2020
DOI: 10.1108/ics-07-2020-0113
|View full text |Cite
|
Sign up to set email alerts
|

How social engineers use persuasion principles during vishing attacks

Abstract: Purpose This study aims to examine how social engineers use persuasion principles during vishing attacks. Design/methodology/approach In total, 86 examples of real-world vishing attacks were found in articles and videos. Each example was coded to determine which persuasion principles were present in that attack and how they were implemented, i.e. what specific elements of the attack contributed to the presence of each persuasion principle. Findings Authority (A), social proof (S) and distraction (D) were t… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0
1

Year Published

2021
2021
2024
2024

Publication Types

Select...
5
2
1
1

Relationship

0
9

Authors

Journals

citations
Cited by 25 publications
(5 citation statements)
references
References 15 publications
0
4
0
1
Order By: Relevance
“…The prevalence of deception, social engineering and other forms of deceptive communication online shows no signs of abating anytime soon (Das et al , 2022; Jones et al , 2021; Van der Walt and Eloff, 2019; Xu and Rajivan, 2023). To reduce the damage that ensues after an individual is victimized, training Internet users to detect and disregard deceptive communication seems to be the only practical solution, at least until automated means of filtering deception are implemented and made widely available (Twitchell and Fuller, 2019; Twyman et al , 2015).…”
Section: Discussionmentioning
confidence: 99%
“…The prevalence of deception, social engineering and other forms of deceptive communication online shows no signs of abating anytime soon (Das et al , 2022; Jones et al , 2021; Van der Walt and Eloff, 2019; Xu and Rajivan, 2023). To reduce the damage that ensues after an individual is victimized, training Internet users to detect and disregard deceptive communication seems to be the only practical solution, at least until automated means of filtering deception are implemented and made widely available (Twitchell and Fuller, 2019; Twyman et al , 2015).…”
Section: Discussionmentioning
confidence: 99%
“…An orthogonal approach to building an ad-hoc dataset involves the use of well-known existing datasets. For instance, the datasets originally used in [83,85] were also used to train and evaluate the systems recently proposed in [82,84]. Similarly, other scholars used data published in well-known scientific repositories such as Mendeley, Kaggle and the UCI collection of machine learning datasets.…”
Section: Datasetsmentioning
confidence: 99%
“…Approximately, Jonathan [74] believes that the successful implementation of SE attacks stems from the application of psychological and discusses social psychology in SE attacks. Keith et al [75] further analyzed 86 instances of phishing attacks and social psychology in the attacks [74,76]. They defined five "deception guidelines" which can guide SE hackers to deceive users, as shown in Table 3.…”
Section: Users' Psychology Exploited By Hackersmentioning
confidence: 99%