首页> 外文期刊>Information & computer security >How social engineers use persuasion principles during vishing attacks
【24h】

How social engineers use persuasion principles during vishing attacks

机译:社交工程师如何在浪费期间使用说服原则

获取原文
获取原文并翻译 | 示例
       

摘要

Purpose - This study aims to examine how social engineers use persuasion principles during vishing attacks. Design/methodology/approach - In total, 86 examples of real-world vishing attacks were found in articles and videos. Each example was coded to determine which persuasion principles were present in that attack and how they were implemented, i.e. what specific elements of the attack contributed to the presence of each persuasion principle. Findings - Authority (A), social proof (S) and distraction (D) were the most widely used persuasion principles in vishing attacks, followed by liking, similarity and deception (L). These four persuasion principles occurred in a majority of vishing attacks, while commitment, reciprocation and consistency (C) did not. Further, certain sets of persuasion principles (i.e. authority, distraction, liking, similarity, and deception and social proof; , authority, commitment, reciprocation, and consistency, distraction, liking, similarity and deception, and social proof; and authority, distraction and social proof) were used more than others. It was noteworthy that despite their similarities, those sets of persuasion principles were implemented in different ways, and certain specific ways of implementing certain persuasion principles (e.g. vishers claiming to have authority over the victim) were quite rare. Originality/value - To the best of authors' knowledge, this study is the first to investigate how social engineers use persuasion principles during vishing attacks. As such, it provides important insight into how social engineers implement vishing attacks and lays a critical foundation for future research investigating the psychological aspects of vishing attacks. The present results have important implications for vishing countermeasures and education.
机译:目的 - 本研究旨在检查社交工程师如何在浪费期间使用劝说原则。设计/方法/方法 - 总共有86个现实世界熏蒸攻击的例子是在文章和视频中找到的。编码每个示例以确定该攻击中存在哪些说服原则以及它们的实施方式,即攻击的具体内容促成了每个劝说原则的存在。调查结果 - 权力(a),社会证明和分心(d)是浪花攻击中最广泛使用的劝说原则,其次是喜欢,相似性和欺骗(L)。这四项劝说原则发生在大多数浪费袭击中,而承诺,往复和一致性(C)没有。此外,某些劝说原则(即权威,分心,喜欢,相似性,以及欺骗和社会证明;,权威,承诺,往复和一致性,分心,喜好,相似性和欺骗,以及社会证明;和权威,分心和社会证明)比其他人更多。值得注意的是,尽管他们的相似之处,但这些劝说原则是以不同的方式实施的,以及实施某些劝说原则的某些特定方式(例如,声称对受害者有权力的争论者)非常罕见。原创性/价值 - 据作者所知,这项研究是第一个调查社交工程师在浪费袭击期间使用说服原则的研究。因此,它提供了重要的了解社交工程师如何实施熏蒸攻击,并为未来的研究奠定重要的基础,调查浪花攻击的心理方面。目前的结果对渴望对策和教育具有重要意义。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号