensors, 2018 - mdpi.com
… into automatic personality computing. However, the integrity and accuracy of the results from
current automatic personality computing is insufficient for the elaborate modeling in Cyber-I …