2021
DOI: 10.1002/spy2.161
|View full text |Cite
|
Sign up to set email alerts
|

Understanding and deciphering of social engineering attack scenarios

Abstract: Malicious scammers and social engineers are causing great harms to modern society, as they have led to the loss of data, information, money, and many more for individuals and companies. Knowledge about social engineering (SE) is wide-spread and it exits in non-academic papers and communication channels. Knowledge is mostly based on expert opinion and experience reports. Such knowledge, if articulated, can provide a valid source of knowledge and information. We performed the analysis of such sources, guided by … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
5
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
5

Relationship

1
4

Authors

Journals

citations
Cited by 9 publications
(20 citation statements)
references
References 32 publications
0
5
0
Order By: Relevance
“…Using social engineering knowledge to improve requirements engineering : Through our research studies on social engineering and phishing attacks, 31 which are related to information security, we are able to extract valuable insight and knowledge. From the knowledge gained from previous research study, 32,33 we found that social engineers are excellent elicitors of target victim information requirements. For better understanding, social engineers can be seen as a detective piecing together clues to a crime.…”
Section: Design Rationale and Explanation Of The Proposed Activitymentioning
confidence: 86%
See 2 more Smart Citations
“…Using social engineering knowledge to improve requirements engineering : Through our research studies on social engineering and phishing attacks, 31 which are related to information security, we are able to extract valuable insight and knowledge. From the knowledge gained from previous research study, 32,33 we found that social engineers are excellent elicitors of target victim information requirements. For better understanding, social engineers can be seen as a detective piecing together clues to a crime.…”
Section: Design Rationale and Explanation Of The Proposed Activitymentioning
confidence: 86%
“…In general, persuasion seeks to influence an audience's perception or behavior with the intent of achieving a specific result." 34 In this research study, we have utilized different persuasion techniques in the design of the activity such as (i) time pressure, 33 (ii) trust, 35 and (iii) curiosity. 36 One of the benefits of implementing time pressure in the activity design is that the players can face time pressure thereby increasing the chances of making mistakes and will be helpful in getting or deciding the winner.…”
Section: Design Rationale and Explanation Of The Proposed Activitymentioning
confidence: 99%
See 1 more Smart Citation
“…Complicating the thinking process [67][68][69] Language plays an integral role in the thought process for social interaction. This reliance can create an opportunity to invoke 'thinking confusion' through language.…”
Section: Sub-domains Of Language/reasoning Descriptionmentioning
confidence: 99%
“…Yasin et al 16 postulated a Social engineering analysis framework which may be applied in higher education in mitigating social engineering attacks. The framework is composed of social role analysis which examined who is the victim in the attack and the social expectation.…”
Section: Nature Of Software Engineering Attacksmentioning
confidence: 99%