Social Engineering in Cybersecurity: a Domain Ontology and Knowledge Graph Application Examples

Total Page:16

File Type:pdf, Size:1020Kb

Social Engineering in Cybersecurity: a Domain Ontology and Knowledge Graph Application Examples Wang et al. This paper was accepted by Cybersecurity (ISSN: 2523-3246) on 2021-4-28. doi:10.1186/s42400-021-00094-6 RESEARCH Social Engineering in Cybersecurity: A Domain Ontology and Knowledge Graph Application Examples Zuoguang Wang1,2*, Hongsong Zhu1,2*,PeipeiLiu1,2 and Limin Sun1,2 Abstract Social engineering has posed a serious threat to cyberspace security. To protect against social engineering attacks, a fundamental work is to know what constitutes social engineering. This paper first develops a domain ontology of social engineering in cybersecurity and conducts ontology evaluation by its knowledge graph application. The domain ontology defines 11 concepts of core entities that significantly constitute or a↵ect social engineering domain, together with 22 kinds of relations describing how these entities related to each other. It provides a formal and explicit knowledge schema to understand, analyze, reuse and share domain knowledge of social engineering. Furthermore, this paper builds a knowledge graph based on 15 social engineering attack incidents and scenarios. 7 knowledge graph application examples (in 6 analysis patterns) demonstrate that the ontology together with knowledge graph is useful to 1) understand and analyze social engineering attack scenario and incident, 2) find the top ranked social engineering threat elements (e.g. the most exploited human vulnerabilities and most used attack mediums), 3) find potential social engineering threats to victims, 4) find potential targets for social engineering attackers, 5) find potential attack paths from specific attacker to specific target, and 6) analyze the same origin attacks. Keywords: Social engineering attack; Cyber security; Ontology; Knowledge graph; Attack scenarios; Threat analysis; Attack path; Attack model; Taxonomy; Composition and structure 1 Introduction brute-force and software vulnerabilities exploit, social In the context of cybersecurity, social engineering de- engineering exploits human vulnerabilities to bypass scribes a type of attack in which the attacker exploit or break through security barriers, without having to human vulnerabilities (by means such as influence, combat with firewall or antivirus software by deep cod- persuasion, deception, manipulation and inducing) to ing. 2) For some attack scenarios, social engineering breach the security goals (such as confidentiality, in- can be as simple as making a phone call and imper- tegrity, availability, controllability and auditability) of sonating an insider to elicit the classified information. cyberspace elements (such as infrastructure, data, re- 3) Especially in past decades when defense mainly fo- source, user and operation). Succinctly, social engi- cus on the digital domain yet overlooks human factors neering is a type of attack wherein the attacker ex- in security. As the development of security technology, ploit human vulnerability through social interaction classical attacks become harder and more and more to breach cyberspace security [1]. Many distinctive attackers turn to social engineering. 4) Human vulner- features make social engineering to be a quite pop- abilities seem inevitable, after all, there is not a cyber ular attack in hacker community and a serious, uni- system doesn’t rely on humans or involve human fac- versal and persistent threat to cyber security. 1) Com- tors on earth and these human factors are vulnerable pared to classical attacks such as password cracking by obviously or can be largely turned into security vulner- abilities by skilled attackers. Moreover, social engineer- *Correspondence: [email protected]; [email protected] ing threat is increasingly serious along with its evolu- 1School of Cyber Security, University of Chinese Academy of Sciences, tion in new technical and cyber environment. Social Beijing, CN engineering gets not only large amounts of sensitive in- 2Beijing Key Laboratory of IoT Information Security Technology, Institute of Information Engineering, Chinese Academy of Sciences, Beijing, CN formation about people, network and devices but also Full list of author information is available at the end of the article more attack channels with the wide applications of So- This article has been accepted for publication in a future issue of Cybersecurity (ISSN: 2523-3246), but has not been fully edited. Content may change prior to final publication. Citation information, DOI: 10.1186/s42400-021-00094-6 This work is licensed under a Creative Commons Attribution 4.0 License. For more information, see https://creativecommons.org/licenses/by/4.0/. Wang et al. This paper was accepted by Cybersecurity (ISSN: 2523-3246) on 28 April. doi:10.1186/s42400-021-00094-6 Page 2 of 20 cial Networking Sites (SNSs), Internet of Things (IoT), knowledge graph. Section 6 is the discussion. Section 7 Industrial Internet, mobile communication and wear- concludes the paper. able devices. And large part of above information is open source, which simplifies the information gather- 2 Methodology to develop domain ing for social engineering. Social engineering becomes ontology more efficient and automated by technology such as There is no single correct way or methodology for de- machine learning and artificial intelligence. As a result, veloping ontologies [2]. Since ontology design is a cre- a large group of targets can be reached and specific vic- ative process and many factors will a↵ect the design tims can be carefully selected to craft more creditable choices, such as the potential applications of the on- attack. The spread of social engineering tools decrease tology, the designer’s understanding and view of the the threat threshold. Loose office policy (bring your domain, di↵erent domain features, anticipations of the own device, remote office, etc.) leads to the weakening ontology to be more intuitive, general, detailed, exten- of area-isolation of di↵erent security levels and cre- sible and / or maintainable. ates more attack opportunities. Targeted, large-scale, In this paper, we design the methodology to develop robotic, automated and advanced social engineering domain ontology of social engineering based on the attack is becoming possible [1]. method reported in work [2] with some modification. To protect against social engineering, the fundamen- Prot´eg´e5.5.0 [3] is used to edit and implement the tal work is to know what social engineering is, what en- ontology. It should be noted that ”entity” in real word tities significantly constitute or a↵ect social engineer- are described as ”concept” in ontology and ”class” in ing and how these entities relate to each other. Study Prot´eg´e; ”relation” is described as ”object property” [1] proposed a definition of social engineering in cyber- in Prot´eg´e. The methodology is described as Figure 1. security based on systematically conceptual evolution analysis. Yet only the definition is not enough to get Determine the Consider reusing insight into all the issue above, and further, to server as domain, purpose existing ontologies a tool for analyzing social engineering attack scenarios and scope or incidents and providing a formal, explicit, reusable knowledge schema of social engineering domain. Enumerate important Ontology is a term comes from philosophy to de- terms in the ontology scribe the existence of beings in the world and adopted in informatics, semantic web, knowledge engineering and Artificial Intelligence (AI) fields, in which an on- Define core concepts, Define relations, concept taxonomy relation description tology is a formal, explicit description of knowledge as and description and characteristic a set of concepts within a domain and the relation- ships among them (i.e. what entities exist in a domain revise and how they related). It defines a common vocab- Define other Result: ontology Validate descriptions e.g. rules, ulary for researchers who need to share information annotations, axioms and includes definitions of basic concepts in the do- main and their relations [2]. In an ontology, semantic Figure 1 Overview of methodology to develop domain ontology information and components such as concept, object, of social engineering relation, attribute, constraints and axiom are encoded or formally specified, by which an ontology is machine- (1) Determine the domain, purpose and scope. readable and has capacity for reasoning. In this way, As described before, the domain of the ontology is ontology not only introduce a formal, explicit, share- social engineering in cybersecurity. The purpose of the able and reusable knowledge representation but also ontology, i) for design is to present what entities signif- can add new knowledge about the domain. icantly constitute or a↵ect social engineering and how Thus, we propose a domain ontology of social engi- these entities relate to each other, ii) and for appli- neering to understand, analyze, reuse and share do- cation is to server as a tool for understanding social main knowledge of social engineering. engineering, analyzing social engineering attack sce- Organization: Section 2 describes the the back- narios or incidents and providing a formal, explicit, ground material and methodology to develop domain reusable knowledge schema of social engineering do- ontology. Section 3 presents the material and ontology main. Thus, social engineering itself as a type of attack, implementation. Section 4 is the result: domain ontol- measures regarding social engineering defense will not ogy of social engineering in cybersecurity. Section 5 be included here although they are important.
Recommended publications
  • 1992-Common Sense Retrieval
    From: AAAI-92 Proceedings. Copyright ©1992, AAAI (www.aaai.org). All rights reserved. Common Sense A. Julian Graddock University of B.C. Vancouver, B.C., V6T lW5 [email protected] Abstract Such inferences are made by retrieving common sense knowledge: General stable knowledge about the An important and readily available source unobserved properties obtained by aggregating over a of knowledge for common sense reasoning is set of similar experiences in the EKB. Thus, the CSR partial descriptions of specific experiences. might infer that the bird sitting on the lawn flys if Knowledge bases (KBs) containing such in- flying is part of the common sense knowledge about formation are called episodic knowledge buses similar birds. (EKB). Aggregations of episodic knowledge In this document I provide a first order framework provide common sense knowledge about the appropriate for: 1. Describing experiences, and 2. Mak- unobserved properties of ‘new’ experiences. ing inferences by retrieving common sense knowledge Such knowledge is retrieved by applying directly from an EKB. The framework differs from statistics to a relevant subset of the EKB many existing knowledge representation techniques as called the reference class. it provides information about specific experiences. I I study a manner in which a corpus of expe- judge the effectiveness of my model by its ability to riences can be represented to allow common flexibly and efficiently retrieve common sense knowl- sense retrieval which is: 1. Flexible enough edge. to allow the common sense reasoner to deal with ‘new’ experiences, and 2. In the simplest My solution case, reduces to efficient database look-up.
    [Show full text]
  • Deception, Disinformation, and Strategic Communications: How One Interagency Group Made a Major Difference by Fletcher Schoen and Christopher J
    STRATEGIC PERSPECTIVES 11 Deception, Disinformation, and Strategic Communications: How One Interagency Group Made a Major Difference by Fletcher Schoen and Christopher J. Lamb Center for Strategic Research Institute for National Strategic Studies National Defense University Institute for National Strategic Studies National Defense University The Institute for National Strategic Studies (INSS) is National Defense University’s (NDU’s) dedicated research arm. INSS includes the Center for Strategic Research, Center for Complex Operations, Center for the Study of Chinese Military Affairs, Center for Technology and National Security Policy, Center for Transatlantic Security Studies, and Conflict Records Research Center. The military and civilian analysts and staff who comprise INSS and its subcomponents execute their mission by conducting research and analysis, publishing, and participating in conferences, policy support, and outreach. The mission of INSS is to conduct strategic studies for the Secretary of Defense, Chairman of the Joint Chiefs of Staff, and the Unified Combatant Commands in support of the academic programs at NDU and to perform outreach to other U.S. Government agencies and the broader national security community. Cover: Kathleen Bailey presents evidence of forgeries to the press corps. Credit: The Washington Times Deception, Disinformation, and Strategic Communications: How One Interagency Group Made a Major Difference Deception, Disinformation, and Strategic Communications: How One Interagency Group Made a Major Difference By Fletcher Schoen and Christopher J. Lamb Institute for National Strategic Studies Strategic Perspectives, No. 11 Series Editor: Nicholas Rostow National Defense University Press Washington, D.C. June 2012 Opinions, conclusions, and recommendations expressed or implied within are solely those of the contributors and do not necessarily represent the views of the Defense Department or any other agency of the Federal Government.
    [Show full text]
  • Correlates of Imaginative Suggestibility and Hypnotizability in Children
    University of Massachusetts Amherst ScholarWorks@UMass Amherst Doctoral Dissertations 1896 - February 2014 1-1-2000 Correlates of imaginative suggestibility and hypnotizability in children. Bruce C. Poulsen University of Massachusetts Amherst Follow this and additional works at: https://scholarworks.umass.edu/dissertations_1 Recommended Citation Poulsen, Bruce C., "Correlates of imaginative suggestibility and hypnotizability in children." (2000). Doctoral Dissertations 1896 - February 2014. 1271. https://scholarworks.umass.edu/dissertations_1/1271 This Open Access Dissertation is brought to you for free and open access by ScholarWorks@UMass Amherst. It has been accepted for inclusion in Doctoral Dissertations 1896 - February 2014 by an authorized administrator of ScholarWorks@UMass Amherst. For more information, please contact [email protected]. CORRELATES OF IMAGINATIVE SUGGESTIBILITY AND HYPNOTIZABILITY IN CHILDREN A Dissertation Presented by BRUCE C. POULSEN Submitted to the Graduate School of the University of Massachusetts Amherst in partial fulfillment of the requirements for the degree of DOCTOR OF PHILOSOPHY February 2000 Education © Copyright by Bruce Craig Poulsen 2000 All Rights Reserved CORRELATES OF IMAGINATIVE SUGGESTIBILITY AND HYPNOTIZABILITY IN CHILDREN A Dissertation Presented by BRUCE C. POULSEN B^\ty W. Jackson, Dean S^hqol of Education ACKNOWLEDGMENTS I would like to gratefully acknowledge the assistance and support of several individuals, without whom this project would not have been possible. First, I am indebted to William Matthews, Jr., Ph.D. and Irving Kirsch, Ph.D. for mitial suggestions for both the research design and statistical analysis. Karen Olness, M.D. and Steven Jay Lynn, Ph.D. both provided helpful suggestions for selecting the measurement instruments. Several individuals at Primary Children's Medical Center provided invaluable support during the data collection procedures.
    [Show full text]
  • Social Engineering in Cybersecurity: a Domain Ontology and Knowledge Graph Application Examples Zuoguang Wang1,2* , Hongsong Zhu1,2* ,Peipeiliu1,2 and Limin Sun1,2
    Wang et al. Cybersecurity (2021) 4:31 Cybersecurity https://doi.org/10.1186/s42400-021-00094-6 RESEARCH Open Access Social engineering in cybersecurity: a domain ontology and knowledge graph application examples Zuoguang Wang1,2* , Hongsong Zhu1,2* ,PeipeiLiu1,2 and Limin Sun1,2 Abstract Social engineering has posed a serious threat to cyberspace security. To protect against social engineering attacks, a fundamental work is to know what constitutes social engineering. This paper first develops a domain ontology of social engineering in cybersecurity and conducts ontology evaluation by its knowledge graph application. The domain ontology defines 11 concepts of core entities that significantly constitute or affect social engineering domain, together with 22 kinds of relations describing how these entities related to each other. It provides a formal and explicit knowledge schema to understand, analyze, reuse and share domain knowledge of social engineering. Furthermore, this paper builds a knowledge graph based on 15 social engineering attack incidents and scenarios. 7 knowledge graph application examples (in 6 analysis patterns) demonstrate that the ontology together with knowledge graph is useful to 1) understand and analyze social engineering attack scenario and incident, 2) find the top ranked social engineering threat elements (e.g. the most exploited human vulnerabilities and most used attack mediums), 3) find potential social engineering threats to victims, 4) find potential targets for social engineering attackers, 5) find potential attack paths from specific attacker to specific target, and 6) analyze the same origin attacks. Keywords: Social engineering attack, Cyber security, Ontology, Knowledge graph, Attack scenarios, Threat analysis, Attack path, Attack model, Taxonomy, Composition and structure Introduction (Wang et al.
    [Show full text]
  • Vivid Knowledge and Tractable Reasoning: Preliminary Report
    Vivid Knowledge and Tractable Reasoning: Preliminary Report David W. Etherington Alex Borgida Ronald J. Brachman AT&T Bell Laboratories Department of Computer Science Henry Kautz 600 Mountain Avenue Rutgers University AT&T Bell Laboratories Murray Hill, NJ 07974-2070 New Brunswick, NJ Murray Hill, NJ 07974-2070 Abstract can be expressed in the knowledge base (KB) is restricted (sometimes severely) to guarantee that queries can be Mundane, everyday, reasoning is fast. Given answered in more or less reasonable time. In the lat• the inherent complexity of sound and com• ter, restrictions like avoiding chaining or four-valued in• plete reasoning with representations expressive terpretations yield limited conclusions, albeit from rela• enough to capture what people seem to know, tively expressive KB's. commonsense reasoning must require shortcuts We conjecture that a key to efficient problem-solving and assumptions. Some means of simplifying lies in a notion of commonsense reasoning—the kind of the retrieval of the inferential consequences of reasoning that people engage in all the time without re• a set of facts is obviously required. Instead of course to "paper and pencil'1, reasoning by cases, back• looking, as others have, at limited inference or tracking, or particularly deep thought.1 Commonsense syntactic restrictions on the representation, we reasoning is fast: if it were a problem-solver's normal explore the use of "vivid" forms for knowledge, mode of reasoning, then the problem-solver would be in which determining the truth of a sentence is fast. Paradoxically, studies of commonsense reasoning on the order of a database retrieval. in AI (e.g., nonmonotonic logics) have frequently led to In order to base a reasoning system on mechanisms that are even less tractable than logical de• vivid knowledge, we consider ways to construct duction.
    [Show full text]
  • Driving Distraction Away
    Driving Distraction Away www.safestart.com 1 Driving DISTRACTION Away That quote, from the National Safety Council’s president and CEO Deborah Hersman, says it all. Driving is such a big risk factor that it’s the only injury Driving a car is one of the category to receive a full section (it’s 36 pages!) in the National Safety riskiest activities any of Council’s Injury Facts 2015. us undertake in spite of The frequency and potential severity of vehicle collisions places driving in the worst corner of any risk matrix. Add distraction to the mix and driving decades of vehicle design becomes the riskiest thing we do every day. improvements and traffic The standard picture of distracted driving is a teen with the steering wheel in safety advancements. one hand and a cellphone in the other. But the issue is much bigger—and you won’t solve it unless you shift your focus from driving to distraction. DISTRACTION, NOT DRIVING, IS THE KEY The dangers of distraction aren’t confined to the car. There’s almost no difference between distracted driving, distracted working, or doing anything else while distracted. Solve distraction in all its forms and you’ll make people a lot safer. EHS Today, “Motor Vehicle Deaths in 2015 Show Large Increase Year-Over-Year”, February 17, 2016. www.safestart.com 2 Why You Should Care About DISTRACTED DRIVING Everyone drives or rides in a car. And that means distracted driving affects every single business in the world. Because no matter where a crash occurs—at work or off the job—it can affect drivers, passengers and pedestrians for weeks and months Employee Crash Injury/FatalityReducedLost Morale ProductivityEquipmentCompany Damage Liability afterwards.
    [Show full text]
  • Module 1: Understanding Distress Intolerance Page 1 • Psychotherapy • Research • Training Facing Your Feelings Introduction
    Facing Your Feelings Facing Your Feelings Facing Your Feelings Module 1 Understanding Distress Intolerance Introduction 2 What Is Distress Intolerance? 2 The Paradox… 3 Am I Distress Intolerant? 4 Healthy Distress Tolerance 5 How Does Distress Intolerance Develop? 5 Distress Intolerant Beliefs 6 Distress Escape Methods 7 Distress Intolerance Model 8 My Distress Intolerance Model 9 The Good News… 10 Module Summary 11 About the Modules 12 The information provided in the document is for information purposes only. Please refer to the full disclaimer and copyright statements available at www.cci.health.gov.au regarding the information on this website before making use of such information. entre for C linical C I nterventions Module 1: Understanding Distress Intolerance Page 1 • Psychotherapy • Research • Training Facing Your Feelings Introduction We all experience emotions. Emotions are an important part of being human, and are essential to our survival. As humans we are designed to feel a whole range of emotions, some of which may be comfortable to us, and others may be uncomfortable. Most people dislike feeling uncomfortable. There are many different ways that humans can feel uncomfortable…we can be hot, cold, tired, in pain, hungry, unwell, and the list could go on. The type of discomfort we will be talking about in these modules is emotional discomfort, or what is often called distress. We may not like it, but experiencing uncomfortable emotions is a natural part of life. However, there is a difference between disliking unpleasant emotions, but nevertheless accepting that they are an inevitable part of life and hence riding through them, versus experiencing unpleasant emotions as unbearable and needing to get rid of them.
    [Show full text]
  • Reasoning with Models *
    Artificial Intelligence ELSEVIER Artificial Intelligence 87 ( 1996) 187-213 Reasoning with models * Roni Khardon *, Dan Roth ’ Aiken Computation Laboratory, Harvard University, 33 Oxford Street, Cambridge, MA 02138, LISA Received August 1994; revised January 1996 Abstract We develop a model-based approach to reasoning, in which the knowledge base is represented as a set of models (satisfying assignments) rather than a logical formula, and the set of queries is restricted. We show that for every propositional knowledge base (KB) there exists a set of characteristic models with the property that a query is true in KB if and only if it is satisfied by the models in this set. We characterize a set of functions for which the model-based representation is compact and provides efficient reasoning. These include cases where the formula-based repre- sentation does not support efficient reasoning. In addition, we consider the model-based approach to abductive reasoning and show that for any propositional KB, reasoning with its model-based representation yields an abductive explanation in time that is polynomial in its size. Some of our technical results make use of the monotone theory, a new characterization of Boolean functions recently introduced. The notion of restricted queries is inherent in our approach. This is a wide class of queries for which reasoning is efficient and exact, even when the model-based representation KB provides only an approximate representation of the domain in question. Moreover, we show that the theory developed here generalizes the model-based approach to reasoning with Horn expressions and captures even the notion of reasoning with Horn approxi- mations.
    [Show full text]
  • The Anatomy of a Moral Panic: Western Mainstream Media's
    Changing Societies & Personalities, 2019 Vol. 3, No. 3, pp. 189–206 http://dx.doi.org/10.15826/csp.2019.3.3.071 ARTICLE The Anatomy of a Moral Panic: Western Mainstream Media’s Russia Scapegoat Greg Simons Uppsala University, Sweden Turiba University, Latvia Ural Federal University, Yekaterinburg, Russia ABSTRACT Since 2014, there has been a very concerted campaign launched by the neo-liberal Western mainstream mass media against Russia. The format and content suggest that this is an attempt to induce a moral panic among the Western publics. It seems to be intended to create a sense of fear and to switch the logic to a series of emotionally- based reactions to assertion propaganda. Russia has been variously blamed for many different events and trends around the world, such as the “destroying” of Western “democracy”, and democratic values. In many regards, Russia is projected as being an existential threat in both the physical and intangible realms. This paper traces the strategic messages and narratives of the “Russia threat” as it is presented in Western mainstream media. Russia is connoted as a scapegoat for the failings of the neo-liberal democratic political order to maintain its global hegemony; therefore, Russia is viewed as the “menacing” other and a desperate measure to halt this gradual decline and loss of power and influence. This ultimately means that this type of journalism fails in its supposed fourth estate role, by directly aiding the hegemonic political power. KEYWORDS moral panic, Western mainstream media, Russia, propaganda, scapegoating, fourth estate Received 28 July 2019 © 2019 Gregory Simons Accepted 13 September 2019 [email protected] Published online 5 October 2019 190 Greg Simons Introduction Moral panic has been developed as a concept within sociology and came to greater attention after Stanley Cohen’s 1972 book on Folk Devils and Moral Panic.
    [Show full text]
  • Examination of Psychopathic Traits and Attention Using the Image Based Parity Task Veronica Claudia Llamas
    Loma Linda University TheScholarsRepository@LLU: Digital Archive of Research, Scholarship & Creative Works Loma Linda University Electronic Theses, Dissertations & Projects 9-2014 Examination of Psychopathic Traits and Attention Using the Image Based Parity Task Veronica Claudia Llamas Follow this and additional works at: http://scholarsrepository.llu.edu/etd Part of the Clinical Psychology Commons Recommended Citation Llamas, Veronica Claudia, "Examination of Psychopathic Traits and Attention Using the Image Based Parity Task" (2014). Loma Linda University Electronic Theses, Dissertations & Projects. 172. http://scholarsrepository.llu.edu/etd/172 This Dissertation is brought to you for free and open access by TheScholarsRepository@LLU: Digital Archive of Research, Scholarship & Creative Works. It has been accepted for inclusion in Loma Linda University Electronic Theses, Dissertations & Projects by an authorized administrator of TheScholarsRepository@LLU: Digital Archive of Research, Scholarship & Creative Works. For more information, please contact [email protected]. LOMA LINDA UNIVERSITY School of Behavioral Health in conjunction with the Faculty of Graduate Studies ____________________ Examination of Psychopathic Traits and Attention Using the Image Based Parity Task by Veronica Claudia Llamas ____________________ A Dissertation submitted in partial satisfaction of the requirements for the degree Doctor of Philosophy in Clinical Psychology ____________________ September 2014 © 2014 Veronica Claudia Llamas All Rights Reserved
    [Show full text]
  • Understanding and Treating Shame: the Role of the Clinician
    St. Catherine University SOPHIA Master of Social Work Clinical Research Papers School of Social Work 8-2016 Understanding and Treating Shame: The Role of the Clinician Jennifer Perez St. Catherine University, [email protected] Follow this and additional works at: https://sophia.stkate.edu/msw_papers Part of the Social Work Commons Recommended Citation Perez, Jennifer. (2016). Understanding and Treating Shame: The Role of the Clinician. Retrieved from Sophia, the St. Catherine University repository website: https://sophia.stkate.edu/msw_papers/695 This Clinical research paper is brought to you for free and open access by the School of Social Work at SOPHIA. It has been accepted for inclusion in Master of Social Work Clinical Research Papers by an authorized administrator of SOPHIA. For more information, please contact [email protected]. Understanding and Treating Shame: The Role of the Clinician by Jennifer Perez, L.S.W. MSW Clinical Research Paper Presented to the Faculty of the School of Social Work St. Catherine University and the University of St. Thomas St. Paul, Minnesota In Partial fulfillment of the Requirements for the Degree of Master of Social Work Committee Members Dr. David Roseborough (chair) Carli Kody, PhD Shelly Richardson, PhD The Clinical Research Project is a graduation requirement for MSW students at St. Catherine University/University of St. Thomas School of Social Work in St. Paul, Minnesota and is conducted within a nine-month time frame to demonstrate facility with basic social research methods. Students must independently conceptualize a research problem, formulate a research design that is approved by a research committee and the university Institutional Review Board, implement the project, and publicly present the findings of the study.
    [Show full text]
  • Esteem Moderate the Impact of Daily Social Rejection on Restrictive Eating Behaviours Among College Women
    Psychology & Health ISSN: 0887-0446 (Print) 1476-8321 (Online) Journal homepage: http://www.tandfonline.com/loi/gpsh20 Stomaching rejection: Self-compassion and self- esteem moderate the impact of daily social rejection on restrictive eating behaviours among college women Janine B. Beekman, Michelle L. Stock & George W. Howe To cite this article: Janine B. Beekman, Michelle L. Stock & George W. Howe (2017): Stomaching rejection: Self-compassion and self-esteem moderate the impact of daily social rejection on restrictive eating behaviours among college women, Psychology & Health, DOI: 10.1080/08870446.2017.1324972 To link to this article: http://dx.doi.org/10.1080/08870446.2017.1324972 Published online: 05 May 2017. Submit your article to this journal Article views: 30 View related articles View Crossmark data Full Terms & Conditions of access and use can be found at http://www.tandfonline.com/action/journalInformation?journalCode=gpsh20 Download by: [204.118.216.39] Date: 14 June 2017, At: 08:04 Psychology & Health, 2017 https://doi.org/10.1080/08870446.2017.1324972 Stomaching rejection: Self-compassion and self-esteem moderate the impact of daily social rejection on restrictive eating behaviours among college women Janine B. Beekman*,†, Michelle L. Stock and George W. Howe Department of Psychology, The George Washington University, Washington, DC, USA (Received 6 September 2016; accepted 18 April 2017) Objective: The present study examined whether having high self-esteem or a self-compassionate perspective help mitigate the impact of daily social rejection on negative affect and restrictive eating behaviours. Design: Following a baseline survey assessing self-esteem and self-compassion, 121 college women completed online daily diaries for one week.
    [Show full text]