Abstract

ABSTRACT End users present a key challenge for the protection of contemporary information security systems. The manipulation of people through deceit to gain access to sensitive information and otherwise secure systems is known to hackers, information security practitioners, and other technologists as “social engineering.” To date, little research has investigated the attributes that people who engage in such deception – so-called “social engineers” – associate with vulnerable targets. To address this gap, this study engages in a grounded theory-based analysis of interviews with nonprofessional and professional social engineers. The results describe six attributes of a “model victim” for social engineers, a hypothetical person considered particularly susceptible to social engineering deceptions: (1) prized, (2) uninformed, (3) unconcerned, (4) outgoing, (5) connected, and (6) controlled. Additionally, this study describes heuristic categories described by participants to help make decisions about target vulnerability which include target socio-demographic characteristics, social roles, and organizational positions. Implications for theory, future research, and policy are considered.

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.